<?xml version='1.0' encoding='utf-8'?>
<updates>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20006</id>
    <title>Important: OpenEXR security update</title>
    <updated date="2022-08-29 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: OpenEXR security update</summary>
    <description> A flaw was found in OpenEXR's B44Compressor. This flaw allows an attacker who can submit a crafted file to be processed by OpenEXR, to exhaust all memory accessible to the application. The highest threat from this vulnerability is to system availability.(CVE-2021-20298)
 A flaw was found in OpenEXR's hufDecode functionality. This flaw allows an attacker who can pass a crafted file to be processed by OpenEXR, to trigger an undefined right shift error. The highest threat from this vulnerability is to system availability.(CVE-2021-20304)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-20298" type="cve" title="fix CVE-2021-20298" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-20304" type="cve" title="fix CVE-2021-20304" />
    </references>
    <pkglist>
      <collection>
        <package name="OpenEXR-devel" version="2.2.0" release="28.uel20" epoch="0" arch="x86_64" src="OpenEXR-2.2.0-28.uel20.src.rpm">
          <filename>OpenEXR-devel-2.2.0-28.uel20.x86_64.rpm</filename>
        </package>
        <package name="OpenEXR-libs" version="2.2.0" release="28.uel20" epoch="0" arch="x86_64" src="OpenEXR-2.2.0-28.uel20.src.rpm">
          <filename>OpenEXR-libs-2.2.0-28.uel20.x86_64.rpm</filename>
        </package>
        <package name="OpenEXR" version="2.2.0" release="28.uel20" epoch="0" arch="x86_64" src="OpenEXR-2.2.0-28.uel20.src.rpm">
          <filename>OpenEXR-2.2.0-28.uel20.x86_64.rpm</filename>
        </package>
        <package name="OpenEXR-devel" version="2.2.0" release="28.uel20" epoch="0" arch="aarch64" src="OpenEXR-2.2.0-28.uel20.src.rpm">
          <filename>OpenEXR-devel-2.2.0-28.uel20.aarch64.rpm</filename>
        </package>
        <package name="OpenEXR-libs" version="2.2.0" release="28.uel20" epoch="0" arch="aarch64" src="OpenEXR-2.2.0-28.uel20.src.rpm">
          <filename>OpenEXR-libs-2.2.0-28.uel20.aarch64.rpm</filename>
        </package>
        <package name="OpenEXR" version="2.2.0" release="28.uel20" epoch="0" arch="aarch64" src="OpenEXR-2.2.0-28.uel20.src.rpm">
          <filename>OpenEXR-2.2.0-28.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20012</id>
    <title>Moderate: python-bleach security update</title>
    <updated date="2022-08-23 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: python-bleach security update</summary>
    <description>fix cve/bug or enhancement</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-23980" type="cve" title="fix CVE-2021-23980" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-bleach" version="5.0.1" release="1.uel20" epoch="0" arch="noarch" src="python-bleach-5.0.1-1.uel20.src.rpm">
          <filename>python3-bleach-5.0.1-1.uel20.noarch.rpm</filename>
        </package>
        <package name="python-bleach-help" version="5.0.1" release="1.uel20" epoch="0" arch="noarch" src="python-bleach-5.0.1-1.uel20.src.rpm">
          <filename>python-bleach-help-5.0.1-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20018</id>
    <title>Important: rsync security update</title>
    <updated date="2022-08-29 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: rsync security update</summary>
    <description> An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. However, the rsync client performs insufficient validation of file names. A malicious rsync server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rsync client target directory and subdirectories (for example, overwrite the .ssh/authorized_keys file).(CVE-2022-29154)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-29154" type="cve" title="fix CVE-2022-29154" />
    </references>
    <pkglist>
      <collection>
        <package name="rsync" version="3.1.3" release="9.uel20" epoch="0" arch="x86_64" src="rsync-3.1.3-9.uel20.src.rpm">
          <filename>rsync-3.1.3-9.uel20.x86_64.rpm</filename>
        </package>
        <package name="rsync" version="3.1.3" release="9.uel20" epoch="0" arch="aarch64" src="rsync-3.1.3-9.uel20.src.rpm">
          <filename>rsync-3.1.3-9.uel20.aarch64.rpm</filename>
        </package>
        <package name="rsync-help" version="3.1.3" release="9.uel20" epoch="0" arch="noarch" src="rsync-3.1.3-9.uel20.src.rpm">
          <filename>rsync-help-3.1.3-9.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20024</id>
    <title>Important: rubygem-yajl-ruby security update</title>
    <updated date="2022-07-11 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: rubygem-yajl-ruby security update</summary>
    <description> yajl-ruby is a C binding to the YAJL JSON parsing and generation library. The 1.x branch and the 2.x branch of `yajl` contain an integer overflow which leads to subsequent heap memory corruption when dealing with large (~2GB) inputs. The reallocation logic at `yajl_buf.c#L64` may result in the `need` 32bit integer wrapping to 0 when `need` approaches a value of 0x80000000 (i.e. ~2GB of data), which results in a reallocation of buf-&gt;alloc into a small heap chunk. These integers are declared as `size_t` in the 2.x branch of `yajl`, which practically prevents the issue from triggering on 64bit platforms, however this does not preclude this issue triggering on 32bit builds on which `size_t` is a 32bit integer. Subsequent population of this under-allocated heap chunk is based on the original buffer size, leading to heap memory corruption. This vulnerability mostly impacts process availability. Maintainers believe exploitation for arbitrary code execution is unlikely. A patch is available and anticipated to be part of yajl-ruby version 1.4.2. As a workaround, avoid passing large inputs to YAJL.(CVE-2022-24795)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-24795" type="cve" title="fix CVE-2022-24795" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-yajl-ruby" version="1.4.3" release="1.uel20" epoch="0" arch="x86_64" src="rubygem-yajl-ruby-1.4.3-1.uel20.src.rpm">
          <filename>rubygem-yajl-ruby-1.4.3-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-yajl-ruby" version="1.4.3" release="1.uel20" epoch="0" arch="aarch64" src="rubygem-yajl-ruby-1.4.3-1.uel20.src.rpm">
          <filename>rubygem-yajl-ruby-1.4.3-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-yajl-ruby-help" version="1.4.3" release="1.uel20" epoch="0" arch="noarch" src="rubygem-yajl-ruby-1.4.3-1.uel20.src.rpm">
          <filename>rubygem-yajl-ruby-help-1.4.3-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20025</id>
    <title>Important: python-lxml security update</title>
    <updated date="2022-07-25 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: python-lxml security update</summary>
    <description> NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows triggering crashes through forged input data, given a vulnerable code sequence in the application. The vulnerability is caused by the iterwalk function (also used by the canonicalize function). Such code shouldn't be in wide-spread use, given that parsing + iterwalk would usually be replaced with the more efficient iterparse function. However, an XML converter that serialises to C14N would also be vulnerable, for example, and there are legitimate use cases for this code sequence. If untrusted input is received (also remotely) and processed via iterwalk function, a crash can be triggered.(CVE-2022-2309)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-2309" type="cve" title="fix CVE-2022-2309" />
    </references>
    <pkglist>
      <collection>
        <package name="python2-lxml" version="4.5.2" release="8.uel20" epoch="0" arch="x86_64" src="python-lxml-4.5.2-8.uel20.src.rpm">
          <filename>python2-lxml-4.5.2-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-lxml" version="4.5.2" release="8.uel20" epoch="0" arch="x86_64" src="python-lxml-4.5.2-8.uel20.src.rpm">
          <filename>python3-lxml-4.5.2-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="python-lxml-help" version="4.5.2" release="8.uel20" epoch="0" arch="noarch" src="python-lxml-4.5.2-8.uel20.src.rpm">
          <filename>python-lxml-help-4.5.2-8.uel20.noarch.rpm</filename>
        </package>
        <package name="python3-lxml" version="4.5.2" release="8.uel20" epoch="0" arch="aarch64" src="python-lxml-4.5.2-8.uel20.src.rpm">
          <filename>python3-lxml-4.5.2-8.uel20.aarch64.rpm</filename>
        </package>
        <package name="python2-lxml" version="4.5.2" release="8.uel20" epoch="0" arch="aarch64" src="python-lxml-4.5.2-8.uel20.src.rpm">
          <filename>python2-lxml-4.5.2-8.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20026</id>
    <title>Important: mod_wsgi security update</title>
    <updated date="2022-08-02 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: mod_wsgi security update</summary>
    <description> A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.(CVE-2022-2255)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-2255" type="cve" title="fix CVE-2022-2255" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-mod_wsgi" version="4.6.4" release="3.uel20" epoch="0" arch="x86_64" src="mod_wsgi-4.6.4-3.uel20.src.rpm">
          <filename>python3-mod_wsgi-4.6.4-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-mod_wsgi" version="4.6.4" release="3.uel20" epoch="0" arch="aarch64" src="mod_wsgi-4.6.4-3.uel20.src.rpm">
          <filename>python3-mod_wsgi-4.6.4-3.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20029</id>
    <title>Moderate: gdm security update</title>
    <updated date="2022-07-21 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: gdm security update</summary>
    <description> A flaw was found in GDM in versions prior to 3.38.2.1. A race condition in the handling of session shutdown makes it possible to bypass the lock screen for a user that has autologin enabled, accessing their session without authentication. This is similar to CVE-2017-12164, but requires more difficult conditions to exploit.(CVE-2020-27837)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-27837" type="cve" title="fix CVE-2020-27837" />
    </references>
    <pkglist>
      <collection>
        <package name="gdm" version="3.38.2.1" release="1.uel20" epoch="1" arch="x86_64" src="gdm-3.38.2.1-1.uel20.src.rpm">
          <filename>gdm-3.38.2.1-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="gdm-devel" version="3.38.2.1" release="1.uel20" epoch="1" arch="x86_64" src="gdm-3.38.2.1-1.uel20.src.rpm">
          <filename>gdm-devel-3.38.2.1-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="gdm" version="3.38.2.1" release="1.uel20" epoch="1" arch="aarch64" src="gdm-3.38.2.1-1.uel20.src.rpm">
          <filename>gdm-3.38.2.1-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="gdm-devel" version="3.38.2.1" release="1.uel20" epoch="1" arch="aarch64" src="gdm-3.38.2.1-1.uel20.src.rpm">
          <filename>gdm-devel-3.38.2.1-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20032</id>
    <title>Important: libproxy security update</title>
    <updated date="2022-07-14 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: libproxy security update</summary>
    <description> url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.(CVE-2020-25219)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-25219" type="cve" title="fix CVE-2020-25219" />
    </references>
    <pkglist>
      <collection>
        <package name="libproxy" version="0.4.15" release="18.uel20.01" epoch="0" arch="x86_64" src="libproxy-0.4.15-18.uel20.01.src.rpm">
          <filename>libproxy-0.4.15-18.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="libproxy-webkitgtk4" version="0.4.15" release="18.uel20.01" epoch="0" arch="x86_64" src="libproxy-0.4.15-18.uel20.01.src.rpm">
          <filename>libproxy-webkitgtk4-0.4.15-18.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="libproxy-devel" version="0.4.15" release="18.uel20.01" epoch="0" arch="x86_64" src="libproxy-0.4.15-18.uel20.01.src.rpm">
          <filename>libproxy-devel-0.4.15-18.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="libproxy-webkitgtk4" version="0.4.15" release="18.uel20.01" epoch="0" arch="aarch64" src="libproxy-0.4.15-18.uel20.01.src.rpm">
          <filename>libproxy-webkitgtk4-0.4.15-18.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="libproxy" version="0.4.15" release="18.uel20.01" epoch="0" arch="aarch64" src="libproxy-0.4.15-18.uel20.01.src.rpm">
          <filename>libproxy-0.4.15-18.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="python2-libproxy" version="0.4.15" release="18.uel20.01" epoch="0" arch="noarch" src="libproxy-0.4.15-18.uel20.01.src.rpm">
          <filename>python2-libproxy-0.4.15-18.uel20.01.noarch.rpm</filename>
        </package>
        <package name="python3-libproxy" version="0.4.15" release="18.uel20.01" epoch="0" arch="noarch" src="libproxy-0.4.15-18.uel20.01.src.rpm">
          <filename>python3-libproxy-0.4.15-18.uel20.01.noarch.rpm</filename>
        </package>
        <package name="libproxy-devel" version="0.4.15" release="18.uel20.01" epoch="0" arch="aarch64" src="libproxy-0.4.15-18.uel20.01.src.rpm">
          <filename>libproxy-devel-0.4.15-18.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="libproxy-help" version="0.4.15" release="18.uel20.01" epoch="0" arch="noarch" src="libproxy-0.4.15-18.uel20.01.src.rpm">
          <filename>libproxy-help-0.4.15-18.uel20.01.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20033</id>
    <title>Moderate: bison security update</title>
    <updated date="2022-09-08 19:30:38" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: bison security update</summary>
    <description> GNU Bison before 3.7.1 has a use-after-free in _obstack_free in lib/obstack.c (called from gram_lex) when a '\0' byte is encountered. NOTE: there is a risk only if Bison is used with untrusted input, and the observed bug happens to cause unsafe behavior with a specific compiler/architecture. The bug report was intended to show that a crash may occur in Bison itself, not that a crash may occur in code that is generated by Bison.(CVE-2020-24240)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-24240" type="cve" title="fix CVE-2020-24240" />
    </references>
    <pkglist>
      <collection>
        <package name="bison" version="3.6.4" release="3.uel20" epoch="0" arch="x86_64" src="bison-3.6.4-3.uel20.src.rpm">
          <filename>bison-3.6.4-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="bison-lang" version="3.6.4" release="3.uel20" epoch="0" arch="x86_64" src="bison-3.6.4-3.uel20.src.rpm">
          <filename>bison-lang-3.6.4-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="bison-devel" version="3.6.4" release="3.uel20" epoch="0" arch="x86_64" src="bison-3.6.4-3.uel20.src.rpm">
          <filename>bison-devel-3.6.4-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="bison-lang" version="3.6.4" release="3.uel20" epoch="0" arch="aarch64" src="bison-3.6.4-3.uel20.src.rpm">
          <filename>bison-lang-3.6.4-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="bison-devel" version="3.6.4" release="3.uel20" epoch="0" arch="aarch64" src="bison-3.6.4-3.uel20.src.rpm">
          <filename>bison-devel-3.6.4-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="bison" version="3.6.4" release="3.uel20" epoch="0" arch="aarch64" src="bison-3.6.4-3.uel20.src.rpm">
          <filename>bison-3.6.4-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="bison-help" version="3.6.4" release="3.uel20" epoch="0" arch="noarch" src="bison-3.6.4-3.uel20.src.rpm">
          <filename>bison-help-3.6.4-3.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20043</id>
    <title>Moderate: GraphicsMagick security update</title>
    <updated date="2022-07-12 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: GraphicsMagick security update</summary>
    <description>fix cve/bug or enhancement</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-1270" type="cve" title="fix CVE-2022-1270" />
    </references>
    <pkglist>
      <collection>
        <package name="GraphicsMagick" version="1.3.30" release="10.uel20" epoch="0" arch="x86_64" src="GraphicsMagick-1.3.30-10.uel20.src.rpm">
          <filename>GraphicsMagick-1.3.30-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="GraphicsMagick-perl" version="1.3.30" release="10.uel20" epoch="0" arch="x86_64" src="GraphicsMagick-1.3.30-10.uel20.src.rpm">
          <filename>GraphicsMagick-perl-1.3.30-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="GraphicsMagick-c++" version="1.3.30" release="10.uel20" epoch="0" arch="x86_64" src="GraphicsMagick-1.3.30-10.uel20.src.rpm">
          <filename>GraphicsMagick-c++-1.3.30-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="GraphicsMagick-devel" version="1.3.30" release="10.uel20" epoch="0" arch="x86_64" src="GraphicsMagick-1.3.30-10.uel20.src.rpm">
          <filename>GraphicsMagick-devel-1.3.30-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="GraphicsMagick-c++-devel" version="1.3.30" release="10.uel20" epoch="0" arch="x86_64" src="GraphicsMagick-1.3.30-10.uel20.src.rpm">
          <filename>GraphicsMagick-c++-devel-1.3.30-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="GraphicsMagick-c++-devel" version="1.3.30" release="10.uel20" epoch="0" arch="aarch64" src="GraphicsMagick-1.3.30-10.uel20.src.rpm">
          <filename>GraphicsMagick-c++-devel-1.3.30-10.uel20.aarch64.rpm</filename>
        </package>
        <package name="GraphicsMagick-devel" version="1.3.30" release="10.uel20" epoch="0" arch="aarch64" src="GraphicsMagick-1.3.30-10.uel20.src.rpm">
          <filename>GraphicsMagick-devel-1.3.30-10.uel20.aarch64.rpm</filename>
        </package>
        <package name="GraphicsMagick-perl" version="1.3.30" release="10.uel20" epoch="0" arch="aarch64" src="GraphicsMagick-1.3.30-10.uel20.src.rpm">
          <filename>GraphicsMagick-perl-1.3.30-10.uel20.aarch64.rpm</filename>
        </package>
        <package name="GraphicsMagick" version="1.3.30" release="10.uel20" epoch="0" arch="aarch64" src="GraphicsMagick-1.3.30-10.uel20.src.rpm">
          <filename>GraphicsMagick-1.3.30-10.uel20.aarch64.rpm</filename>
        </package>
        <package name="GraphicsMagick-c++" version="1.3.30" release="10.uel20" epoch="0" arch="aarch64" src="GraphicsMagick-1.3.30-10.uel20.src.rpm">
          <filename>GraphicsMagick-c++-1.3.30-10.uel20.aarch64.rpm</filename>
        </package>
        <package name="GraphicsMagick-help" version="1.3.30" release="10.uel20" epoch="0" arch="noarch" src="GraphicsMagick-1.3.30-10.uel20.src.rpm">
          <filename>GraphicsMagick-help-1.3.30-10.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20048</id>
    <title>Important: mc security update</title>
    <updated date="2022-07-20 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: mc security update</summary>
    <description> An issue was discovered in Midnight Commander through 4.8.26. When establishing an SFTP connection, the fingerprint of the server is neither checked nor displayed. As a result, a user connects to the server without the ability to verify its authenticity.(CVE-2021-36370)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-36370" type="cve" title="fix CVE-2021-36370" />
    </references>
    <pkglist>
      <collection>
        <package name="mc" version="4.8.28" release="1.uel20" epoch="1" arch="x86_64" src="mc-4.8.28-1.uel20.src.rpm">
          <filename>mc-4.8.28-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mc" version="4.8.28" release="1.uel20" epoch="1" arch="aarch64" src="mc-4.8.28-1.uel20.src.rpm">
          <filename>mc-4.8.28-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mc-help" version="4.8.28" release="1.uel20" epoch="1" arch="noarch" src="mc-4.8.28-1.uel20.src.rpm">
          <filename>mc-help-4.8.28-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20051</id>
    <title>Moderate: raptor2 security update</title>
    <updated date="2022-07-20 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: raptor2 security update</summary>
    <description> A malformed input file can lead to a segfault due to an out of bounds array access in raptor_xml_writer_start_element_common.(CVE-2020-25713)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-25713" type="cve" title="fix CVE-2020-25713" />
    </references>
    <pkglist>
      <collection>
        <package name="raptor2-devel" version="2.0.15" release="19.uel20" epoch="0" arch="x86_64" src="raptor2-2.0.15-19.uel20.src.rpm">
          <filename>raptor2-devel-2.0.15-19.uel20.x86_64.rpm</filename>
        </package>
        <package name="raptor2-help" version="2.0.15" release="19.uel20" epoch="0" arch="x86_64" src="raptor2-2.0.15-19.uel20.src.rpm">
          <filename>raptor2-help-2.0.15-19.uel20.x86_64.rpm</filename>
        </package>
        <package name="raptor2" version="2.0.15" release="19.uel20" epoch="0" arch="x86_64" src="raptor2-2.0.15-19.uel20.src.rpm">
          <filename>raptor2-2.0.15-19.uel20.x86_64.rpm</filename>
        </package>
        <package name="raptor2-help" version="2.0.15" release="19.uel20" epoch="0" arch="aarch64" src="raptor2-2.0.15-19.uel20.src.rpm">
          <filename>raptor2-help-2.0.15-19.uel20.aarch64.rpm</filename>
        </package>
        <package name="raptor2-devel" version="2.0.15" release="19.uel20" epoch="0" arch="aarch64" src="raptor2-2.0.15-19.uel20.src.rpm">
          <filename>raptor2-devel-2.0.15-19.uel20.aarch64.rpm</filename>
        </package>
        <package name="raptor2" version="2.0.15" release="19.uel20" epoch="0" arch="aarch64" src="raptor2-2.0.15-19.uel20.src.rpm">
          <filename>raptor2-2.0.15-19.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20053</id>
    <title>Moderate: targetcli security update</title>
    <updated date="2022-07-29 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: targetcli security update</summary>
    <description> Open-iSCSI targetcli-fb through 2.1.52 has weak permissions for /etc/target (and for the backup directory and backup files).(CVE-2020-13867)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-13867" type="cve" title="fix CVE-2020-13867" />
    </references>
    <pkglist>
      <collection>
        <package name="targetcli" version="2.1.54" release="1.uel20" epoch="0" arch="noarch" src="targetcli-2.1.54-1.uel20.src.rpm">
          <filename>targetcli-2.1.54-1.uel20.noarch.rpm</filename>
        </package>
        <package name="targetcli-help" version="2.1.54" release="1.uel20" epoch="0" arch="noarch" src="targetcli-2.1.54-1.uel20.src.rpm">
          <filename>targetcli-help-2.1.54-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20055</id>
    <title>Important: linux-firmware security update</title>
    <updated date="2022-07-25 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: linux-firmware security update</summary>
    <description> Improper buffer restriction in some Intel(R) Wireless Bluetooth(R) products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.(CVE-2020-12321)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-12321" type="cve" title="fix CVE-2020-12321" />
    </references>
    <pkglist>
      <collection>
        <package name="linux-firmware" version="20211027" release="1.uel20" epoch="0" arch="noarch" src="linux-firmware-20211027-1.uel20.src.rpm">
          <filename>linux-firmware-20211027-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20057</id>
    <title>Important: mod_fcgid security update</title>
    <updated date="2022-07-13 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: mod_fcgid security update</summary>
    <description> A security Bypass vulnerability exists in the FcgidPassHeader Proxy in mod_fcgid through 2016-07-07.(CVE-2016-1000104)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2016-1000104" type="cve" title="fix CVE-2016-1000104" />
    </references>
    <pkglist>
      <collection>
        <package name="mod_fcgid" version="2.3.9" release="20.uel20" epoch="0" arch="x86_64" src="mod_fcgid-2.3.9-20.uel20.src.rpm">
          <filename>mod_fcgid-2.3.9-20.uel20.x86_64.rpm</filename>
        </package>
        <package name="mod_fcgid-help" version="2.3.9" release="20.uel20" epoch="0" arch="x86_64" src="mod_fcgid-2.3.9-20.uel20.src.rpm">
          <filename>mod_fcgid-help-2.3.9-20.uel20.x86_64.rpm</filename>
        </package>
        <package name="mod_fcgid-help" version="2.3.9" release="20.uel20" epoch="0" arch="aarch64" src="mod_fcgid-2.3.9-20.uel20.src.rpm">
          <filename>mod_fcgid-help-2.3.9-20.uel20.aarch64.rpm</filename>
        </package>
        <package name="mod_fcgid" version="2.3.9" release="20.uel20" epoch="0" arch="aarch64" src="mod_fcgid-2.3.9-20.uel20.src.rpm">
          <filename>mod_fcgid-2.3.9-20.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20059</id>
    <title>Moderate: python-ldap security update</title>
    <updated date="2022-07-26 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: python-ldap security update</summary>
    <description>fix cve/bug or enhancement</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-46823" type="cve" title="fix CVE-2021-46823" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-ldap" version="3.1.0" release="4.uel20" epoch="0" arch="x86_64" src="python-ldap-3.1.0-4.uel20.src.rpm">
          <filename>python3-ldap-3.1.0-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-ldap" version="3.1.0" release="4.uel20" epoch="0" arch="aarch64" src="python-ldap-3.1.0-4.uel20.src.rpm">
          <filename>python3-ldap-3.1.0-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="python-ldap-help" version="3.1.0" release="4.uel20" epoch="0" arch="noarch" src="python-ldap-3.1.0-4.uel20.src.rpm">
          <filename>python-ldap-help-3.1.0-4.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20070</id>
    <title>Moderate: nodejs-hawk security update</title>
    <updated date="2022-05-17 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: nodejs-hawk security update</summary>
    <description> Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils.parseHost()`), which was subject to regular expression DoS attack - meaning each added character in the attacker's input increases the computation time exponentially. `parseHost()` was patched in `9.0.1` to use built-in `URL` class to parse hostname instead. `Hawk.authenticate()` accepts `options` argument. If that contains `host` and `port`, those would be used instead of a call to `utils.parseHost()`.(CVE-2022-29167)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-29167" type="cve" title="fix CVE-2022-29167" />
    </references>
    <pkglist>
      <collection>
        <package name="nodejs-hawk" version="4.1.2" release="2.uel20" epoch="0" arch="noarch" src="nodejs-hawk-4.1.2-2.uel20.src.rpm">
          <filename>nodejs-hawk-4.1.2-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20074</id>
    <title>Important: libinput security update</title>
    <updated date="2022-06-07 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: libinput security update</summary>
    <description> A format string vulnerability was found in libinput(CVE-2022-1215)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-1215" type="cve" title="fix CVE-2022-1215" />
    </references>
    <pkglist>
      <collection>
        <package name="libinput" version="1.15.6" release="3.uel20" epoch="0" arch="x86_64" src="libinput-1.15.6-3.uel20.src.rpm">
          <filename>libinput-1.15.6-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="libinput-devel" version="1.15.6" release="3.uel20" epoch="0" arch="x86_64" src="libinput-1.15.6-3.uel20.src.rpm">
          <filename>libinput-devel-1.15.6-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="libinput-help" version="1.15.6" release="3.uel20" epoch="0" arch="x86_64" src="libinput-1.15.6-3.uel20.src.rpm">
          <filename>libinput-help-1.15.6-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="libinput-utils" version="1.15.6" release="3.uel20" epoch="0" arch="x86_64" src="libinput-1.15.6-3.uel20.src.rpm">
          <filename>libinput-utils-1.15.6-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="libinput-devel" version="1.15.6" release="3.uel20" epoch="0" arch="aarch64" src="libinput-1.15.6-3.uel20.src.rpm">
          <filename>libinput-devel-1.15.6-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="libinput-utils" version="1.15.6" release="3.uel20" epoch="0" arch="aarch64" src="libinput-1.15.6-3.uel20.src.rpm">
          <filename>libinput-utils-1.15.6-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="libinput" version="1.15.6" release="3.uel20" epoch="0" arch="aarch64" src="libinput-1.15.6-3.uel20.src.rpm">
          <filename>libinput-1.15.6-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="libinput-help" version="1.15.6" release="3.uel20" epoch="0" arch="aarch64" src="libinput-1.15.6-3.uel20.src.rpm">
          <filename>libinput-help-1.15.6-3.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20076</id>
    <title>Critical: nodejs-minimist security update</title>
    <updated date="2022-04-13 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: nodejs-minimist security update</summary>
    <description> Minimist &lt;=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).(CVE-2021-44906)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-44906" type="cve" title="fix CVE-2021-44906" />
    </references>
    <pkglist>
      <collection>
        <package name="nodejs-minimist" version="1.2.6" release="1.uel20" epoch="0" arch="noarch" src="nodejs-minimist-1.2.6-1.uel20.src.rpm">
          <filename>nodejs-minimist-1.2.6-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20077</id>
    <title>Important: tcl security update</title>
    <updated date="2022-06-13 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: tcl security update</summary>
    <description> ** DISPUTED ** In Tcl 8.6.11, a format string vulnerability in nmakehlp.c might allow code execution via a crafted file. NOTE: multiple third parties dispute the significance of this finding.(CVE-2021-35331)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-35331" type="cve" title="fix CVE-2021-35331" />
    </references>
    <pkglist>
      <collection>
        <package name="tcl" version="8.6.10" release="4.uel20" epoch="1" arch="x86_64" src="tcl-8.6.10-4.uel20.src.rpm">
          <filename>tcl-8.6.10-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="tcl-devel" version="8.6.10" release="4.uel20" epoch="1" arch="x86_64" src="tcl-8.6.10-4.uel20.src.rpm">
          <filename>tcl-devel-8.6.10-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="tcl-devel" version="8.6.10" release="4.uel20" epoch="1" arch="aarch64" src="tcl-8.6.10-4.uel20.src.rpm">
          <filename>tcl-devel-8.6.10-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="tcl-help" version="8.6.10" release="4.uel20" epoch="1" arch="noarch" src="tcl-8.6.10-4.uel20.src.rpm">
          <filename>tcl-help-8.6.10-4.uel20.noarch.rpm</filename>
        </package>
        <package name="tcl" version="8.6.10" release="4.uel20" epoch="1" arch="aarch64" src="tcl-8.6.10-4.uel20.src.rpm">
          <filename>tcl-8.6.10-4.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20084</id>
    <title>Moderate: speex security update</title>
    <updated date="2022-06-06 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: speex security update</summary>
    <description> A Divide by Zero vulnerability in the function static int read_samples of Speex v1.2 allows attackers to cause a denial of service (DoS) via a crafted WAV file.(CVE-2020-23903)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-23903" type="cve" title="fix CVE-2020-23903" />
    </references>
    <pkglist>
      <collection>
        <package name="speex-devel" version="1.2.0" release="5.uel20" epoch="0" arch="x86_64" src="speex-1.2.0-5.uel20.src.rpm">
          <filename>speex-devel-1.2.0-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="speex" version="1.2.0" release="5.uel20" epoch="0" arch="x86_64" src="speex-1.2.0-5.uel20.src.rpm">
          <filename>speex-1.2.0-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="speex" version="1.2.0" release="5.uel20" epoch="0" arch="aarch64" src="speex-1.2.0-5.uel20.src.rpm">
          <filename>speex-1.2.0-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="speex-devel" version="1.2.0" release="5.uel20" epoch="0" arch="aarch64" src="speex-1.2.0-5.uel20.src.rpm">
          <filename>speex-devel-1.2.0-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="speex-help" version="1.2.0" release="5.uel20" epoch="0" arch="noarch" src="speex-1.2.0-5.uel20.src.rpm">
          <filename>speex-help-1.2.0-5.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20091</id>
    <title>Important: google-gson security update</title>
    <updated date="2022-05-10 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: google-gson security update</summary>
    <description> The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks.(CVE-2022-25647)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-25647" type="cve" title="fix CVE-2022-25647" />
    </references>
    <pkglist>
      <collection>
        <package name="google-gson" version="2.8.2" release="4.uel20" epoch="0" arch="noarch" src="google-gson-2.8.2-4.uel20.src.rpm">
          <filename>google-gson-2.8.2-4.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20097</id>
    <title>Important: nekohtml security update</title>
    <updated date="2022-04-24 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: nekohtml security update</summary>
    <description> org.cyberneko.html is an html parser written in Java. The fork of `org.cyberneko.html` used by Nokogiri (Rubygem) raises a `java.lang.OutOfMemoryError` exception when parsing ill-formed HTML markup. Users are advised to upgrade to `&gt;= 1.9.22.noko2`. Note: The upstream library `org.cyberneko.html` is no longer maintained. Nokogiri uses its own fork of this library located at https://github.com/sparklemotion/nekohtml and this CVE applies only to that fork. Other forks of nekohtml may have a similar vulnerability.(CVE-2022-24839)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-24839" type="cve" title="fix CVE-2022-24839" />
    </references>
    <pkglist>
      <collection>
        <package name="nekohtml" version="1.9.22" release="9.uel20" epoch="0" arch="noarch" src="nekohtml-1.9.22-9.uel20.src.rpm">
          <filename>nekohtml-1.9.22-9.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20098</id>
    <title>Important: rubygem-nokogiri security update</title>
    <updated date="2022-04-24 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: rubygem-nokogiri security update</summary>
    <description> Nokogiri is an open source XML and HTML library for Ruby. Nokogiri `&lt; v1.13.4` contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to detect encoding in HTML documents. Users are advised to upgrade to Nokogiri `&gt;= 1.13.4`. There are no known workarounds for this issue.(CVE-2022-24836)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-24836" type="cve" title="fix CVE-2022-24836" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-nokogiri-doc" version="1.10.5" release="5.uel20" epoch="0" arch="x86_64" src="rubygem-nokogiri-1.10.5-5.uel20.src.rpm">
          <filename>rubygem-nokogiri-doc-1.10.5-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-nokogiri" version="1.10.5" release="5.uel20" epoch="0" arch="x86_64" src="rubygem-nokogiri-1.10.5-5.uel20.src.rpm">
          <filename>rubygem-nokogiri-1.10.5-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-nokogiri-doc" version="1.10.5" release="5.uel20" epoch="0" arch="aarch64" src="rubygem-nokogiri-1.10.5-5.uel20.src.rpm">
          <filename>rubygem-nokogiri-doc-1.10.5-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-nokogiri" version="1.10.5" release="5.uel20" epoch="0" arch="aarch64" src="rubygem-nokogiri-1.10.5-5.uel20.src.rpm">
          <filename>rubygem-nokogiri-1.10.5-5.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20099</id>
    <title>Important: python-waitress security update</title>
    <updated date="2020-02-13 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: python-waitress security update</summary>
    <description> Waitress is a Web Server Gateway Interface server for Python 2 and 3. When using Waitress versions 2.1.0 and prior behind a proxy that does not properly validate the incoming HTTP request matches the RFC7230 standard, Waitress and the frontend proxy may disagree on where one request starts and where it ends. This would allow requests to be smuggled via the front-end proxy to waitress and later behavior. There are two classes of vulnerability that may lead to request smuggling that are addressed by this advisory: The use of Python's `int()` to parse strings into integers, leading to `+10` to be parsed as `10`, or `0x01` to be parsed as `1`, where as the standard specifies that the string should contain only digits or hex digits; and Waitress does not support chunk extensions, however it was discarding them without validating that they did not contain illegal characters. This vulnerability has been patched in Waitress 2.1.1. A workaround is available. When deploying a proxy in front of waitress, turning on any and all functionality to make sure that the request matches the RFC7230 standard. Certain proxy servers may not have this functionality though and users are encouraged to upgrade to the latest version of waitress instead.(CVE-2022-24761)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-24761" type="cve" title="fix CVE-2022-24761" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-waitress" version="1.1.0" release="5.uel20" epoch="0" arch="noarch" src="python-waitress-1.1.0-5.uel20.src.rpm">
          <filename>python3-waitress-1.1.0-5.uel20.noarch.rpm</filename>
        </package>
        <package name="python2-waitress" version="1.1.0" release="5.uel20" epoch="0" arch="noarch" src="python-waitress-1.1.0-5.uel20.src.rpm">
          <filename>python2-waitress-1.1.0-5.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20103</id>
    <title>Moderate: xerces-j2 security update</title>
    <updated date="2022-04-27 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: xerces-j2 security update</summary>
    <description> There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions.(CVE-2022-23437)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-23437" type="cve" title="fix CVE-2022-23437" />
    </references>
    <pkglist>
      <collection>
        <package name="xerces-j2-help" version="2.12.2" release="1.uel20" epoch="0" arch="noarch" src="xerces-j2-2.12.2-1.uel20.src.rpm">
          <filename>xerces-j2-help-2.12.2-1.uel20.noarch.rpm</filename>
        </package>
        <package name="xerces-j2" version="2.12.2" release="1.uel20" epoch="0" arch="noarch" src="xerces-j2-2.12.2-1.uel20.src.rpm">
          <filename>xerces-j2-2.12.2-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20104</id>
    <title>Critical: log4j12 security update</title>
    <updated date="2022-02-08 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: log4j12 security update</summary>
    <description> By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.(CVE-2022-23305)
 CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.(CVE-2022-23307)
 JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.(CVE-2022-23302)
 JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.(CVE-2021-4104)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-23305" type="cve" title="fix CVE-2022-23305" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-23307" type="cve" title="fix CVE-2022-23307" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-23302" type="cve" title="fix CVE-2022-23302" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-4104" type="cve" title="fix CVE-2021-4104" />
    </references>
    <pkglist>
      <collection>
        <package name="log4j12-help" version="1.2.17" release="25.uel20" epoch="0" arch="noarch" src="log4j12-1.2.17-25.uel20.src.rpm">
          <filename>log4j12-help-1.2.17-25.uel20.noarch.rpm</filename>
        </package>
        <package name="log4j12" version="1.2.17" release="25.uel20" epoch="0" arch="noarch" src="log4j12-1.2.17-25.uel20.src.rpm">
          <filename>log4j12-1.2.17-25.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20112</id>
    <title>Moderate: ffmpeg security update</title>
    <updated date="2022-05-23 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: ffmpeg security update</summary>
    <description> libavcodec/dnxhddec.c in FFmpeg 4.4 does not check the return value of the init_vlc function, a similar issue to CVE-2013-0868.(CVE-2021-38114)
 track_header in libavformat/vividas.c in FFmpeg 4.3.1 has an out-of-bounds write because of incorrect extradata packing.(CVE-2020-35964)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-38114" type="cve" title="fix CVE-2021-38114" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-35964" type="cve" title="fix CVE-2020-35964" />
    </references>
    <pkglist>
      <collection>
        <package name="libavdevice" version="4.2.4" release="4.uel20" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-4.uel20.src.rpm">
          <filename>libavdevice-4.2.4-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg-libs" version="4.2.4" release="4.uel20" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-4.uel20.src.rpm">
          <filename>ffmpeg-libs-4.2.4-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg-devel" version="4.2.4" release="4.uel20" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-4.uel20.src.rpm">
          <filename>ffmpeg-devel-4.2.4-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg" version="4.2.4" release="4.uel20" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-4.uel20.src.rpm">
          <filename>ffmpeg-4.2.4-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg-devel" version="4.2.4" release="4.uel20" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-4.uel20.src.rpm">
          <filename>ffmpeg-devel-4.2.4-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="ffmpeg-libs" version="4.2.4" release="4.uel20" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-4.uel20.src.rpm">
          <filename>ffmpeg-libs-4.2.4-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="libavdevice" version="4.2.4" release="4.uel20" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-4.uel20.src.rpm">
          <filename>libavdevice-4.2.4-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="ffmpeg" version="4.2.4" release="4.uel20" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-4.uel20.src.rpm">
          <filename>ffmpeg-4.2.4-4.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20113</id>
    <title>Important: jdom2 security update</title>
    <updated date="2022-04-20 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: jdom2 security update</summary>
    <description> An XXE issue in SAXBuilder in JDOM through 2.0.6 allows attackers to cause a denial of service via a crafted HTTP request.(CVE-2021-33813)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-33813" type="cve" title="fix CVE-2021-33813" />
    </references>
    <pkglist>
      <collection>
        <package name="jdom2-help" version="2.0.6" release="16.uel20" epoch="0" arch="noarch" src="jdom2-2.0.6-16.uel20.src.rpm">
          <filename>jdom2-help-2.0.6-16.uel20.noarch.rpm</filename>
        </package>
        <package name="jdom2" version="2.0.6" release="16.uel20" epoch="0" arch="noarch" src="jdom2-2.0.6-16.uel20.src.rpm">
          <filename>jdom2-2.0.6-16.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20118</id>
    <title>Important: f2fs-tools security update</title>
    <updated date="2021-08-18 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: f2fs-tools security update</summary>
    <description> An exploitable code execution vulnerability exists in the fsck_chk_orphan_node functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause a heap buffer overflow resulting in a code execution. An attacker can provide a malicious file to trigger this vulnerability.(CVE-2020-6108)
 An exploitable information disclosure vulnerability exists in the dev_read functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause an uninitialized read resulting in an information disclosure. An attacker can provide a malicious file to trigger this vulnerability.(CVE-2020-6107)
 An exploitable information disclosure vulnerability exists in the init_node_manager functionality of F2fs-Tools F2fs.Fsck 1.12 and 1.13. A specially crafted filesystem can be used to disclose information. An attacker can provide a malicious file to trigger this vulnerability.(CVE-2020-6106)
 An exploitable code execution vulnerability exists in the multiple devices functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause Information overwrite resulting in a code execution. An attacker can provide a malicious file to trigger this vulnerability.(CVE-2020-6105)
 An exploitable information disclosure vulnerability exists in the get_dnode_of_data functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause information disclosure resulting in a information disclosure. An attacker can provide a malicious file to trigger this vulnerability.(CVE-2020-6104)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-6108" type="cve" title="fix CVE-2020-6108" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-6107" type="cve" title="fix CVE-2020-6107" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-6106" type="cve" title="fix CVE-2020-6106" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-6105" type="cve" title="fix CVE-2020-6105" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-6104" type="cve" title="fix CVE-2020-6104" />
    </references>
    <pkglist>
      <collection>
        <package name="f2fs-tools" version="1.14.0" release="1.uel20" epoch="0" arch="x86_64" src="f2fs-tools-1.14.0-1.uel20.src.rpm">
          <filename>f2fs-tools-1.14.0-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="f2fs-tools-devel" version="1.14.0" release="1.uel20" epoch="0" arch="x86_64" src="f2fs-tools-1.14.0-1.uel20.src.rpm">
          <filename>f2fs-tools-devel-1.14.0-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="f2fs-tools-devel" version="1.14.0" release="1.uel20" epoch="0" arch="aarch64" src="f2fs-tools-1.14.0-1.uel20.src.rpm">
          <filename>f2fs-tools-devel-1.14.0-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="f2fs-tools" version="1.14.0" release="1.uel20" epoch="0" arch="aarch64" src="f2fs-tools-1.14.0-1.uel20.src.rpm">
          <filename>f2fs-tools-1.14.0-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20119</id>
    <title>Important: htslib security update</title>
    <updated date="2022-05-07 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: htslib security update</summary>
    <description> HTSlib through 1.10.2 allows out-of-bounds write access in vcf_parse_format (called from vcf_parse and vcf_read).(CVE-2020-36403)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-36403" type="cve" title="fix CVE-2020-36403" />
    </references>
    <pkglist>
      <collection>
        <package name="htslib" version="1.11" release="1.uel20" epoch="0" arch="x86_64" src="htslib-1.11-1.uel20.src.rpm">
          <filename>htslib-1.11-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="htslib-tools" version="1.11" release="1.uel20" epoch="0" arch="x86_64" src="htslib-1.11-1.uel20.src.rpm">
          <filename>htslib-tools-1.11-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="htslib-devel" version="1.11" release="1.uel20" epoch="0" arch="x86_64" src="htslib-1.11-1.uel20.src.rpm">
          <filename>htslib-devel-1.11-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="htslib-devel" version="1.11" release="1.uel20" epoch="0" arch="aarch64" src="htslib-1.11-1.uel20.src.rpm">
          <filename>htslib-devel-1.11-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="htslib-tools" version="1.11" release="1.uel20" epoch="0" arch="aarch64" src="htslib-1.11-1.uel20.src.rpm">
          <filename>htslib-tools-1.11-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="htslib" version="1.11" release="1.uel20" epoch="0" arch="aarch64" src="htslib-1.11-1.uel20.src.rpm">
          <filename>htslib-1.11-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20121</id>
    <title>Moderate: m2crypto security update</title>
    <updated date="2022-08-17 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: m2crypto security update</summary>
    <description> A flaw was found in all released versions of m2crypto, where they are vulnerable to Bleichenbacher timing attacks in the RSA decryption API via the timed processing of valid PKCS#1 v1.5 Ciphertext. The highest threat from this vulnerability is to confidentiality.(CVE-2020-25657)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-25657" type="cve" title="fix CVE-2020-25657" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-m2crypto" version="0.30.1" release="5.uel20" epoch="0" arch="x86_64" src="m2crypto-0.30.1-5.uel20.src.rpm">
          <filename>python3-m2crypto-0.30.1-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="m2crypto" version="0.30.1" release="5.uel20" epoch="0" arch="x86_64" src="m2crypto-0.30.1-5.uel20.src.rpm">
          <filename>m2crypto-0.30.1-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-m2crypto" version="0.30.1" release="5.uel20" epoch="0" arch="aarch64" src="m2crypto-0.30.1-5.uel20.src.rpm">
          <filename>python3-m2crypto-0.30.1-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="m2crypto" version="0.30.1" release="5.uel20" epoch="0" arch="aarch64" src="m2crypto-0.30.1-5.uel20.src.rpm">
          <filename>m2crypto-0.30.1-5.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20128</id>
    <title>Important: xmlgraphics-commons security update</title>
    <updated date="2022-04-24 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: xmlgraphics-commons security update</summary>
    <description> Apache XmlGraphics Commons 2.4 and earlier is vulnerable to server-side request forgery, caused by improper input validation by the XMPParser. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. Users should upgrade to 2.6 or later.(CVE-2020-11988)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-11988" type="cve" title="fix CVE-2020-11988" />
    </references>
    <pkglist>
      <collection>
        <package name="xmlgraphics-commons" version="2.2" release="4.uel20" epoch="0" arch="noarch" src="xmlgraphics-commons-2.2-4.uel20.src.rpm">
          <filename>xmlgraphics-commons-2.2-4.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20139</id>
    <title>Moderate: perl-DBI security update</title>
    <updated date="2022-04-09 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: perl-DBI security update</summary>
    <description> An issue was discovered in the DBI module through 1.643 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute in the data source name (DSN). NOTE: this issue exists because of an incomplete fix for CVE-2014-10401.(CVE-2014-10402)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2014-10402" type="cve" title="fix CVE-2014-10402" />
    </references>
    <pkglist>
      <collection>
        <package name="perl-DBI" version="1.643" release="2.uel20" epoch="0" arch="x86_64" src="perl-DBI-1.643-2.uel20.src.rpm">
          <filename>perl-DBI-1.643-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="perl-DBI" version="1.643" release="2.uel20" epoch="0" arch="aarch64" src="perl-DBI-1.643-2.uel20.src.rpm">
          <filename>perl-DBI-1.643-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="perl-DBI-help" version="1.643" release="2.uel20" epoch="0" arch="noarch" src="perl-DBI-1.643-2.uel20.src.rpm">
          <filename>perl-DBI-help-1.643-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20140</id>
    <title>Moderate: eclipse-ecf security update</title>
    <updated date="2021-01-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: eclipse-ecf security update</summary>
    <description> The ServerTrustManager component in the Ignite Realtime Smack XMPP API before 4.0.0-rc1 does not verify basicConstraints and nameConstraints in X.509 certificate chains from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate chain.(CVE-2014-0363)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2014-0363" type="cve" title="fix CVE-2014-0363" />
    </references>
    <pkglist>
      <collection>
        <package name="eclipse-ecf-runtime" version="3.14.4" release="2.uel20" epoch="0" arch="noarch" src="eclipse-ecf-3.14.4-2.uel20.src.rpm">
          <filename>eclipse-ecf-runtime-3.14.4-2.uel20.noarch.rpm</filename>
        </package>
        <package name="eclipse-ecf-core" version="3.14.4" release="2.uel20" epoch="0" arch="noarch" src="eclipse-ecf-3.14.4-2.uel20.src.rpm">
          <filename>eclipse-ecf-core-3.14.4-2.uel20.noarch.rpm</filename>
        </package>
        <package name="eclipse-ecf-sdk" version="3.14.4" release="2.uel20" epoch="0" arch="noarch" src="eclipse-ecf-3.14.4-2.uel20.src.rpm">
          <filename>eclipse-ecf-sdk-3.14.4-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20144</id>
    <title>Critical: openvpn security update</title>
    <updated date="2022-03-30 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: openvpn security update</summary>
    <description> OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication plug-ins when more than one of them makes use of deferred authentication replies, which allows an external user to be granted access with only partially correct credentials.(CVE-2022-0547)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-0547" type="cve" title="fix CVE-2022-0547" />
    </references>
    <pkglist>
      <collection>
        <package name="openvpn" version="2.4.8" release="8.uel20" epoch="0" arch="x86_64" src="openvpn-2.4.8-8.uel20.src.rpm">
          <filename>openvpn-2.4.8-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="openvpn-devel" version="2.4.8" release="8.uel20" epoch="0" arch="x86_64" src="openvpn-2.4.8-8.uel20.src.rpm">
          <filename>openvpn-devel-2.4.8-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="openvpn-devel" version="2.4.8" release="8.uel20" epoch="0" arch="aarch64" src="openvpn-2.4.8-8.uel20.src.rpm">
          <filename>openvpn-devel-2.4.8-8.uel20.aarch64.rpm</filename>
        </package>
        <package name="openvpn" version="2.4.8" release="8.uel20" epoch="0" arch="aarch64" src="openvpn-2.4.8-8.uel20.src.rpm">
          <filename>openvpn-2.4.8-8.uel20.aarch64.rpm</filename>
        </package>
        <package name="openvpn-help" version="2.4.8" release="8.uel20" epoch="0" arch="noarch" src="openvpn-2.4.8-8.uel20.src.rpm">
          <filename>openvpn-help-2.4.8-8.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20153</id>
    <title>Moderate: festival security update</title>
    <updated date="2022-03-15 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: festival security update</summary>
    <description> festival_server in Centre for Speech Technology Research (CSTR) Festival, probably 2.0.95-beta and earlier, places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.(CVE-2010-3996)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2010-3996" type="cve" title="fix CVE-2010-3996" />
    </references>
    <pkglist>
      <collection>
        <package name="festival" version="1.96" release="44.uel20" epoch="0" arch="x86_64" src="festival-1.96-44.uel20.src.rpm">
          <filename>festival-1.96-44.uel20.x86_64.rpm</filename>
        </package>
        <package name="festival-devel" version="1.96" release="44.uel20" epoch="0" arch="x86_64" src="festival-1.96-44.uel20.src.rpm">
          <filename>festival-devel-1.96-44.uel20.x86_64.rpm</filename>
        </package>
        <package name="festival-devel" version="1.96" release="44.uel20" epoch="0" arch="aarch64" src="festival-1.96-44.uel20.src.rpm">
          <filename>festival-devel-1.96-44.uel20.aarch64.rpm</filename>
        </package>
        <package name="festival" version="1.96" release="44.uel20" epoch="0" arch="aarch64" src="festival-1.96-44.uel20.src.rpm">
          <filename>festival-1.96-44.uel20.aarch64.rpm</filename>
        </package>
        <package name="festival-help" version="1.96" release="44.uel20" epoch="0" arch="noarch" src="festival-1.96-44.uel20.src.rpm">
          <filename>festival-help-1.96-44.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20158</id>
    <title>Important: nodejs-fstream security update</title>
    <updated date="2022-03-05 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: nodejs-fstream security update</summary>
    <description> fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system's file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.(CVE-2019-13173)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2019-13173" type="cve" title="fix CVE-2019-13173" />
    </references>
    <pkglist>
      <collection>
        <package name="nodejs-fstream" version="1.0.12" release="1.uel20" epoch="0" arch="noarch" src="nodejs-fstream-1.0.12-1.uel20.src.rpm">
          <filename>nodejs-fstream-1.0.12-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20159</id>
    <title>Important: zsh security update</title>
    <updated date="2022-03-01 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: zsh security update</summary>
    <description> In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.(CVE-2021-45444)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-45444" type="cve" title="fix CVE-2021-45444" />
    </references>
    <pkglist>
      <collection>
        <package name="zsh" version="5.7.1" release="6.uel20" epoch="0" arch="x86_64" src="zsh-5.7.1-6.uel20.src.rpm">
          <filename>zsh-5.7.1-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="zsh" version="5.7.1" release="6.uel20" epoch="0" arch="aarch64" src="zsh-5.7.1-6.uel20.src.rpm">
          <filename>zsh-5.7.1-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="zsh-help" version="5.7.1" release="6.uel20" epoch="0" arch="noarch" src="zsh-5.7.1-6.uel20.src.rpm">
          <filename>zsh-help-5.7.1-6.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20163</id>
    <title>Moderate: xterm security update</title>
    <updated date="2022-02-23 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: xterm security update</summary>
    <description> xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.(CVE-2022-24130)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-24130" type="cve" title="fix CVE-2022-24130" />
    </references>
    <pkglist>
      <collection>
        <package name="xterm-help" version="334" release="6.uel20" epoch="0" arch="x86_64" src="xterm-334-6.uel20.src.rpm">
          <filename>xterm-help-334-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="xterm" version="334" release="6.uel20" epoch="0" arch="x86_64" src="xterm-334-6.uel20.src.rpm">
          <filename>xterm-334-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="xterm" version="334" release="6.uel20" epoch="0" arch="aarch64" src="xterm-334-6.uel20.src.rpm">
          <filename>xterm-334-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="xterm-help" version="334" release="6.uel20" epoch="0" arch="aarch64" src="xterm-334-6.uel20.src.rpm">
          <filename>xterm-help-334-6.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20167</id>
    <title>Critical: nodejs-jison security update</title>
    <updated date="2022-02-23 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: nodejs-jison security update</summary>
    <description> Insufficient input validation in npm package `jison` &lt;= 0.4.18 may lead to OS command injection attacks.(CVE-2020-8178)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-8178" type="cve" title="fix CVE-2020-8178" />
    </references>
    <pkglist>
      <collection>
        <package name="nodejs-jison" version="0.4.18" release="2.uel20" epoch="0" arch="noarch" src="nodejs-jison-0.4.18-2.uel20.src.rpm">
          <filename>nodejs-jison-0.4.18-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20169</id>
    <title>Important: rubygem-websocket-extensions security update</title>
    <updated date="2022-02-24 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: rubygem-websocket-extensions security update</summary>
    <description> websocket-extensions ruby module prior to 0.1.5 allows Denial of Service (DoS) via Regex Backtracking. The extension parser may take quadratic time when parsing a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and some other character. This could be abused by an attacker to conduct Regex Denial Of Service (ReDoS) on a single-threaded server by providing a malicious payload with the Sec-WebSocket-Extensions header.(CVE-2020-7663)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-7663" type="cve" title="fix CVE-2020-7663" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-websocket-extensions-doc" version="0.1.2" release="2.uel20" epoch="0" arch="noarch" src="rubygem-websocket-extensions-0.1.2-2.uel20.src.rpm">
          <filename>rubygem-websocket-extensions-doc-0.1.2-2.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-websocket-extensions" version="0.1.2" release="2.uel20" epoch="0" arch="noarch" src="rubygem-websocket-extensions-0.1.2-2.uel20.src.rpm">
          <filename>rubygem-websocket-extensions-0.1.2-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20170</id>
    <title>Important: python-py security update</title>
    <updated date="2020-02-23 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: python-py security update</summary>
    <description> A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.(CVE-2020-29651)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-29651" type="cve" title="fix CVE-2020-29651" />
    </references>
    <pkglist>
      <collection>
        <package name="python2-py" version="1.5.4" release="5.uel20" epoch="0" arch="noarch" src="python-py-1.5.4-5.uel20.src.rpm">
          <filename>python2-py-1.5.4-5.uel20.noarch.rpm</filename>
        </package>
        <package name="python3-py" version="1.5.4" release="5.uel20" epoch="0" arch="noarch" src="python-py-1.5.4-5.uel20.src.rpm">
          <filename>python3-py-1.5.4-5.uel20.noarch.rpm</filename>
        </package>
        <package name="python-py-help" version="1.5.4" release="5.uel20" epoch="0" arch="noarch" src="python-py-1.5.4-5.uel20.src.rpm">
          <filename>python-py-help-1.5.4-5.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20171</id>
    <title>Critical: nodejs-getobject security update</title>
    <updated date="2022-02-22 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: nodejs-getobject security update</summary>
    <description> Prototype pollution vulnerability in 'getobject' version 0.1.0 allows an attacker to cause a denial of service and may lead to remote code execution.(CVE-2020-28282)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-28282" type="cve" title="fix CVE-2020-28282" />
    </references>
    <pkglist>
      <collection>
        <package name="nodejs-getobject" version="0.1.0" release="2.uel20" epoch="0" arch="noarch" src="nodejs-getobject-0.1.0-2.uel20.src.rpm">
          <filename>nodejs-getobject-0.1.0-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20173</id>
    <title>Critical: xmlrpc security update</title>
    <updated date="2022-02-25 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: xmlrpc security update</summary>
    <description> An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code. Apache XML-RPC is no longer maintained and this issue will not be fixed.(CVE-2019-17570)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2019-17570" type="cve" title="fix CVE-2019-17570" />
    </references>
    <pkglist>
      <collection>
        <package name="xmlrpc-server" version="3.1.3" release="2.uel20" epoch="1" arch="noarch" src="xmlrpc-3.1.3-2.uel20.src.rpm">
          <filename>xmlrpc-server-3.1.3-2.uel20.noarch.rpm</filename>
        </package>
        <package name="xmlrpc-javadoc" version="3.1.3" release="2.uel20" epoch="1" arch="noarch" src="xmlrpc-3.1.3-2.uel20.src.rpm">
          <filename>xmlrpc-javadoc-3.1.3-2.uel20.noarch.rpm</filename>
        </package>
        <package name="xmlrpc-common" version="3.1.3" release="2.uel20" epoch="1" arch="noarch" src="xmlrpc-3.1.3-2.uel20.src.rpm">
          <filename>xmlrpc-common-3.1.3-2.uel20.noarch.rpm</filename>
        </package>
        <package name="xmlrpc-client" version="3.1.3" release="2.uel20" epoch="1" arch="noarch" src="xmlrpc-3.1.3-2.uel20.src.rpm">
          <filename>xmlrpc-client-3.1.3-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20174</id>
    <title>Moderate: rubygem-rubyzip security update</title>
    <updated date="2021-12-01 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: rubygem-rubyzip security update</summary>
    <description> In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes because data about the uncompressed size can be spoofed. This allows attackers to cause a denial of service (disk consumption).(CVE-2019-16892)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2019-16892" type="cve" title="fix CVE-2019-16892" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-rubyzip-doc" version="2.0.0" release="1.uel20" epoch="0" arch="noarch" src="rubygem-rubyzip-2.0.0-1.uel20.src.rpm">
          <filename>rubygem-rubyzip-doc-2.0.0-1.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-rubyzip" version="2.0.0" release="1.uel20" epoch="0" arch="noarch" src="rubygem-rubyzip-2.0.0-1.uel20.src.rpm">
          <filename>rubygem-rubyzip-2.0.0-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20175</id>
    <title>Moderate: evince security update</title>
    <updated date="2022-02-26 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: evince security update</summary>
    <description> The tiff_document_render() and tiff_document_get_thumbnail() functions in the TIFF document backend in GNOME Evince through 3.32.0 did not handle errors from TIFFReadRGBAImageOriented(), leading to uninitialized memory use when processing certain TIFF image files.(CVE-2019-11459)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2019-11459" type="cve" title="fix CVE-2019-11459" />
    </references>
    <pkglist>
      <collection>
        <package name="evince" version="3.30.1" release="4.uel20" epoch="0" arch="x86_64" src="evince-3.30.1-4.uel20.src.rpm">
          <filename>evince-3.30.1-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="evince-help" version="3.30.1" release="4.uel20" epoch="0" arch="x86_64" src="evince-3.30.1-4.uel20.src.rpm">
          <filename>evince-help-3.30.1-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="evince-devel" version="3.30.1" release="4.uel20" epoch="0" arch="x86_64" src="evince-3.30.1-4.uel20.src.rpm">
          <filename>evince-devel-3.30.1-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="evince-help" version="3.30.1" release="4.uel20" epoch="0" arch="aarch64" src="evince-3.30.1-4.uel20.src.rpm">
          <filename>evince-help-3.30.1-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="evince-devel" version="3.30.1" release="4.uel20" epoch="0" arch="aarch64" src="evince-3.30.1-4.uel20.src.rpm">
          <filename>evince-devel-3.30.1-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="evince" version="3.30.1" release="4.uel20" epoch="0" arch="aarch64" src="evince-3.30.1-4.uel20.src.rpm">
          <filename>evince-3.30.1-4.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20180</id>
    <title>Important: cfitsio security update</title>
    <updated date="2022-02-09 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: cfitsio security update</summary>
    <description> In the ffghtb function in NASA CFITSIO 3.42, specially crafted images parsed via the library can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can deliver an FIT image to trigger this vulnerability and potentially gain code execution.(CVE-2018-3849)
 In the ffghbn function in NASA CFITSIO 3.42, specially crafted images parsed via the library can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can deliver an FIT image to trigger this vulnerability and potentially gain code execution.(CVE-2018-3848)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2018-3849" type="cve" title="fix CVE-2018-3849" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2018-3848" type="cve" title="fix CVE-2018-3848" />
    </references>
    <pkglist>
      <collection>
        <package name="cfitsio" version="3.490" release="1.uel20" epoch="0" arch="x86_64" src="cfitsio-3.490-1.uel20.src.rpm">
          <filename>cfitsio-3.490-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="fpack" version="3.490" release="1.uel20" epoch="0" arch="x86_64" src="cfitsio-3.490-1.uel20.src.rpm">
          <filename>fpack-3.490-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="cfitsio-devel" version="3.490" release="1.uel20" epoch="0" arch="x86_64" src="cfitsio-3.490-1.uel20.src.rpm">
          <filename>cfitsio-devel-3.490-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="cfitsio-devel" version="3.490" release="1.uel20" epoch="0" arch="aarch64" src="cfitsio-3.490-1.uel20.src.rpm">
          <filename>cfitsio-devel-3.490-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="cfitsio-help" version="3.490" release="1.uel20" epoch="0" arch="noarch" src="cfitsio-3.490-1.uel20.src.rpm">
          <filename>cfitsio-help-3.490-1.uel20.noarch.rpm</filename>
        </package>
        <package name="fpack" version="3.490" release="1.uel20" epoch="0" arch="aarch64" src="cfitsio-3.490-1.uel20.src.rpm">
          <filename>fpack-3.490-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="cfitsio" version="3.490" release="1.uel20" epoch="0" arch="aarch64" src="cfitsio-3.490-1.uel20.src.rpm">
          <filename>cfitsio-3.490-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20189</id>
    <title>Moderate: uriparser security update</title>
    <updated date="2022-01-25 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: uriparser security update</summary>
    <description> An issue was discovered in uriparser before 0.9.6. It performs invalid free operations in uriNormalizeSyntax.(CVE-2021-46142)
 An issue was discovered in uriparser before 0.9.6. It performs invalid free operations in uriFreeUriMembers and uriMakeOwner.(CVE-2021-46141)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-46142" type="cve" title="fix CVE-2021-46142" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-46141" type="cve" title="fix CVE-2021-46141" />
    </references>
    <pkglist>
      <collection>
        <package name="uriparser-devel" version="0.9.6" release="1.uel20" epoch="0" arch="x86_64" src="uriparser-0.9.6-1.uel20.src.rpm">
          <filename>uriparser-devel-0.9.6-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="uriparser" version="0.9.6" release="1.uel20" epoch="0" arch="x86_64" src="uriparser-0.9.6-1.uel20.src.rpm">
          <filename>uriparser-0.9.6-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="uriparser-help" version="0.9.6" release="1.uel20" epoch="0" arch="noarch" src="uriparser-0.9.6-1.uel20.src.rpm">
          <filename>uriparser-help-0.9.6-1.uel20.noarch.rpm</filename>
        </package>
        <package name="uriparser" version="0.9.6" release="1.uel20" epoch="0" arch="aarch64" src="uriparser-0.9.6-1.uel20.src.rpm">
          <filename>uriparser-0.9.6-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="uriparser-devel" version="0.9.6" release="1.uel20" epoch="0" arch="aarch64" src="uriparser-0.9.6-1.uel20.src.rpm">
          <filename>uriparser-devel-0.9.6-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20190</id>
    <title>Moderate: hibernate3 security update</title>
    <updated date="2021-03-19 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: hibernate3 security update</summary>
    <description> A flaw was found in Hibernate ORM in versions before 5.3.18, 5.4.18 and 5.5.0.Beta1. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SELECT or GROUP BY parts of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks.(CVE-2019-14900)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2019-14900" type="cve" title="fix CVE-2019-14900" />
    </references>
    <pkglist>
      <collection>
        <package name="hibernate3-help" version="3.6.10" release="25.uel20" epoch="0" arch="noarch" src="hibernate3-3.6.10-25.uel20.src.rpm">
          <filename>hibernate3-help-3.6.10-25.uel20.noarch.rpm</filename>
        </package>
        <package name="hibernate3-envers" version="3.6.10" release="25.uel20" epoch="0" arch="noarch" src="hibernate3-3.6.10-25.uel20.src.rpm">
          <filename>hibernate3-envers-3.6.10-25.uel20.noarch.rpm</filename>
        </package>
        <package name="hibernate3-ehcache" version="3.6.10" release="25.uel20" epoch="0" arch="noarch" src="hibernate3-3.6.10-25.uel20.src.rpm">
          <filename>hibernate3-ehcache-3.6.10-25.uel20.noarch.rpm</filename>
        </package>
        <package name="hibernate3-entitymanager" version="3.6.10" release="25.uel20" epoch="0" arch="noarch" src="hibernate3-3.6.10-25.uel20.src.rpm">
          <filename>hibernate3-entitymanager-3.6.10-25.uel20.noarch.rpm</filename>
        </package>
        <package name="hibernate3-proxool" version="3.6.10" release="25.uel20" epoch="0" arch="noarch" src="hibernate3-3.6.10-25.uel20.src.rpm">
          <filename>hibernate3-proxool-3.6.10-25.uel20.noarch.rpm</filename>
        </package>
        <package name="hibernate3" version="3.6.10" release="25.uel20" epoch="0" arch="noarch" src="hibernate3-3.6.10-25.uel20.src.rpm">
          <filename>hibernate3-3.6.10-25.uel20.noarch.rpm</filename>
        </package>
        <package name="hibernate3-testing" version="3.6.10" release="25.uel20" epoch="0" arch="noarch" src="hibernate3-3.6.10-25.uel20.src.rpm">
          <filename>hibernate3-testing-3.6.10-25.uel20.noarch.rpm</filename>
        </package>
        <package name="hibernate3-c3p0" version="3.6.10" release="25.uel20" epoch="0" arch="noarch" src="hibernate3-3.6.10-25.uel20.src.rpm">
          <filename>hibernate3-c3p0-3.6.10-25.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20192</id>
    <title>Moderate: qt5-qtsvg security update</title>
    <updated date="2022-01-13 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: qt5-qtsvg security update</summary>
    <description> Qt SVG in Qt 5.0.0 through 5.15.2 and 6.0.0 through 6.2.1 has an out-of-bounds write in QtPrivate::QCommonArrayOps&lt;QPainterPath::Element&gt;::growAppend (called from QPainterPath::addPath and QPathClipper::intersect).(CVE-2021-45930)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-45930" type="cve" title="fix CVE-2021-45930" />
    </references>
    <pkglist>
      <collection>
        <package name="qt5-qtsvg-devel" version="5.11.1" release="7.uel20" epoch="0" arch="x86_64" src="qt5-qtsvg-5.11.1-7.uel20.src.rpm">
          <filename>qt5-qtsvg-devel-5.11.1-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="qt5-qtsvg" version="5.11.1" release="7.uel20" epoch="0" arch="x86_64" src="qt5-qtsvg-5.11.1-7.uel20.src.rpm">
          <filename>qt5-qtsvg-5.11.1-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="qt5-qtsvg-devel" version="5.11.1" release="7.uel20" epoch="0" arch="aarch64" src="qt5-qtsvg-5.11.1-7.uel20.src.rpm">
          <filename>qt5-qtsvg-devel-5.11.1-7.uel20.aarch64.rpm</filename>
        </package>
        <package name="qt5-qtsvg" version="5.11.1" release="7.uel20" epoch="0" arch="aarch64" src="qt5-qtsvg-5.11.1-7.uel20.src.rpm">
          <filename>qt5-qtsvg-5.11.1-7.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20198</id>
    <title>Important: sphinx security update</title>
    <updated date="2022-01-17 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: sphinx security update</summary>
    <description> SphinxSearch in Sphinx Technologies Sphinx through 3.1.1 allows directory traversal (in conjunction with CVE-2019-14511) because the mysql client can be used for CALL SNIPPETS and load_file operations on a full pathname (e.g., a file in the /etc directory). NOTE: this is unrelated to CMUSphinx.(CVE-2020-29050)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-29050" type="cve" title="fix CVE-2020-29050" />
    </references>
    <pkglist>
      <collection>
        <package name="sphinx" version="2.2.11" release="2.uel20" epoch="0" arch="x86_64" src="sphinx-2.2.11-2.uel20.src.rpm">
          <filename>sphinx-2.2.11-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="libsphinxclient" version="2.2.11" release="2.uel20" epoch="0" arch="x86_64" src="sphinx-2.2.11-2.uel20.src.rpm">
          <filename>libsphinxclient-2.2.11-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="libsphinxclient-devel" version="2.2.11" release="2.uel20" epoch="0" arch="x86_64" src="sphinx-2.2.11-2.uel20.src.rpm">
          <filename>libsphinxclient-devel-2.2.11-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="sphinx-php" version="2.2.11" release="2.uel20" epoch="0" arch="x86_64" src="sphinx-2.2.11-2.uel20.src.rpm">
          <filename>sphinx-php-2.2.11-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="sphinx-java" version="2.2.11" release="2.uel20" epoch="0" arch="x86_64" src="sphinx-2.2.11-2.uel20.src.rpm">
          <filename>sphinx-java-2.2.11-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="sphinx-help" version="2.2.11" release="2.uel20" epoch="0" arch="noarch" src="sphinx-2.2.11-2.uel20.src.rpm">
          <filename>sphinx-help-2.2.11-2.uel20.noarch.rpm</filename>
        </package>
        <package name="sphinx-php" version="2.2.11" release="2.uel20" epoch="0" arch="aarch64" src="sphinx-2.2.11-2.uel20.src.rpm">
          <filename>sphinx-php-2.2.11-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="sphinx" version="2.2.11" release="2.uel20" epoch="0" arch="aarch64" src="sphinx-2.2.11-2.uel20.src.rpm">
          <filename>sphinx-2.2.11-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="libsphinxclient-devel" version="2.2.11" release="2.uel20" epoch="0" arch="aarch64" src="sphinx-2.2.11-2.uel20.src.rpm">
          <filename>libsphinxclient-devel-2.2.11-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="libsphinxclient" version="2.2.11" release="2.uel20" epoch="0" arch="aarch64" src="sphinx-2.2.11-2.uel20.src.rpm">
          <filename>libsphinxclient-2.2.11-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="sphinx-java" version="2.2.11" release="2.uel20" epoch="0" arch="aarch64" src="sphinx-2.2.11-2.uel20.src.rpm">
          <filename>sphinx-java-2.2.11-2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20204</id>
    <title>Moderate: keepalived security update</title>
    <updated date="2021-12-23 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: keepalived security update</summary>
    <description> In Keepalived through 2.2.4, the D-Bus policy does not sufficiently restrict the message destination, allowing any user to inspect and manipulate any property. This leads to access-control bypass in some situations in which an unrelated D-Bus system service has a settable (writable) property(CVE-2021-44225)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-44225" type="cve" title="fix CVE-2021-44225" />
    </references>
    <pkglist>
      <collection>
        <package name="keepalived" version="2.0.20" release="19.uel20" epoch="0" arch="x86_64" src="keepalived-2.0.20-19.uel20.src.rpm">
          <filename>keepalived-2.0.20-19.uel20.x86_64.rpm</filename>
        </package>
        <package name="keepalived-help" version="2.0.20" release="19.uel20" epoch="0" arch="noarch" src="keepalived-2.0.20-19.uel20.src.rpm">
          <filename>keepalived-help-2.0.20-19.uel20.noarch.rpm</filename>
        </package>
        <package name="keepalived" version="2.0.20" release="19.uel20" epoch="0" arch="aarch64" src="keepalived-2.0.20-19.uel20.src.rpm">
          <filename>keepalived-2.0.20-19.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20205</id>
    <title>Important: rubygem-bundler security update</title>
    <updated date="2021-12-29 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: rubygem-bundler security update</summary>
    <description> `Bundler` is a package for managing application dependencies in Ruby. In `bundler` versions before 2.2.33, when working with untrusted and apparently harmless `Gemfile`'s, it is not expected that they lead to execution of external code, unless that's explicit in the ruby code inside the `Gemfile` itself. However, if the `Gemfile` includes `gem` entries that use the `git` option with invalid, but seemingly harmless, values with a leading dash, this can be false. To handle dependencies that come from a Git repository instead of a registry, Bundler uses various commands, such as `git clone`. These commands are being constructed using user input (e.g. the repository URL). When building the commands, Bundler versions before 2.2.33 correctly avoid Command Injection vulnerabilities by passing an array of arguments instead of a command string. However, there is the possibility that a user input starts with a dash (`-`) and is therefore treated as an optional argument instead of a positional one. This can lead to Code Execution because some of the commands have options that can be leveraged to run arbitrary executables. Since this value comes from the `Gemfile` file, it can contain any character, including a leading dash. To exploit this vulnerability, an attacker has to craft a directory containing a `Gemfile` file that declares a dependency that is located in a Git repository. This dependency has to have a Git URL in the form of `-u./payload`. This URL will be used to construct a Git clone command but will be interpreted as the upload-pack argument. Then this directory needs to be shared with the victim, who then needs to run a command that evaluates the Gemfile, such as `bundle lock`, inside. This vulnerability can lead to Arbitrary Code Execution, which could potentially lead to the takeover of the system. However, the exploitability is very low, because it requires a lot of user interaction. Bundler 2.2.33 has patched this problem by inserting `--` as an argument before any positional arguments to those Git commands that were affected by this issue. Regardless of whether users can upgrade or not, they should review any untrustred `Gemfile`'s before running any `bundler` commands that may read them, since they can contain arbitrary ruby code.(CVE-2021-43809)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-43809" type="cve" title="fix CVE-2021-43809" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-bundler-help" version="2.2.33" release="1.uel20" epoch="0" arch="noarch" src="rubygem-bundler-2.2.33-1.uel20.src.rpm">
          <filename>rubygem-bundler-help-2.2.33-1.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-bundler" version="2.2.33" release="1.uel20" epoch="0" arch="noarch" src="rubygem-bundler-2.2.33-1.uel20.src.rpm">
          <filename>rubygem-bundler-2.2.33-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20207</id>
    <title>Critical: openblas security update</title>
    <updated date="2021-12-29 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: openblas security update</summary>
    <description> An out-of-bounds read flaw was found in the CLARRV, DLARRV, SLARRV, and ZLARRV functions in lapack through version 3.10.0, as also used in OpenBLAS before version 0.3.18. Specially crafted inputs passed to these functions could cause an application using lapack to crash or possibly disclose portions of its memory.(CVE-2021-4048)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-4048" type="cve" title="fix CVE-2021-4048" />
    </references>
    <pkglist>
      <collection>
        <package name="openblas" version="0.3.10" release="3.uel20" epoch="0" arch="x86_64" src="openblas-0.3.10-3.uel20.src.rpm">
          <filename>openblas-0.3.10-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="openblas-devel" version="0.3.10" release="3.uel20" epoch="0" arch="x86_64" src="openblas-0.3.10-3.uel20.src.rpm">
          <filename>openblas-devel-0.3.10-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="openblas-devel" version="0.3.10" release="3.uel20" epoch="0" arch="aarch64" src="openblas-0.3.10-3.uel20.src.rpm">
          <filename>openblas-devel-0.3.10-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="openblas" version="0.3.10" release="3.uel20" epoch="0" arch="aarch64" src="openblas-0.3.10-3.uel20.src.rpm">
          <filename>openblas-0.3.10-3.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20209</id>
    <title>Important: mailman security update</title>
    <updated date="2021-12-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: mailman security update</summary>
    <description> In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.(CVE-2021-44227)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-44227" type="cve" title="fix CVE-2021-44227" />
    </references>
    <pkglist>
      <collection>
        <package name="mailman" version="2.1.36" release="2.uel20" epoch="3" arch="x86_64" src="mailman-2.1.36-2.uel20.src.rpm">
          <filename>mailman-2.1.36-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="mailman" version="2.1.36" release="2.uel20" epoch="3" arch="aarch64" src="mailman-2.1.36-2.uel20.src.rpm">
          <filename>mailman-2.1.36-2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20212</id>
    <title>Important: redis5 security update</title>
    <updated date="2021-12-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: redis5 security update</summary>
    <description> Redis is an open source, in-memory database that persists on disk. An integer overflow bug in the ziplist data structure used by all versions of Redis can be exploited to corrupt the heap and potentially result with remote code execution. The vulnerability involves modifying the default ziplist configuration parameters (hash-max-ziplist-entries, hash-max-ziplist-value, zset-max-ziplist-entries or zset-max-ziplist-value) to a very large value, and then constructing specially crafted commands to create very large ziplists. The problem is fixed in Redis versions 6.2.6, 6.0.16, 5.0.14. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from modifying the above configuration parameters. This can be done using ACL to restrict unprivileged users from using the CONFIG SET command.(CVE-2021-32628)
 Redis is an open source, in-memory database that persists on disk. In affected versions specially crafted Lua scripts executing in Redis can cause the heap-based Lua stack to be overflowed, due to incomplete checks for this condition. This can result with heap corruption and potentially remote code execution. This problem exists in all versions of Redis with Lua scripting support, starting from 2.6. The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14. For users unable to update an additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.(CVE-2021-32626)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-32628" type="cve" title="fix CVE-2021-32628" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-32626" type="cve" title="fix CVE-2021-32626" />
    </references>
    <pkglist>
      <collection>
        <package name="redis5" version="5.0.14" release="2.uel20" epoch="0" arch="x86_64" src="redis5-5.0.14-2.uel20.src.rpm">
          <filename>redis5-5.0.14-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="redis5-devel" version="5.0.14" release="2.uel20" epoch="0" arch="x86_64" src="redis5-5.0.14-2.uel20.src.rpm">
          <filename>redis5-devel-5.0.14-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="redis5-doc" version="5.0.14" release="2.uel20" epoch="0" arch="noarch" src="redis5-5.0.14-2.uel20.src.rpm">
          <filename>redis5-doc-5.0.14-2.uel20.noarch.rpm</filename>
        </package>
        <package name="redis5" version="5.0.14" release="2.uel20" epoch="0" arch="aarch64" src="redis5-5.0.14-2.uel20.src.rpm">
          <filename>redis5-5.0.14-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="redis5-devel" version="5.0.14" release="2.uel20" epoch="0" arch="aarch64" src="redis5-5.0.14-2.uel20.src.rpm">
          <filename>redis5-devel-5.0.14-2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20214</id>
    <title>Moderate: apache-mina security update</title>
    <updated date="2021-11-08 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: apache-mina security update</summary>
    <description> In Apache MINA, a specifically crafted, malformed HTTP request may cause the HTTP Header decoder to loop indefinitely. The decoder assumed that the HTTP Header begins at the beginning of the buffer and loops if there is more data than expected. Please update MINA to 2.1.5 or greater.(CVE-2021-41973)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-41973" type="cve" title="fix CVE-2021-41973" />
    </references>
    <pkglist>
      <collection>
        <package name="apache-mina-mina-filter-compression" version="2.0.21" release="2.uel20" epoch="0" arch="noarch" src="apache-mina-2.0.21-2.uel20.src.rpm">
          <filename>apache-mina-mina-filter-compression-2.0.21-2.uel20.noarch.rpm</filename>
        </package>
        <package name="apache-mina-javadoc" version="2.0.21" release="2.uel20" epoch="0" arch="noarch" src="apache-mina-2.0.21-2.uel20.src.rpm">
          <filename>apache-mina-javadoc-2.0.21-2.uel20.noarch.rpm</filename>
        </package>
        <package name="apache-mina-mina-http" version="2.0.21" release="2.uel20" epoch="0" arch="noarch" src="apache-mina-2.0.21-2.uel20.src.rpm">
          <filename>apache-mina-mina-http-2.0.21-2.uel20.noarch.rpm</filename>
        </package>
        <package name="apache-mina" version="2.0.21" release="2.uel20" epoch="0" arch="noarch" src="apache-mina-2.0.21-2.uel20.src.rpm">
          <filename>apache-mina-2.0.21-2.uel20.noarch.rpm</filename>
        </package>
        <package name="apache-mina-mina-statemachine" version="2.0.21" release="2.uel20" epoch="0" arch="noarch" src="apache-mina-2.0.21-2.uel20.src.rpm">
          <filename>apache-mina-mina-statemachine-2.0.21-2.uel20.noarch.rpm</filename>
        </package>
        <package name="apache-mina-mina-core" version="2.0.21" release="2.uel20" epoch="0" arch="noarch" src="apache-mina-2.0.21-2.uel20.src.rpm">
          <filename>apache-mina-mina-core-2.0.21-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20218</id>
    <title>Important: tinyxml security update</title>
    <updated date="2022-01-27 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: tinyxml security update</summary>
    <description> TinyXML through 2.6.2 has an infinite loop in TiXmlParsingData::Stamp in tinyxmlparser.cpp via the TIXML_UTF_LEAD_0 case. It can be triggered by a crafted XML message and leads to a denial of service.(CVE-2021-42260)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-42260" type="cve" title="fix CVE-2021-42260" />
    </references>
    <pkglist>
      <collection>
        <package name="tinyxml" version="2.6.2" release="22.uel20" epoch="0" arch="x86_64" src="tinyxml-2.6.2-22.uel20.src.rpm">
          <filename>tinyxml-2.6.2-22.uel20.x86_64.rpm</filename>
        </package>
        <package name="tinyxml-devel" version="2.6.2" release="22.uel20" epoch="0" arch="x86_64" src="tinyxml-2.6.2-22.uel20.src.rpm">
          <filename>tinyxml-devel-2.6.2-22.uel20.x86_64.rpm</filename>
        </package>
        <package name="tinyxml-devel" version="2.6.2" release="22.uel20" epoch="0" arch="aarch64" src="tinyxml-2.6.2-22.uel20.src.rpm">
          <filename>tinyxml-devel-2.6.2-22.uel20.aarch64.rpm</filename>
        </package>
        <package name="tinyxml" version="2.6.2" release="22.uel20" epoch="0" arch="aarch64" src="tinyxml-2.6.2-22.uel20.src.rpm">
          <filename>tinyxml-2.6.2-22.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20222</id>
    <title>Important: squashfs-tools security update</title>
    <updated date="2021-11-09 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: squashfs-tools security update</summary>
    <description> squashfs_opendir in unsquash-2.c in Squashfs-Tools 4.5 allows Directory Traversal, a different vulnerability than CVE-2021-40153. A squashfs filesystem that has been crafted to include a symbolic link and then contents under the same filename in a filesystem can cause unsquashfs to first create the symbolic link pointing outside the expected directory, and then the subsequent write operation will cause the unsquashfs process to write through the symbolic link elsewhere in the filesystem.(CVE-2021-41072)
 squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination.(CVE-2021-40153)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-41072" type="cve" title="fix CVE-2021-41072" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-40153" type="cve" title="fix CVE-2021-40153" />
    </references>
    <pkglist>
      <collection>
        <package name="squashfs-tools" version="4.4" release="5.uel20" epoch="0" arch="x86_64" src="squashfs-tools-4.4-5.uel20.src.rpm">
          <filename>squashfs-tools-4.4-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="squashfs-tools" version="4.4" release="5.uel20" epoch="0" arch="aarch64" src="squashfs-tools-4.4-5.uel20.src.rpm">
          <filename>squashfs-tools-4.4-5.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20224</id>
    <title>Important: SDL security update</title>
    <updated date="2021-11-05 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: SDL security update</summary>
    <description> SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c.(CVE-2019-7575)
 SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c.(CVE-2019-7574)
 SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c.(CVE-2019-7572)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2019-7575" type="cve" title="fix CVE-2019-7575" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2019-7574" type="cve" title="fix CVE-2019-7574" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2019-7572" type="cve" title="fix CVE-2019-7572" />
    </references>
    <pkglist>
      <collection>
        <package name="SDL" version="1.2.15" release="39.uel20" epoch="0" arch="x86_64" src="SDL-1.2.15-39.uel20.src.rpm">
          <filename>SDL-1.2.15-39.uel20.x86_64.rpm</filename>
        </package>
        <package name="SDL-devel" version="1.2.15" release="39.uel20" epoch="0" arch="x86_64" src="SDL-1.2.15-39.uel20.src.rpm">
          <filename>SDL-devel-1.2.15-39.uel20.x86_64.rpm</filename>
        </package>
        <package name="SDL-help" version="1.2.15" release="39.uel20" epoch="0" arch="x86_64" src="SDL-1.2.15-39.uel20.src.rpm">
          <filename>SDL-help-1.2.15-39.uel20.x86_64.rpm</filename>
        </package>
        <package name="SDL" version="1.2.15" release="39.uel20" epoch="0" arch="aarch64" src="SDL-1.2.15-39.uel20.src.rpm">
          <filename>SDL-1.2.15-39.uel20.aarch64.rpm</filename>
        </package>
        <package name="SDL-help" version="1.2.15" release="39.uel20" epoch="0" arch="aarch64" src="SDL-1.2.15-39.uel20.src.rpm">
          <filename>SDL-help-1.2.15-39.uel20.aarch64.rpm</filename>
        </package>
        <package name="SDL-devel" version="1.2.15" release="39.uel20" epoch="0" arch="aarch64" src="SDL-1.2.15-39.uel20.src.rpm">
          <filename>SDL-devel-1.2.15-39.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20227</id>
    <title>Moderate: rubygem-excon security update</title>
    <updated date="2021-11-01 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: rubygem-excon security update</summary>
    <description> In RubyGem excon before 0.71.0, there was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be difficult to purposefully exploit this.(CVE-2019-16779)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2019-16779" type="cve" title="fix CVE-2019-16779" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-excon-help" version="0.62.0" release="3.uel20" epoch="0" arch="noarch" src="rubygem-excon-0.62.0-3.uel20.src.rpm">
          <filename>rubygem-excon-help-0.62.0-3.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-excon" version="0.62.0" release="3.uel20" epoch="0" arch="noarch" src="rubygem-excon-0.62.0-3.uel20.src.rpm">
          <filename>rubygem-excon-0.62.0-3.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20229</id>
    <title>Critical: storm security update</title>
    <updated date="2022-09-08 19:30:43" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: storm security update</summary>
    <description> An Unsafe Deserialization vulnerability exists in the worker services of the Apache Storm supervisor server allowing pre-auth Remote Code Execution (RCE). Apache Storm 2.2.x users should upgrade to version 2.2.1 or 2.3.0. Apache Storm 2.1.x users should upgrade to version 2.1.1. Apache Storm 1.x users should upgrade to version 1.2.4(CVE-2021-40865)
 A Command Injection vulnerability exists in the getTopologyHistory service of the Apache Storm 2.x prior to 2.2.1 and Apache Storm 1.x prior to 1.2.4. A specially crafted thrift request to the Nimbus server allows Remote Code Execution (RCE) prior to authentication.(CVE-2021-38294)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-40865" type="cve" title="fix CVE-2021-40865" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-38294" type="cve" title="fix CVE-2021-38294" />
    </references>
    <pkglist>
      <collection>
        <package name="storm" version="1.2.4" release="1.uel20" epoch="0" arch="x86_64" src="storm-1.2.4-1.uel20.src.rpm">
          <filename>storm-1.2.4-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="storm" version="1.2.4" release="1.uel20" epoch="0" arch="aarch64" src="storm-1.2.4-1.uel20.src.rpm">
          <filename>storm-1.2.4-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20234</id>
    <title>Moderate: fetchmail security update</title>
    <updated date="2021-09-14 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: fetchmail security update</summary>
    <description> Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.(CVE-2021-39272)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-39272" type="cve" title="fix CVE-2021-39272" />
    </references>
    <pkglist>
      <collection>
        <package name="fetchmail" version="6.4.22" release="1.uel20" epoch="0" arch="x86_64" src="fetchmail-6.4.22-1.uel20.src.rpm">
          <filename>fetchmail-6.4.22-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="fetchmail" version="6.4.22" release="1.uel20" epoch="0" arch="aarch64" src="fetchmail-6.4.22-1.uel20.src.rpm">
          <filename>fetchmail-6.4.22-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="fetchmail-help" version="6.4.22" release="1.uel20" epoch="0" arch="noarch" src="fetchmail-6.4.22-1.uel20.src.rpm">
          <filename>fetchmail-help-6.4.22-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20237</id>
    <title>Moderate: lynx security update</title>
    <updated date="2021-08-17 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: lynx security update</summary>
    <description> Lynx through 2.8.9 mishandles the userinfo subcomponent of a URI, which allows remote attackers to discover cleartext credentials because they may appear in SNI data.(CVE-2021-38165)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-38165" type="cve" title="fix CVE-2021-38165" />
    </references>
    <pkglist>
      <collection>
        <package name="lynx" version="2.8.9" release="6.uel20" epoch="0" arch="x86_64" src="lynx-2.8.9-6.uel20.src.rpm">
          <filename>lynx-2.8.9-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="lynx" version="2.8.9" release="6.uel20" epoch="0" arch="aarch64" src="lynx-2.8.9-6.uel20.src.rpm">
          <filename>lynx-2.8.9-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="lynx-help" version="2.8.9" release="6.uel20" epoch="0" arch="noarch" src="lynx-2.8.9-6.uel20.src.rpm">
          <filename>lynx-help-2.8.9-6.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20246</id>
    <title>Important: apache-commons-compress security update</title>
    <updated date="2021-08-03 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: apache-commons-compress security update</summary>
    <description> When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package.(CVE-2021-36090)
 When reading a specially crafted TAR archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' tar package.(CVE-2021-35517)
 When reading a specially crafted 7Z archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' sevenz package.(CVE-2021-35516)
 When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package.(CVE-2021-35515)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-36090" type="cve" title="fix CVE-2021-36090" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-35517" type="cve" title="fix CVE-2021-35517" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-35516" type="cve" title="fix CVE-2021-35516" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-35515" type="cve" title="fix CVE-2021-35515" />
    </references>
    <pkglist>
      <collection>
        <package name="apache-commons-compress-help" version="1.21" release="1.uel20" epoch="0" arch="noarch" src="apache-commons-compress-1.21-1.uel20.src.rpm">
          <filename>apache-commons-compress-help-1.21-1.uel20.noarch.rpm</filename>
        </package>
        <package name="apache-commons-compress" version="1.21" release="1.uel20" epoch="0" arch="noarch" src="apache-commons-compress-1.21-1.uel20.src.rpm">
          <filename>apache-commons-compress-1.21-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20254</id>
    <title>Important: rubygem-addressable security update</title>
    <updated date="2021-07-14 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: rubygem-addressable security update</summary>
    <description> Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. An uncontrolled resource consumption vulnerability exists after version 2.3.0 through version 2.7.0. Within the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected. The vulnerability is patched in version 2.8.0. As a workaround, only create Template objects from trusted sources that have been validated not to produce catastrophic backtracking.(CVE-2021-32740)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-32740" type="cve" title="fix CVE-2021-32740" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-addressable-doc" version="2.5.2" release="2.uel20" epoch="0" arch="noarch" src="rubygem-addressable-2.5.2-2.uel20.src.rpm">
          <filename>rubygem-addressable-doc-2.5.2-2.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-addressable" version="2.5.2" release="2.uel20" epoch="0" arch="noarch" src="rubygem-addressable-2.5.2-2.uel20.src.rpm">
          <filename>rubygem-addressable-2.5.2-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20263</id>
    <title>Moderate: gnome-autoar security update</title>
    <updated date="2021-04-23 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: gnome-autoar security update</summary>
    <description> autoar-extractor.c in GNOME gnome-autoar before 0.3.1, as used by GNOME Shell, Nautilus, and other software, allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink in certain complex situations. NOTE: this issue exists because of an incomplete fix for CVE-2020-36241.(CVE-2021-28650)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-28650" type="cve" title="fix CVE-2021-28650" />
    </references>
    <pkglist>
      <collection>
        <package name="gnome-autoar" version="0.2.3" release="6.uel20" epoch="0" arch="x86_64" src="gnome-autoar-0.2.3-6.uel20.src.rpm">
          <filename>gnome-autoar-0.2.3-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="gnome-autoar-devel" version="0.2.3" release="6.uel20" epoch="0" arch="x86_64" src="gnome-autoar-0.2.3-6.uel20.src.rpm">
          <filename>gnome-autoar-devel-0.2.3-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="gnome-autoar-devel" version="0.2.3" release="6.uel20" epoch="0" arch="aarch64" src="gnome-autoar-0.2.3-6.uel20.src.rpm">
          <filename>gnome-autoar-devel-0.2.3-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="gnome-autoar" version="0.2.3" release="6.uel20" epoch="0" arch="aarch64" src="gnome-autoar-0.2.3-6.uel20.src.rpm">
          <filename>gnome-autoar-0.2.3-6.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20264</id>
    <title>Moderate: jersey security update</title>
    <updated date="2021-05-07 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: jersey security update</summary>
    <description> Eclipse Jersey 2.28 to 2.33 and Eclipse Jersey 3.0.0 to 3.0.1 contains a local information disclosure vulnerability. This is due to the use of the File.createTempFile which creates a file inside of the system temporary directory with the permissions: -rw-r--r--. Thus the contents of this file are viewable by all other users locally on the system. As such, if the contents written is security sensitive, it can be disclosed to other local users.(CVE-2021-28168)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-28168" type="cve" title="fix CVE-2021-28168" />
    </references>
    <pkglist>
      <collection>
        <package name="jersey-javadoc" version="2.28" release="2.uel20" epoch="0" arch="noarch" src="jersey-2.28-2.uel20.src.rpm">
          <filename>jersey-javadoc-2.28-2.uel20.noarch.rpm</filename>
        </package>
        <package name="jersey" version="2.28" release="2.uel20" epoch="0" arch="noarch" src="jersey-2.28-2.uel20.src.rpm">
          <filename>jersey-2.28-2.uel20.noarch.rpm</filename>
        </package>
        <package name="jersey-test-framework" version="2.28" release="2.uel20" epoch="0" arch="noarch" src="jersey-2.28-2.uel20.src.rpm">
          <filename>jersey-test-framework-2.28-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20265</id>
    <title>Moderate: jasper security update</title>
    <updated date="2021-09-08 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: jasper security update</summary>
    <description> A Divide-by-zero vulnerability exists in JasPer Image Coding Toolkit 2.0 in jasper/src/libjasper/jpc/jpc_enc.c(CVE-2021-27845)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-27845" type="cve" title="fix CVE-2021-27845" />
    </references>
    <pkglist>
      <collection>
        <package name="jasper" version="2.0.14" release="10.uel20" epoch="0" arch="x86_64" src="jasper-2.0.14-10.uel20.src.rpm">
          <filename>jasper-2.0.14-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="jasper-utils" version="2.0.14" release="10.uel20" epoch="0" arch="x86_64" src="jasper-2.0.14-10.uel20.src.rpm">
          <filename>jasper-utils-2.0.14-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="jasper-devel" version="2.0.14" release="10.uel20" epoch="0" arch="x86_64" src="jasper-2.0.14-10.uel20.src.rpm">
          <filename>jasper-devel-2.0.14-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="jasper-help" version="2.0.14" release="10.uel20" epoch="0" arch="x86_64" src="jasper-2.0.14-10.uel20.src.rpm">
          <filename>jasper-help-2.0.14-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="jasper" version="2.0.14" release="10.uel20" epoch="0" arch="aarch64" src="jasper-2.0.14-10.uel20.src.rpm">
          <filename>jasper-2.0.14-10.uel20.aarch64.rpm</filename>
        </package>
        <package name="jasper-utils" version="2.0.14" release="10.uel20" epoch="0" arch="aarch64" src="jasper-2.0.14-10.uel20.src.rpm">
          <filename>jasper-utils-2.0.14-10.uel20.aarch64.rpm</filename>
        </package>
        <package name="jasper-help" version="2.0.14" release="10.uel20" epoch="0" arch="aarch64" src="jasper-2.0.14-10.uel20.src.rpm">
          <filename>jasper-help-2.0.14-10.uel20.aarch64.rpm</filename>
        </package>
        <package name="jasper-devel" version="2.0.14" release="10.uel20" epoch="0" arch="aarch64" src="jasper-2.0.14-10.uel20.src.rpm">
          <filename>jasper-devel-2.0.14-10.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20269</id>
    <title>Critical: xmlbeans security update</title>
    <updated date="2021-02-08 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: xmlbeans security update</summary>
    <description> The XML parsers used by XMLBeans up to version 2.6.0 did not set the properties needed to protect the user from malicious XML input. Vulnerabilities include possibilities for XML Entity Expansion attacks. Affects XMLBeans up to and including v2.6.0.(CVE-2021-23926)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-23926" type="cve" title="fix CVE-2021-23926" />
    </references>
    <pkglist>
      <collection>
        <package name="xmlbeans-javadoc" version="2.6.0" release="2.uel20" epoch="0" arch="noarch" src="xmlbeans-2.6.0-2.uel20.src.rpm">
          <filename>xmlbeans-javadoc-2.6.0-2.uel20.noarch.rpm</filename>
        </package>
        <package name="xmlbeans" version="2.6.0" release="2.uel20" epoch="0" arch="noarch" src="xmlbeans-2.6.0-2.uel20.src.rpm">
          <filename>xmlbeans-2.6.0-2.uel20.noarch.rpm</filename>
        </package>
        <package name="xmlbeans-manual" version="2.6.0" release="2.uel20" epoch="0" arch="noarch" src="xmlbeans-2.6.0-2.uel20.src.rpm">
          <filename>xmlbeans-manual-2.6.0-2.uel20.noarch.rpm</filename>
        </package>
        <package name="xmlbeans-scripts" version="2.6.0" release="2.uel20" epoch="0" arch="noarch" src="xmlbeans-2.6.0-2.uel20.src.rpm">
          <filename>xmlbeans-scripts-2.6.0-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20271</id>
    <title>Critical: nodejs-handlebars security update</title>
    <updated date="2021-05-21 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: nodejs-handlebars security update</summary>
    <description> The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source.(CVE-2021-23383)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-23383" type="cve" title="fix CVE-2021-23383" />
    </references>
    <pkglist>
      <collection>
        <package name="nodejs-handlebars" version="4.0.13" release="2.uel20" epoch="0" arch="noarch" src="nodejs-handlebars-4.0.13-2.uel20.src.rpm">
          <filename>nodejs-handlebars-4.0.13-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20272</id>
    <title>Moderate: nodejs-hosted-git-info security update</title>
    <updated date="2021-03-29 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: nodejs-hosted-git-info security update</summary>
    <description> The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.(CVE-2021-23362)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-23362" type="cve" title="fix CVE-2021-23362" />
    </references>
    <pkglist>
      <collection>
        <package name="nodejs-hosted-git-info" version="2.1.4" release="2.uel20" epoch="0" arch="noarch" src="nodejs-hosted-git-info-2.1.4-2.uel20.src.rpm">
          <filename>nodejs-hosted-git-info-2.1.4-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20273</id>
    <title>Important: nodejs-underscore security update</title>
    <updated date="2021-04-16 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: nodejs-underscore security update</summary>
    <description> The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Injection via the template function, particularly when a variable property is passed as an argument as it is not sanitized.(CVE-2021-23358)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-23358" type="cve" title="fix CVE-2021-23358" />
    </references>
    <pkglist>
      <collection>
        <package name="nodejs-underscore" version="1.9.1" release="2.uel20" epoch="0" arch="noarch" src="nodejs-underscore-1.9.1-2.uel20.src.rpm">
          <filename>nodejs-underscore-1.9.1-2.uel20.noarch.rpm</filename>
        </package>
        <package name="js-underscore" version="1.9.1" release="2.uel20" epoch="0" arch="noarch" src="nodejs-underscore-1.9.1-2.uel20.src.rpm">
          <filename>js-underscore-1.9.1-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20274</id>
    <title>Important: nodejs-path-parse security update</title>
    <updated date="2021-07-01 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: nodejs-path-parse security update</summary>
    <description> All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.(CVE-2021-23343)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-23343" type="cve" title="fix CVE-2021-23343" />
    </references>
    <pkglist>
      <collection>
        <package name="nodejs-path-parse" version="1.0.7" release="1.uel20" epoch="0" arch="noarch" src="nodejs-path-parse-1.0.7-1.uel20.src.rpm">
          <filename>nodejs-path-parse-1.0.7-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20279</id>
    <title>Moderate: spice security update</title>
    <updated date="2021-06-07 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: spice security update</summary>
    <description> A flaw was found in spice in versions before 0.14.92. A DoS tool might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection.(CVE-2021-20201)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-20201" type="cve" title="fix CVE-2021-20201" />
    </references>
    <pkglist>
      <collection>
        <package name="spice-server-devel" version="0.14.3" release="3.uel20" epoch="0" arch="x86_64" src="spice-0.14.3-3.uel20.src.rpm">
          <filename>spice-server-devel-0.14.3-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="spice-server" version="0.14.3" release="3.uel20" epoch="0" arch="x86_64" src="spice-0.14.3-3.uel20.src.rpm">
          <filename>spice-server-0.14.3-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="spice-help" version="0.14.3" release="3.uel20" epoch="0" arch="noarch" src="spice-0.14.3-3.uel20.src.rpm">
          <filename>spice-help-0.14.3-3.uel20.noarch.rpm</filename>
        </package>
        <package name="spice-server-devel" version="0.14.3" release="3.uel20" epoch="0" arch="aarch64" src="spice-0.14.3-3.uel20.src.rpm">
          <filename>spice-server-devel-0.14.3-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="spice-server" version="0.14.3" release="3.uel20" epoch="0" arch="aarch64" src="spice-0.14.3-3.uel20.src.rpm">
          <filename>spice-server-0.14.3-3.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20281</id>
    <title>Moderate: babel security update</title>
    <updated date="2021-05-11 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: babel security update</summary>
    <description>fix cve/bug or enhancement</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-20095" type="cve" title="fix CVE-2021-20095" />
    </references>
    <pkglist>
      <collection>
        <package name="python2-babel" version="2.8.0" release="3.uel20" epoch="0" arch="noarch" src="babel-2.8.0-3.uel20.src.rpm">
          <filename>python2-babel-2.8.0-3.uel20.noarch.rpm</filename>
        </package>
        <package name="python3-babel" version="2.8.0" release="3.uel20" epoch="0" arch="noarch" src="babel-2.8.0-3.uel20.src.rpm">
          <filename>python3-babel-2.8.0-3.uel20.noarch.rpm</filename>
        </package>
        <package name="babel-help" version="2.8.0" release="3.uel20" epoch="0" arch="noarch" src="babel-2.8.0-3.uel20.src.rpm">
          <filename>babel-help-2.8.0-3.uel20.noarch.rpm</filename>
        </package>
        <package name="babel" version="2.8.0" release="3.uel20" epoch="0" arch="noarch" src="babel-2.8.0-3.uel20.src.rpm">
          <filename>babel-2.8.0-3.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20283</id>
    <title>Critical: rubygem-rails security update</title>
    <updated date="2021-02-03 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: rubygem-rails security update</summary>
    <description> A deserialization of untrusted data vulnernerability exists in rails &lt; 5.2.4.3, rails &lt; 6.0.3.1 that can allow an attacker to unmarshal user-provided objects in MemCacheStore and RedisCacheStore potentially resulting in an RCE.(CVE-2020-8165)
 A client side enforcement of server side security vulnerability exists in rails &lt; 5.2.4.2 and rails &lt; 6.0.3.1 ActiveStorage's S3 adapter that allows the Content-Length of a direct file upload to be modified by an end user bypassing upload limits.(CVE-2020-8162)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-8165" type="cve" title="fix CVE-2020-8165" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-8162" type="cve" title="fix CVE-2020-8162" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-rails" version="5.2.4.4" release="1.uel20" epoch="1" arch="noarch" src="rubygem-rails-5.2.4.4-1.uel20.src.rpm">
          <filename>rubygem-rails-5.2.4.4-1.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-rails-doc" version="5.2.4.4" release="1.uel20" epoch="1" arch="noarch" src="rubygem-rails-5.2.4.4-1.uel20.src.rpm">
          <filename>rubygem-rails-doc-5.2.4.4-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20284</id>
    <title>Important: rubygem-activeresource security update</title>
    <updated date="2021-10-08 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: rubygem-activeresource security update</summary>
    <description> There is a possible information disclosure issue in Active Resource &lt;v5.1.1 that could allow an attacker to create specially crafted requests to access data in an unexpected way and possibly leak information.(CVE-2020-8151)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-8151" type="cve" title="fix CVE-2020-8151" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-activeresource" version="5.0.0" release="2.uel20" epoch="1" arch="noarch" src="rubygem-activeresource-5.0.0-2.uel20.src.rpm">
          <filename>rubygem-activeresource-5.0.0-2.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-activeresource-doc" version="5.0.0" release="2.uel20" epoch="1" arch="noarch" src="rubygem-activeresource-5.0.0-2.uel20.src.rpm">
          <filename>rubygem-activeresource-doc-5.0.0-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20286</id>
    <title>Moderate: mojarra security update</title>
    <updated date="2021-06-10 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: mojarra security update</summary>
    <description> Directory traversal in Eclipse Mojarra before 2.3.14 allows attackers to read arbitrary files via the loc parameter or con parameter.(CVE-2020-6950)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-6950" type="cve" title="fix CVE-2020-6950" />
    </references>
    <pkglist>
      <collection>
        <package name="mojarra" version="2.2.13" release="2.uel20" epoch="0" arch="noarch" src="mojarra-2.2.13-2.uel20.src.rpm">
          <filename>mojarra-2.2.13-2.uel20.noarch.rpm</filename>
        </package>
        <package name="mojarra-javadoc" version="2.2.13" release="2.uel20" epoch="0" arch="noarch" src="mojarra-2.2.13-2.uel20.src.rpm">
          <filename>mojarra-javadoc-2.2.13-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20287</id>
    <title>Important: libass security update</title>
    <updated date="2021-07-29 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: libass security update</summary>
    <description> libass 0.15.x before 0.15.1 has a heap-based buffer overflow in decode_chars (called from decode_font and process_text) because the wrong integer data type is used for subtraction.(CVE-2020-36430)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-36430" type="cve" title="fix CVE-2020-36430" />
    </references>
    <pkglist>
      <collection>
        <package name="libass" version="0.15.0" release="2.uel20" epoch="0" arch="x86_64" src="libass-0.15.0-2.uel20.src.rpm">
          <filename>libass-0.15.0-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="libass-devel" version="0.15.0" release="2.uel20" epoch="0" arch="x86_64" src="libass-0.15.0-2.uel20.src.rpm">
          <filename>libass-devel-0.15.0-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="libass-help" version="0.15.0" release="2.uel20" epoch="0" arch="noarch" src="libass-0.15.0-2.uel20.src.rpm">
          <filename>libass-help-0.15.0-2.uel20.noarch.rpm</filename>
        </package>
        <package name="libass" version="0.15.0" release="2.uel20" epoch="0" arch="aarch64" src="libass-0.15.0-2.uel20.src.rpm">
          <filename>libass-0.15.0-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="libass-devel" version="0.15.0" release="2.uel20" epoch="0" arch="aarch64" src="libass-0.15.0-2.uel20.src.rpm">
          <filename>libass-devel-0.15.0-2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20289</id>
    <title>Moderate: wavpack security update</title>
    <updated date="2021-03-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: wavpack security update</summary>
    <description> WavPack 5.3.0 has an out-of-bounds write in WavpackPackSamples in pack_utils.c because of an integer overflow in a malloc argument. NOTE: some third-parties claim that there are later "unofficial" releases through 5.3.2, which are also affected.(CVE-2020-35738)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-35738" type="cve" title="fix CVE-2020-35738" />
    </references>
    <pkglist>
      <collection>
        <package name="wavpack" version="5.3.0" release="2.uel20" epoch="0" arch="x86_64" src="wavpack-5.3.0-2.uel20.src.rpm">
          <filename>wavpack-5.3.0-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="wavpack-devel" version="5.3.0" release="2.uel20" epoch="0" arch="x86_64" src="wavpack-5.3.0-2.uel20.src.rpm">
          <filename>wavpack-devel-5.3.0-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="wavpack" version="5.3.0" release="2.uel20" epoch="0" arch="aarch64" src="wavpack-5.3.0-2.uel20.src.rpm">
          <filename>wavpack-5.3.0-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="wavpack-devel" version="5.3.0" release="2.uel20" epoch="0" arch="aarch64" src="wavpack-5.3.0-2.uel20.src.rpm">
          <filename>wavpack-devel-5.3.0-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="wavpack-help" version="5.3.0" release="2.uel20" epoch="0" arch="noarch" src="wavpack-5.3.0-2.uel20.src.rpm">
          <filename>wavpack-help-5.3.0-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20293</id>
    <title>Important: jackson-dataformats-binary security update</title>
    <updated date="2021-03-02 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: jackson-dataformats-binary security update</summary>
    <description> This affects the package com.fasterxml.jackson.dataformat:jackson-dataformat-cbor from 0 and before 2.11.4, from 2.12.0-rc1 and before 2.12.1. Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception.(CVE-2020-28491)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-28491" type="cve" title="fix CVE-2020-28491" />
    </references>
    <pkglist>
      <collection>
        <package name="jackson-dataformats-binary" version="2.9.4" release="6.uel20" epoch="0" arch="noarch" src="jackson-dataformats-binary-2.9.4-6.uel20.src.rpm">
          <filename>jackson-dataformats-binary-2.9.4-6.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20295</id>
    <title>Moderate: libmaxminddb security update</title>
    <updated date="2021-07-24 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: libmaxminddb security update</summary>
    <description> libmaxminddb before 1.4.3 has a heap-based buffer over-read in dump_entry_data_list in maxminddb.c.(CVE-2020-28241)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-28241" type="cve" title="fix CVE-2020-28241" />
    </references>
    <pkglist>
      <collection>
        <package name="libmaxminddb" version="1.2.0" release="8.uel20" epoch="0" arch="x86_64" src="libmaxminddb-1.2.0-8.uel20.src.rpm">
          <filename>libmaxminddb-1.2.0-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="libmaxminddb-help" version="1.2.0" release="8.uel20" epoch="0" arch="x86_64" src="libmaxminddb-1.2.0-8.uel20.src.rpm">
          <filename>libmaxminddb-help-1.2.0-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="libmaxminddb-devel" version="1.2.0" release="8.uel20" epoch="0" arch="x86_64" src="libmaxminddb-1.2.0-8.uel20.src.rpm">
          <filename>libmaxminddb-devel-1.2.0-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="libmaxminddb" version="1.2.0" release="8.uel20" epoch="0" arch="aarch64" src="libmaxminddb-1.2.0-8.uel20.src.rpm">
          <filename>libmaxminddb-1.2.0-8.uel20.aarch64.rpm</filename>
        </package>
        <package name="libmaxminddb-help" version="1.2.0" release="8.uel20" epoch="0" arch="aarch64" src="libmaxminddb-1.2.0-8.uel20.src.rpm">
          <filename>libmaxminddb-help-1.2.0-8.uel20.aarch64.rpm</filename>
        </package>
        <package name="libmaxminddb-devel" version="1.2.0" release="8.uel20" epoch="0" arch="aarch64" src="libmaxminddb-1.2.0-8.uel20.src.rpm">
          <filename>libmaxminddb-devel-1.2.0-8.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20298</id>
    <title>Moderate: xdg-utils security update</title>
    <updated date="2021-06-15 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: xdg-utils security update</summary>
    <description> A flaw was found in the xdg-email component of xdg-utils-1.1.0-rc1 and newer. When handling mailto: URIs, xdg-email allows attachments to be discreetly added via the URI when being passed to Thunderbird. An attacker could potentially send a victim a URI that automatically attaches a sensitive file to a new email. If a victim user does not notice that an attachment was added and sends the email, this could result in sensitive information disclosure. It has been confirmed that the code behind this issue is in xdg-email and not in Thunderbird.(CVE-2020-27748)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-27748" type="cve" title="fix CVE-2020-27748" />
    </references>
    <pkglist>
      <collection>
        <package name="xdg-utils" version="1.1.3" release="5.uel20" epoch="0" arch="noarch" src="xdg-utils-1.1.3-5.uel20.src.rpm">
          <filename>xdg-utils-1.1.3-5.uel20.noarch.rpm</filename>
        </package>
        <package name="xdg-utils-help" version="1.1.3" release="5.uel20" epoch="0" arch="noarch" src="xdg-utils-1.1.3-5.uel20.src.rpm">
          <filename>xdg-utils-help-1.1.3-5.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20304</id>
    <title>Moderate: junit security update</title>
    <updated date="2021-02-19 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: junit security update</summary>
    <description> In JUnit4 from version 4.7 and before 4.13.1, the test rule TemporaryFolder contains a local information disclosure vulnerability. On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. This vulnerability impacts you if the JUnit tests write sensitive information, like API keys or passwords, into the temporary folder, and the JUnit tests execute in an environment where the OS has other untrusted users. Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. For Java 1.7 and higher users: this vulnerability is fixed in 4.13.1. For Java 1.6 and lower users: no patch is available, you must use the workaround below. If you are unable to patch, or are stuck running on Java 1.6, specifying the `java.io.tmpdir` system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability. For more information, including an example of vulnerable code, see the referenced GitHub Security Advisory.(CVE-2020-15250)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-15250" type="cve" title="fix CVE-2020-15250" />
    </references>
    <pkglist>
      <collection>
        <package name="junit-help" version="4.12" release="13.uel20" epoch="1" arch="noarch" src="junit-4.12-13.uel20.src.rpm">
          <filename>junit-help-4.12-13.uel20.noarch.rpm</filename>
        </package>
        <package name="junit" version="4.12" release="13.uel20" epoch="1" arch="noarch" src="junit-4.12-13.uel20.src.rpm">
          <filename>junit-4.12-13.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20307</id>
    <title>Critical: PyYAML security update</title>
    <updated date="2021-06-16 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: PyYAML security update</summary>
    <description> A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.(CVE-2020-14343)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-14343" type="cve" title="fix CVE-2020-14343" />
    </references>
    <pkglist>
      <collection>
        <package name="python2-pyyaml" version="5.3.1" release="4.uel20" epoch="0" arch="x86_64" src="pyyaml-5.3.1-4.uel20.src.rpm">
          <filename>python2-pyyaml-5.3.1-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-pyyaml" version="5.3.1" release="4.uel20" epoch="0" arch="x86_64" src="pyyaml-5.3.1-4.uel20.src.rpm">
          <filename>python3-pyyaml-5.3.1-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-pyyaml" version="5.3.1" release="4.uel20" epoch="0" arch="aarch64" src="pyyaml-5.3.1-4.uel20.src.rpm">
          <filename>python3-pyyaml-5.3.1-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="python2-pyyaml" version="5.3.1" release="4.uel20" epoch="0" arch="aarch64" src="pyyaml-5.3.1-4.uel20.src.rpm">
          <filename>python2-pyyaml-5.3.1-4.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20309</id>
    <title>Critical: rubygem-kramdown security update</title>
    <updated date="2021-07-23 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: rubygem-kramdown security update</summary>
    <description> The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://&lt;%= `). NOTE: kramdown is used in Jekyll, GitLab Pages, GitHub Pages, and Thredded Forum.(CVE-2020-14001)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-14001" type="cve" title="fix CVE-2020-14001" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-kramdown-help" version="2.1.0" release="3.uel20" epoch="0" arch="noarch" src="rubygem-kramdown-2.1.0-3.uel20.src.rpm">
          <filename>rubygem-kramdown-help-2.1.0-3.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-kramdown" version="2.1.0" release="3.uel20" epoch="0" arch="noarch" src="rubygem-kramdown-2.1.0-3.uel20.src.rpm">
          <filename>rubygem-kramdown-2.1.0-3.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20311</id>
    <title>Moderate: velocity-tools security update</title>
    <updated date="2021-03-20 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: velocity-tools security update</summary>
    <description> The default error page for VelocityView in Apache Velocity Tools prior to 3.1 reflects back the vm file that was entered as part of the URL. An attacker can set an XSS payload file as this vm file in the URL which results in this payload being executed. XSS vulnerabilities allow attackers to execute arbitrary JavaScript in the context of the attacked website and the attacked user. This can be abused to steal session cookies, perform requests in the name of the victim or for phishing attacks.(CVE-2020-13959)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-13959" type="cve" title="fix CVE-2020-13959" />
    </references>
    <pkglist>
      <collection>
        <package name="velocity-tools-javadoc" version="2.0" release="2.uel20" epoch="0" arch="noarch" src="velocity-tools-2.0-2.uel20.src.rpm">
          <filename>velocity-tools-javadoc-2.0-2.uel20.noarch.rpm</filename>
        </package>
        <package name="velocity-tools" version="2.0" release="2.uel20" epoch="0" arch="noarch" src="velocity-tools-2.0-2.uel20.src.rpm">
          <filename>velocity-tools-2.0-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20313</id>
    <title>Important: libupnp security update</title>
    <updated date="2021-02-01 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: libupnp security update</summary>
    <description> Portable UPnP SDK (aka libupnp) 1.12.1 and earlier allows remote attackers to cause a denial of service (crash) via a crafted SSDP message due to a NULL pointer dereference in the functions FindServiceControlURLPath and FindServiceEventURLPath in genlib/service_table/service_table.c.(CVE-2020-13848)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-13848" type="cve" title="fix CVE-2020-13848" />
    </references>
    <pkglist>
      <collection>
        <package name="libupnp" version="1.8.4" release="3.uel20" epoch="0" arch="x86_64" src="libupnp-1.8.4-3.uel20.src.rpm">
          <filename>libupnp-1.8.4-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="libupnp-devel" version="1.8.4" release="3.uel20" epoch="0" arch="x86_64" src="libupnp-1.8.4-3.uel20.src.rpm">
          <filename>libupnp-devel-1.8.4-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="libupnp" version="1.8.4" release="3.uel20" epoch="0" arch="aarch64" src="libupnp-1.8.4-3.uel20.src.rpm">
          <filename>libupnp-1.8.4-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="libupnp-devel" version="1.8.4" release="3.uel20" epoch="0" arch="aarch64" src="libupnp-1.8.4-3.uel20.src.rpm">
          <filename>libupnp-devel-1.8.4-3.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20320</id>
    <title>Low: file-roller security update</title>
    <updated date="2021-07-29 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Low</severity>
    <summary>Low: file-roller security update</summary>
    <description> fr-archive-libarchive.c in GNOME file-roller through 3.36.1 allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the intended extraction location.(CVE-2020-11736)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-11736" type="cve" title="fix CVE-2020-11736" />
    </references>
    <pkglist>
      <collection>
        <package name="file-roller" version="3.30.1" release="3.uel20" epoch="0" arch="x86_64" src="file-roller-3.30.1-3.uel20.src.rpm">
          <filename>file-roller-3.30.1-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="file-roller-nautilus" version="3.30.1" release="3.uel20" epoch="0" arch="x86_64" src="file-roller-3.30.1-3.uel20.src.rpm">
          <filename>file-roller-nautilus-3.30.1-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="file-roller" version="3.30.1" release="3.uel20" epoch="0" arch="aarch64" src="file-roller-3.30.1-3.uel20.src.rpm">
          <filename>file-roller-3.30.1-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="file-roller-nautilus" version="3.30.1" release="3.uel20" epoch="0" arch="aarch64" src="file-roller-3.30.1-3.uel20.src.rpm">
          <filename>file-roller-nautilus-3.30.1-3.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20321</id>
    <title>Critical: python-sqlalchemy security update</title>
    <updated date="2021-02-08 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: python-sqlalchemy security update</summary>
    <description> SQLAlchemy 1.2.17 has SQL Injection when the group_by parameter can be controlled.(CVE-2019-7548)
 SQLAlchemy through 1.2.17 and 1.3.x through 1.3.0b2 allows SQL Injection via the order_by parameter.(CVE-2019-7164)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2019-7548" type="cve" title="fix CVE-2019-7548" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2019-7164" type="cve" title="fix CVE-2019-7164" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-sqlalchemy" version="1.2.19" release="3.uel20" epoch="0" arch="x86_64" src="python-sqlalchemy-1.2.19-3.uel20.src.rpm">
          <filename>python3-sqlalchemy-1.2.19-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="python2-sqlalchemy" version="1.2.19" release="3.uel20" epoch="0" arch="x86_64" src="python-sqlalchemy-1.2.19-3.uel20.src.rpm">
          <filename>python2-sqlalchemy-1.2.19-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-sqlalchemy" version="1.2.19" release="3.uel20" epoch="0" arch="aarch64" src="python-sqlalchemy-1.2.19-3.uel20.src.rpm">
          <filename>python3-sqlalchemy-1.2.19-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="python2-sqlalchemy" version="1.2.19" release="3.uel20" epoch="0" arch="aarch64" src="python-sqlalchemy-1.2.19-3.uel20.src.rpm">
          <filename>python2-sqlalchemy-1.2.19-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="python-sqlalchemy-help" version="1.2.19" release="3.uel20" epoch="0" arch="noarch" src="python-sqlalchemy-1.2.19-3.uel20.src.rpm">
          <filename>python-sqlalchemy-help-1.2.19-3.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20324</id>
    <title>Critical: aspell security update</title>
    <updated date="2021-09-28 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: aspell security update</summary>
    <description> objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow in acommon::ObjStack::dup_top (called from acommon::StringMap::add and acommon::Config::lookup_list).(CVE-2019-25051)
 libaspell.a in GNU Aspell before 0.60.8 has a buffer over-read for a string ending with a single '\0' byte, if the encoding is set to ucs-2 or ucs-4 outside of the application, as demonstrated by the ASPELL_CONF environment variable.(CVE-2019-20433)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2019-25051" type="cve" title="fix CVE-2019-25051" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2019-20433" type="cve" title="fix CVE-2019-20433" />
    </references>
    <pkglist>
      <collection>
        <package name="aspell" version="0.60.6.1" release="29.uel20" epoch="12" arch="x86_64" src="aspell-0.60.6.1-29.uel20.src.rpm">
          <filename>aspell-0.60.6.1-29.uel20.x86_64.rpm</filename>
        </package>
        <package name="aspell-help" version="0.60.6.1" release="29.uel20" epoch="12" arch="x86_64" src="aspell-0.60.6.1-29.uel20.src.rpm">
          <filename>aspell-help-0.60.6.1-29.uel20.x86_64.rpm</filename>
        </package>
        <package name="aspell-devel" version="0.60.6.1" release="29.uel20" epoch="12" arch="x86_64" src="aspell-0.60.6.1-29.uel20.src.rpm">
          <filename>aspell-devel-0.60.6.1-29.uel20.x86_64.rpm</filename>
        </package>
        <package name="aspell" version="0.60.6.1" release="29.uel20" epoch="12" arch="aarch64" src="aspell-0.60.6.1-29.uel20.src.rpm">
          <filename>aspell-0.60.6.1-29.uel20.aarch64.rpm</filename>
        </package>
        <package name="aspell-devel" version="0.60.6.1" release="29.uel20" epoch="12" arch="aarch64" src="aspell-0.60.6.1-29.uel20.src.rpm">
          <filename>aspell-devel-0.60.6.1-29.uel20.aarch64.rpm</filename>
        </package>
        <package name="aspell-help" version="0.60.6.1" release="29.uel20" epoch="12" arch="aarch64" src="aspell-0.60.6.1-29.uel20.src.rpm">
          <filename>aspell-help-0.60.6.1-29.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20330</id>
    <title>Important: memcached security update</title>
    <updated date="2021-01-07 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: memcached security update</summary>
    <description> memcached 1.5.16, when UNIX sockets are used, has a stack-based buffer over-read in conn_to_str in memcached.c.(CVE-2019-15026)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2019-15026" type="cve" title="fix CVE-2019-15026" />
    </references>
    <pkglist>
      <collection>
        <package name="memcached-selinux" version="1.5.10" release="6.uel20" epoch="0" arch="x86_64" src="memcached-1.5.10-6.uel20.src.rpm">
          <filename>memcached-selinux-1.5.10-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="memcached-devel" version="1.5.10" release="6.uel20" epoch="0" arch="x86_64" src="memcached-1.5.10-6.uel20.src.rpm">
          <filename>memcached-devel-1.5.10-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="memcached" version="1.5.10" release="6.uel20" epoch="0" arch="x86_64" src="memcached-1.5.10-6.uel20.src.rpm">
          <filename>memcached-1.5.10-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="memcached-help" version="1.5.10" release="6.uel20" epoch="0" arch="noarch" src="memcached-1.5.10-6.uel20.src.rpm">
          <filename>memcached-help-1.5.10-6.uel20.noarch.rpm</filename>
        </package>
        <package name="memcached-devel" version="1.5.10" release="6.uel20" epoch="0" arch="aarch64" src="memcached-1.5.10-6.uel20.src.rpm">
          <filename>memcached-devel-1.5.10-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="memcached" version="1.5.10" release="6.uel20" epoch="0" arch="aarch64" src="memcached-1.5.10-6.uel20.src.rpm">
          <filename>memcached-1.5.10-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="memcached-selinux" version="1.5.10" release="6.uel20" epoch="0" arch="aarch64" src="memcached-1.5.10-6.uel20.src.rpm">
          <filename>memcached-selinux-1.5.10-6.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20331</id>
    <title>Important: kf5-kconfig security update</title>
    <updated date="2022-01-28 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: kf5-kconfig security update</summary>
    <description> In KDE Frameworks KConfig before 5.61.0, malicious desktop files and configuration files lead to code execution with minimal user interaction. This relates to libKF5ConfigCore.so, and the mishandling of .desktop and .directory files, as demonstrated by a shell command on an Icon line in a .desktop file.(CVE-2019-14744)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2019-14744" type="cve" title="fix CVE-2019-14744" />
    </references>
    <pkglist>
      <collection>
        <package name="kf5-kconfig" version="5.55.0" release="3.uel20" epoch="0" arch="x86_64" src="kf5-kconfig-5.55.0-3.uel20.src.rpm">
          <filename>kf5-kconfig-5.55.0-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="kf5-kconfig-core" version="5.55.0" release="3.uel20" epoch="0" arch="x86_64" src="kf5-kconfig-5.55.0-3.uel20.src.rpm">
          <filename>kf5-kconfig-core-5.55.0-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="kf5-kconfig-gui" version="5.55.0" release="3.uel20" epoch="0" arch="x86_64" src="kf5-kconfig-5.55.0-3.uel20.src.rpm">
          <filename>kf5-kconfig-gui-5.55.0-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="kf5-kconfig-devel" version="5.55.0" release="3.uel20" epoch="0" arch="x86_64" src="kf5-kconfig-5.55.0-3.uel20.src.rpm">
          <filename>kf5-kconfig-devel-5.55.0-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="kf5-kconfig-gui" version="5.55.0" release="3.uel20" epoch="0" arch="aarch64" src="kf5-kconfig-5.55.0-3.uel20.src.rpm">
          <filename>kf5-kconfig-gui-5.55.0-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="kf5-kconfig" version="5.55.0" release="3.uel20" epoch="0" arch="aarch64" src="kf5-kconfig-5.55.0-3.uel20.src.rpm">
          <filename>kf5-kconfig-5.55.0-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="kf5-kconfig-devel" version="5.55.0" release="3.uel20" epoch="0" arch="aarch64" src="kf5-kconfig-5.55.0-3.uel20.src.rpm">
          <filename>kf5-kconfig-devel-5.55.0-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="kf5-kconfig-core" version="5.55.0" release="3.uel20" epoch="0" arch="aarch64" src="kf5-kconfig-5.55.0-3.uel20.src.rpm">
          <filename>kf5-kconfig-core-5.55.0-3.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20333</id>
    <title>Important: jackson security update</title>
    <updated date="2021-09-13 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: jackson security update</summary>
    <description> A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but in different classes.(CVE-2019-10172)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2019-10172" type="cve" title="fix CVE-2019-10172" />
    </references>
    <pkglist>
      <collection>
        <package name="jackson-help" version="1.9.11" release="16.uel20" epoch="0" arch="noarch" src="jackson-1.9.11-16.uel20.src.rpm">
          <filename>jackson-help-1.9.11-16.uel20.noarch.rpm</filename>
        </package>
        <package name="jackson" version="1.9.11" release="16.uel20" epoch="0" arch="noarch" src="jackson-1.9.11-16.uel20.src.rpm">
          <filename>jackson-1.9.11-16.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20335</id>
    <title>Critical: libpng12 security update</title>
    <updated date="2020-09-07 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: libpng12 security update</summary>
    <description> Unspecified vulnerability in libpng before 1.6.20, as used in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01, allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 23265085.(CVE-2016-3751)
 Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.(CVE-2015-8126)
 Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng before 1.5.21 and 1.6.x before 1.6.16 allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495.(CVE-2015-0973)
 Heap-based buffer overflow in the png_combine_row function in libpng before 1.5.21 and 1.6.x before 1.6.16, when running on 64-bit systems, might allow context-dependent attackers to execute arbitrary code via a "very wide interlaced" PNG image.(CVE-2014-9495)
 Multiple integer overflows in libpng before 1.5.14rc03 allow remote attackers to cause a denial of service (crash) via a crafted image to the (1) png_set_sPLT or (2) png_set_text_2 function, which triggers a heap-based buffer overflow.(CVE-2013-7354)
 Integer overflow in the png_set_unknown_chunks function in libpng/pngset.c in libpng before 1.5.14beta08 allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a crafted image, which triggers a heap-based buffer overflow.(CVE-2013-7353)
 The png_do_expand_palette function in libpng before 1.6.8 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via (1) a PLTE chunk of zero bytes or (2) a NULL palette, related to pngrtran.c and pngset.c.(CVE-2013-6954)
 Integer signedness error in the png_inflate function in pngrutil.c in libpng before 1.4.10beta01, as used in Google Chrome before 17.0.963.83 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file, a different vulnerability than CVE-2011-3026.(CVE-2011-3045)
 Multiple off-by-one errors in libpng before 1.2.32beta01, and 1.4 before 1.4.0beta34, allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a PNG image with crafted zTXt chunks, related to (1) the png_push_read_zTXt function in pngread.c, and possibly related to (2) pngtest.c.(CVE-2008-3964)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2016-3751" type="cve" title="fix CVE-2016-3751" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2015-8126" type="cve" title="fix CVE-2015-8126" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2015-0973" type="cve" title="fix CVE-2015-0973" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2014-9495" type="cve" title="fix CVE-2014-9495" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2013-7354" type="cve" title="fix CVE-2013-7354" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2013-7353" type="cve" title="fix CVE-2013-7353" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2013-6954" type="cve" title="fix CVE-2013-6954" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2011-3045" type="cve" title="fix CVE-2011-3045" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2008-3964" type="cve" title="fix CVE-2008-3964" />
    </references>
    <pkglist>
      <collection>
        <package name="libpng12" version="1.2.57" release="12.uel20" epoch="0" arch="x86_64" src="libpng12-1.2.57-12.uel20.src.rpm">
          <filename>libpng12-1.2.57-12.uel20.x86_64.rpm</filename>
        </package>
        <package name="libpng12-devel" version="1.2.57" release="12.uel20" epoch="0" arch="x86_64" src="libpng12-1.2.57-12.uel20.src.rpm">
          <filename>libpng12-devel-1.2.57-12.uel20.x86_64.rpm</filename>
        </package>
        <package name="libpng12" version="1.2.57" release="12.uel20" epoch="0" arch="aarch64" src="libpng12-1.2.57-12.uel20.src.rpm">
          <filename>libpng12-1.2.57-12.uel20.aarch64.rpm</filename>
        </package>
        <package name="libpng12-devel" version="1.2.57" release="12.uel20" epoch="0" arch="aarch64" src="libpng12-1.2.57-12.uel20.src.rpm">
          <filename>libpng12-devel-1.2.57-12.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20336</id>
    <title>Moderate: gstreamer-plugins-good security update</title>
    <updated date="2021-01-27 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: gstreamer-plugins-good security update</summary>
    <description> The gst_aac_parse_sink_setcaps function in gst/audioparsers/gstaacparse.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted audio file.(CVE-2016-10198)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2016-10198" type="cve" title="fix CVE-2016-10198" />
    </references>
    <pkglist>
      <collection>
        <package name="gstreamer-plugins-good" version="0.10.31" release="24.uel20" epoch="0" arch="x86_64" src="gstreamer-plugins-good-0.10.31-24.uel20.src.rpm">
          <filename>gstreamer-plugins-good-0.10.31-24.uel20.x86_64.rpm</filename>
        </package>
        <package name="gstreamer-plugins-good" version="0.10.31" release="24.uel20" epoch="0" arch="aarch64" src="gstreamer-plugins-good-0.10.31-24.uel20.src.rpm">
          <filename>gstreamer-plugins-good-0.10.31-24.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20340</id>
    <title>Critical: nodejs-jsonpointer security update</title>
    <updated date="2022-06-29 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: nodejs-jsonpointer security update</summary>
    <description> This affects the package jsonpointer before 5.0.0. A type confusion vulnerability can lead to a bypass of a previous Prototype Pollution fix when the pointer components are arrays.(CVE-2021-23807)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-23807" type="cve" title="fix CVE-2021-23807" />
    </references>
    <pkglist>
      <collection>
        <package name="nodejs-jsonpointer" version="5.0.0" release="1.uel20" epoch="0" arch="noarch" src="nodejs-jsonpointer-5.0.0-1.uel20.src.rpm">
          <filename>nodejs-jsonpointer-5.0.0-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="bugfix" version="2.0">
    <id>UTBA-2022:20349</id>
    <title>liburing/fio bugfix</title>
    <updated date="2022-07-21 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>liburing/fio bugfix</summary>
    <description> 解决io_uring测试segfault问题(BZ-129697)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="BZ-129697" type="bugzilla" title="fix BZ-129697" />
    </references>
    <pkglist>
      <collection>
        <package name="liburing" version="1.0.7" release="3.0.1.uel20" epoch="0" arch="x86_64" src="liburing-1.0.7-3.0.1.uel20.src.rpm">
          <filename>liburing-1.0.7-3.0.1.uel20.x86_64.rpm</filename>
        </package>
        <package name="liburing" version="1.0.7" release="3.0.1.uel20" epoch="0" arch="aarch64" src="liburing-1.0.7-3.0.1.uel20.src.rpm">
          <filename>liburing-1.0.7-3.0.1.uel20.aarch64.rpm</filename>
        </package>
        <package name="fio" version="3.22" release="1.0.1.uel20.01" epoch="0" arch="x86_64" src="fio-3.22-1.0.1.uel20.01.src.rpm">
          <filename>fio-3.22-1.0.1.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="fio-help" version="3.22" release="1.0.1.uel20.01" epoch="0" arch="x86_64" src="fio-3.22-1.0.1.uel20.01.src.rpm">
          <filename>fio-help-3.22-1.0.1.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="fio-help" version="3.22" release="1.0.1.uel20.01" epoch="0" arch="aarch64" src="fio-3.22-1.0.1.uel20.01.src.rpm">
          <filename>fio-help-3.22-1.0.1.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="fio" version="3.22" release="1.0.1.uel20.01" epoch="0" arch="aarch64" src="fio-3.22-1.0.1.uel20.01.src.rpm">
          <filename>fio-3.22-1.0.1.uel20.01.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="bugfix" version="2.0">
    <id>UTBA-2022:20352</id>
    <title>podman/ima-evm-utils bugfix</title>
    <updated date="2022-07-21 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>podman/ima-evm-utils bugfix</summary>
    <description> 解决安装依赖问题(BZ-149361)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="BZ-149361" type="bugzilla" title="fix BZ-149361" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-podman" version="0.10.1" release="8.up1.uel20" epoch="1" arch="noarch" src="podman-0.10.1-8.up1.uel20.src.rpm">
          <filename>python3-podman-0.10.1-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="python3-pypodman" version="0.10.1" release="8.up1.uel20" epoch="1" arch="noarch" src="podman-0.10.1-8.up1.uel20.src.rpm">
          <filename>python3-pypodman-0.10.1-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="ima-evm-utils-libs" version="1.3.2" release="12.uel20.9" epoch="0" arch="x86_64" src="ima-evm-utils-1.3.2-12.uel20.9.src.rpm">
          <filename>ima-evm-utils-libs-1.3.2-12.uel20.9.x86_64.rpm</filename>
        </package>
        <package name="ima-evm-utils" version="1.3.2" release="12.uel20.9" epoch="0" arch="x86_64" src="ima-evm-utils-1.3.2-12.uel20.9.src.rpm">
          <filename>ima-evm-utils-1.3.2-12.uel20.9.x86_64.rpm</filename>
        </package>
        <package name="ima-evm-utils-devel" version="1.3.2" release="12.uel20.9" epoch="0" arch="x86_64" src="ima-evm-utils-1.3.2-12.uel20.9.src.rpm">
          <filename>ima-evm-utils-devel-1.3.2-12.uel20.9.x86_64.rpm</filename>
        </package>
        <package name="ima-evm-utils-help" version="1.3.2" release="12.uel20.9" epoch="0" arch="noarch" src="ima-evm-utils-1.3.2-12.uel20.9.src.rpm">
          <filename>ima-evm-utils-help-1.3.2-12.uel20.9.noarch.rpm</filename>
        </package>
        <package name="ima-evm-utils-libs" version="1.3.2" release="12.uel20.9" epoch="0" arch="aarch64" src="ima-evm-utils-1.3.2-12.uel20.9.src.rpm">
          <filename>ima-evm-utils-libs-1.3.2-12.uel20.9.aarch64.rpm</filename>
        </package>
        <package name="ima-evm-utils" version="1.3.2" release="12.uel20.9" epoch="0" arch="aarch64" src="ima-evm-utils-1.3.2-12.uel20.9.src.rpm">
          <filename>ima-evm-utils-1.3.2-12.uel20.9.aarch64.rpm</filename>
        </package>
        <package name="ima-evm-utils-devel" version="1.3.2" release="12.uel20.9" epoch="0" arch="aarch64" src="ima-evm-utils-1.3.2-12.uel20.9.src.rpm">
          <filename>ima-evm-utils-devel-1.3.2-12.uel20.9.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="bugfix" version="2.0">
    <id>UTBA-2022:20359</id>
    <title>google-noto-fonts\atune bugfix</title>
    <updated date="2022-07-21 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>google-noto-fonts\atune bugfix</summary>
    <description> 修改产品标识(BZ-139685)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="BZ-139685" type="bugzilla" title="fix BZ-139685" />
    </references>
    <pkglist>
      <collection>
        <package name="google-noto-sans-deseret-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-deseret-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-lycian-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-lycian-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-lydian-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-lydian-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-ogham-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-ogham-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-phoenician-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-phoenician-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-tagbanwa-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-tagbanwa-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-hatran-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-hatran-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-old-south-arabian-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-old-south-arabian-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-old-italic-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-old-italic-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-inscriptional-pahlavi-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-inscriptional-pahlavi-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-imperial-aramaic-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-imperial-aramaic-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-nabataean-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-nabataean-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-inscriptional-parthian-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-inscriptional-parthian-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-old-permic-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-old-permic-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-tagalog-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-tagalog-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-mro-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-mro-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-bassa-vah-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-bassa-vah-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-buginese-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-buginese-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-hanunoo-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-hanunoo-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-old-north-arabian-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-old-north-arabian-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-rejang-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-rejang-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-sora-sompeng-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-sora-sompeng-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-ugaritic-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-ugaritic-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-pau-cin-hau-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-pau-cin-hau-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-runic-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-runic-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-gothic-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-gothic-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-samaritan-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-samaritan-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-buhid-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-buhid-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-carian-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-carian-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-lisu-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-lisu-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-limbu-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-limbu-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-old-persian-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-old-persian-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-shavian-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-shavian-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-caucasian-albanian-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-caucasian-albanian-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-cypriot-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-cypriot-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-old-turkic-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-old-turkic-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-batak-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-batak-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-fonts-common" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-fonts-common-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-ol-chiki-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-ol-chiki-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-palmyrene-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-palmyrene-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-meetei-mayek-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-meetei-mayek-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-takri-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-takri-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-multani-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-multani-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-osmanya-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-osmanya-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-new-tai-lue-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-new-tai-lue-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-kayah-li-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-kayah-li-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-pahawh-hmong-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-pahawh-hmong-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-duployan-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-duployan-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-osage-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-osage-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-elbasan-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-elbasan-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-khudawadi-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-khudawadi-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-ahom-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-ahom-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-tai-le-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-tai-le-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-mahajani-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-mahajani-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-sundanese-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-sundanese-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-avestan-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-avestan-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-tifinagh-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-tifinagh-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-lepcha-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-lepcha-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-kharoshthi-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-kharoshthi-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-warang-citi-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-warang-citi-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-syloti-nagri-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-syloti-nagri-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-mandaic-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-mandaic-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-miao-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-miao-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-mende-kikakui-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-mende-kikakui-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-tai-viet-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-tai-viet-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-psalter-pahlavi-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-psalter-pahlavi-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-meroitic-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-meroitic-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-phags-pa-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-phags-pa-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-saurashtra-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-saurashtra-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-nko-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-nko-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-brahmi-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-brahmi-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-glagolitic-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-glagolitic-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-adlam-unjoined-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-adlam-unjoined-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-sharada-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-sharada-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-khojki-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-khojki-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-modi-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-modi-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-manichaean-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-manichaean-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-syriac-estrangela-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-syriac-estrangela-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-syriac-eastern-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-syriac-eastern-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-coptic-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-coptic-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-tai-tham-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-tai-tham-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-thaana-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-thaana-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-balinese-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-balinese-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-syriac-western-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-syriac-western-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-old-hungarian-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-old-hungarian-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-linear-a-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-linear-a-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-chakma-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-chakma-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-lao-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-lao-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-hebrew-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-hebrew-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-linear-b-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-linear-b-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-lao-ui-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-lao-ui-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-armenian-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-armenian-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-myanmar-ui-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-myanmar-ui-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-kufi-arabic-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-kufi-arabic-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-devanagari-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-devanagari-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-sinhala-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-sinhala-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-tamil-ui-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-tamil-ui-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-hebrew-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-hebrew-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-tibetan-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-tibetan-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-georgian-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-georgian-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-bengali-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-bengali-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-kannada-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-kannada-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-thai-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-thai-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-ethiopic-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-ethiopic-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-thaana-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-thaana-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-syriac-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-syriac-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-display-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-display-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-bengali-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-bengali-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-myanmar-ui-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-myanmar-ui-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-arabic-ui-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-arabic-ui-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-armenian-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-armenian-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-display-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-display-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-symbols-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-symbols-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-tamil-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-tamil-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-kannada-ui-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-kannada-ui-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-sinhala-ui-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-sinhala-ui-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-armenian-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-armenian-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-khmer-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-khmer-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-lao-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-lao-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-myanmar-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-myanmar-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-lao-ui-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-lao-ui-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-malayalam-ui-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-malayalam-ui-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-khmer-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-khmer-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-khmer-ui-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-khmer-ui-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-tibetan-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-tibetan-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-thai-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-thai-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-display-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-display-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-display-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-display-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-khmer-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-khmer-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-cuneiform-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-cuneiform-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-tamil-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-tamil-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-lao-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-lao-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-thai-ui-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-thai-ui-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-tamil-slanted-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-tamil-slanted-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-tamil-slanted-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-tamil-slanted-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-mono-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-mono-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-malayalam-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-malayalam-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-bhaiksuki-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-bhaiksuki-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-lao-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-lao-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-grantha-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-grantha-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-canadian-aboriginal-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-canadian-aboriginal-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-devanagari-ui-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-devanagari-ui-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-ethiopic-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-ethiopic-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-devanagari-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-devanagari-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-symbols2-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-symbols2-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-gurmukhi-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-gurmukhi-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-tamil-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-tamil-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-oriya-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-oriya-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-khmer-ui-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-khmer-ui-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-ethiopic-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-ethiopic-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-hebrew-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-hebrew-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-gurmukhi-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-gurmukhi-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-music-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-music-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-adlam-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-adlam-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-tirhuta-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-tirhuta-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-bengali-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-bengali-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-kannada-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-kannada-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-devanagari-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-devanagari-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-mongolian-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-mongolian-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-myanmar-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-myanmar-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-arabic-ui-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-arabic-ui-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-marchen-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-marchen-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-naskh-arabic-ui-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-naskh-arabic-ui-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-nastaliq-urdu-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-nastaliq-urdu-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-malayalam-ui-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-malayalam-ui-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-gujarati-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-gujarati-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-tamil-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-tamil-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-cham-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-cham-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-gujarati-ui-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-gujarati-ui-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-malayalam-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-malayalam-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-gujarati-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-gujarati-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-tamil-ui-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-tamil-ui-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-symbols-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-symbols-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-bengali-ui-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-bengali-ui-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-math-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-math-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-tibetan-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-tibetan-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-bengali-ui-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-bengali-ui-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-kannada-ui-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-kannada-ui-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-canadian-aboriginal-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-canadian-aboriginal-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-cherokee-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-cherokee-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-kaithi-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-kaithi-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-telugu-ui-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-telugu-ui-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-naskh-arabic-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-naskh-arabic-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-georgian-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-georgian-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-thai-ui-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-thai-ui-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-bamum-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-bamum-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-gurmukhi-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-gurmukhi-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-cham-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-cham-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-anatolian-hieroglyphs-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-anatolian-hieroglyphs-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-myanmar-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-myanmar-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-telugu-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-telugu-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-arabic-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-arabic-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-oriya-ui-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-oriya-ui-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-gujarati-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-gujarati-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-khmer-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-khmer-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-myanmar-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-myanmar-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-telugu-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-telugu-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-georgian-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-georgian-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-thai-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-thai-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-kannada-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-kannada-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-sinhala-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-sinhala-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-vai-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-vai-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-georgian-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-georgian-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-yi-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-yi-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-javanese-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-javanese-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-gurmukhi-ui-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-gurmukhi-ui-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-malayalam-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-malayalam-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-mono-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-mono-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-armenian-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-armenian-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-arabic-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-arabic-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-kannada-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-kannada-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-hebrew-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-hebrew-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-devanagari-ui-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-devanagari-ui-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-sinhala-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-sinhala-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-cherokee-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-cherokee-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-egyptian-hieroglyphs-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-egyptian-hieroglyphs-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-ethiopic-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-ethiopic-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-thai-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-thai-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-sinhala-vf-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-sinhala-vf-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-sans-newa-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-sans-newa-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="google-noto-serif-fonts" version="20181223" release="1.up1.uel20" epoch="0" arch="noarch" src="google-noto-fonts-20181223-1.up1.uel20.src.rpm">
          <filename>google-noto-serif-fonts-20181223-1.up1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="bugfix" version="2.0">
    <id>UTBA-2022:20361</id>
    <title>netdata/autotrace bugfix</title>
    <updated date="2022-07-21 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>netdata/autotrace bugfix</summary>
    <description> 解决安装依赖问题(BZ-137513)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="BZ-137513" type="bugzilla" title="fix BZ-137513" />
    </references>
    <pkglist>
      <collection>
        <package name="netdata-freeipmi" version="1.31.0" release="3.uel20" epoch="0" arch="x86_64" src="netdata-1.31.0-3.uel20.src.rpm">
          <filename>netdata-freeipmi-1.31.0-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="netdata" version="1.31.0" release="3.uel20" epoch="0" arch="x86_64" src="netdata-1.31.0-3.uel20.src.rpm">
          <filename>netdata-1.31.0-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="netdata" version="1.31.0" release="3.uel20" epoch="0" arch="aarch64" src="netdata-1.31.0-3.uel20.src.rpm">
          <filename>netdata-1.31.0-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="netdata-conf" version="1.31.0" release="3.uel20" epoch="0" arch="noarch" src="netdata-1.31.0-3.uel20.src.rpm">
          <filename>netdata-conf-1.31.0-3.uel20.noarch.rpm</filename>
        </package>
        <package name="netdata-data" version="1.31.0" release="3.uel20" epoch="0" arch="noarch" src="netdata-1.31.0-3.uel20.src.rpm">
          <filename>netdata-data-1.31.0-3.uel20.noarch.rpm</filename>
        </package>
        <package name="netdata-freeipmi" version="1.31.0" release="3.uel20" epoch="0" arch="aarch64" src="netdata-1.31.0-3.uel20.src.rpm">
          <filename>netdata-freeipmi-1.31.0-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="autotrace" version="0.31.1" release="53.up1.uel20" epoch="0" arch="x86_64" src="autotrace-0.31.1-53.up1.uel20.src.rpm">
          <filename>autotrace-0.31.1-53.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="autotrace-devel" version="0.31.1" release="53.up1.uel20" epoch="0" arch="x86_64" src="autotrace-0.31.1-53.up1.uel20.src.rpm">
          <filename>autotrace-devel-0.31.1-53.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="autotrace-help" version="0.31.1" release="53.up1.uel20" epoch="0" arch="noarch" src="autotrace-0.31.1-53.up1.uel20.src.rpm">
          <filename>autotrace-help-0.31.1-53.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="autotrace-devel" version="0.31.1" release="53.up1.uel20" epoch="0" arch="aarch64" src="autotrace-0.31.1-53.up1.uel20.src.rpm">
          <filename>autotrace-devel-0.31.1-53.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="autotrace" version="0.31.1" release="53.up1.uel20" epoch="0" arch="aarch64" src="autotrace-0.31.1-53.up1.uel20.src.rpm">
          <filename>autotrace-0.31.1-53.up1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20379</id>
    <title>Moderate: libjpeg-turbo security update</title>
    <updated date="2022-09-16 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: libjpeg-turbo security update</summary>
    <description> A crafted input file could cause a null pointer dereference in jcopy_sample_rows() when processed by libjpeg-turbo.(CVE-2020-35538)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-35538" type="cve" title="fix CVE-2020-35538" />
    </references>
    <pkglist>
      <collection>
        <package name="libjpeg-turbo" version="2.0.5" release="3.up1.uel20" epoch="0" arch="x86_64" src="libjpeg-turbo-2.0.5-3.up1.uel20.src.rpm">
          <filename>libjpeg-turbo-2.0.5-3.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libjpeg-turbo-devel" version="2.0.5" release="3.up1.uel20" epoch="0" arch="x86_64" src="libjpeg-turbo-2.0.5-3.up1.uel20.src.rpm">
          <filename>libjpeg-turbo-devel-2.0.5-3.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libjpeg-turbo-devel" version="2.0.5" release="3.up1.uel20" epoch="0" arch="aarch64" src="libjpeg-turbo-2.0.5-3.up1.uel20.src.rpm">
          <filename>libjpeg-turbo-devel-2.0.5-3.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libjpeg-turbo-help" version="2.0.5" release="3.up1.uel20" epoch="0" arch="noarch" src="libjpeg-turbo-2.0.5-3.up1.uel20.src.rpm">
          <filename>libjpeg-turbo-help-2.0.5-3.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="libjpeg-turbo" version="2.0.5" release="3.up1.uel20" epoch="0" arch="aarch64" src="libjpeg-turbo-2.0.5-3.up1.uel20.src.rpm">
          <filename>libjpeg-turbo-2.0.5-3.up1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20380</id>
    <title>Important: fribidi security update</title>
    <updated date="2022-09-16 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: fribidi security update</summary>
    <description> A segmentation fault (SEGV) flaw was found in the Fribidi package and affects the fribidi_remove_bidi_marks() function of the lib/fribidi.c file. This flaw allows an attacker to pass a specially crafted file to Fribidi, leading to a crash and causing a denial of service.(CVE-2022-25310)
 A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the '--caprtl' option, leading to a crash and causing a denial of service.(CVE-2022-25309)
 A stack-based buffer overflow flaw was found in the Fribidi package. This flaw allows an attacker to pass a specially crafted file to the Fribidi application, which leads to a possible memory leak or a denial of service.(CVE-2022-25308)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-25310" type="cve" title="fix CVE-2022-25310" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-25309" type="cve" title="fix CVE-2022-25309" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-25308" type="cve" title="fix CVE-2022-25308" />
    </references>
    <pkglist>
      <collection>
        <package name="fribidi" version="1.0.10" release="2.uel20" epoch="0" arch="x86_64" src="fribidi-1.0.10-2.uel20.src.rpm">
          <filename>fribidi-1.0.10-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="fribidi-devel" version="1.0.10" release="2.uel20" epoch="0" arch="x86_64" src="fribidi-1.0.10-2.uel20.src.rpm">
          <filename>fribidi-devel-1.0.10-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="fribidi" version="1.0.10" release="2.uel20" epoch="0" arch="aarch64" src="fribidi-1.0.10-2.uel20.src.rpm">
          <filename>fribidi-1.0.10-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="fribidi-devel" version="1.0.10" release="2.uel20" epoch="0" arch="aarch64" src="fribidi-1.0.10-2.uel20.src.rpm">
          <filename>fribidi-devel-1.0.10-2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20382</id>
    <title>None: wayland security update</title>
    <updated date="2022-09-16 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: wayland security update</summary>
    <description>fix cve/bug or enhancement</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-3782" type="cve" title="fix CVE-2021-3782" />
    </references>
    <pkglist>
      <collection>
        <package name="wayland" version="1.17.0" release="3.uel20" epoch="0" arch="x86_64" src="wayland-1.17.0-3.uel20.src.rpm">
          <filename>wayland-1.17.0-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="wayland-devel" version="1.17.0" release="3.uel20" epoch="0" arch="x86_64" src="wayland-1.17.0-3.uel20.src.rpm">
          <filename>wayland-devel-1.17.0-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="wayland-devel" version="1.17.0" release="3.uel20" epoch="0" arch="aarch64" src="wayland-1.17.0-3.uel20.src.rpm">
          <filename>wayland-devel-1.17.0-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="wayland-help" version="1.17.0" release="3.uel20" epoch="0" arch="noarch" src="wayland-1.17.0-3.uel20.src.rpm">
          <filename>wayland-help-1.17.0-3.uel20.noarch.rpm</filename>
        </package>
        <package name="wayland" version="1.17.0" release="3.uel20" epoch="0" arch="aarch64" src="wayland-1.17.0-3.uel20.src.rpm">
          <filename>wayland-1.17.0-3.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20398</id>
    <title>Important: dovecot security update</title>
    <updated date="2022-10-08 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: dovecot security update</summary>
    <description> An issue was discovered in the auth component in Dovecot 2.2 and 2.3 before 2.3.20. When two passdb configuration entries exist with the same driver and args settings, incorrect username_filter and mechanism settings can be applied to passdb definitions. These incorrectly applied settings can lead to an unintended security configuration and can permit privilege escalation in certain configurations. The documentation does not advise against the use of passdb definitions that have the same driver and args settings. One such configuration would be where an administrator wishes to use the same PAM configuration or passwd file for both normal and master users but use the username_filter setting to restrict which of the users is able to be a master user.(CVE-2022-30550)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-30550" type="cve" title="fix CVE-2022-30550" />
    </references>
    <pkglist>
      <collection>
        <package name="dovecot" version="2.3.15" release="5.uel20" epoch="1" arch="x86_64" src="dovecot-2.3.15-5.uel20.src.rpm">
          <filename>dovecot-2.3.15-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="dovecot-help" version="2.3.15" release="5.uel20" epoch="1" arch="x86_64" src="dovecot-2.3.15-5.uel20.src.rpm">
          <filename>dovecot-help-2.3.15-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="dovecot-devel" version="2.3.15" release="5.uel20" epoch="1" arch="x86_64" src="dovecot-2.3.15-5.uel20.src.rpm">
          <filename>dovecot-devel-2.3.15-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="dovecot" version="2.3.15" release="5.uel20" epoch="1" arch="aarch64" src="dovecot-2.3.15-5.uel20.src.rpm">
          <filename>dovecot-2.3.15-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="dovecot-devel" version="2.3.15" release="5.uel20" epoch="1" arch="aarch64" src="dovecot-2.3.15-5.uel20.src.rpm">
          <filename>dovecot-devel-2.3.15-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="dovecot-help" version="2.3.15" release="5.uel20" epoch="1" arch="aarch64" src="dovecot-2.3.15-5.uel20.src.rpm">
          <filename>dovecot-help-2.3.15-5.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20400</id>
    <title>Important: xalan-j2 security update</title>
    <updated date="2022-09-26 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: xalan-j2 security update</summary>
    <description> The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. The Apache Xalan Java project is dormant and in the process of being retired. No future releases of Apache Xalan Java to address this issue are expected. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.(CVE-2022-34169)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-34169" type="cve" title="fix CVE-2022-34169" />
    </references>
    <pkglist>
      <collection>
        <package name="xalan-j2" version="2.7.1" release="39.uel20" epoch="0" arch="noarch" src="xalan-j2-2.7.1-39.uel20.src.rpm">
          <filename>xalan-j2-2.7.1-39.uel20.noarch.rpm</filename>
        </package>
        <package name="xalan-j2-xsltc" version="2.7.1" release="39.uel20" epoch="0" arch="noarch" src="xalan-j2-2.7.1-39.uel20.src.rpm">
          <filename>xalan-j2-xsltc-2.7.1-39.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20409</id>
    <title>None: bcel security update</title>
    <updated date="2022-09-26 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: bcel security update</summary>
    <description>fix cve/bug or enhancement</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-34169" type="cve" title="fix CVE-2022-34169" />
    </references>
    <pkglist>
      <collection>
        <package name="bcel" version="6.2" release="5.uel20" epoch="0" arch="noarch" src="bcel-6.2-5.uel20.src.rpm">
          <filename>bcel-6.2-5.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20414</id>
    <title>Important: lighttpd security update</title>
    <updated date="2022-09-26 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: lighttpd security update</summary>
    <description> In lighttpd 1.4.65, mod_wstunnel does not initialize a handler function pointer if an invalid HTTP request (websocket handshake) is received. It leads to null pointer dereference which crashes the server. It could be used by an external attacker to cause denial of service condition.(CVE-2022-37797)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-37797" type="cve" title="fix CVE-2022-37797" />
    </references>
    <pkglist>
      <collection>
        <package name="lighttpd" version="1.4.67" release="1.uel20" epoch="0" arch="x86_64" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-1.4.67-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="lighttpd-mod_authn_gssapi" version="1.4.67" release="1.uel20" epoch="0" arch="x86_64" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-mod_authn_gssapi-1.4.67-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="lighttpd-fastcgi" version="1.4.67" release="1.uel20" epoch="0" arch="x86_64" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-fastcgi-1.4.67-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="lighttpd-mod_authn_pam" version="1.4.67" release="1.uel20" epoch="0" arch="x86_64" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-mod_authn_pam-1.4.67-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="lighttpd-mod_mysql_vhost" version="1.4.67" release="1.uel20" epoch="0" arch="x86_64" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-mod_mysql_vhost-1.4.67-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="lighttpd-mod_authn_mysql" version="1.4.67" release="1.uel20" epoch="0" arch="x86_64" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-mod_authn_mysql-1.4.67-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="lighttpd-mod_authn_gssapi" version="1.4.67" release="1.uel20" epoch="0" arch="aarch64" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-mod_authn_gssapi-1.4.67-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="lighttpd-filesystem" version="1.4.67" release="1.uel20" epoch="0" arch="noarch" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-filesystem-1.4.67-1.uel20.noarch.rpm</filename>
        </package>
        <package name="lighttpd-mod_authn_mysql" version="1.4.67" release="1.uel20" epoch="0" arch="aarch64" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-mod_authn_mysql-1.4.67-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="lighttpd" version="1.4.67" release="1.uel20" epoch="0" arch="aarch64" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-1.4.67-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="lighttpd-mod_mysql_vhost" version="1.4.67" release="1.uel20" epoch="0" arch="aarch64" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-mod_mysql_vhost-1.4.67-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="lighttpd-fastcgi" version="1.4.67" release="1.uel20" epoch="0" arch="aarch64" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-fastcgi-1.4.67-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="lighttpd-mod_authn_pam" version="1.4.67" release="1.uel20" epoch="0" arch="aarch64" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-mod_authn_pam-1.4.67-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20437</id>
    <title>Important: lighttpd security update</title>
    <updated date="2022-10-17 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: lighttpd security update</summary>
    <description> A resource leak in gw_backend.c in lighttpd 1.4.56 through 1.4.66 could lead to a denial of service (connection-slot exhaustion) after a large amount of anomalous TCP behavior by clients. It is related to RDHUP mishandling in certain HTTP/1.1 chunked situations. Use of mod_fastcgi is, for example, affected. This is fixed in 1.4.67.(CVE-2022-41556)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-41556" type="cve" title="fix CVE-2022-41556" />
    </references>
    <pkglist>
      <collection>
        <package name="lighttpd" version="1.4.67" release="1.uel20" epoch="0" arch="x86_64" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-1.4.67-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="lighttpd-mod_authn_gssapi" version="1.4.67" release="1.uel20" epoch="0" arch="x86_64" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-mod_authn_gssapi-1.4.67-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="lighttpd-fastcgi" version="1.4.67" release="1.uel20" epoch="0" arch="x86_64" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-fastcgi-1.4.67-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="lighttpd-mod_authn_pam" version="1.4.67" release="1.uel20" epoch="0" arch="x86_64" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-mod_authn_pam-1.4.67-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="lighttpd-mod_mysql_vhost" version="1.4.67" release="1.uel20" epoch="0" arch="x86_64" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-mod_mysql_vhost-1.4.67-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="lighttpd-mod_authn_mysql" version="1.4.67" release="1.uel20" epoch="0" arch="x86_64" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-mod_authn_mysql-1.4.67-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="lighttpd-mod_authn_gssapi" version="1.4.67" release="1.uel20" epoch="0" arch="aarch64" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-mod_authn_gssapi-1.4.67-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="lighttpd-filesystem" version="1.4.67" release="1.uel20" epoch="0" arch="noarch" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-filesystem-1.4.67-1.uel20.noarch.rpm</filename>
        </package>
        <package name="lighttpd-mod_authn_mysql" version="1.4.67" release="1.uel20" epoch="0" arch="aarch64" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-mod_authn_mysql-1.4.67-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="lighttpd" version="1.4.67" release="1.uel20" epoch="0" arch="aarch64" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-1.4.67-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="lighttpd-mod_mysql_vhost" version="1.4.67" release="1.uel20" epoch="0" arch="aarch64" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-mod_mysql_vhost-1.4.67-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="lighttpd-fastcgi" version="1.4.67" release="1.uel20" epoch="0" arch="aarch64" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-fastcgi-1.4.67-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="lighttpd-mod_authn_pam" version="1.4.67" release="1.uel20" epoch="0" arch="aarch64" src="lighttpd-1.4.67-1.uel20.src.rpm">
          <filename>lighttpd-mod_authn_pam-1.4.67-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20440</id>
    <title>Critical: uboot-tools security update</title>
    <updated date="2022-10-08 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: uboot-tools security update</summary>
    <description> nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196.(CVE-2022-30767)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-30767" type="cve" title="fix CVE-2022-30767" />
    </references>
    <pkglist>
      <collection>
        <package name="uboot-tools" version="2020.07" release="7.uel20" epoch="0" arch="x86_64" src="uboot-tools-2020.07-7.uel20.src.rpm">
          <filename>uboot-tools-2020.07-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="uboot-images-armv8" version="2020.07" release="7.uel20" epoch="0" arch="noarch" src="uboot-tools-2020.07-7.uel20.src.rpm">
          <filename>uboot-images-armv8-2020.07-7.uel20.noarch.rpm</filename>
        </package>
        <package name="uboot-tools-help" version="2020.07" release="7.uel20" epoch="0" arch="noarch" src="uboot-tools-2020.07-7.uel20.src.rpm">
          <filename>uboot-tools-help-2020.07-7.uel20.noarch.rpm</filename>
        </package>
        <package name="uboot-tools" version="2020.07" release="7.uel20" epoch="0" arch="aarch64" src="uboot-tools-2020.07-7.uel20.src.rpm">
          <filename>uboot-tools-2020.07-7.uel20.aarch64.rpm</filename>
        </package>
        <package name="uboot-images-elf" version="2020.07" release="7.uel20" epoch="0" arch="aarch64" src="uboot-tools-2020.07-7.uel20.src.rpm">
          <filename>uboot-images-elf-2020.07-7.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20442</id>
    <title>Critical: python-joblib security update</title>
    <updated date="2022-10-08 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: python-joblib security update</summary>
    <description> The package joblib from 0 and before 1.2.0 are vulnerable to Arbitrary Code Execution via the pre_dispatch flag in Parallel() class due to the eval() statement.(CVE-2022-21797)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21797" type="cve" title="fix CVE-2022-21797" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-joblib" version="0.14.0" release="4.uel20" epoch="0" arch="noarch" src="python-joblib-0.14.0-4.uel20.src.rpm">
          <filename>python3-joblib-0.14.0-4.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20446</id>
    <title>Critical: mariadb-connector-c security update</title>
    <updated date="2022-10-17 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: mariadb-connector-c security update</summary>
    <description> zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).(CVE-2022-37434)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-37434" type="cve" title="fix CVE-2022-37434" />
    </references>
    <pkglist>
      <collection>
        <package name="mariadb-connector-c-devel" version="3.0.6" release="9.uel20" epoch="0" arch="x86_64" src="mariadb-connector-c-3.0.6-9.uel20.src.rpm">
          <filename>mariadb-connector-c-devel-3.0.6-9.uel20.x86_64.rpm</filename>
        </package>
        <package name="mariadb-connector-c" version="3.0.6" release="9.uel20" epoch="0" arch="x86_64" src="mariadb-connector-c-3.0.6-9.uel20.src.rpm">
          <filename>mariadb-connector-c-3.0.6-9.uel20.x86_64.rpm</filename>
        </package>
        <package name="mariadb-connector-c-devel" version="3.0.6" release="9.uel20" epoch="0" arch="aarch64" src="mariadb-connector-c-3.0.6-9.uel20.src.rpm">
          <filename>mariadb-connector-c-devel-3.0.6-9.uel20.aarch64.rpm</filename>
        </package>
        <package name="mariadb-connector-c" version="3.0.6" release="9.uel20" epoch="0" arch="aarch64" src="mariadb-connector-c-3.0.6-9.uel20.src.rpm">
          <filename>mariadb-connector-c-3.0.6-9.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20455</id>
    <title>Important: ntfs-3g security update</title>
    <updated date="2022-11-14 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: ntfs-3g security update</summary>
    <description> A buffer overflow was discovered in NTFS-3G before 2022.10.3. Crafted metadata in an NTFS image can cause code execution. A local attacker can exploit this if the ntfs-3g binary is setuid root. A physically proximate attacker can exploit this if NTFS-3G software is configured to execute upon attachment of an external storage device.(CVE-2022-40284)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-40284" type="cve" title="fix CVE-2022-40284" />
    </references>
    <pkglist>
      <collection>
        <package name="ntfs-3g-devel" version="2022.5.17" release="2.uel20" epoch="2" arch="x86_64" src="ntfs-3g-2022.5.17-2.uel20.src.rpm">
          <filename>ntfs-3g-devel-2022.5.17-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ntfs-3g" version="2022.5.17" release="2.uel20" epoch="2" arch="x86_64" src="ntfs-3g-2022.5.17-2.uel20.src.rpm">
          <filename>ntfs-3g-2022.5.17-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ntfs-3g-help" version="2022.5.17" release="2.uel20" epoch="2" arch="x86_64" src="ntfs-3g-2022.5.17-2.uel20.src.rpm">
          <filename>ntfs-3g-help-2022.5.17-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ntfs-3g" version="2022.5.17" release="2.uel20" epoch="2" arch="aarch64" src="ntfs-3g-2022.5.17-2.uel20.src.rpm">
          <filename>ntfs-3g-2022.5.17-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ntfs-3g-help" version="2022.5.17" release="2.uel20" epoch="2" arch="aarch64" src="ntfs-3g-2022.5.17-2.uel20.src.rpm">
          <filename>ntfs-3g-help-2022.5.17-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ntfs-3g-devel" version="2022.5.17" release="2.uel20" epoch="2" arch="aarch64" src="ntfs-3g-2022.5.17-2.uel20.src.rpm">
          <filename>ntfs-3g-devel-2022.5.17-2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20460</id>
    <title>Important: pixman security update</title>
    <updated date="2022-11-10 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: pixman security update</summary>
    <description> In libpixman in Pixman before 0.42.2, there is an out-of-bounds write (aka heap-based buffer overflow) in rasterize_edges_8 due to an integer overflow in pixman_sample_floor_y.(CVE-2022-44638)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-44638" type="cve" title="fix CVE-2022-44638" />
    </references>
    <pkglist>
      <collection>
        <package name="pixman-devel" version="0.40.0" release="2.uel20" epoch="0" arch="x86_64" src="pixman-0.40.0-2.uel20.src.rpm">
          <filename>pixman-devel-0.40.0-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="pixman" version="0.40.0" release="2.uel20" epoch="0" arch="x86_64" src="pixman-0.40.0-2.uel20.src.rpm">
          <filename>pixman-0.40.0-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="pixman-devel" version="0.40.0" release="2.uel20" epoch="0" arch="aarch64" src="pixman-0.40.0-2.uel20.src.rpm">
          <filename>pixman-devel-0.40.0-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="pixman" version="0.40.0" release="2.uel20" epoch="0" arch="aarch64" src="pixman-0.40.0-2.uel20.src.rpm">
          <filename>pixman-0.40.0-2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20463</id>
    <title>Critical: deltarpm security update</title>
    <updated date="2022-11-17 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: deltarpm security update</summary>
    <description> zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).(CVE-2022-37434)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-37434" type="cve" title="fix CVE-2022-37434" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-deltarpm" version="3.6.2" release="5.uel20" epoch="0" arch="x86_64" src="deltarpm-3.6.2-5.uel20.src.rpm">
          <filename>python3-deltarpm-3.6.2-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="drpmsync" version="3.6.2" release="5.uel20" epoch="0" arch="x86_64" src="deltarpm-3.6.2-5.uel20.src.rpm">
          <filename>drpmsync-3.6.2-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="python2-deltarpm" version="3.6.2" release="5.uel20" epoch="0" arch="x86_64" src="deltarpm-3.6.2-5.uel20.src.rpm">
          <filename>python2-deltarpm-3.6.2-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="deltarpm" version="3.6.2" release="5.uel20" epoch="0" arch="x86_64" src="deltarpm-3.6.2-5.uel20.src.rpm">
          <filename>deltarpm-3.6.2-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-deltarpm" version="3.6.2" release="5.uel20" epoch="0" arch="aarch64" src="deltarpm-3.6.2-5.uel20.src.rpm">
          <filename>python3-deltarpm-3.6.2-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="deltarpm-help" version="3.6.2" release="5.uel20" epoch="0" arch="noarch" src="deltarpm-3.6.2-5.uel20.src.rpm">
          <filename>deltarpm-help-3.6.2-5.uel20.noarch.rpm</filename>
        </package>
        <package name="drpmsync" version="3.6.2" release="5.uel20" epoch="0" arch="aarch64" src="deltarpm-3.6.2-5.uel20.src.rpm">
          <filename>drpmsync-3.6.2-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="python2-deltarpm" version="3.6.2" release="5.uel20" epoch="0" arch="aarch64" src="deltarpm-3.6.2-5.uel20.src.rpm">
          <filename>python2-deltarpm-3.6.2-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="deltarpm" version="3.6.2" release="5.uel20" epoch="0" arch="aarch64" src="deltarpm-3.6.2-5.uel20.src.rpm">
          <filename>deltarpm-3.6.2-5.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20464</id>
    <title>Important: libconfuse security update</title>
    <updated date="2022-11-17 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: libconfuse security update</summary>
    <description> cfg_tilde_expand in confuse.c in libConfuse 3.3 has a heap-based buffer over-read.(CVE-2022-40320)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-40320" type="cve" title="fix CVE-2022-40320" />
    </references>
    <pkglist>
      <collection>
        <package name="libconfuse" version="3.3" release="2.uel20" epoch="0" arch="x86_64" src="libconfuse-3.3-2.uel20.src.rpm">
          <filename>libconfuse-3.3-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="libconfuse-devel" version="3.3" release="2.uel20" epoch="0" arch="x86_64" src="libconfuse-3.3-2.uel20.src.rpm">
          <filename>libconfuse-devel-3.3-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="libconfuse" version="3.3" release="2.uel20" epoch="0" arch="aarch64" src="libconfuse-3.3-2.uel20.src.rpm">
          <filename>libconfuse-3.3-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="libconfuse-devel" version="3.3" release="2.uel20" epoch="0" arch="aarch64" src="libconfuse-3.3-2.uel20.src.rpm">
          <filename>libconfuse-devel-3.3-2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20482</id>
    <title>None: libtar security update</title>
    <updated date="2022-12-13 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: libtar security update</summary>
    <description> After tar_close(), libtar.c releases the memory pointed to by pointer t. After tar_close() is called in the list() function, it continues to use pointer t: free_longlink_longname(t-&gt;th_buf) . As a result, the released memory is used (use-after-free).(CVE-2021-33640)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-33640" type="cve" title="fix CVE-2021-33640" />
    </references>
    <pkglist>
      <collection>
        <package name="libtar-help" version="1.2.20" release="20.uel20" epoch="0" arch="x86_64" src="libtar-1.2.20-20.uel20.src.rpm">
          <filename>libtar-help-1.2.20-20.uel20.x86_64.rpm</filename>
        </package>
        <package name="libtar-devel" version="1.2.20" release="20.uel20" epoch="0" arch="x86_64" src="libtar-1.2.20-20.uel20.src.rpm">
          <filename>libtar-devel-1.2.20-20.uel20.x86_64.rpm</filename>
        </package>
        <package name="libtar" version="1.2.20" release="20.uel20" epoch="0" arch="x86_64" src="libtar-1.2.20-20.uel20.src.rpm">
          <filename>libtar-1.2.20-20.uel20.x86_64.rpm</filename>
        </package>
        <package name="libtar-help" version="1.2.20" release="20.uel20" epoch="0" arch="aarch64" src="libtar-1.2.20-20.uel20.src.rpm">
          <filename>libtar-help-1.2.20-20.uel20.aarch64.rpm</filename>
        </package>
        <package name="libtar-devel" version="1.2.20" release="20.uel20" epoch="0" arch="aarch64" src="libtar-1.2.20-20.uel20.src.rpm">
          <filename>libtar-devel-1.2.20-20.uel20.aarch64.rpm</filename>
        </package>
        <package name="libtar" version="1.2.20" release="20.uel20" epoch="0" arch="aarch64" src="libtar-1.2.20-20.uel20.src.rpm">
          <filename>libtar-1.2.20-20.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2022:20487</id>
    <title>Moderate: mongodb security update</title>
    <updated date="2022-12-20 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: mongodb security update</summary>
    <description> A user authorized to perform database queries may cause denial of service by issuing specially crafted queries, which violate an invariant in the query subsystem's support for geoNear. This issue affects: MongoDB Inc. MongoDB Server v4.4 versions prior to 4.4.0-rc7; v4.2 versions prior to 4.2.8; v4.0 versions prior to 4.0.19.(CVE-2020-7923)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-7923" type="cve" title="fix CVE-2020-7923" />
    </references>
    <pkglist>
      <collection>
        <package name="mongodb" version="4.0.23" release="1.uel20" epoch="0" arch="x86_64" src="mongodb-4.0.23-1.uel20.src.rpm">
          <filename>mongodb-4.0.23-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mongodb-test" version="4.0.23" release="1.uel20" epoch="0" arch="x86_64" src="mongodb-4.0.23-1.uel20.src.rpm">
          <filename>mongodb-test-4.0.23-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mongodb-server" version="4.0.23" release="1.uel20" epoch="0" arch="x86_64" src="mongodb-4.0.23-1.uel20.src.rpm">
          <filename>mongodb-server-4.0.23-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mongodb-test" version="4.0.23" release="1.uel20" epoch="0" arch="aarch64" src="mongodb-4.0.23-1.uel20.src.rpm">
          <filename>mongodb-test-4.0.23-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mongodb" version="4.0.23" release="1.uel20" epoch="0" arch="aarch64" src="mongodb-4.0.23-1.uel20.src.rpm">
          <filename>mongodb-4.0.23-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mongodb-help" version="4.0.23" release="1.uel20" epoch="0" arch="noarch" src="mongodb-4.0.23-1.uel20.src.rpm">
          <filename>mongodb-help-4.0.23-1.uel20.noarch.rpm</filename>
        </package>
        <package name="mongodb-server" version="4.0.23" release="1.uel20" epoch="0" arch="aarch64" src="mongodb-4.0.23-1.uel20.src.rpm">
          <filename>mongodb-server-4.0.23-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20001</id>
    <title>Moderate: python-setuptools security update</title>
    <updated date="2023-01-05 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: python-setuptools security update</summary>
    <description> Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py.(CVE-2022-40897)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-40897" type="cve" title="fix CVE-2022-40897" />
    </references>
    <pkglist>
      <collection>
        <package name="python2-setuptools" version="44.1.1" release="2.uel20" epoch="0" arch="noarch" src="python-setuptools-44.1.1-2.uel20.src.rpm">
          <filename>python2-setuptools-44.1.1-2.uel20.noarch.rpm</filename>
        </package>
        <package name="python-setuptools-help" version="44.1.1" release="2.uel20" epoch="0" arch="noarch" src="python-setuptools-44.1.1-2.uel20.src.rpm">
          <filename>python-setuptools-help-44.1.1-2.uel20.noarch.rpm</filename>
        </package>
        <package name="python-setuptools" version="44.1.1" release="2.uel20" epoch="0" arch="noarch" src="python-setuptools-44.1.1-2.uel20.src.rpm">
          <filename>python-setuptools-44.1.1-2.uel20.noarch.rpm</filename>
        </package>
        <package name="python3-setuptools" version="44.1.1" release="2.uel20" epoch="0" arch="noarch" src="python-setuptools-44.1.1-2.uel20.src.rpm">
          <filename>python3-setuptools-44.1.1-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20004</id>
    <title>None: byacc security update</title>
    <updated date="2023-01-10 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: byacc security update</summary>
    <description> ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2021-33642)
 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2021-33641)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-33642" type="cve" title="fix CVE-2021-33642" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-33641" type="cve" title="fix CVE-2021-33641" />
    </references>
    <pkglist>
      <collection>
        <package name="byacc" version="1.9.20200330" release="2.uel20" epoch="0" arch="x86_64" src="byacc-1.9.20200330-2.uel20.src.rpm">
          <filename>byacc-1.9.20200330-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="byacc-help" version="1.9.20200330" release="2.uel20" epoch="0" arch="noarch" src="byacc-1.9.20200330-2.uel20.src.rpm">
          <filename>byacc-help-1.9.20200330-2.uel20.noarch.rpm</filename>
        </package>
        <package name="byacc" version="1.9.20200330" release="2.uel20" epoch="0" arch="aarch64" src="byacc-1.9.20200330-2.uel20.src.rpm">
          <filename>byacc-1.9.20200330-2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20010</id>
    <title>Moderate: net-snmp security update</title>
    <updated date="2023-01-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: net-snmp security update</summary>
    <description> handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.(CVE-2022-44793)
 handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.(CVE-2022-44792)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-44793" type="cve" title="fix CVE-2022-44793" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-44792" type="cve" title="fix CVE-2022-44792" />
    </references>
    <pkglist>
      <collection>
        <package name="net-snmp-perl" version="5.9" release="8.up1.uel20" epoch="1" arch="x86_64" src="net-snmp-5.9-8.up1.uel20.src.rpm">
          <filename>net-snmp-perl-5.9-8.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-net-snmp" version="5.9" release="8.up1.uel20" epoch="1" arch="x86_64" src="net-snmp-5.9-8.up1.uel20.src.rpm">
          <filename>python3-net-snmp-5.9-8.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="net-snmp" version="5.9" release="8.up1.uel20" epoch="1" arch="x86_64" src="net-snmp-5.9-8.up1.uel20.src.rpm">
          <filename>net-snmp-5.9-8.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="net-snmp-devel" version="5.9" release="8.up1.uel20" epoch="1" arch="x86_64" src="net-snmp-5.9-8.up1.uel20.src.rpm">
          <filename>net-snmp-devel-5.9-8.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="net-snmp-gui" version="5.9" release="8.up1.uel20" epoch="1" arch="x86_64" src="net-snmp-5.9-8.up1.uel20.src.rpm">
          <filename>net-snmp-gui-5.9-8.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="net-snmp-libs" version="5.9" release="8.up1.uel20" epoch="1" arch="x86_64" src="net-snmp-5.9-8.up1.uel20.src.rpm">
          <filename>net-snmp-libs-5.9-8.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="net-snmp" version="5.9" release="8.up1.uel20" epoch="1" arch="aarch64" src="net-snmp-5.9-8.up1.uel20.src.rpm">
          <filename>net-snmp-5.9-8.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="net-snmp-perl" version="5.9" release="8.up1.uel20" epoch="1" arch="aarch64" src="net-snmp-5.9-8.up1.uel20.src.rpm">
          <filename>net-snmp-perl-5.9-8.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="net-snmp-libs" version="5.9" release="8.up1.uel20" epoch="1" arch="aarch64" src="net-snmp-5.9-8.up1.uel20.src.rpm">
          <filename>net-snmp-libs-5.9-8.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="net-snmp-devel" version="5.9" release="8.up1.uel20" epoch="1" arch="aarch64" src="net-snmp-5.9-8.up1.uel20.src.rpm">
          <filename>net-snmp-devel-5.9-8.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="net-snmp-gui" version="5.9" release="8.up1.uel20" epoch="1" arch="aarch64" src="net-snmp-5.9-8.up1.uel20.src.rpm">
          <filename>net-snmp-gui-5.9-8.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-net-snmp" version="5.9" release="8.up1.uel20" epoch="1" arch="aarch64" src="net-snmp-5.9-8.up1.uel20.src.rpm">
          <filename>python3-net-snmp-5.9-8.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="net-snmp-help" version="5.9" release="8.up1.uel20" epoch="1" arch="noarch" src="net-snmp-5.9-8.up1.uel20.src.rpm">
          <filename>net-snmp-help-5.9-8.up1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20014</id>
    <title>Important: linux-firmware security update</title>
    <updated date="2023-01-09 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: linux-firmware security update</summary>
    <description> Integer overflow in the firmware for some Intel(R) Graphics Drivers for Windows * before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable an escalation of privilege via local access.(CVE-2020-12362)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-12362" type="cve" title="fix CVE-2020-12362" />
    </references>
    <pkglist>
      <collection>
        <package name="linux-firmware" version="20211027" release="1.uel20" epoch="0" arch="noarch" src="linux-firmware-20211027-1.uel20.src.rpm">
          <filename>linux-firmware-20211027-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20017</id>
    <title>Important: opusfile security update</title>
    <updated date="2023-02-01 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: opusfile security update</summary>
    <description> A null pointer dereference issue was discovered in functions op_get_data and op_open1 in opusfile.c in xiph opusfile 0.9 thru 0.12 allows attackers to cause denial of service or other unspecified impacts.(CVE-2022-47021)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-47021" type="cve" title="fix CVE-2022-47021" />
    </references>
    <pkglist>
      <collection>
        <package name="opusfile" version="0.11" release="7.uel20" epoch="0" arch="x86_64" src="opusfile-0.11-7.uel20.src.rpm">
          <filename>opusfile-0.11-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="opusfile-devel" version="0.11" release="7.uel20" epoch="0" arch="x86_64" src="opusfile-0.11-7.uel20.src.rpm">
          <filename>opusfile-devel-0.11-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="opusfile-devel" version="0.11" release="7.uel20" epoch="0" arch="aarch64" src="opusfile-0.11-7.uel20.src.rpm">
          <filename>opusfile-devel-0.11-7.uel20.aarch64.rpm</filename>
        </package>
        <package name="opusfile" version="0.11" release="7.uel20" epoch="0" arch="aarch64" src="opusfile-0.11-7.uel20.src.rpm">
          <filename>opusfile-0.11-7.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20018</id>
    <title>Critical: pkgconf security update</title>
    <updated date="2023-02-01 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: pkgconf security update</summary>
    <description> In pkgconf through 1.9.3, variable duplication can cause unbounded string expansion due to incorrect checks in libpkgconf/tuple.c:pkgconf_tuple_parse. For example, a .pc file containing a few hundred bytes can expand to one billion bytes.(CVE-2023-24056)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-24056" type="cve" title="fix CVE-2023-24056" />
    </references>
    <pkglist>
      <collection>
        <package name="pkgconf" version="1.7.3" release="2.uel20" epoch="0" arch="x86_64" src="pkgconf-1.7.3-2.uel20.src.rpm">
          <filename>pkgconf-1.7.3-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="pkgconf-devel" version="1.7.3" release="2.uel20" epoch="0" arch="x86_64" src="pkgconf-1.7.3-2.uel20.src.rpm">
          <filename>pkgconf-devel-1.7.3-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="pkgconf-devel" version="1.7.3" release="2.uel20" epoch="0" arch="aarch64" src="pkgconf-1.7.3-2.uel20.src.rpm">
          <filename>pkgconf-devel-1.7.3-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="pkgconf" version="1.7.3" release="2.uel20" epoch="0" arch="aarch64" src="pkgconf-1.7.3-2.uel20.src.rpm">
          <filename>pkgconf-1.7.3-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="pkgconf-help" version="1.7.3" release="2.uel20" epoch="0" arch="noarch" src="pkgconf-1.7.3-2.uel20.src.rpm">
          <filename>pkgconf-help-1.7.3-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20020</id>
    <title>Important: SDL2 security update</title>
    <updated date="2023-01-11 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: SDL2 security update</summary>
    <description> A potential memory leak issue was discovered in SDL2 in GLES_CreateTexture() function in SDL_render_gles.c. The vulnerability allows an attacker to cause a denial of service attack. The vulnerability affects SDL2 v2.0.4 and above. SDL-1.x are not affected.(CVE-2022-4743)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-4743" type="cve" title="fix CVE-2022-4743" />
    </references>
    <pkglist>
      <collection>
        <package name="SDL2" version="2.0.12" release="2.uel20" epoch="0" arch="x86_64" src="SDL2-2.0.12-2.uel20.src.rpm">
          <filename>SDL2-2.0.12-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="SDL2-devel" version="2.0.12" release="2.uel20" epoch="0" arch="x86_64" src="SDL2-2.0.12-2.uel20.src.rpm">
          <filename>SDL2-devel-2.0.12-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="SDL2" version="2.0.12" release="2.uel20" epoch="0" arch="aarch64" src="SDL2-2.0.12-2.uel20.src.rpm">
          <filename>SDL2-2.0.12-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="SDL2-devel" version="2.0.12" release="2.uel20" epoch="0" arch="aarch64" src="SDL2-2.0.12-2.uel20.src.rpm">
          <filename>SDL2-devel-2.0.12-2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20027</id>
    <title>Important: rubygem-globalid security update</title>
    <updated date="2023-02-17 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: rubygem-globalid security update</summary>
    <description> A ReDoS based DoS vulnerability in the GlobalID &lt;1.0.1 which could allow an attacker supplying a carefully crafted input can cause the regular expression engine to take an unexpected amount of time. All users running an affected release should either upgrade or use one of the workarounds immediately.(CVE-2023-22799)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22799" type="cve" title="fix CVE-2023-22799" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-globalid-doc" version="0.4.2" release="4.uel20" epoch="0" arch="noarch" src="rubygem-globalid-0.4.2-4.uel20.src.rpm">
          <filename>rubygem-globalid-doc-0.4.2-4.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-globalid" version="0.4.2" release="4.uel20" epoch="0" arch="noarch" src="rubygem-globalid-0.4.2-4.uel20.src.rpm">
          <filename>rubygem-globalid-0.4.2-4.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20030</id>
    <title>Critical: apr-util security update</title>
    <updated date="2023-02-15 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: apr-util security update</summary>
    <description> Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions.(CVE-2022-25147)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-25147" type="cve" title="fix CVE-2022-25147" />
    </references>
    <pkglist>
      <collection>
        <package name="apr-util-pgsql" version="1.6.1" release="15.uel20" epoch="0" arch="x86_64" src="apr-util-1.6.1-15.uel20.src.rpm">
          <filename>apr-util-pgsql-1.6.1-15.uel20.x86_64.rpm</filename>
        </package>
        <package name="apr-util" version="1.6.1" release="15.uel20" epoch="0" arch="x86_64" src="apr-util-1.6.1-15.uel20.src.rpm">
          <filename>apr-util-1.6.1-15.uel20.x86_64.rpm</filename>
        </package>
        <package name="apr-util-devel" version="1.6.1" release="15.uel20" epoch="0" arch="x86_64" src="apr-util-1.6.1-15.uel20.src.rpm">
          <filename>apr-util-devel-1.6.1-15.uel20.x86_64.rpm</filename>
        </package>
        <package name="apr-util-odbc" version="1.6.1" release="15.uel20" epoch="0" arch="x86_64" src="apr-util-1.6.1-15.uel20.src.rpm">
          <filename>apr-util-odbc-1.6.1-15.uel20.x86_64.rpm</filename>
        </package>
        <package name="apr-util-pgsql" version="1.6.1" release="15.uel20" epoch="0" arch="aarch64" src="apr-util-1.6.1-15.uel20.src.rpm">
          <filename>apr-util-pgsql-1.6.1-15.uel20.aarch64.rpm</filename>
        </package>
        <package name="apr-util-devel" version="1.6.1" release="15.uel20" epoch="0" arch="aarch64" src="apr-util-1.6.1-15.uel20.src.rpm">
          <filename>apr-util-devel-1.6.1-15.uel20.aarch64.rpm</filename>
        </package>
        <package name="apr-util" version="1.6.1" release="15.uel20" epoch="0" arch="aarch64" src="apr-util-1.6.1-15.uel20.src.rpm">
          <filename>apr-util-1.6.1-15.uel20.aarch64.rpm</filename>
        </package>
        <package name="apr-util-odbc" version="1.6.1" release="15.uel20" epoch="0" arch="aarch64" src="apr-util-1.6.1-15.uel20.src.rpm">
          <filename>apr-util-odbc-1.6.1-15.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20046</id>
    <title>Moderate: leptonica security update</title>
    <updated date="2023-03-01 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: leptonica security update</summary>
    <description> An issue in the Leptonica linked library (v1.79.0) allows attackers to cause an arithmetic exception leading to a Denial of Service (DoS) via a crafted JPEG file.(CVE-2022-38266)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-38266" type="cve" title="fix CVE-2022-38266" />
    </references>
    <pkglist>
      <collection>
        <package name="leptonica-tools" version="1.79.0" release="3.uel20" epoch="0" arch="x86_64" src="leptonica-1.79.0-3.uel20.src.rpm">
          <filename>leptonica-tools-1.79.0-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="leptonica" version="1.79.0" release="3.uel20" epoch="0" arch="x86_64" src="leptonica-1.79.0-3.uel20.src.rpm">
          <filename>leptonica-1.79.0-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="leptonica-devel" version="1.79.0" release="3.uel20" epoch="0" arch="x86_64" src="leptonica-1.79.0-3.uel20.src.rpm">
          <filename>leptonica-devel-1.79.0-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="leptonica" version="1.79.0" release="3.uel20" epoch="0" arch="aarch64" src="leptonica-1.79.0-3.uel20.src.rpm">
          <filename>leptonica-1.79.0-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="leptonica-devel" version="1.79.0" release="3.uel20" epoch="0" arch="aarch64" src="leptonica-1.79.0-3.uel20.src.rpm">
          <filename>leptonica-devel-1.79.0-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="leptonica-tools" version="1.79.0" release="3.uel20" epoch="0" arch="aarch64" src="leptonica-1.79.0-3.uel20.src.rpm">
          <filename>leptonica-tools-1.79.0-3.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20047</id>
    <title>Moderate: pesign security update</title>
    <updated date="2023-02-16 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: pesign security update</summary>
    <description> A flaw was found in pesign. The pesign package provides a systemd service used to start the pesign daemon. This service unit runs a script to set ACLs for /etc/pki/pesign and /run/pesign directories to grant access privileges to users in the 'pesign' group. However, the script doesn't check for symbolic links. This could allow an attacker to gain access to privileged files and directories via a path traversal attack.(CVE-2022-3560)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-3560" type="cve" title="fix CVE-2022-3560" />
    </references>
    <pkglist>
      <collection>
        <package name="pesign" version="0.113" release="5.uel20" epoch="0" arch="x86_64" src="pesign-0.113-5.uel20.src.rpm">
          <filename>pesign-0.113-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="pesign-help" version="0.113" release="5.uel20" epoch="0" arch="x86_64" src="pesign-0.113-5.uel20.src.rpm">
          <filename>pesign-help-0.113-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="pesign-help" version="0.113" release="5.uel20" epoch="0" arch="aarch64" src="pesign-0.113-5.uel20.src.rpm">
          <filename>pesign-help-0.113-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="pesign" version="0.113" release="5.uel20" epoch="0" arch="aarch64" src="pesign-0.113-5.uel20.src.rpm">
          <filename>pesign-0.113-5.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20048</id>
    <title>Critical: apr security update</title>
    <updated date="2023-02-16 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: apr security update</summary>
    <description> Integer Overflow or Wraparound vulnerability in apr_encode functions of Apache Portable Runtime (APR) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime (APR) version 1.7.0.(CVE-2022-24963)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-24963" type="cve" title="fix CVE-2022-24963" />
    </references>
    <pkglist>
      <collection>
        <package name="apr-devel" version="1.7.0" release="5.uel20" epoch="0" arch="x86_64" src="apr-1.7.0-5.uel20.src.rpm">
          <filename>apr-devel-1.7.0-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="apr" version="1.7.0" release="5.uel20" epoch="0" arch="x86_64" src="apr-1.7.0-5.uel20.src.rpm">
          <filename>apr-1.7.0-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="apr-devel" version="1.7.0" release="5.uel20" epoch="0" arch="aarch64" src="apr-1.7.0-5.uel20.src.rpm">
          <filename>apr-devel-1.7.0-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="apr-help" version="1.7.0" release="5.uel20" epoch="0" arch="noarch" src="apr-1.7.0-5.uel20.src.rpm">
          <filename>apr-help-1.7.0-5.uel20.noarch.rpm</filename>
        </package>
        <package name="apr" version="1.7.0" release="5.uel20" epoch="0" arch="aarch64" src="apr-1.7.0-5.uel20.src.rpm">
          <filename>apr-1.7.0-5.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20060</id>
    <title>Important: apache-commons-fileupload security update</title>
    <updated date="2023-03-08 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: apache-commons-fileupload security update</summary>
    <description> Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured.(CVE-2023-24998)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-24998" type="cve" title="fix CVE-2023-24998" />
    </references>
    <pkglist>
      <collection>
        <package name="apache-commons-fileupload-help" version="1.4" release="2.uel20" epoch="0" arch="noarch" src="apache-commons-fileupload-1.4-2.uel20.src.rpm">
          <filename>apache-commons-fileupload-help-1.4-2.uel20.noarch.rpm</filename>
        </package>
        <package name="apache-commons-fileupload" version="1.4" release="2.uel20" epoch="0" arch="noarch" src="apache-commons-fileupload-1.4-2.uel20.src.rpm">
          <filename>apache-commons-fileupload-1.4-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20061</id>
    <title>Important: snakeyaml security update</title>
    <updated date="2023-03-14 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: snakeyaml security update</summary>
    <description> Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.(CVE-2022-41854)
 Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.(CVE-2022-38752)
 Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.(CVE-2022-38751)
 Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.(CVE-2022-38750)
 Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.(CVE-2022-38749)
 The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.(CVE-2022-25857)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-41854" type="cve" title="fix CVE-2022-41854" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-38752" type="cve" title="fix CVE-2022-38752" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-38751" type="cve" title="fix CVE-2022-38751" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-38750" type="cve" title="fix CVE-2022-38750" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-38749" type="cve" title="fix CVE-2022-38749" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-25857" type="cve" title="fix CVE-2022-25857" />
    </references>
    <pkglist>
      <collection>
        <package name="snakeyaml-javadoc" version="1.32" release="1.uel20" epoch="0" arch="noarch" src="snakeyaml-1.32-1.uel20.src.rpm">
          <filename>snakeyaml-javadoc-1.32-1.uel20.noarch.rpm</filename>
        </package>
        <package name="snakeyaml" version="1.32" release="1.uel20" epoch="0" arch="noarch" src="snakeyaml-1.32-1.uel20.src.rpm">
          <filename>snakeyaml-1.32-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20067</id>
    <title>Important: libfastjson security update</title>
    <updated date="2023-04-03 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: libfastjson security update</summary>
    <description> json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.(CVE-2020-12762)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-12762" type="cve" title="fix CVE-2020-12762" />
    </references>
    <pkglist>
      <collection>
        <package name="libfastjson-devel" version="0.99.9" release="3.uel20.01" epoch="0" arch="x86_64" src="libfastjson-0.99.9-3.uel20.01.src.rpm">
          <filename>libfastjson-devel-0.99.9-3.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="libfastjson" version="0.99.9" release="3.uel20.01" epoch="0" arch="x86_64" src="libfastjson-0.99.9-3.uel20.01.src.rpm">
          <filename>libfastjson-0.99.9-3.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="libfastjson-devel" version="0.99.9" release="3.uel20.01" epoch="0" arch="aarch64" src="libfastjson-0.99.9-3.uel20.01.src.rpm">
          <filename>libfastjson-devel-0.99.9-3.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="libfastjson" version="0.99.9" release="3.uel20.01" epoch="0" arch="aarch64" src="libfastjson-0.99.9-3.uel20.01.src.rpm">
          <filename>libfastjson-0.99.9-3.uel20.01.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20074</id>
    <title>Important: json-smart security update</title>
    <updated date="2023-04-10 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: json-smart security update</summary>
    <description> [Json-smart](https://netplex.github.io/json-smart/) is a performance focused, JSON processor lib. When reaching a ‘[‘ or ‘{‘ character in the JSON input, the code parses an array or an object respectively. It was discovered that the code does not have any limit to the nesting of such arrays or objects. Since the parsing of nested arrays and objects is done recursively, nesting too many of them can cause a stack exhaustion (stack overflow) and crash the software.(CVE-2023-1370)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-1370" type="cve" title="fix CVE-2023-1370" />
    </references>
    <pkglist>
      <collection>
        <package name="json-smart-javadoc" version="2.2" release="2.uel20" epoch="0" arch="noarch" src="json-smart-2.2-2.uel20.src.rpm">
          <filename>json-smart-javadoc-2.2-2.uel20.noarch.rpm</filename>
        </package>
        <package name="json-smart" version="2.2" release="2.uel20" epoch="0" arch="noarch" src="json-smart-2.2-2.uel20.src.rpm">
          <filename>json-smart-2.2-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20077</id>
    <title>None: undertow security update</title>
    <updated date="2023-04-10 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: undertow security update</summary>
    <description> ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2023-1108)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-1108" type="cve" title="fix CVE-2023-1108" />
    </references>
    <pkglist>
      <collection>
        <package name="undertow" version="1.4.0" release="5.uel20" epoch="1" arch="noarch" src="undertow-1.4.0-5.uel20.src.rpm">
          <filename>undertow-1.4.0-5.uel20.noarch.rpm</filename>
        </package>
        <package name="undertow-javadoc" version="1.4.0" release="5.uel20" epoch="1" arch="noarch" src="undertow-1.4.0-5.uel20.src.rpm">
          <filename>undertow-javadoc-1.4.0-5.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20081</id>
    <title>Moderate: libmicrohttpd security update</title>
    <updated date="2023-03-15 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: libmicrohttpd security update</summary>
    <description> GNU libmicrohttpd before 0.9.76 allows remote DoS (Denial of Service) due to improper parsing of a multipart/form-data boundary in the postprocessor.c MHD_create_post_processor() method. This allows an attacker to remotely send a malicious HTTP POST packet that includes one or more '\0' bytes in a multipart/form-data boundary field, which - assuming a specific heap layout - will result in an out-of-bounds read and a crash in the find_boundary() function.(CVE-2023-27371)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-27371" type="cve" title="fix CVE-2023-27371" />
    </references>
    <pkglist>
      <collection>
        <package name="libmicrohttpd" version="0.9.59" release="8.up1.uel20" epoch="1" arch="x86_64" src="libmicrohttpd-0.9.59-8.up1.uel20.src.rpm">
          <filename>libmicrohttpd-0.9.59-8.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libmicrohttpd-devel" version="0.9.59" release="8.up1.uel20" epoch="1" arch="x86_64" src="libmicrohttpd-0.9.59-8.up1.uel20.src.rpm">
          <filename>libmicrohttpd-devel-0.9.59-8.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libmicrohttpd-help" version="0.9.59" release="8.up1.uel20" epoch="1" arch="noarch" src="libmicrohttpd-0.9.59-8.up1.uel20.src.rpm">
          <filename>libmicrohttpd-help-0.9.59-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="libmicrohttpd" version="0.9.59" release="8.up1.uel20" epoch="1" arch="aarch64" src="libmicrohttpd-0.9.59-8.up1.uel20.src.rpm">
          <filename>libmicrohttpd-0.9.59-8.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libmicrohttpd-devel" version="0.9.59" release="8.up1.uel20" epoch="1" arch="aarch64" src="libmicrohttpd-0.9.59-8.up1.uel20.src.rpm">
          <filename>libmicrohttpd-devel-0.9.59-8.up1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20087</id>
    <title>Important: future security update</title>
    <updated date="2023-03-15 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: future security update</summary>
    <description> An issue discovered in Python Charmers Future 0.18.2 and earlier allows remote attackers to cause a denial of service via crafted Set-Cookie header from malicious web server.(CVE-2022-40899)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-40899" type="cve" title="fix CVE-2022-40899" />
    </references>
    <pkglist>
      <collection>
        <package name="python2-future" version="0.16.0" release="12.uel20" epoch="0" arch="noarch" src="future-0.16.0-12.uel20.src.rpm">
          <filename>python2-future-0.16.0-12.uel20.noarch.rpm</filename>
        </package>
        <package name="python3-future" version="0.16.0" release="12.uel20" epoch="0" arch="noarch" src="future-0.16.0-12.uel20.src.rpm">
          <filename>python3-future-0.16.0-12.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20089</id>
    <title>Important: dmidecode security update</title>
    <updated date="2023-04-21 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: dmidecode security update</summary>
    <description> Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible.(CVE-2023-30630)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-30630" type="cve" title="fix CVE-2023-30630" />
    </references>
    <pkglist>
      <collection>
        <package name="dmidecode" version="3.3" release="4.uel20.06" epoch="1" arch="x86_64" src="dmidecode-3.3-4.uel20.06.src.rpm">
          <filename>dmidecode-3.3-4.uel20.06.x86_64.rpm</filename>
        </package>
        <package name="dmidecode" version="3.3" release="4.uel20.06" epoch="1" arch="aarch64" src="dmidecode-3.3-4.uel20.06.src.rpm">
          <filename>dmidecode-3.3-4.uel20.06.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20090</id>
    <title>Moderate: protobuf-c security update</title>
    <updated date="2023-04-24 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: protobuf-c security update</summary>
    <description> protobuf-c before 1.4.1 has an unsigned integer overflow in parse_required_member.(CVE-2022-48468)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-48468" type="cve" title="fix CVE-2022-48468" />
    </references>
    <pkglist>
      <collection>
        <package name="protobuf-c" version="1.3.2" release="5.uel20" epoch="0" arch="x86_64" src="protobuf-c-1.3.2-5.uel20.src.rpm">
          <filename>protobuf-c-1.3.2-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="protobuf-c-devel" version="1.3.2" release="5.uel20" epoch="0" arch="x86_64" src="protobuf-c-1.3.2-5.uel20.src.rpm">
          <filename>protobuf-c-devel-1.3.2-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="protobuf-c" version="1.3.2" release="5.uel20" epoch="0" arch="aarch64" src="protobuf-c-1.3.2-5.uel20.src.rpm">
          <filename>protobuf-c-1.3.2-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="protobuf-c-devel" version="1.3.2" release="5.uel20" epoch="0" arch="aarch64" src="protobuf-c-1.3.2-5.uel20.src.rpm">
          <filename>protobuf-c-devel-1.3.2-5.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20108</id>
    <title>Moderate: screen security update</title>
    <updated date="2023-04-23 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: screen security update</summary>
    <description> socket.c in GNU Screen through 4.9.0, when installed setuid or setgid (the default on platforms such as Arch Linux and FreeBSD), allows local users to send a privileged SIGHUP signal to any PID, causing a denial of service or disruption of the target process.(CVE-2023-24626)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-24626" type="cve" title="fix CVE-2023-24626" />
    </references>
    <pkglist>
      <collection>
        <package name="screen" version="4.8.0" release="6.uel20" epoch="1" arch="x86_64" src="screen-4.8.0-6.uel20.src.rpm">
          <filename>screen-4.8.0-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="screen-help" version="4.8.0" release="6.uel20" epoch="1" arch="noarch" src="screen-4.8.0-6.uel20.src.rpm">
          <filename>screen-help-4.8.0-6.uel20.noarch.rpm</filename>
        </package>
        <package name="screen" version="4.8.0" release="6.uel20" epoch="1" arch="aarch64" src="screen-4.8.0-6.uel20.src.rpm">
          <filename>screen-4.8.0-6.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20122</id>
    <title>Moderate: python-requests security update</title>
    <updated date="2023-06-05 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: python-requests security update</summary>
    <description> Requests is a HTTP library. Since Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to destination servers when redirected to an HTTPS endpoint. This is a product of how we use `rebuild_proxies` to reattach the `Proxy-Authorization` header to requests. For HTTP connections sent through the tunnel, the proxy will identify the header in the request itself and remove it prior to forwarding to the destination server. However when sent over HTTPS, the `Proxy-Authorization` header must be sent in the CONNECT request as the proxy has no visibility into the tunneled request. This results in Requests forwarding proxy credentials to the destination server unintentionally, allowing a malicious actor to potentially exfiltrate sensitive information. This issue has been patched in version 2.31.0.

(CVE-2023-32681)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-32681" type="cve" title="fix CVE-2023-32681" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-requests" version="2.24.0" release="2.up1.uel20" epoch="0" arch="noarch" src="python-requests-2.24.0-2.up1.uel20.src.rpm">
          <filename>python3-requests-2.24.0-2.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="python-requests-help" version="2.24.0" release="2.up1.uel20" epoch="0" arch="noarch" src="python-requests-2.24.0-2.up1.uel20.src.rpm">
          <filename>python-requests-help-2.24.0-2.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="python2-requests" version="2.24.0" release="2.up1.uel20" epoch="0" arch="noarch" src="python-requests-2.24.0-2.up1.uel20.src.rpm">
          <filename>python2-requests-2.24.0-2.up1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20131</id>
    <title>Moderate: cloud-init security update</title>
    <updated date="2023-05-25 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: cloud-init security update</summary>
    <description> Sensitive data could be exposed in logs of cloud-init before version 23.1.2. An attacker could use this information to find hashed passwords and possibly escalate their privilege.(CVE-2023-1786)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-1786" type="cve" title="fix CVE-2023-1786" />
    </references>
    <pkglist>
      <collection>
        <package name="cloud-init" version="19.4" release="13.up4.uel20.02" epoch="0" arch="noarch" src="cloud-init-19.4-13.up4.uel20.02.src.rpm">
          <filename>cloud-init-19.4-13.up4.uel20.02.noarch.rpm</filename>
        </package>
        <package name="cloud-init-help" version="19.4" release="13.up4.uel20.02" epoch="0" arch="noarch" src="cloud-init-19.4-13.up4.uel20.02.src.rpm">
          <filename>cloud-init-help-19.4-13.up4.uel20.02.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20137</id>
    <title>Moderate: dbus security update</title>
    <updated date="2023-06-20 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: dbus security update</summary>
    <description> D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.(CVE-2023-34969)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-34969" type="cve" title="fix CVE-2023-34969" />
    </references>
    <pkglist>
      <collection>
        <package name="dbus" version="1.12.16" release="21.uel20.09" epoch="1" arch="x86_64" src="dbus-1.12.16-21.uel20.09.src.rpm">
          <filename>dbus-1.12.16-21.uel20.09.x86_64.rpm</filename>
        </package>
        <package name="dbus-daemon" version="1.12.16" release="21.uel20.09" epoch="1" arch="x86_64" src="dbus-1.12.16-21.uel20.09.src.rpm">
          <filename>dbus-daemon-1.12.16-21.uel20.09.x86_64.rpm</filename>
        </package>
        <package name="dbus-devel" version="1.12.16" release="21.uel20.09" epoch="1" arch="x86_64" src="dbus-1.12.16-21.uel20.09.src.rpm">
          <filename>dbus-devel-1.12.16-21.uel20.09.x86_64.rpm</filename>
        </package>
        <package name="dbus-x11" version="1.12.16" release="21.uel20.09" epoch="1" arch="x86_64" src="dbus-1.12.16-21.uel20.09.src.rpm">
          <filename>dbus-x11-1.12.16-21.uel20.09.x86_64.rpm</filename>
        </package>
        <package name="dbus-tools" version="1.12.16" release="21.uel20.09" epoch="1" arch="x86_64" src="dbus-1.12.16-21.uel20.09.src.rpm">
          <filename>dbus-tools-1.12.16-21.uel20.09.x86_64.rpm</filename>
        </package>
        <package name="dbus-libs" version="1.12.16" release="21.uel20.09" epoch="1" arch="x86_64" src="dbus-1.12.16-21.uel20.09.src.rpm">
          <filename>dbus-libs-1.12.16-21.uel20.09.x86_64.rpm</filename>
        </package>
        <package name="dbus-daemon" version="1.12.16" release="21.uel20.09" epoch="1" arch="aarch64" src="dbus-1.12.16-21.uel20.09.src.rpm">
          <filename>dbus-daemon-1.12.16-21.uel20.09.aarch64.rpm</filename>
        </package>
        <package name="dbus-common" version="1.12.16" release="21.uel20.09" epoch="1" arch="noarch" src="dbus-1.12.16-21.uel20.09.src.rpm">
          <filename>dbus-common-1.12.16-21.uel20.09.noarch.rpm</filename>
        </package>
        <package name="dbus" version="1.12.16" release="21.uel20.09" epoch="1" arch="aarch64" src="dbus-1.12.16-21.uel20.09.src.rpm">
          <filename>dbus-1.12.16-21.uel20.09.aarch64.rpm</filename>
        </package>
        <package name="dbus-devel" version="1.12.16" release="21.uel20.09" epoch="1" arch="aarch64" src="dbus-1.12.16-21.uel20.09.src.rpm">
          <filename>dbus-devel-1.12.16-21.uel20.09.aarch64.rpm</filename>
        </package>
        <package name="dbus-tools" version="1.12.16" release="21.uel20.09" epoch="1" arch="aarch64" src="dbus-1.12.16-21.uel20.09.src.rpm">
          <filename>dbus-tools-1.12.16-21.uel20.09.aarch64.rpm</filename>
        </package>
        <package name="dbus-help" version="1.12.16" release="21.uel20.09" epoch="1" arch="noarch" src="dbus-1.12.16-21.uel20.09.src.rpm">
          <filename>dbus-help-1.12.16-21.uel20.09.noarch.rpm</filename>
        </package>
        <package name="dbus-x11" version="1.12.16" release="21.uel20.09" epoch="1" arch="aarch64" src="dbus-1.12.16-21.uel20.09.src.rpm">
          <filename>dbus-x11-1.12.16-21.uel20.09.aarch64.rpm</filename>
        </package>
        <package name="dbus-libs" version="1.12.16" release="21.uel20.09" epoch="1" arch="aarch64" src="dbus-1.12.16-21.uel20.09.src.rpm">
          <filename>dbus-libs-1.12.16-21.uel20.09.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20140</id>
    <title>Important: openldap security update</title>
    <updated date="2023-06-12 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: openldap security update</summary>
    <description> A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.(CVE-2023-2953)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-2953" type="cve" title="fix CVE-2023-2953" />
    </references>
    <pkglist>
      <collection>
        <package name="openldap-servers" version="2.4.50" release="8.up1.uel20.01" epoch="0" arch="aarch64" src="openldap-2.4.50-8.up1.uel20.01.src.rpm">
          <filename>openldap-servers-2.4.50-8.up1.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="openldap-clients" version="2.4.50" release="8.up1.uel20.01" epoch="0" arch="aarch64" src="openldap-2.4.50-8.up1.uel20.01.src.rpm">
          <filename>openldap-clients-2.4.50-8.up1.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="openldap" version="2.4.50" release="8.up1.uel20.01" epoch="0" arch="aarch64" src="openldap-2.4.50-8.up1.uel20.01.src.rpm">
          <filename>openldap-2.4.50-8.up1.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="openldap-devel" version="2.4.50" release="8.up1.uel20.01" epoch="0" arch="aarch64" src="openldap-2.4.50-8.up1.uel20.01.src.rpm">
          <filename>openldap-devel-2.4.50-8.up1.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="openldap-servers" version="2.4.50" release="8.up1.uel20.01" epoch="0" arch="x86_64" src="openldap-2.4.50-8.up1.uel20.01.src.rpm">
          <filename>openldap-servers-2.4.50-8.up1.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="openldap-devel" version="2.4.50" release="8.up1.uel20.01" epoch="0" arch="x86_64" src="openldap-2.4.50-8.up1.uel20.01.src.rpm">
          <filename>openldap-devel-2.4.50-8.up1.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="openldap-clients" version="2.4.50" release="8.up1.uel20.01" epoch="0" arch="x86_64" src="openldap-2.4.50-8.up1.uel20.01.src.rpm">
          <filename>openldap-clients-2.4.50-8.up1.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="openldap-help" version="2.4.50" release="8.up1.uel20.01" epoch="0" arch="noarch" src="openldap-2.4.50-8.up1.uel20.01.src.rpm">
          <filename>openldap-help-2.4.50-8.up1.uel20.01.noarch.rpm</filename>
        </package>
        <package name="openldap" version="2.4.50" release="8.up1.uel20.01" epoch="0" arch="x86_64" src="openldap-2.4.50-8.up1.uel20.01.src.rpm">
          <filename>openldap-2.4.50-8.up1.uel20.01.x86_64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20142</id>
    <title>Moderate: python-tornado security update</title>
    <updated date="2023-06-20 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: python-tornado security update</summary>
    <description> Open redirect vulnerability in Tornado versions 6.3.1 and earlier allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having user access a specially crafted URL.(CVE-2023-28370)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-28370" type="cve" title="fix CVE-2023-28370" />
    </references>
    <pkglist>
      <collection>
        <package name="python2-tornado" version="5.0.2" release="8.uel20" epoch="0" arch="x86_64" src="python-tornado-5.0.2-8.uel20.src.rpm">
          <filename>python2-tornado-5.0.2-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-tornado" version="5.0.2" release="8.uel20" epoch="0" arch="x86_64" src="python-tornado-5.0.2-8.uel20.src.rpm">
          <filename>python3-tornado-5.0.2-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="python2-tornado" version="5.0.2" release="8.uel20" epoch="0" arch="aarch64" src="python-tornado-5.0.2-8.uel20.src.rpm">
          <filename>python2-tornado-5.0.2-8.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-tornado" version="5.0.2" release="8.uel20" epoch="0" arch="aarch64" src="python-tornado-5.0.2-8.uel20.src.rpm">
          <filename>python3-tornado-5.0.2-8.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20151</id>
    <title>None: gnuplot security update</title>
    <updated date="2023-07-17 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: gnuplot security update</summary>
    <description> gnuplot v5.5 was discovered to contain a buffer overflow via the function plotrequest().(CVE-2020-25969)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-25969" type="cve" title="fix CVE-2020-25969" />
    </references>
    <pkglist>
      <collection>
        <package name="gnuplot" version="5.0.6" release="13.uel20" epoch="0" arch="x86_64" src="gnuplot-5.0.6-13.uel20.src.rpm">
          <filename>gnuplot-5.0.6-13.uel20.x86_64.rpm</filename>
        </package>
        <package name="gnuplot-help" version="5.0.6" release="13.uel20" epoch="0" arch="noarch" src="gnuplot-5.0.6-13.uel20.src.rpm">
          <filename>gnuplot-help-5.0.6-13.uel20.noarch.rpm</filename>
        </package>
        <package name="gnuplot" version="5.0.6" release="13.uel20" epoch="0" arch="aarch64" src="gnuplot-5.0.6-13.uel20.src.rpm">
          <filename>gnuplot-5.0.6-13.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20152</id>
    <title>Important: perl-CPAN security update</title>
    <updated date="2023-07-06 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: perl-CPAN security update</summary>
    <description> CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS.(CVE-2023-31484)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-31484" type="cve" title="fix CVE-2023-31484" />
    </references>
    <pkglist>
      <collection>
        <package name="perl-CPAN" version="2.27" release="4.uel20" epoch="0" arch="noarch" src="perl-CPAN-2.27-4.uel20.src.rpm">
          <filename>perl-CPAN-2.27-4.uel20.noarch.rpm</filename>
        </package>
        <package name="perl-CPAN-help" version="2.27" release="4.uel20" epoch="0" arch="noarch" src="perl-CPAN-2.27-4.uel20.src.rpm">
          <filename>perl-CPAN-help-2.27-4.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20153</id>
    <title>Important: kubernetes security update</title>
    <updated date="2023-07-05 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: kubernetes security update</summary>
    <description> Users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using ephemeral containers. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the `kubernetes.io/enforce-mountable-secrets` annotation are used together with ephemeral containers.

(CVE-2023-2728)
 Users may be able to launch containers using images that are restricted by ImagePolicyWebhook when using ephemeral containers. Kubernetes clusters are only affected if the ImagePolicyWebhook admission plugin is used together with ephemeral containers.

(CVE-2023-2727)
 Users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an untrusted user can modify Node objects and send proxy requests to them. Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections to Pods, retrieve container logs, and more. While Kubernetes already validates the proxying address for Nodes, a bug in kube-apiserver made it possible to bypass this validation. Bypassing this validation could allow authenticated requests destined for Nodes to to the API server's private network.(CVE-2022-3294)
 Users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group without authorization. Clusters are impacted by this vulnerability if all of the following are true: 1. There are 2+ CustomResourceDefinitions sharing the same API group 2. Users have cluster-wide list or watch authorization on one of those custom resources. 3. The same users are not authorized to read another custom resource in the same API group.(CVE-2022-3162)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-2728" type="cve" title="fix CVE-2023-2728" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-2727" type="cve" title="fix CVE-2023-2727" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-3294" type="cve" title="fix CVE-2022-3294" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-3162" type="cve" title="fix CVE-2022-3162" />
    </references>
    <pkglist>
      <collection>
        <package name="kubernetes-help" version="1.20.2" release="20.uel20" epoch="0" arch="x86_64" src="kubernetes-1.20.2-20.uel20.src.rpm">
          <filename>kubernetes-help-1.20.2-20.uel20.x86_64.rpm</filename>
        </package>
        <package name="kubernetes-node" version="1.20.2" release="20.uel20" epoch="0" arch="x86_64" src="kubernetes-1.20.2-20.uel20.src.rpm">
          <filename>kubernetes-node-1.20.2-20.uel20.x86_64.rpm</filename>
        </package>
        <package name="kubernetes-master" version="1.20.2" release="20.uel20" epoch="0" arch="x86_64" src="kubernetes-1.20.2-20.uel20.src.rpm">
          <filename>kubernetes-master-1.20.2-20.uel20.x86_64.rpm</filename>
        </package>
        <package name="kubernetes-kubeadm" version="1.20.2" release="20.uel20" epoch="0" arch="x86_64" src="kubernetes-1.20.2-20.uel20.src.rpm">
          <filename>kubernetes-kubeadm-1.20.2-20.uel20.x86_64.rpm</filename>
        </package>
        <package name="kubernetes-kubelet" version="1.20.2" release="20.uel20" epoch="0" arch="x86_64" src="kubernetes-1.20.2-20.uel20.src.rpm">
          <filename>kubernetes-kubelet-1.20.2-20.uel20.x86_64.rpm</filename>
        </package>
        <package name="kubernetes-client" version="1.20.2" release="20.uel20" epoch="0" arch="x86_64" src="kubernetes-1.20.2-20.uel20.src.rpm">
          <filename>kubernetes-client-1.20.2-20.uel20.x86_64.rpm</filename>
        </package>
        <package name="kubernetes" version="1.20.2" release="20.uel20" epoch="0" arch="x86_64" src="kubernetes-1.20.2-20.uel20.src.rpm">
          <filename>kubernetes-1.20.2-20.uel20.x86_64.rpm</filename>
        </package>
        <package name="kubernetes-master" version="1.20.2" release="20.uel20" epoch="0" arch="aarch64" src="kubernetes-1.20.2-20.uel20.src.rpm">
          <filename>kubernetes-master-1.20.2-20.uel20.aarch64.rpm</filename>
        </package>
        <package name="kubernetes-kubelet" version="1.20.2" release="20.uel20" epoch="0" arch="aarch64" src="kubernetes-1.20.2-20.uel20.src.rpm">
          <filename>kubernetes-kubelet-1.20.2-20.uel20.aarch64.rpm</filename>
        </package>
        <package name="kubernetes" version="1.20.2" release="20.uel20" epoch="0" arch="aarch64" src="kubernetes-1.20.2-20.uel20.src.rpm">
          <filename>kubernetes-1.20.2-20.uel20.aarch64.rpm</filename>
        </package>
        <package name="kubernetes-client" version="1.20.2" release="20.uel20" epoch="0" arch="aarch64" src="kubernetes-1.20.2-20.uel20.src.rpm">
          <filename>kubernetes-client-1.20.2-20.uel20.aarch64.rpm</filename>
        </package>
        <package name="kubernetes-kubeadm" version="1.20.2" release="20.uel20" epoch="0" arch="aarch64" src="kubernetes-1.20.2-20.uel20.src.rpm">
          <filename>kubernetes-kubeadm-1.20.2-20.uel20.aarch64.rpm</filename>
        </package>
        <package name="kubernetes-help" version="1.20.2" release="20.uel20" epoch="0" arch="aarch64" src="kubernetes-1.20.2-20.uel20.src.rpm">
          <filename>kubernetes-help-1.20.2-20.uel20.aarch64.rpm</filename>
        </package>
        <package name="kubernetes-node" version="1.20.2" release="20.uel20" epoch="0" arch="aarch64" src="kubernetes-1.20.2-20.uel20.src.rpm">
          <filename>kubernetes-node-1.20.2-20.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20154</id>
    <title>Important: texlive-base security update</title>
    <updated date="2023-07-05 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: texlive-base security update</summary>
    <description> LuaTeX before 1.17.0 allows execution of arbitrary shell commands when compiling a TeX file obtained from an untrusted source. This occurs because luatex-core.lua lets the original io.popen be accessed. This also affects TeX Live before 2023 r66984 and MiKTeX before 23.5.(CVE-2023-32700)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-32700" type="cve" title="fix CVE-2023-32700" />
    </references>
    <pkglist>
      <collection>
        <package name="texlive-tie" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-tie-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-ctie" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-ctie-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-dvidvi" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-dvidvi-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-synctex" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-synctex-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-patgen" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-patgen-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-gsftopk" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-gsftopk-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-dvipos" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-dvipos-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-pstools" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-pstools-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-detex" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-detex-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-dvicopy" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-dvicopy-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-texware" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-texware-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-lacheck" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-lacheck-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-dtl" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-dtl-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-dvi2tty" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-dvi2tty-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-afm2pl" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-afm2pl-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-web" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-web-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-musixtnt" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-musixtnt-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-seetexk" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-seetexk-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-vlna" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-vlna-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-cjkutils" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-cjkutils-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-bibtexu" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-bibtexu-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-ps2pk" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-ps2pk-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-fontware" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-fontware-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-mfware" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-mfware-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-dviljk" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-dviljk-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-lib-devel" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-lib-devel-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-bibtex8" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-bibtex8-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-tex" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-tex-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-autosp" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-autosp-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-dvipng" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-dvipng-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-chktex" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-chktex-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-makeindex" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-makeindex-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-aleph" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-aleph-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-cweb" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-cweb-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-omegaware" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-omegaware-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-m-tx" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-m-tx-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-metafont" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-metafont-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-bibtex" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-bibtex-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-xdvi" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-xdvi-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-axodraw2" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-axodraw2-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-mflua" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-mflua-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-lib" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-lib-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-ttfutils" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-ttfutils-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-dvips" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-dvips-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-pdftools" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-pdftools-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-pmx" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-pmx-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-kpathsea" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-kpathsea-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-ptex" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-ptex-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-uptex" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-uptex-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-dvipdfmx" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-dvipdfmx-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-lcdftypetools" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-lcdftypetools-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-xetex" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-xetex-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-dvisvgm" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-dvisvgm-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-pdftex" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-pdftex-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-metapost" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-metapost-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-velthuis" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-velthuis-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-luatex" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-luatex-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-tex4ht" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-tex4ht-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-base" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-base-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-gregoriotex" version="20180414" release="32.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-gregoriotex-20180414-32.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-typeoutfileinfo" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-typeoutfileinfo-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-latex-papersize" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-latex-papersize-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-latexfileversion" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-latexfileversion-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-wordcount" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-wordcount-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-texloganalyser" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-texloganalyser-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-dviinfox" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-dviinfox-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-convbkmk" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-convbkmk-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-texdirflatten" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-texdirflatten-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pdfbook2" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-pdfbook2-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-texliveonfly" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-texliveonfly-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-texfot" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-texfot-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-latexpand" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-latexpand-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-purifyeps" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-purifyeps-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-texdiff" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-texdiff-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-findhyph" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-findhyph-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pdfxup" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-pdfxup-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-yplan" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-yplan-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pkfix" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-pkfix-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-epstopdf" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-epstopdf-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-ctan-o-mat" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-ctan-o-mat-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-dviasm" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-dviasm-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-texlive-scripts" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-texlive-scripts-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pax" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-pax-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-vpe" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-vpe-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-adhocfilelist" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-adhocfilelist-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pdfcrop" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-pdfcrop-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-ptex2pdf" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-ptex2pdf-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-mltex" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-mltex-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-ltxfileinfo" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-ltxfileinfo-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-bundledoc" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-bundledoc-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-texconfig" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-texconfig-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-dtxgen" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-dtxgen-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-match_parens" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-match_parens-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-tie" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-tie-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-ctie" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-ctie-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-detex" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-detex-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-lacheck" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-lacheck-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-dvipos" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-dvipos-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-dvidvi" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-dvidvi-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-patgen" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-patgen-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-synctex" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-synctex-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-ctanify" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-ctanify-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-gsftopk" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-gsftopk-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-cslatex" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-cslatex-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-dosepsbin" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-dosepsbin-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-tpic2pdftex" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-tpic2pdftex-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-glyphlist" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-glyphlist-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-de-macro" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-de-macro-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-thumbpdf" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-thumbpdf-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-installfont" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-installfont-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-texdoctk" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-texdoctk-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-fig4latex" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-fig4latex-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-latex-git-log" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-latex-git-log-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-ebong" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-ebong-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-a2ping" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-a2ping-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pstools" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-pstools-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-mkgrkindex" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-mkgrkindex-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-jfmutil" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-jfmutil-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-mkjobtexmf" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-mkjobtexmf-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-afm2pl" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-afm2pl-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-dvicopy" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-dvicopy-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-texware" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-texware-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-dvi2tty" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-dvi2tty-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-pdflatexpicscale" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-pdflatexpicscale-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-dtl" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-dtl-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-mex" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-mex-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-mptopdf" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-mptopdf-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-tex4ebook" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-tex4ebook-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-xmltex" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-xmltex-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-listings-ext" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-listings-ext-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-fontools" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-fontools-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-sty2dtx" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-sty2dtx-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-musixtnt" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-musixtnt-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-authorindex" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-authorindex-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-accfonts" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-accfonts-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-cachepic" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-cachepic-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-texdef" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-texdef-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-web" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-web-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-vlna" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-vlna-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-crossrefware" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-crossrefware-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-mkpic" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-mkpic-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-bibtexu" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-bibtexu-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-lib-devel" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-lib-devel-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-bibtex" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-bibtex-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-cjkutils" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-cjkutils-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-omegaware" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-omegaware-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-texsis" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-texsis-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-make4ht" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-make4ht-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-jadetex" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-jadetex-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-makedtx" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-makedtx-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-latexdiff" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-latexdiff-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pdftex" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-pdftex-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-cweb" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-cweb-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-texlive.infra" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-texlive.infra-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-musixtex" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-musixtex-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-glossaries" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-glossaries-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-fontware" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-fontware-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-splitindex" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-splitindex-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pkfix-helper" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-pkfix-helper-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-kotex-utils" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-kotex-utils-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-mf2pt1" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-mf2pt1-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-texlive-en" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-texlive-en-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-tex" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-tex-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-chktex" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-chktex-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-multibibliography" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-multibibliography-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-mflua" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-mflua-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-pst2pdf" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-pst2pdf-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-mfware" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-mfware-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-l3build" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-l3build-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-autosp" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-autosp-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-perltex" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-perltex-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-mathspic" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-mathspic-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pmxchords" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-pmxchords-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-urlbst" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-urlbst-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-epspdf" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-epspdf-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-texosquery" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-texosquery-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pygmentex" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-pygmentex-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-checklistings" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-checklistings-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-m-tx" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-m-tx-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-ps2pk" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-ps2pk-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-listbib" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-listbib-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-svn-multi" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-svn-multi-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-dvisvgm" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-dvisvgm-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-bibtex8" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-bibtex8-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-latex2man" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-latex2man-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-dvipng" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-dvipng-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-tetex" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-tetex-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-context" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-context-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-tex4ht" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-tex4ht-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-dvips" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-dvips-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-texdoc" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-texdoc-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-ltximg" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-ltximg-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-checkcites" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-checkcites-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-ptex-fontmaps" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-ptex-fontmaps-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pdfjam" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-pdfjam-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-seetexk" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-seetexk-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-fragmaster" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-fragmaster-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-bibexport" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-bibexport-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-dviljk" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-dviljk-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-lollipop" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-lollipop-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pfarrei" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-pfarrei-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-aleph" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-aleph-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-axodraw2" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-axodraw2-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-srcredact" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-srcredact-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-makeindex" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-makeindex-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-texcount" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-texcount-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-amstex" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-amstex-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-ttfutils" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-ttfutils-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-velthuis" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-velthuis-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-kpathsea" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-kpathsea-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-metafont" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-metafont-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-pst-pdf" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-pst-pdf-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-ptex" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-ptex-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-bib2gls" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-bib2gls-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-getmap" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-getmap-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-lua2dox" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-lua2dox-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pmx" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-pmx-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-lyluatex" version="svn47584" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-lyluatex-svn47584-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-oberdiek" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-oberdiek-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-eplain" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-eplain-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-uptex" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-uptex-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-pythontex" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-pythontex-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-luatex" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-luatex-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-luaotfload" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-luaotfload-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-xetex" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-xetex-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-arara" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-arara-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-lilyglyphs" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-lilyglyphs-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-dvipdfmx" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-dvipdfmx-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-diadia" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-diadia-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-lcdftypetools" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-lcdftypetools-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-ulqda" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-ulqda-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-petri-nets" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-petri-nets-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-csplain" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-csplain-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-lib" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-lib-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-xdvi" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-xdvi-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-cyrillic" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-cyrillic-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pdftools" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-pdftools-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-pedigree-perl" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-pedigree-perl-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-gregoriotex" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-gregoriotex-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-lwarp" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-lwarp-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-fontinst" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-fontinst-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-rubik" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-rubik-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-latex" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-latex-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-latex2nemeth" version="20180414" release="32.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-latex2nemeth-20180414-32.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-metapost" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-metapost-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-base" version="20180414" release="32.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-32.uel20.up1.src.rpm">
          <filename>texlive-base-20180414-32.uel20.up1.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20156</id>
    <title>Important: perl-HTTP-Tiny security update</title>
    <updated date="2023-06-28 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: perl-HTTP-Tiny security update</summary>
    <description> HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.(CVE-2023-31486)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-31486" type="cve" title="fix CVE-2023-31486" />
    </references>
    <pkglist>
      <collection>
        <package name="perl-HTTP-Tiny-help" version="0.076" release="4.uel20" epoch="0" arch="noarch" src="perl-HTTP-Tiny-0.076-4.uel20.src.rpm">
          <filename>perl-HTTP-Tiny-help-0.076-4.uel20.noarch.rpm</filename>
        </package>
        <package name="perl-HTTP-Tiny" version="0.076" release="4.uel20" epoch="0" arch="noarch" src="perl-HTTP-Tiny-0.076-4.uel20.src.rpm">
          <filename>perl-HTTP-Tiny-0.076-4.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20157</id>
    <title>Important: gdk-pixbuf2 security update</title>
    <updated date="2023-06-27 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: gdk-pixbuf2 security update</summary>
    <description> GNOME gdk-pixbuf 2.42.6 is vulnerable to a heap-buffer overflow vulnerability when decoding the lzw compressed stream of image data in GIF files with lzw minimum code size equals to 12.(CVE-2021-44648)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-44648" type="cve" title="fix CVE-2021-44648" />
    </references>
    <pkglist>
      <collection>
        <package name="gdk-pixbuf2" version="2.40.0" release="5.uel20" epoch="0" arch="x86_64" src="gdk-pixbuf2-2.40.0-5.uel20.src.rpm">
          <filename>gdk-pixbuf2-2.40.0-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="gdk-pixbuf2-devel" version="2.40.0" release="5.uel20" epoch="0" arch="x86_64" src="gdk-pixbuf2-2.40.0-5.uel20.src.rpm">
          <filename>gdk-pixbuf2-devel-2.40.0-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="gdk-pixbuf2-devel" version="2.40.0" release="5.uel20" epoch="0" arch="aarch64" src="gdk-pixbuf2-2.40.0-5.uel20.src.rpm">
          <filename>gdk-pixbuf2-devel-2.40.0-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="gdk-pixbuf2" version="2.40.0" release="5.uel20" epoch="0" arch="aarch64" src="gdk-pixbuf2-2.40.0-5.uel20.src.rpm">
          <filename>gdk-pixbuf2-2.40.0-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="gdk-pixbuf2-help" version="2.40.0" release="5.uel20" epoch="0" arch="noarch" src="gdk-pixbuf2-2.40.0-5.uel20.src.rpm">
          <filename>gdk-pixbuf2-help-2.40.0-5.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20162</id>
    <title>Moderate: librabbitmq security update</title>
    <updated date="2023-07-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: librabbitmq security update</summary>
    <description> An issue was discovered in the C AMQP client library (aka rabbitmq-c) through 0.13.0 for RabbitMQ. Credentials can only be entered on the command line (e.g., for amqp-publish or amqp-consume) and are thus visible to local attackers by listing a process and its arguments.(CVE-2023-35789)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-35789" type="cve" title="fix CVE-2023-35789" />
    </references>
    <pkglist>
      <collection>
        <package name="librabbitmq" version="0.9.0" release="7.uel20" epoch="0" arch="x86_64" src="librabbitmq-0.9.0-7.uel20.src.rpm">
          <filename>librabbitmq-0.9.0-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="librabbitmq-help" version="0.9.0" release="7.uel20" epoch="0" arch="x86_64" src="librabbitmq-0.9.0-7.uel20.src.rpm">
          <filename>librabbitmq-help-0.9.0-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="librabbitmq-devel" version="0.9.0" release="7.uel20" epoch="0" arch="x86_64" src="librabbitmq-0.9.0-7.uel20.src.rpm">
          <filename>librabbitmq-devel-0.9.0-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="librabbitmq" version="0.9.0" release="7.uel20" epoch="0" arch="aarch64" src="librabbitmq-0.9.0-7.uel20.src.rpm">
          <filename>librabbitmq-0.9.0-7.uel20.aarch64.rpm</filename>
        </package>
        <package name="librabbitmq-devel" version="0.9.0" release="7.uel20" epoch="0" arch="aarch64" src="librabbitmq-0.9.0-7.uel20.src.rpm">
          <filename>librabbitmq-devel-0.9.0-7.uel20.aarch64.rpm</filename>
        </package>
        <package name="librabbitmq-help" version="0.9.0" release="7.uel20" epoch="0" arch="aarch64" src="librabbitmq-0.9.0-7.uel20.src.rpm">
          <filename>librabbitmq-help-0.9.0-7.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20164</id>
    <title>None: bouncycastle security update</title>
    <updated date="2023-06-28 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: bouncycastle security update</summary>
    <description> Bouncy Castle For Java before 1.74 is affected by an LDAP injection vulnerability. The vulnerability only affects applications that use an LDAP CertStore from Bouncy Castle to validate X.509 certificates. During the certificate validation process, Bouncy Castle inserts the certificate's Subject Name into an LDAP search filter without any escaping, which leads to an LDAP injection vulnerability.(CVE-2023-33201)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-33201" type="cve" title="fix CVE-2023-33201" />
    </references>
    <pkglist>
      <collection>
        <package name="bouncycastle" version="1.67" release="2.uel20" epoch="0" arch="noarch" src="bouncycastle-1.67-2.uel20.src.rpm">
          <filename>bouncycastle-1.67-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20166</id>
    <title>Moderate: tang security update</title>
    <updated date="2023-07-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: tang security update</summary>
    <description> A race condition exists in the Tang server functionality for key generation and key rotation. This flaw results in a small time window where Tang private keys become readable by other processes on the same host.(CVE-2023-1672)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-1672" type="cve" title="fix CVE-2023-1672" />
    </references>
    <pkglist>
      <collection>
        <package name="tang" version="7" release="4.uel20" epoch="0" arch="x86_64" src="tang-7-4.uel20.src.rpm">
          <filename>tang-7-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="tang" version="7" release="4.uel20" epoch="0" arch="aarch64" src="tang-7-4.uel20.src.rpm">
          <filename>tang-7-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="tang-help" version="7" release="4.uel20" epoch="0" arch="noarch" src="tang-7-4.uel20.src.rpm">
          <filename>tang-help-7-4.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20167</id>
    <title>Important: guava20 security update</title>
    <updated date="2023-07-06 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: guava20 security update</summary>
    <description> Use of Java's default temporary directory for file creation in `FileBackedOutputStream` in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class.

Even though the security vulnerability is fixed in version 32.0.0, we recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows.

(CVE-2023-2976)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-2976" type="cve" title="fix CVE-2023-2976" />
    </references>
    <pkglist>
      <collection>
        <package name="guava20-help" version="20.0" release="11.uel20" epoch="0" arch="noarch" src="guava20-20.0-11.uel20.src.rpm">
          <filename>guava20-help-20.0-11.uel20.noarch.rpm</filename>
        </package>
        <package name="guava20" version="20.0" release="11.uel20" epoch="0" arch="noarch" src="guava20-20.0-11.uel20.src.rpm">
          <filename>guava20-20.0-11.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20168</id>
    <title>Important: guava security update</title>
    <updated date="2023-07-06 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: guava security update</summary>
    <description> Use of Java's default temporary directory for file creation in `FileBackedOutputStream` in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class.

Even though the security vulnerability is fixed in version 32.0.0, we recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows.

(CVE-2023-2976)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-2976" type="cve" title="fix CVE-2023-2976" />
    </references>
    <pkglist>
      <collection>
        <package name="guava-help" version="25.0" release="6.uel20" epoch="0" arch="noarch" src="guava-25.0-6.uel20.src.rpm">
          <filename>guava-help-25.0-6.uel20.noarch.rpm</filename>
        </package>
        <package name="guava" version="25.0" release="6.uel20" epoch="0" arch="noarch" src="guava-25.0-6.uel20.src.rpm">
          <filename>guava-25.0-6.uel20.noarch.rpm</filename>
        </package>
        <package name="guava-testlib" version="25.0" release="6.uel20" epoch="0" arch="noarch" src="guava-25.0-6.uel20.src.rpm">
          <filename>guava-testlib-25.0-6.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20173</id>
    <title>Important: amanda security update</title>
    <updated date="2023-08-09 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: amanda security update</summary>
    <description> AMANDA (Advanced Maryland Automatic Network Disk Archiver) before tag-community-3.5.4 mishandles argument checking for runtar.c, a different vulnerability than CVE-2022-37705.(CVE-2023-30577)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-30577" type="cve" title="fix CVE-2023-30577" />
    </references>
    <pkglist>
      <collection>
        <package name="amanda" version="3.5.4" release="1.uel20" epoch="0" arch="x86_64" src="amanda-3.5.4-1.uel20.src.rpm">
          <filename>amanda-3.5.4-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="amanda" version="3.5.4" release="1.uel20" epoch="0" arch="aarch64" src="amanda-3.5.4-1.uel20.src.rpm">
          <filename>amanda-3.5.4-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="amanda-help" version="3.5.4" release="1.uel20" epoch="0" arch="noarch" src="amanda-3.5.4-1.uel20.src.rpm">
          <filename>amanda-help-3.5.4-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20174</id>
    <title>Important: pcre2 security update</title>
    <updated date="2023-08-07 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: pcre2 security update</summary>
    <description> Integer overflow vulnerability in pcre2test before 10.41 allows attackers to cause a denial of service or other unspecified impacts via negative input.(CVE-2022-41409)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-41409" type="cve" title="fix CVE-2022-41409" />
    </references>
    <pkglist>
      <collection>
        <package name="pcre2" version="10.35" release="5.uel20.01" epoch="0" arch="x86_64" src="pcre2-10.35-5.uel20.01.src.rpm">
          <filename>pcre2-10.35-5.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="pcre2-devel" version="10.35" release="5.uel20.01" epoch="0" arch="x86_64" src="pcre2-10.35-5.uel20.01.src.rpm">
          <filename>pcre2-devel-10.35-5.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="pcre2-help" version="10.35" release="5.uel20.01" epoch="0" arch="noarch" src="pcre2-10.35-5.uel20.01.src.rpm">
          <filename>pcre2-help-10.35-5.uel20.01.noarch.rpm</filename>
        </package>
        <package name="pcre2-devel" version="10.35" release="5.uel20.01" epoch="0" arch="aarch64" src="pcre2-10.35-5.uel20.01.src.rpm">
          <filename>pcre2-devel-10.35-5.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="pcre2" version="10.35" release="5.uel20.01" epoch="0" arch="aarch64" src="pcre2-10.35-5.uel20.01.src.rpm">
          <filename>pcre2-10.35-5.uel20.01.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20175</id>
    <title>Critical: python-certifi security update</title>
    <updated date="2023-08-07 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: python-certifi security update</summary>
    <description> Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes "e-Tugra" root certificates. e-Tugra's root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from "e-Tugra" from the root store.(CVE-2023-37920)
 Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi 2022.12.07 removes root certificates from "TrustCor" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found in the linked google group discussion.(CVE-2022-23491)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-37920" type="cve" title="fix CVE-2023-37920" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-23491" type="cve" title="fix CVE-2022-23491" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-certifi" version="2023.7.22" release="1.uel20" epoch="0" arch="noarch" src="python-certifi-2023.7.22-1.uel20.src.rpm">
          <filename>python3-certifi-2023.7.22-1.uel20.noarch.rpm</filename>
        </package>
        <package name="python-certifi-help" version="2023.7.22" release="1.uel20" epoch="0" arch="noarch" src="python-certifi-2023.7.22-1.uel20.src.rpm">
          <filename>python-certifi-help-2023.7.22-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20176</id>
    <title>Moderate: doxygen security update</title>
    <updated date="2023-07-31 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: doxygen security update</summary>
    <description> Cross Site Scripting vulnerability in jQuery 2.2.0 through 3.x before 3.5.0 allows a remote attacker to execute arbitrary code via the &lt;options&gt; element.(CVE-2020-23064)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-23064" type="cve" title="fix CVE-2020-23064" />
    </references>
    <pkglist>
      <collection>
        <package name="doxygen-doxywizard" version="1.8.17" release="8.uel20" epoch="1" arch="x86_64" src="doxygen-1.8.17-8.uel20.src.rpm">
          <filename>doxygen-doxywizard-1.8.17-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="doxygen" version="1.8.17" release="8.uel20" epoch="1" arch="x86_64" src="doxygen-1.8.17-8.uel20.src.rpm">
          <filename>doxygen-1.8.17-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="doxygen-doxywizard" version="1.8.17" release="8.uel20" epoch="1" arch="aarch64" src="doxygen-1.8.17-8.uel20.src.rpm">
          <filename>doxygen-doxywizard-1.8.17-8.uel20.aarch64.rpm</filename>
        </package>
        <package name="doxygen" version="1.8.17" release="8.uel20" epoch="1" arch="aarch64" src="doxygen-1.8.17-8.uel20.src.rpm">
          <filename>doxygen-1.8.17-8.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20187</id>
    <title>Important: redis security update</title>
    <updated date="2023-08-01 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: redis security update</summary>
    <description> Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. The problem is fixed in versions 7.0.12, 6.2.13, and 6.0.20.(CVE-2022-24834)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-24834" type="cve" title="fix CVE-2022-24834" />
    </references>
    <pkglist>
      <collection>
        <package name="redis" version="4.0.11" release="19.uel20" epoch="0" arch="x86_64" src="redis-4.0.11-19.uel20.src.rpm">
          <filename>redis-4.0.11-19.uel20.x86_64.rpm</filename>
        </package>
        <package name="redis" version="4.0.11" release="19.uel20" epoch="0" arch="aarch64" src="redis-4.0.11-19.uel20.src.rpm">
          <filename>redis-4.0.11-19.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20191</id>
    <title>Important: python-reportlab security update</title>
    <updated date="2023-07-31 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: python-reportlab security update</summary>
    <description> Reportlab up to v3.6.12 allows attackers to execute arbitrary code via supplying a crafted PDF file.(CVE-2023-33733)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-33733" type="cve" title="fix CVE-2023-33733" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-reportlab" version="3.6.10" release="2.uel20" epoch="0" arch="x86_64" src="python-reportlab-3.6.10-2.uel20.src.rpm">
          <filename>python3-reportlab-3.6.10-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-reportlab" version="3.6.10" release="2.uel20" epoch="0" arch="aarch64" src="python-reportlab-3.6.10-2.uel20.src.rpm">
          <filename>python3-reportlab-3.6.10-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="python-reportlab-help" version="3.6.10" release="2.uel20" epoch="0" arch="noarch" src="python-reportlab-3.6.10-2.uel20.src.rpm">
          <filename>python-reportlab-help-3.6.10-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20194</id>
    <title>Moderate: file security update</title>
    <updated date="2023-08-29 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: file security update</summary>
    <description> File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: "File" is the name of an Open Source project.(CVE-2022-48554)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-48554" type="cve" title="fix CVE-2022-48554" />
    </references>
    <pkglist>
      <collection>
        <package name="file" version="5.39" release="7.uel20.01" epoch="0" arch="x86_64" src="file-5.39-7.uel20.01.src.rpm">
          <filename>file-5.39-7.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="file-devel" version="5.39" release="7.uel20.01" epoch="0" arch="x86_64" src="file-5.39-7.uel20.01.src.rpm">
          <filename>file-devel-5.39-7.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="file-help" version="5.39" release="7.uel20.01" epoch="0" arch="x86_64" src="file-5.39-7.uel20.01.src.rpm">
          <filename>file-help-5.39-7.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="file-libs" version="5.39" release="7.uel20.01" epoch="0" arch="x86_64" src="file-5.39-7.uel20.01.src.rpm">
          <filename>file-libs-5.39-7.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="file-devel" version="5.39" release="7.uel20.01" epoch="0" arch="aarch64" src="file-5.39-7.uel20.01.src.rpm">
          <filename>file-devel-5.39-7.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="file" version="5.39" release="7.uel20.01" epoch="0" arch="aarch64" src="file-5.39-7.uel20.01.src.rpm">
          <filename>file-5.39-7.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="python3-magic" version="5.39" release="7.uel20.01" epoch="0" arch="noarch" src="file-5.39-7.uel20.01.src.rpm">
          <filename>python3-magic-5.39-7.uel20.01.noarch.rpm</filename>
        </package>
        <package name="file-help" version="5.39" release="7.uel20.01" epoch="0" arch="aarch64" src="file-5.39-7.uel20.01.src.rpm">
          <filename>file-help-5.39-7.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="file-libs" version="5.39" release="7.uel20.01" epoch="0" arch="aarch64" src="file-5.39-7.uel20.01.src.rpm">
          <filename>file-libs-5.39-7.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="python2-magic" version="5.39" release="7.uel20.01" epoch="0" arch="noarch" src="file-5.39-7.uel20.01.src.rpm">
          <filename>python2-magic-5.39-7.uel20.01.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20197</id>
    <title>Important: clamav security update</title>
    <updated date="2023-08-23 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: clamav security update</summary>
    <description> A vulnerability in the filesystem image parser for Hierarchical File System Plus (HFS+) of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

 This vulnerability is due to an incorrect check for completion when a file is decompressed, which may result in a loop condition that could cause the affected software to stop responding. An attacker could exploit this vulnerability by submitting a crafted HFS+ filesystem image to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to stop responding, resulting in a DoS condition on the affected software and consuming available system resources.

 For a description of this vulnerability, see the ClamAV blog .(CVE-2023-20197)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-20197" type="cve" title="fix CVE-2023-20197" />
    </references>
    <pkglist>
      <collection>
        <package name="clamav" version="0.103.9" release="1.uel20" epoch="0" arch="x86_64" src="clamav-0.103.9-1.uel20.src.rpm">
          <filename>clamav-0.103.9-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="clamav-update" version="0.103.9" release="1.uel20" epoch="0" arch="x86_64" src="clamav-0.103.9-1.uel20.src.rpm">
          <filename>clamav-update-0.103.9-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="clamav-help" version="0.103.9" release="1.uel20" epoch="0" arch="x86_64" src="clamav-0.103.9-1.uel20.src.rpm">
          <filename>clamav-help-0.103.9-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="clamav-devel" version="0.103.9" release="1.uel20" epoch="0" arch="x86_64" src="clamav-0.103.9-1.uel20.src.rpm">
          <filename>clamav-devel-0.103.9-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="clamav-milter" version="0.103.9" release="1.uel20" epoch="0" arch="x86_64" src="clamav-0.103.9-1.uel20.src.rpm">
          <filename>clamav-milter-0.103.9-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="clamd" version="0.103.9" release="1.uel20" epoch="0" arch="x86_64" src="clamav-0.103.9-1.uel20.src.rpm">
          <filename>clamd-0.103.9-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="clamav" version="0.103.9" release="1.uel20" epoch="0" arch="aarch64" src="clamav-0.103.9-1.uel20.src.rpm">
          <filename>clamav-0.103.9-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="clamav-update" version="0.103.9" release="1.uel20" epoch="0" arch="aarch64" src="clamav-0.103.9-1.uel20.src.rpm">
          <filename>clamav-update-0.103.9-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="clamav-milter" version="0.103.9" release="1.uel20" epoch="0" arch="aarch64" src="clamav-0.103.9-1.uel20.src.rpm">
          <filename>clamav-milter-0.103.9-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="clamav-devel" version="0.103.9" release="1.uel20" epoch="0" arch="aarch64" src="clamav-0.103.9-1.uel20.src.rpm">
          <filename>clamav-devel-0.103.9-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="clamav-filesystem" version="0.103.9" release="1.uel20" epoch="0" arch="noarch" src="clamav-0.103.9-1.uel20.src.rpm">
          <filename>clamav-filesystem-0.103.9-1.uel20.noarch.rpm</filename>
        </package>
        <package name="clamd" version="0.103.9" release="1.uel20" epoch="0" arch="aarch64" src="clamav-0.103.9-1.uel20.src.rpm">
          <filename>clamd-0.103.9-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="clamav-data" version="0.103.9" release="1.uel20" epoch="0" arch="noarch" src="clamav-0.103.9-1.uel20.src.rpm">
          <filename>clamav-data-0.103.9-1.uel20.noarch.rpm</filename>
        </package>
        <package name="clamav-help" version="0.103.9" release="1.uel20" epoch="0" arch="aarch64" src="clamav-0.103.9-1.uel20.src.rpm">
          <filename>clamav-help-0.103.9-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20199</id>
    <title>Important: qpdf security update</title>
    <updated date="2023-08-22 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: qpdf security update</summary>
    <description> An issue was discovered in QPDF version 10.0.4, allows remote attackers to execute arbitrary code via crafted .pdf file to Pl_ASCII85Decoder::write parameter in libqpdf.(CVE-2021-25786)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-25786" type="cve" title="fix CVE-2021-25786" />
    </references>
    <pkglist>
      <collection>
        <package name="qpdf" version="8.4.2" release="4.uel20" epoch="0" arch="x86_64" src="qpdf-8.4.2-4.uel20.src.rpm">
          <filename>qpdf-8.4.2-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="qpdf-devel" version="8.4.2" release="4.uel20" epoch="0" arch="x86_64" src="qpdf-8.4.2-4.uel20.src.rpm">
          <filename>qpdf-devel-8.4.2-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="qpdf-devel" version="8.4.2" release="4.uel20" epoch="0" arch="aarch64" src="qpdf-8.4.2-4.uel20.src.rpm">
          <filename>qpdf-devel-8.4.2-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="qpdf" version="8.4.2" release="4.uel20" epoch="0" arch="aarch64" src="qpdf-8.4.2-4.uel20.src.rpm">
          <filename>qpdf-8.4.2-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="qpdf-help" version="8.4.2" release="4.uel20" epoch="0" arch="noarch" src="qpdf-8.4.2-4.uel20.src.rpm">
          <filename>qpdf-help-8.4.2-4.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20205</id>
    <title>Moderate: procps-ng security update</title>
    <updated date="2023-08-21 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: procps-ng security update</summary>
    <description> Under some circumstances, this weakness allows a user who has access to run the “ps” utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.(CVE-2023-4016)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-4016" type="cve" title="fix CVE-2023-4016" />
    </references>
    <pkglist>
      <collection>
        <package name="procps-ng" version="3.3.16" release="19.uel20.01" epoch="0" arch="x86_64" src="procps-ng-3.3.16-19.uel20.01.src.rpm">
          <filename>procps-ng-3.3.16-19.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="procps-ng-devel" version="3.3.16" release="19.uel20.01" epoch="0" arch="x86_64" src="procps-ng-3.3.16-19.uel20.01.src.rpm">
          <filename>procps-ng-devel-3.3.16-19.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="procps-ng-help" version="3.3.16" release="19.uel20.01" epoch="0" arch="noarch" src="procps-ng-3.3.16-19.uel20.01.src.rpm">
          <filename>procps-ng-help-3.3.16-19.uel20.01.noarch.rpm</filename>
        </package>
        <package name="procps-ng-devel" version="3.3.16" release="19.uel20.01" epoch="0" arch="aarch64" src="procps-ng-3.3.16-19.uel20.01.src.rpm">
          <filename>procps-ng-devel-3.3.16-19.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="procps-ng-i18n" version="3.3.16" release="19.uel20.01" epoch="0" arch="noarch" src="procps-ng-3.3.16-19.uel20.01.src.rpm">
          <filename>procps-ng-i18n-3.3.16-19.uel20.01.noarch.rpm</filename>
        </package>
        <package name="procps-ng" version="3.3.16" release="19.uel20.01" epoch="0" arch="aarch64" src="procps-ng-3.3.16-19.uel20.01.src.rpm">
          <filename>procps-ng-3.3.16-19.uel20.01.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20210</id>
    <title>Moderate: xerces-j2 security update</title>
    <updated date="2023-09-06 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: xerces-j2 security update</summary>
    <description> Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).(CVE-2018-2799)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2018-2799" type="cve" title="fix CVE-2018-2799" />
    </references>
    <pkglist>
      <collection>
        <package name="xerces-j2-help" version="2.12.2" release="1.uel20" epoch="0" arch="noarch" src="xerces-j2-2.12.2-1.uel20.src.rpm">
          <filename>xerces-j2-help-2.12.2-1.uel20.noarch.rpm</filename>
        </package>
        <package name="xerces-j2" version="2.12.2" release="1.uel20" epoch="0" arch="noarch" src="xerces-j2-2.12.2-1.uel20.src.rpm">
          <filename>xerces-j2-2.12.2-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20212</id>
    <title>Important: python-werkzeug security update</title>
    <updated date="2023-08-21 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: python-werkzeug security update</summary>
    <description> Werkzeug is a comprehensive WSGI web application library. Prior to version 2.2.3, Werkzeug's multipart form data parser will parse an unlimited number of parts, including file parts. Parts can be a small amount of bytes, but each requires CPU time to parse and may use more memory as Python data. If a request can be made to an endpoint that accesses `request.data`, `request.form`, `request.files`, or `request.get_data(parse_form_data=False)`, it can cause unexpectedly high resource usage. This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. The amount of RAM required can trigger an out of memory kill of the process. Unlimited file parts can use up memory and file handles. If many concurrent requests are sent continuously, this can exhaust or kill all available workers. Version 2.2.3 contains a patch for this issue.(CVE-2023-25577)
 Werkzeug is a comprehensive WSGI web application library. Browsers may allow "nameless" cookies that look like `=value` instead of `key=value`. A vulnerable browser may allow a compromised application on an adjacent subdomain to exploit this to set a cookie like `=__Host-test=bad` for another subdomain. Werkzeug prior to 2.2.3 will parse the cookie `=__Host-test=bad` as __Host-test=bad`. If a Werkzeug application is running next to a vulnerable or malicious subdomain which sets such a cookie using a vulnerable browser, the Werkzeug application will see the bad cookie value but the valid cookie key. The issue is fixed in Werkzeug 2.2.3.(CVE-2023-23934)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-25577" type="cve" title="fix CVE-2023-25577" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-23934" type="cve" title="fix CVE-2023-23934" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-werkzeug-doc" version="1.0.1" release="2.up1.uel20" epoch="0" arch="noarch" src="python-werkzeug-1.0.1-2.up1.uel20.src.rpm">
          <filename>python3-werkzeug-doc-1.0.1-2.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="python3-werkzeug" version="1.0.1" release="2.up1.uel20" epoch="0" arch="noarch" src="python-werkzeug-1.0.1-2.up1.uel20.src.rpm">
          <filename>python3-werkzeug-1.0.1-2.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="python2-werkzeug" version="1.0.1" release="2.up1.uel20" epoch="0" arch="noarch" src="python-werkzeug-1.0.1-2.up1.uel20.src.rpm">
          <filename>python2-werkzeug-1.0.1-2.up1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20213</id>
    <title>Important: snappy-java security update</title>
    <updated date="2023-09-27 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: snappy-java security update</summary>
    <description> snappy-java is a Java port of the snappy, a fast C++ compresser/decompresser developed by Google. The SnappyInputStream was found to be vulnerable to Denial of Service (DoS) attacks when decompressing data with a too large chunk size. Due to missing upper bound check on chunk length, an unrecoverable fatal error can occur. All versions of snappy-java including the latest released version 1.1.10.3 are vulnerable to this issue. A fix has been introduced in commit `9f8c3cf74` which will be included in the 1.1.10.4 release. Users are advised to upgrade. Users unable to upgrade should only accept compressed data from trusted sources.(CVE-2023-43642)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-43642" type="cve" title="fix CVE-2023-43642" />
    </references>
    <pkglist>
      <collection>
        <package name="snappy-java" version="1.1.2.4" release="3.uel20" epoch="0" arch="x86_64" src="snappy-java-1.1.2.4-3.uel20.src.rpm">
          <filename>snappy-java-1.1.2.4-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="snappy-java-javadoc" version="1.1.2.4" release="3.uel20" epoch="0" arch="noarch" src="snappy-java-1.1.2.4-3.uel20.src.rpm">
          <filename>snappy-java-javadoc-1.1.2.4-3.uel20.noarch.rpm</filename>
        </package>
        <package name="snappy-java" version="1.1.2.4" release="3.uel20" epoch="0" arch="aarch64" src="snappy-java-1.1.2.4-3.uel20.src.rpm">
          <filename>snappy-java-1.1.2.4-3.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20215</id>
    <title>Important: cups security update</title>
    <updated date="2023-09-26 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: cups security update</summary>
    <description> Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
(CVE-2023-4504)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-4504" type="cve" title="fix CVE-2023-4504" />
    </references>
    <pkglist>
      <collection>
        <package name="cups" version="2.2.13" release="19.up4.uel20" epoch="1" arch="x86_64" src="cups-2.2.13-19.up4.uel20.src.rpm">
          <filename>cups-2.2.13-19.up4.uel20.x86_64.rpm</filename>
        </package>
        <package name="cups-devel" version="2.2.13" release="19.up4.uel20" epoch="1" arch="x86_64" src="cups-2.2.13-19.up4.uel20.src.rpm">
          <filename>cups-devel-2.2.13-19.up4.uel20.x86_64.rpm</filename>
        </package>
        <package name="cups-libs" version="2.2.13" release="19.up4.uel20" epoch="1" arch="x86_64" src="cups-2.2.13-19.up4.uel20.src.rpm">
          <filename>cups-libs-2.2.13-19.up4.uel20.x86_64.rpm</filename>
        </package>
        <package name="cups" version="2.2.13" release="19.up4.uel20" epoch="1" arch="aarch64" src="cups-2.2.13-19.up4.uel20.src.rpm">
          <filename>cups-2.2.13-19.up4.uel20.aarch64.rpm</filename>
        </package>
        <package name="cups-help" version="2.2.13" release="19.up4.uel20" epoch="1" arch="noarch" src="cups-2.2.13-19.up4.uel20.src.rpm">
          <filename>cups-help-2.2.13-19.up4.uel20.noarch.rpm</filename>
        </package>
        <package name="cups-devel" version="2.2.13" release="19.up4.uel20" epoch="1" arch="aarch64" src="cups-2.2.13-19.up4.uel20.src.rpm">
          <filename>cups-devel-2.2.13-19.up4.uel20.aarch64.rpm</filename>
        </package>
        <package name="cups-libs" version="2.2.13" release="19.up4.uel20" epoch="1" arch="aarch64" src="cups-2.2.13-19.up4.uel20.src.rpm">
          <filename>cups-libs-2.2.13-19.up4.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20219</id>
    <title>None: rubygem-railties security update</title>
    <updated date="2023-09-14 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: rubygem-railties security update</summary>
    <description> ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2023-38037)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-38037" type="cve" title="fix CVE-2023-38037" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-railties-doc" version="5.2.4.4" release="5.uel20" epoch="0" arch="noarch" src="rubygem-railties-5.2.4.4-5.uel20.src.rpm">
          <filename>rubygem-railties-doc-5.2.4.4-5.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-railties" version="5.2.4.4" release="5.uel20" epoch="0" arch="noarch" src="rubygem-railties-5.2.4.4-5.uel20.src.rpm">
          <filename>rubygem-railties-5.2.4.4-5.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20220</id>
    <title>Moderate: mutt security update</title>
    <updated date="2023-09-19 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: mutt security update</summary>
    <description> Null pointer dereference when composing from a specially crafted draft message in Mutt &gt;1.5.2 &lt;2.2.12(CVE-2023-4875)
 Null pointer dereference when viewing a specially crafted email in Mutt &gt;1.5.2 &lt;2.2.12(CVE-2023-4874)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-4875" type="cve" title="fix CVE-2023-4875" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-4874" type="cve" title="fix CVE-2023-4874" />
    </references>
    <pkglist>
      <collection>
        <package name="mutt" version="2.2.12" release="1.uel20" epoch="5" arch="x86_64" src="mutt-2.2.12-1.uel20.src.rpm">
          <filename>mutt-2.2.12-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mutt" version="2.2.12" release="1.uel20" epoch="5" arch="aarch64" src="mutt-2.2.12-1.uel20.src.rpm">
          <filename>mutt-2.2.12-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mutt-help" version="2.2.12" release="1.uel20" epoch="5" arch="noarch" src="mutt-2.2.12-1.uel20.src.rpm">
          <filename>mutt-help-2.2.12-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20221</id>
    <title>Important: pmix security update</title>
    <updated date="2023-09-21 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: pmix security update</summary>
    <description> OpenPMIx PMIx before 4.2.6 and 5.0.x before 5.0.1 allows attackers to obtain ownership of arbitrary files via a race condition during execution of library code with UID 0.(CVE-2023-41915)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-41915" type="cve" title="fix CVE-2023-41915" />
    </references>
    <pkglist>
      <collection>
        <package name="pmix" version="4.2.6" release="1.uel20" epoch="0" arch="x86_64" src="pmix-4.2.6-1.uel20.src.rpm">
          <filename>pmix-4.2.6-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="pmix-tools" version="4.2.6" release="1.uel20" epoch="0" arch="x86_64" src="pmix-4.2.6-1.uel20.src.rpm">
          <filename>pmix-tools-4.2.6-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="pmix-devel" version="4.2.6" release="1.uel20" epoch="0" arch="x86_64" src="pmix-4.2.6-1.uel20.src.rpm">
          <filename>pmix-devel-4.2.6-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="pmix-devel" version="4.2.6" release="1.uel20" epoch="0" arch="aarch64" src="pmix-4.2.6-1.uel20.src.rpm">
          <filename>pmix-devel-4.2.6-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="pmix" version="4.2.6" release="1.uel20" epoch="0" arch="aarch64" src="pmix-4.2.6-1.uel20.src.rpm">
          <filename>pmix-4.2.6-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="pmix-tools" version="4.2.6" release="1.uel20" epoch="0" arch="aarch64" src="pmix-4.2.6-1.uel20.src.rpm">
          <filename>pmix-tools-4.2.6-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20224</id>
    <title>Critical: libtommath security update</title>
    <updated date="2023-09-11 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: libtommath security update</summary>
    <description> Integer Overflow vulnerability in mp_grow in libtom libtommath before commit beba892bc0d4e4ded4d667ab1d2a94f4d75109a9, allows attackers to execute arbitrary code and cause a denial of service (DoS).(CVE-2023-36328)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-36328" type="cve" title="fix CVE-2023-36328" />
    </references>
    <pkglist>
      <collection>
        <package name="libtommath-devel" version="1.1.0" release="4.uel20" epoch="0" arch="x86_64" src="libtommath-1.1.0-4.uel20.src.rpm">
          <filename>libtommath-devel-1.1.0-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="libtommath-help" version="1.1.0" release="4.uel20" epoch="0" arch="x86_64" src="libtommath-1.1.0-4.uel20.src.rpm">
          <filename>libtommath-help-1.1.0-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="libtommath" version="1.1.0" release="4.uel20" epoch="0" arch="x86_64" src="libtommath-1.1.0-4.uel20.src.rpm">
          <filename>libtommath-1.1.0-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="libtommath-help" version="1.1.0" release="4.uel20" epoch="0" arch="aarch64" src="libtommath-1.1.0-4.uel20.src.rpm">
          <filename>libtommath-help-1.1.0-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="libtommath" version="1.1.0" release="4.uel20" epoch="0" arch="aarch64" src="libtommath-1.1.0-4.uel20.src.rpm">
          <filename>libtommath-1.1.0-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="libtommath-devel" version="1.1.0" release="4.uel20" epoch="0" arch="aarch64" src="libtommath-1.1.0-4.uel20.src.rpm">
          <filename>libtommath-devel-1.1.0-4.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20229</id>
    <title>Moderate: giflib security update</title>
    <updated date="2023-09-18 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: giflib security update</summary>
    <description> giflib v5.2.1 was discovered to contain a segmentation fault via the component getarg.c.(CVE-2023-39742)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-39742" type="cve" title="fix CVE-2023-39742" />
    </references>
    <pkglist>
      <collection>
        <package name="giflib-devel" version="5.2.1" release="4.uel20" epoch="0" arch="x86_64" src="giflib-5.2.1-4.uel20.src.rpm">
          <filename>giflib-devel-5.2.1-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="giflib" version="5.2.1" release="4.uel20" epoch="0" arch="x86_64" src="giflib-5.2.1-4.uel20.src.rpm">
          <filename>giflib-5.2.1-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="giflib-utils" version="5.2.1" release="4.uel20" epoch="0" arch="x86_64" src="giflib-5.2.1-4.uel20.src.rpm">
          <filename>giflib-utils-5.2.1-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="giflib-utils" version="5.2.1" release="4.uel20" epoch="0" arch="aarch64" src="giflib-5.2.1-4.uel20.src.rpm">
          <filename>giflib-utils-5.2.1-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="giflib-help" version="5.2.1" release="4.uel20" epoch="0" arch="noarch" src="giflib-5.2.1-4.uel20.src.rpm">
          <filename>giflib-help-5.2.1-4.uel20.noarch.rpm</filename>
        </package>
        <package name="giflib" version="5.2.1" release="4.uel20" epoch="0" arch="aarch64" src="giflib-5.2.1-4.uel20.src.rpm">
          <filename>giflib-5.2.1-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="giflib-devel" version="5.2.1" release="4.uel20" epoch="0" arch="aarch64" src="giflib-5.2.1-4.uel20.src.rpm">
          <filename>giflib-devel-5.2.1-4.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20234</id>
    <title>None: rubygem-activesupport security update</title>
    <updated date="2023-09-14 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: rubygem-activesupport security update</summary>
    <description> ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2023-38037)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-38037" type="cve" title="fix CVE-2023-38037" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-activesupport-doc" version="5.2.4.4" release="3.uel20" epoch="2" arch="noarch" src="rubygem-activesupport-5.2.4.4-3.uel20.src.rpm">
          <filename>rubygem-activesupport-doc-5.2.4.4-3.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-activesupport" version="5.2.4.4" release="3.uel20" epoch="2" arch="noarch" src="rubygem-activesupport-5.2.4.4-3.uel20.src.rpm">
          <filename>rubygem-activesupport-5.2.4.4-3.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20236</id>
    <title>Critical: busybox security update</title>
    <updated date="2023-09-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: busybox security update</summary>
    <description> There is a stack overflow vulnerability in ash.c:6030 in busybox before 1.35. In the environment of Internet of Vehicles, this vulnerability can be executed from command to arbitrary code execution.(CVE-2022-48174)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-48174" type="cve" title="fix CVE-2022-48174" />
    </references>
    <pkglist>
      <collection>
        <package name="busybox-petitboot" version="1.31.1" release="19.uel20" epoch="1" arch="x86_64" src="busybox-1.31.1-19.uel20.src.rpm">
          <filename>busybox-petitboot-1.31.1-19.uel20.x86_64.rpm</filename>
        </package>
        <package name="busybox" version="1.31.1" release="19.uel20" epoch="1" arch="x86_64" src="busybox-1.31.1-19.uel20.src.rpm">
          <filename>busybox-1.31.1-19.uel20.x86_64.rpm</filename>
        </package>
        <package name="busybox-help" version="1.31.1" release="19.uel20" epoch="1" arch="x86_64" src="busybox-1.31.1-19.uel20.src.rpm">
          <filename>busybox-help-1.31.1-19.uel20.x86_64.rpm</filename>
        </package>
        <package name="busybox" version="1.31.1" release="19.uel20" epoch="1" arch="aarch64" src="busybox-1.31.1-19.uel20.src.rpm">
          <filename>busybox-1.31.1-19.uel20.aarch64.rpm</filename>
        </package>
        <package name="busybox-petitboot" version="1.31.1" release="19.uel20" epoch="1" arch="aarch64" src="busybox-1.31.1-19.uel20.src.rpm">
          <filename>busybox-petitboot-1.31.1-19.uel20.aarch64.rpm</filename>
        </package>
        <package name="busybox-help" version="1.31.1" release="19.uel20" epoch="1" arch="aarch64" src="busybox-1.31.1-19.uel20.src.rpm">
          <filename>busybox-help-1.31.1-19.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20237</id>
    <title>Important: batik security update</title>
    <updated date="2023-09-12 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: batik security update</summary>
    <description> Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache XML Graphics Batik.This issue affects Apache XML Graphics Batik: 1.16.

A malicious SVG can probe user profile / data and send it directly as parameter to a URL.

(CVE-2022-44730)
 Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache XML Graphics Batik.This issue affects Apache XML Graphics Batik: 1.16.

On version 1.16, a malicious SVG could trigger loading external resources by default, causing resource consumption or in some cases even information disclosure. Users are recommended to upgrade to version 1.17 or later.

(CVE-2022-44729)
 Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to access files using a Jar url. This issue affects Apache XML Graphics Batik 1.14.(CVE-2022-40146)
 Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to fetch external resources. This issue affects Apache XML Graphics Batik 1.14.(CVE-2022-38648)
 Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to load a url thru the jar protocol. This issue affects Apache XML Graphics Batik 1.14.(CVE-2022-38398)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-44730" type="cve" title="fix CVE-2022-44730" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-44729" type="cve" title="fix CVE-2022-44729" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-40146" type="cve" title="fix CVE-2022-40146" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-38648" type="cve" title="fix CVE-2022-38648" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-38398" type="cve" title="fix CVE-2022-38398" />
    </references>
    <pkglist>
      <collection>
        <package name="batik" version="1.17" release="1.uel20" epoch="0" arch="noarch" src="batik-1.17-1.uel20.src.rpm">
          <filename>batik-1.17-1.uel20.noarch.rpm</filename>
        </package>
        <package name="batik-help" version="1.17" release="1.uel20" epoch="0" arch="noarch" src="batik-1.17-1.uel20.src.rpm">
          <filename>batik-help-1.17-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20239</id>
    <title>Critical: json-c security update</title>
    <updated date="2023-09-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: json-c security update</summary>
    <description> An issue was discovered in json-c from 20200420 (post 0.14 unreleased code) through 0.15-20200726. A stack-buffer-overflow exists in the auxiliary sample program json_parse which is located in the function parseit.(CVE-2021-32292)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-32292" type="cve" title="fix CVE-2021-32292" />
    </references>
    <pkglist>
      <collection>
        <package name="json-c" version="0.15" release="6.uel20.01" epoch="0" arch="x86_64" src="json-c-0.15-6.uel20.01.src.rpm">
          <filename>json-c-0.15-6.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="json-c-devel" version="0.15" release="6.uel20.01" epoch="0" arch="x86_64" src="json-c-0.15-6.uel20.01.src.rpm">
          <filename>json-c-devel-0.15-6.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="json-c" version="0.15" release="6.uel20.01" epoch="0" arch="aarch64" src="json-c-0.15-6.uel20.01.src.rpm">
          <filename>json-c-0.15-6.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="json-c-devel" version="0.15" release="6.uel20.01" epoch="0" arch="aarch64" src="json-c-0.15-6.uel20.01.src.rpm">
          <filename>json-c-devel-0.15-6.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="json-c-help" version="0.15" release="6.uel20.01" epoch="0" arch="noarch" src="json-c-0.15-6.uel20.01.src.rpm">
          <filename>json-c-help-0.15-6.uel20.01.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20240</id>
    <title>Important: flac security update</title>
    <updated date="2023-09-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: flac security update</summary>
    <description> Buffer Overflow vulnerability in function bitwriter_grow_ in flac before 1.4.0 allows remote attackers to run arbitrary code via crafted input to the encoder.(CVE-2020-22219)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-22219" type="cve" title="fix CVE-2020-22219" />
    </references>
    <pkglist>
      <collection>
        <package name="flac-devel" version="1.3.3" release="7.uel20" epoch="0" arch="x86_64" src="flac-1.3.3-7.uel20.src.rpm">
          <filename>flac-devel-1.3.3-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="flac" version="1.3.3" release="7.uel20" epoch="0" arch="x86_64" src="flac-1.3.3-7.uel20.src.rpm">
          <filename>flac-1.3.3-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="xmms-flac" version="1.3.3" release="7.uel20" epoch="0" arch="x86_64" src="flac-1.3.3-7.uel20.src.rpm">
          <filename>xmms-flac-1.3.3-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="flac-help" version="1.3.3" release="7.uel20" epoch="0" arch="x86_64" src="flac-1.3.3-7.uel20.src.rpm">
          <filename>flac-help-1.3.3-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="flac-help" version="1.3.3" release="7.uel20" epoch="0" arch="aarch64" src="flac-1.3.3-7.uel20.src.rpm">
          <filename>flac-help-1.3.3-7.uel20.aarch64.rpm</filename>
        </package>
        <package name="xmms-flac" version="1.3.3" release="7.uel20" epoch="0" arch="aarch64" src="flac-1.3.3-7.uel20.src.rpm">
          <filename>xmms-flac-1.3.3-7.uel20.aarch64.rpm</filename>
        </package>
        <package name="flac-devel" version="1.3.3" release="7.uel20" epoch="0" arch="aarch64" src="flac-1.3.3-7.uel20.src.rpm">
          <filename>flac-devel-1.3.3-7.uel20.aarch64.rpm</filename>
        </package>
        <package name="flac" version="1.3.3" release="7.uel20" epoch="0" arch="aarch64" src="flac-1.3.3-7.uel20.src.rpm">
          <filename>flac-1.3.3-7.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20241</id>
    <title>Moderate: nasm security update</title>
    <updated date="2023-09-19 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: nasm security update</summary>
    <description> A Segmentation Fault issue discovered in in ieee_segment function in outieee.c in nasm 2.14.03 and 2.15 allows remote attackers to cause a denial of service via crafted assembly file.(CVE-2020-21528)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-21528" type="cve" title="fix CVE-2020-21528" />
    </references>
    <pkglist>
      <collection>
        <package name="nasm" version="2.15.03" release="7.uel20" epoch="0" arch="x86_64" src="nasm-2.15.03-7.uel20.src.rpm">
          <filename>nasm-2.15.03-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="nasm" version="2.15.03" release="7.uel20" epoch="0" arch="aarch64" src="nasm-2.15.03-7.uel20.src.rpm">
          <filename>nasm-2.15.03-7.uel20.aarch64.rpm</filename>
        </package>
        <package name="nasm-help" version="2.15.03" release="7.uel20" epoch="0" arch="noarch" src="nasm-2.15.03-7.uel20.src.rpm">
          <filename>nasm-help-2.15.03-7.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20245</id>
    <title>Moderate: hyperscan security update</title>
    <updated date="2023-09-05 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: hyperscan security update</summary>
    <description> Insufficient control flow management in the Hyperscan Library maintained by Intel(R) before version 5.4.1 may allow an authenticated user to potentially enable denial of service via local access.(CVE-2023-28711)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-28711" type="cve" title="fix CVE-2023-28711" />
    </references>
    <pkglist>
      <collection>
        <package name="hyperscan" version="5.4.2" release="1.uel20" epoch="0" arch="x86_64" src="hyperscan-5.4.2-1.uel20.src.rpm">
          <filename>hyperscan-5.4.2-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="hyperscan-devel" version="5.4.2" release="1.uel20" epoch="0" arch="x86_64" src="hyperscan-5.4.2-1.uel20.src.rpm">
          <filename>hyperscan-devel-5.4.2-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="hyperscan-devel" version="5.4.2" release="1.uel20" epoch="0" arch="aarch64" src="hyperscan-5.4.2-1.uel20.src.rpm">
          <filename>hyperscan-devel-5.4.2-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="hyperscan" version="5.4.2" release="1.uel20" epoch="0" arch="aarch64" src="hyperscan-5.4.2-1.uel20.src.rpm">
          <filename>hyperscan-5.4.2-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20247</id>
    <title>Important: gawk security update</title>
    <updated date="2023-09-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: gawk security update</summary>
    <description> A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.(CVE-2023-4156)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-4156" type="cve" title="fix CVE-2023-4156" />
    </references>
    <pkglist>
      <collection>
        <package name="gawk-lang" version="5.0.1" release="5.uel20.01" epoch="0" arch="x86_64" src="gawk-5.0.1-5.uel20.01.src.rpm">
          <filename>gawk-lang-5.0.1-5.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="gawk" version="5.0.1" release="5.uel20.01" epoch="0" arch="x86_64" src="gawk-5.0.1-5.uel20.01.src.rpm">
          <filename>gawk-5.0.1-5.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="gawk-devel" version="5.0.1" release="5.uel20.01" epoch="0" arch="x86_64" src="gawk-5.0.1-5.uel20.01.src.rpm">
          <filename>gawk-devel-5.0.1-5.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="gawk-help" version="5.0.1" release="5.uel20.01" epoch="0" arch="noarch" src="gawk-5.0.1-5.uel20.01.src.rpm">
          <filename>gawk-help-5.0.1-5.uel20.01.noarch.rpm</filename>
        </package>
        <package name="gawk" version="5.0.1" release="5.uel20.01" epoch="0" arch="aarch64" src="gawk-5.0.1-5.uel20.01.src.rpm">
          <filename>gawk-5.0.1-5.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="gawk-devel" version="5.0.1" release="5.uel20.01" epoch="0" arch="aarch64" src="gawk-5.0.1-5.uel20.01.src.rpm">
          <filename>gawk-devel-5.0.1-5.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="gawk-lang" version="5.0.1" release="5.uel20.01" epoch="0" arch="aarch64" src="gawk-5.0.1-5.uel20.01.src.rpm">
          <filename>gawk-lang-5.0.1-5.uel20.01.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20250</id>
    <title>Moderate: librsvg2 security update</title>
    <updated date="2023-09-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: librsvg2 security update</summary>
    <description> A directory traversal problem in the URL decoder of librsvg before 2.56.3 could be used by local or remote attackers to disclose files (on the local filesystem outside of the expected area), as demonstrated by href=".?../../../../../../../../../../etc/passwd" in an xi:include element.(CVE-2023-38633)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-38633" type="cve" title="fix CVE-2023-38633" />
    </references>
    <pkglist>
      <collection>
        <package name="librsvg2-devel" version="2.50.5" release="2.uel20" epoch="0" arch="x86_64" src="librsvg2-2.50.5-2.uel20.src.rpm">
          <filename>librsvg2-devel-2.50.5-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="librsvg2-tools" version="2.50.5" release="2.uel20" epoch="0" arch="x86_64" src="librsvg2-2.50.5-2.uel20.src.rpm">
          <filename>librsvg2-tools-2.50.5-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="librsvg2" version="2.50.5" release="2.uel20" epoch="0" arch="x86_64" src="librsvg2-2.50.5-2.uel20.src.rpm">
          <filename>librsvg2-2.50.5-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="librsvg2-tools" version="2.50.5" release="2.uel20" epoch="0" arch="aarch64" src="librsvg2-2.50.5-2.uel20.src.rpm">
          <filename>librsvg2-tools-2.50.5-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="librsvg2-devel" version="2.50.5" release="2.uel20" epoch="0" arch="aarch64" src="librsvg2-2.50.5-2.uel20.src.rpm">
          <filename>librsvg2-devel-2.50.5-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="librsvg2" version="2.50.5" release="2.uel20" epoch="0" arch="aarch64" src="librsvg2-2.50.5-2.uel20.src.rpm">
          <filename>librsvg2-2.50.5-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="librsvg2-help" version="2.50.5" release="2.uel20" epoch="0" arch="noarch" src="librsvg2-2.50.5-2.uel20.src.rpm">
          <filename>librsvg2-help-2.50.5-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20253</id>
    <title>Important: ctags security update</title>
    <updated date="2023-09-22 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: ctags security update</summary>
    <description> A flaw was found in Exuberant Ctags in the way it handles the "-o" option. This option specifies the tag filename. A crafted tag filename specified in the command line or in the configuration file results in arbitrary command execution because the externalSortTags() in sort.c calls the system(3) function in an unsafe way.(CVE-2022-4515)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-4515" type="cve" title="fix CVE-2022-4515" />
    </references>
    <pkglist>
      <collection>
        <package name="ctags" version="5.8" release="28.uel20" epoch="0" arch="x86_64" src="ctags-5.8-28.uel20.src.rpm">
          <filename>ctags-5.8-28.uel20.x86_64.rpm</filename>
        </package>
        <package name="ctags" version="5.8" release="28.uel20" epoch="0" arch="aarch64" src="ctags-5.8-28.uel20.src.rpm">
          <filename>ctags-5.8-28.uel20.aarch64.rpm</filename>
        </package>
        <package name="ctags-help" version="5.8" release="28.uel20" epoch="0" arch="noarch" src="ctags-5.8-28.uel20.src.rpm">
          <filename>ctags-help-5.8-28.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20254</id>
    <title>Important: python-mako security update</title>
    <updated date="2023-09-25 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: python-mako security update</summary>
    <description> Sqlalchemy mako before 1.2.2 is vulnerable to Regular expression Denial of Service when using the Lexer class to parse. This also affects babelplugin and linguaplugin.(CVE-2022-40023)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-40023" type="cve" title="fix CVE-2022-40023" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-mako" version="1.0.6" release="14.uel20" epoch="0" arch="noarch" src="python-mako-1.0.6-14.uel20.src.rpm">
          <filename>python3-mako-1.0.6-14.uel20.noarch.rpm</filename>
        </package>
        <package name="python2-mako" version="1.0.6" release="14.uel20" epoch="0" arch="noarch" src="python-mako-1.0.6-14.uel20.src.rpm">
          <filename>python2-mako-1.0.6-14.uel20.noarch.rpm</filename>
        </package>
        <package name="python-mako-help" version="1.0.6" release="14.uel20" epoch="0" arch="noarch" src="python-mako-1.0.6-14.uel20.src.rpm">
          <filename>python-mako-help-1.0.6-14.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20255</id>
    <title>Moderate: libxpm security update</title>
    <updated date="2023-10-20 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: libxpm security update</summary>
    <description> A vulnerability was found in libXpm where a vulnerability exists due to a boundary condition, a local user can trigger an out-of-bounds read error and read contents of memory on the system.(CVE-2023-43789)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-43789" type="cve" title="fix CVE-2023-43789" />
    </references>
    <pkglist>
      <collection>
        <package name="libXpm" version="3.5.13" release="3.uel20" epoch="0" arch="x86_64" src="libXpm-3.5.13-3.uel20.src.rpm">
          <filename>libXpm-3.5.13-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="libXpm-devel" version="3.5.13" release="3.uel20" epoch="0" arch="x86_64" src="libXpm-3.5.13-3.uel20.src.rpm">
          <filename>libXpm-devel-3.5.13-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="libXpm" version="3.5.13" release="3.uel20" epoch="0" arch="aarch64" src="libXpm-3.5.13-3.uel20.src.rpm">
          <filename>libXpm-3.5.13-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="libXpm-help" version="3.5.13" release="3.uel20" epoch="0" arch="noarch" src="libXpm-3.5.13-3.uel20.src.rpm">
          <filename>libXpm-help-3.5.13-3.uel20.noarch.rpm</filename>
        </package>
        <package name="libXpm-devel" version="3.5.13" release="3.uel20" epoch="0" arch="aarch64" src="libXpm-3.5.13-3.uel20.src.rpm">
          <filename>libXpm-devel-3.5.13-3.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20256</id>
    <title>Important: libx11 security update</title>
    <updated date="2023-10-16 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: libx11 security update</summary>
    <description> A vulnerability was found in libX11 due to an integer overflow within the XCreateImage() function. This flaw allows a local user to trigger an integer overflow and execute arbitrary code with elevated privileges.(CVE-2023-43787)
 A vulnerability was found in libX11 due to an infinite loop within the PutSubImage() function. This flaw allows a local user to consume all available system resources and cause a denial of service condition.(CVE-2023-43786)
 A vulnerability was found in libX11 due to a boundary condition within the _XkbReadKeySyms() function. This flaw allows a local user to trigger an out-of-bounds read error and read the contents of memory on the system.(CVE-2023-43785)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-43787" type="cve" title="fix CVE-2023-43787" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-43786" type="cve" title="fix CVE-2023-43786" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-43785" type="cve" title="fix CVE-2023-43785" />
    </references>
    <pkglist>
      <collection>
        <package name="libX11" version="1.6.9" release="8.uel20" epoch="0" arch="x86_64" src="libX11-1.6.9-8.uel20.src.rpm">
          <filename>libX11-1.6.9-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="libX11-devel" version="1.6.9" release="8.uel20" epoch="0" arch="x86_64" src="libX11-1.6.9-8.uel20.src.rpm">
          <filename>libX11-devel-1.6.9-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="libX11" version="1.6.9" release="8.uel20" epoch="0" arch="aarch64" src="libX11-1.6.9-8.uel20.src.rpm">
          <filename>libX11-1.6.9-8.uel20.aarch64.rpm</filename>
        </package>
        <package name="libX11-help" version="1.6.9" release="8.uel20" epoch="0" arch="noarch" src="libX11-1.6.9-8.uel20.src.rpm">
          <filename>libX11-help-1.6.9-8.uel20.noarch.rpm</filename>
        </package>
        <package name="libX11-devel" version="1.6.9" release="8.uel20" epoch="0" arch="aarch64" src="libX11-1.6.9-8.uel20.src.rpm">
          <filename>libX11-devel-1.6.9-8.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20267</id>
    <title>Important: libvpx security update</title>
    <updated date="2023-10-16 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: libvpx security update</summary>
    <description> VP9 in libvpx before 1.13.1 mishandles widths, leading to a crash related to encoding.(CVE-2023-44488)
 Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)(CVE-2023-5217)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-44488" type="cve" title="fix CVE-2023-44488" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-5217" type="cve" title="fix CVE-2023-5217" />
    </references>
    <pkglist>
      <collection>
        <package name="libvpx-devel" version="1.7.0" release="10.uel20" epoch="0" arch="x86_64" src="libvpx-1.7.0-10.uel20.src.rpm">
          <filename>libvpx-devel-1.7.0-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvpx" version="1.7.0" release="10.uel20" epoch="0" arch="x86_64" src="libvpx-1.7.0-10.uel20.src.rpm">
          <filename>libvpx-1.7.0-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvpx-devel" version="1.7.0" release="10.uel20" epoch="0" arch="aarch64" src="libvpx-1.7.0-10.uel20.src.rpm">
          <filename>libvpx-devel-1.7.0-10.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvpx" version="1.7.0" release="10.uel20" epoch="0" arch="aarch64" src="libvpx-1.7.0-10.uel20.src.rpm">
          <filename>libvpx-1.7.0-10.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20270</id>
    <title>Important: bind security update</title>
    <updated date="2023-10-09 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: bind security update</summary>
    <description> The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing `named` to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel's configured TCP port is necessary.
This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.(CVE-2023-3341)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-3341" type="cve" title="fix CVE-2023-3341" />
    </references>
    <pkglist>
      <collection>
        <package name="bind" version="9.11.21" release="18.uel20" epoch="32" arch="x86_64" src="bind-9.11.21-18.uel20.src.rpm">
          <filename>bind-9.11.21-18.uel20.x86_64.rpm</filename>
        </package>
        <package name="bind-export-libs" version="9.11.21" release="18.uel20" epoch="32" arch="x86_64" src="bind-9.11.21-18.uel20.src.rpm">
          <filename>bind-export-libs-9.11.21-18.uel20.x86_64.rpm</filename>
        </package>
        <package name="bind-pkcs11" version="9.11.21" release="18.uel20" epoch="32" arch="x86_64" src="bind-9.11.21-18.uel20.src.rpm">
          <filename>bind-pkcs11-9.11.21-18.uel20.x86_64.rpm</filename>
        </package>
        <package name="bind-export-devel" version="9.11.21" release="18.uel20" epoch="32" arch="x86_64" src="bind-9.11.21-18.uel20.src.rpm">
          <filename>bind-export-devel-9.11.21-18.uel20.x86_64.rpm</filename>
        </package>
        <package name="bind-devel" version="9.11.21" release="18.uel20" epoch="32" arch="x86_64" src="bind-9.11.21-18.uel20.src.rpm">
          <filename>bind-devel-9.11.21-18.uel20.x86_64.rpm</filename>
        </package>
        <package name="bind-utils" version="9.11.21" release="18.uel20" epoch="32" arch="x86_64" src="bind-9.11.21-18.uel20.src.rpm">
          <filename>bind-utils-9.11.21-18.uel20.x86_64.rpm</filename>
        </package>
        <package name="bind-libs" version="9.11.21" release="18.uel20" epoch="32" arch="x86_64" src="bind-9.11.21-18.uel20.src.rpm">
          <filename>bind-libs-9.11.21-18.uel20.x86_64.rpm</filename>
        </package>
        <package name="bind-chroot" version="9.11.21" release="18.uel20" epoch="32" arch="x86_64" src="bind-9.11.21-18.uel20.src.rpm">
          <filename>bind-chroot-9.11.21-18.uel20.x86_64.rpm</filename>
        </package>
        <package name="bind-pkcs11-devel" version="9.11.21" release="18.uel20" epoch="32" arch="x86_64" src="bind-9.11.21-18.uel20.src.rpm">
          <filename>bind-pkcs11-devel-9.11.21-18.uel20.x86_64.rpm</filename>
        </package>
        <package name="bind-libs-lite" version="9.11.21" release="18.uel20" epoch="32" arch="x86_64" src="bind-9.11.21-18.uel20.src.rpm">
          <filename>bind-libs-lite-9.11.21-18.uel20.x86_64.rpm</filename>
        </package>
        <package name="bind-devel" version="9.11.21" release="18.uel20" epoch="32" arch="aarch64" src="bind-9.11.21-18.uel20.src.rpm">
          <filename>bind-devel-9.11.21-18.uel20.aarch64.rpm</filename>
        </package>
        <package name="bind" version="9.11.21" release="18.uel20" epoch="32" arch="aarch64" src="bind-9.11.21-18.uel20.src.rpm">
          <filename>bind-9.11.21-18.uel20.aarch64.rpm</filename>
        </package>
        <package name="bind-export-devel" version="9.11.21" release="18.uel20" epoch="32" arch="aarch64" src="bind-9.11.21-18.uel20.src.rpm">
          <filename>bind-export-devel-9.11.21-18.uel20.aarch64.rpm</filename>
        </package>
        <package name="bind-libs" version="9.11.21" release="18.uel20" epoch="32" arch="aarch64" src="bind-9.11.21-18.uel20.src.rpm">
          <filename>bind-libs-9.11.21-18.uel20.aarch64.rpm</filename>
        </package>
        <package name="bind-pkcs11" version="9.11.21" release="18.uel20" epoch="32" arch="aarch64" src="bind-9.11.21-18.uel20.src.rpm">
          <filename>bind-pkcs11-9.11.21-18.uel20.aarch64.rpm</filename>
        </package>
        <package name="bind-utils" version="9.11.21" release="18.uel20" epoch="32" arch="aarch64" src="bind-9.11.21-18.uel20.src.rpm">
          <filename>bind-utils-9.11.21-18.uel20.aarch64.rpm</filename>
        </package>
        <package name="bind-chroot" version="9.11.21" release="18.uel20" epoch="32" arch="aarch64" src="bind-9.11.21-18.uel20.src.rpm">
          <filename>bind-chroot-9.11.21-18.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-bind" version="9.11.21" release="18.uel20" epoch="32" arch="noarch" src="bind-9.11.21-18.uel20.src.rpm">
          <filename>python3-bind-9.11.21-18.uel20.noarch.rpm</filename>
        </package>
        <package name="bind-export-libs" version="9.11.21" release="18.uel20" epoch="32" arch="aarch64" src="bind-9.11.21-18.uel20.src.rpm">
          <filename>bind-export-libs-9.11.21-18.uel20.aarch64.rpm</filename>
        </package>
        <package name="bind-libs-lite" version="9.11.21" release="18.uel20" epoch="32" arch="aarch64" src="bind-9.11.21-18.uel20.src.rpm">
          <filename>bind-libs-lite-9.11.21-18.uel20.aarch64.rpm</filename>
        </package>
        <package name="bind-pkcs11-devel" version="9.11.21" release="18.uel20" epoch="32" arch="aarch64" src="bind-9.11.21-18.uel20.src.rpm">
          <filename>bind-pkcs11-devel-9.11.21-18.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20273</id>
    <title>Moderate: djvulibre security update</title>
    <updated date="2023-10-16 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: djvulibre security update</summary>
    <description> An issue was discovered IW44EncodeCodec.cpp in djvulibre 3.5.28 in allows attackers to cause a denial of service via divide by zero.(CVE-2021-46312)
 An issue was discovered IW44Image.cpp in djvulibre 3.5.28 in allows attackers to cause a denial of service via divide by zero.(CVE-2021-46310)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-46312" type="cve" title="fix CVE-2021-46312" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-46310" type="cve" title="fix CVE-2021-46310" />
    </references>
    <pkglist>
      <collection>
        <package name="djvulibre-devel" version="3.5.27" release="20.uel20" epoch="0" arch="x86_64" src="djvulibre-3.5.27-20.uel20.src.rpm">
          <filename>djvulibre-devel-3.5.27-20.uel20.x86_64.rpm</filename>
        </package>
        <package name="djvulibre" version="3.5.27" release="20.uel20" epoch="0" arch="x86_64" src="djvulibre-3.5.27-20.uel20.src.rpm">
          <filename>djvulibre-3.5.27-20.uel20.x86_64.rpm</filename>
        </package>
        <package name="djvulibre-help" version="3.5.27" release="20.uel20" epoch="0" arch="x86_64" src="djvulibre-3.5.27-20.uel20.src.rpm">
          <filename>djvulibre-help-3.5.27-20.uel20.x86_64.rpm</filename>
        </package>
        <package name="djvulibre-help" version="3.5.27" release="20.uel20" epoch="0" arch="aarch64" src="djvulibre-3.5.27-20.uel20.src.rpm">
          <filename>djvulibre-help-3.5.27-20.uel20.aarch64.rpm</filename>
        </package>
        <package name="djvulibre-devel" version="3.5.27" release="20.uel20" epoch="0" arch="aarch64" src="djvulibre-3.5.27-20.uel20.src.rpm">
          <filename>djvulibre-devel-3.5.27-20.uel20.aarch64.rpm</filename>
        </package>
        <package name="djvulibre" version="3.5.27" release="20.uel20" epoch="0" arch="aarch64" src="djvulibre-3.5.27-20.uel20.src.rpm">
          <filename>djvulibre-3.5.27-20.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20275</id>
    <title>Moderate: exempi security update</title>
    <updated date="2023-10-16 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: exempi security update</summary>
    <description> Buffer Overflow vulnerability in WEBP_Support.cpp in exempi 2.5.0 and earlier allows remote attackers to cause a denial of service via opening of crafted webp file.(CVE-2020-18652)
 Buffer Overflow vulnerability in function ID3_Support::ID3v2Frame::getFrameValue in exempi 2.5.0 and earlier allows remote attackers to cause a denial of service via opening of crafted audio file with ID3V2 frame.(CVE-2020-18651)
 XMP Toolkit version 2020.1 (and earlier) is affected by a null pointer dereference vulnerability that could result in leaking data from certain memory locations and causing a local denial of service in the context of the current user. User interaction is required to exploit this vulnerability in that the victim will need to open a specially crafted MXF file.(CVE-2021-40732)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-18652" type="cve" title="fix CVE-2020-18652" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-18651" type="cve" title="fix CVE-2020-18651" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-40732" type="cve" title="fix CVE-2021-40732" />
    </references>
    <pkglist>
      <collection>
        <package name="exempi-devel" version="2.4.5" release="5.uel20" epoch="0" arch="x86_64" src="exempi-2.4.5-5.uel20.src.rpm">
          <filename>exempi-devel-2.4.5-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="exempi" version="2.4.5" release="5.uel20" epoch="0" arch="x86_64" src="exempi-2.4.5-5.uel20.src.rpm">
          <filename>exempi-2.4.5-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="exempi-help" version="2.4.5" release="5.uel20" epoch="0" arch="x86_64" src="exempi-2.4.5-5.uel20.src.rpm">
          <filename>exempi-help-2.4.5-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="exempi" version="2.4.5" release="5.uel20" epoch="0" arch="aarch64" src="exempi-2.4.5-5.uel20.src.rpm">
          <filename>exempi-2.4.5-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="exempi-devel" version="2.4.5" release="5.uel20" epoch="0" arch="aarch64" src="exempi-2.4.5-5.uel20.src.rpm">
          <filename>exempi-devel-2.4.5-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="exempi-help" version="2.4.5" release="5.uel20" epoch="0" arch="aarch64" src="exempi-2.4.5-5.uel20.src.rpm">
          <filename>exempi-help-2.4.5-5.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20279</id>
    <title>Critical: traceroute security update</title>
    <updated date="2023-11-02 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: traceroute security update</summary>
    <description> In buc Traceroute 2.0.12 through 2.1.2 before 2.1.3, the wrapper scripts do not properly parse command lines.(CVE-2023-46316)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-46316" type="cve" title="fix CVE-2023-46316" />
    </references>
    <pkglist>
      <collection>
        <package name="traceroute" version="2.1.2" release="2.uel20" epoch="3" arch="x86_64" src="traceroute-2.1.2-2.uel20.src.rpm">
          <filename>traceroute-2.1.2-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="traceroute" version="2.1.2" release="2.uel20" epoch="3" arch="aarch64" src="traceroute-2.1.2-2.uel20.src.rpm">
          <filename>traceroute-2.1.2-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="traceroute-help" version="2.1.2" release="2.uel20" epoch="3" arch="noarch" src="traceroute-2.1.2-2.uel20.src.rpm">
          <filename>traceroute-help-2.1.2-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20280</id>
    <title>Important: httpd security update</title>
    <updated date="2023-11-07 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: httpd security update</summary>
    <description> When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that.

This was found by the reporter during testing of CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During "normal" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out.

Users are recommended to upgrade to version 2.4.58, which fixes the issue.
(CVE-2023-45802)
 Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.

(CVE-2023-31122)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-45802" type="cve" title="fix CVE-2023-45802" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-31122" type="cve" title="fix CVE-2023-31122" />
    </references>
    <pkglist>
      <collection>
        <package name="mod_proxy_html" version="2.4.43" release="23.up1.uel20" epoch="1" arch="x86_64" src="httpd-2.4.43-23.up1.uel20.src.rpm">
          <filename>mod_proxy_html-2.4.43-23.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mod_ssl" version="2.4.43" release="23.up1.uel20" epoch="1" arch="x86_64" src="httpd-2.4.43-23.up1.uel20.src.rpm">
          <filename>mod_ssl-2.4.43-23.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="httpd" version="2.4.43" release="23.up1.uel20" epoch="0" arch="x86_64" src="httpd-2.4.43-23.up1.uel20.src.rpm">
          <filename>httpd-2.4.43-23.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mod_md" version="2.4.43" release="23.up1.uel20" epoch="0" arch="x86_64" src="httpd-2.4.43-23.up1.uel20.src.rpm">
          <filename>mod_md-2.4.43-23.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="httpd-tools" version="2.4.43" release="23.up1.uel20" epoch="0" arch="x86_64" src="httpd-2.4.43-23.up1.uel20.src.rpm">
          <filename>httpd-tools-2.4.43-23.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="httpd-devel" version="2.4.43" release="23.up1.uel20" epoch="0" arch="x86_64" src="httpd-2.4.43-23.up1.uel20.src.rpm">
          <filename>httpd-devel-2.4.43-23.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mod_session" version="2.4.43" release="23.up1.uel20" epoch="0" arch="x86_64" src="httpd-2.4.43-23.up1.uel20.src.rpm">
          <filename>mod_session-2.4.43-23.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mod_ldap" version="2.4.43" release="23.up1.uel20" epoch="0" arch="x86_64" src="httpd-2.4.43-23.up1.uel20.src.rpm">
          <filename>mod_ldap-2.4.43-23.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="httpd" version="2.4.43" release="23.up1.uel20" epoch="0" arch="aarch64" src="httpd-2.4.43-23.up1.uel20.src.rpm">
          <filename>httpd-2.4.43-23.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="httpd-tools" version="2.4.43" release="23.up1.uel20" epoch="0" arch="aarch64" src="httpd-2.4.43-23.up1.uel20.src.rpm">
          <filename>httpd-tools-2.4.43-23.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mod_md" version="2.4.43" release="23.up1.uel20" epoch="0" arch="aarch64" src="httpd-2.4.43-23.up1.uel20.src.rpm">
          <filename>mod_md-2.4.43-23.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mod_proxy_html" version="2.4.43" release="23.up1.uel20" epoch="1" arch="aarch64" src="httpd-2.4.43-23.up1.uel20.src.rpm">
          <filename>mod_proxy_html-2.4.43-23.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mod_ldap" version="2.4.43" release="23.up1.uel20" epoch="0" arch="aarch64" src="httpd-2.4.43-23.up1.uel20.src.rpm">
          <filename>mod_ldap-2.4.43-23.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="httpd-help" version="2.4.43" release="23.up1.uel20" epoch="0" arch="noarch" src="httpd-2.4.43-23.up1.uel20.src.rpm">
          <filename>httpd-help-2.4.43-23.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="httpd-filesystem" version="2.4.43" release="23.up1.uel20" epoch="0" arch="noarch" src="httpd-2.4.43-23.up1.uel20.src.rpm">
          <filename>httpd-filesystem-2.4.43-23.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="httpd-devel" version="2.4.43" release="23.up1.uel20" epoch="0" arch="aarch64" src="httpd-2.4.43-23.up1.uel20.src.rpm">
          <filename>httpd-devel-2.4.43-23.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mod_session" version="2.4.43" release="23.up1.uel20" epoch="0" arch="aarch64" src="httpd-2.4.43-23.up1.uel20.src.rpm">
          <filename>mod_session-2.4.43-23.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mod_ssl" version="2.4.43" release="23.up1.uel20" epoch="1" arch="aarch64" src="httpd-2.4.43-23.up1.uel20.src.rpm">
          <filename>mod_ssl-2.4.43-23.up1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20282</id>
    <title>Important: nginx security update</title>
    <updated date="2023-10-30 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: nginx security update</summary>
    <description> The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.(CVE-2023-44487)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-44487" type="cve" title="fix CVE-2023-44487" />
    </references>
    <pkglist>
      <collection>
        <package name="nginx-mod-devel" version="1.21.5" release="4.uel20" epoch="1" arch="x86_64" src="nginx-1.21.5-4.uel20.src.rpm">
          <filename>nginx-mod-devel-1.21.5-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="nginx-mod-http-image-filter" version="1.21.5" release="4.uel20" epoch="1" arch="x86_64" src="nginx-1.21.5-4.uel20.src.rpm">
          <filename>nginx-mod-http-image-filter-1.21.5-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="nginx-mod-http-perl" version="1.21.5" release="4.uel20" epoch="1" arch="x86_64" src="nginx-1.21.5-4.uel20.src.rpm">
          <filename>nginx-mod-http-perl-1.21.5-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="nginx-mod-mail" version="1.21.5" release="4.uel20" epoch="1" arch="x86_64" src="nginx-1.21.5-4.uel20.src.rpm">
          <filename>nginx-mod-mail-1.21.5-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="nginx-mod-stream" version="1.21.5" release="4.uel20" epoch="1" arch="x86_64" src="nginx-1.21.5-4.uel20.src.rpm">
          <filename>nginx-mod-stream-1.21.5-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="nginx" version="1.21.5" release="4.uel20" epoch="1" arch="x86_64" src="nginx-1.21.5-4.uel20.src.rpm">
          <filename>nginx-1.21.5-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="nginx-mod-http-xslt-filter" version="1.21.5" release="4.uel20" epoch="1" arch="x86_64" src="nginx-1.21.5-4.uel20.src.rpm">
          <filename>nginx-mod-http-xslt-filter-1.21.5-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="nginx-mod-stream" version="1.21.5" release="4.uel20" epoch="1" arch="aarch64" src="nginx-1.21.5-4.uel20.src.rpm">
          <filename>nginx-mod-stream-1.21.5-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="nginx-mod-http-perl" version="1.21.5" release="4.uel20" epoch="1" arch="aarch64" src="nginx-1.21.5-4.uel20.src.rpm">
          <filename>nginx-mod-http-perl-1.21.5-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="nginx" version="1.21.5" release="4.uel20" epoch="1" arch="aarch64" src="nginx-1.21.5-4.uel20.src.rpm">
          <filename>nginx-1.21.5-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="nginx-mod-http-image-filter" version="1.21.5" release="4.uel20" epoch="1" arch="aarch64" src="nginx-1.21.5-4.uel20.src.rpm">
          <filename>nginx-mod-http-image-filter-1.21.5-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="nginx-filesystem" version="1.21.5" release="4.uel20" epoch="1" arch="noarch" src="nginx-1.21.5-4.uel20.src.rpm">
          <filename>nginx-filesystem-1.21.5-4.uel20.noarch.rpm</filename>
        </package>
        <package name="nginx-mod-devel" version="1.21.5" release="4.uel20" epoch="1" arch="aarch64" src="nginx-1.21.5-4.uel20.src.rpm">
          <filename>nginx-mod-devel-1.21.5-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="nginx-mod-mail" version="1.21.5" release="4.uel20" epoch="1" arch="aarch64" src="nginx-1.21.5-4.uel20.src.rpm">
          <filename>nginx-mod-mail-1.21.5-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="nginx-mod-http-xslt-filter" version="1.21.5" release="4.uel20" epoch="1" arch="aarch64" src="nginx-1.21.5-4.uel20.src.rpm">
          <filename>nginx-mod-http-xslt-filter-1.21.5-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="nginx-all-modules" version="1.21.5" release="4.uel20" epoch="1" arch="noarch" src="nginx-1.21.5-4.uel20.src.rpm">
          <filename>nginx-all-modules-1.21.5-4.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20283</id>
    <title>Critical: zlib security update</title>
    <updated date="2023-10-24 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: zlib security update</summary>
    <description> MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product.(CVE-2023-45853)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-45853" type="cve" title="fix CVE-2023-45853" />
    </references>
    <pkglist>
      <collection>
        <package name="zlib-devel" version="1.2.11" release="23.uel20.03" epoch="0" arch="x86_64" src="zlib-1.2.11-23.uel20.03.src.rpm">
          <filename>zlib-devel-1.2.11-23.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="zlib" version="1.2.11" release="23.uel20.03" epoch="0" arch="x86_64" src="zlib-1.2.11-23.uel20.03.src.rpm">
          <filename>zlib-1.2.11-23.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="minizip-devel" version="1.2.11" release="23.uel20.03" epoch="0" arch="x86_64" src="zlib-1.2.11-23.uel20.03.src.rpm">
          <filename>minizip-devel-1.2.11-23.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="minizip" version="1.2.11" release="23.uel20.03" epoch="0" arch="x86_64" src="zlib-1.2.11-23.uel20.03.src.rpm">
          <filename>minizip-1.2.11-23.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="zlib" version="1.2.11" release="23.uel20.03" epoch="0" arch="aarch64" src="zlib-1.2.11-23.uel20.03.src.rpm">
          <filename>zlib-1.2.11-23.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="minizip" version="1.2.11" release="23.uel20.03" epoch="0" arch="aarch64" src="zlib-1.2.11-23.uel20.03.src.rpm">
          <filename>minizip-1.2.11-23.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="minizip-devel" version="1.2.11" release="23.uel20.03" epoch="0" arch="aarch64" src="zlib-1.2.11-23.uel20.03.src.rpm">
          <filename>minizip-devel-1.2.11-23.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="zlib-help" version="1.2.11" release="23.uel20.03" epoch="0" arch="noarch" src="zlib-1.2.11-23.uel20.03.src.rpm">
          <filename>zlib-help-1.2.11-23.uel20.03.noarch.rpm</filename>
        </package>
        <package name="zlib-devel" version="1.2.11" release="23.uel20.03" epoch="0" arch="aarch64" src="zlib-1.2.11-23.uel20.03.src.rpm">
          <filename>zlib-devel-1.2.11-23.uel20.03.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20289</id>
    <title>Moderate: avahi security update</title>
    <updated date="2023-11-14 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: avahi security update</summary>
    <description> A vulnerability was found in Avahi. A reachable assertion exists in the avahi_alternative_host_name() function.(CVE-2023-38473)
 A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rdata_parse() function.(CVE-2023-38472)
 A vulnerability was found in Avahi. A reachable assertion exists in the dbus_set_host_name function.(CVE-2023-38471)
 A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record.(CVE-2023-38469)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-38473" type="cve" title="fix CVE-2023-38473" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-38472" type="cve" title="fix CVE-2023-38472" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-38471" type="cve" title="fix CVE-2023-38471" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-38469" type="cve" title="fix CVE-2023-38469" />
    </references>
    <pkglist>
      <collection>
        <package name="avahi-compat-libdns_sd-devel" version="0.8" release="11.uel20" epoch="0" arch="x86_64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-compat-libdns_sd-devel-0.8-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="avahi-qt5" version="0.8" release="11.uel20" epoch="0" arch="x86_64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-qt5-0.8-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="avahi-glib" version="0.8" release="11.uel20" epoch="0" arch="x86_64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-glib-0.8-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="avahi-ui-devel" version="0.8" release="11.uel20" epoch="0" arch="x86_64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-ui-devel-0.8-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="avahi-compat-howl-devel" version="0.8" release="11.uel20" epoch="0" arch="x86_64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-compat-howl-devel-0.8-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="avahi-ui-gtk3" version="0.8" release="11.uel20" epoch="0" arch="x86_64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-ui-gtk3-0.8-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="avahi-compat-libdns_sd" version="0.8" release="11.uel20" epoch="0" arch="x86_64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-compat-libdns_sd-0.8-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="avahi-autoipd" version="0.8" release="11.uel20" epoch="0" arch="x86_64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-autoipd-0.8-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="avahi-devel" version="0.8" release="11.uel20" epoch="0" arch="x86_64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-devel-0.8-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="avahi-libs" version="0.8" release="11.uel20" epoch="0" arch="x86_64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-libs-0.8-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="avahi-compat-howl" version="0.8" release="11.uel20" epoch="0" arch="x86_64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-compat-howl-0.8-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="avahi-qt5-devel" version="0.8" release="11.uel20" epoch="0" arch="x86_64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-qt5-devel-0.8-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="avahi-gobject" version="0.8" release="11.uel20" epoch="0" arch="x86_64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-gobject-0.8-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="avahi-glib-devel" version="0.8" release="11.uel20" epoch="0" arch="x86_64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-glib-devel-0.8-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="avahi-tools" version="0.8" release="11.uel20" epoch="0" arch="x86_64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-tools-0.8-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="avahi-gobject-devel" version="0.8" release="11.uel20" epoch="0" arch="x86_64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-gobject-devel-0.8-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="avahi-ui" version="0.8" release="11.uel20" epoch="0" arch="x86_64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-ui-0.8-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="avahi-dnsconfd" version="0.8" release="11.uel20" epoch="0" arch="x86_64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-dnsconfd-0.8-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="avahi" version="0.8" release="11.uel20" epoch="0" arch="x86_64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-0.8-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="avahi-devel" version="0.8" release="11.uel20" epoch="0" arch="aarch64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-devel-0.8-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="avahi-gobject-devel" version="0.8" release="11.uel20" epoch="0" arch="aarch64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-gobject-devel-0.8-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="avahi-glib" version="0.8" release="11.uel20" epoch="0" arch="aarch64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-glib-0.8-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="avahi-glib-devel" version="0.8" release="11.uel20" epoch="0" arch="aarch64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-glib-devel-0.8-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="avahi-qt5" version="0.8" release="11.uel20" epoch="0" arch="aarch64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-qt5-0.8-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="avahi-libs" version="0.8" release="11.uel20" epoch="0" arch="aarch64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-libs-0.8-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="avahi-help" version="0.8" release="11.uel20" epoch="0" arch="noarch" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-help-0.8-11.uel20.noarch.rpm</filename>
        </package>
        <package name="avahi-gobject" version="0.8" release="11.uel20" epoch="0" arch="aarch64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-gobject-0.8-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="avahi-ui-gtk3" version="0.8" release="11.uel20" epoch="0" arch="aarch64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-ui-gtk3-0.8-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="avahi-ui" version="0.8" release="11.uel20" epoch="0" arch="aarch64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-ui-0.8-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="avahi-dnsconfd" version="0.8" release="11.uel20" epoch="0" arch="aarch64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-dnsconfd-0.8-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="avahi-compat-libdns_sd-devel" version="0.8" release="11.uel20" epoch="0" arch="aarch64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-compat-libdns_sd-devel-0.8-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="avahi-compat-howl" version="0.8" release="11.uel20" epoch="0" arch="aarch64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-compat-howl-0.8-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="avahi-compat-libdns_sd" version="0.8" release="11.uel20" epoch="0" arch="aarch64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-compat-libdns_sd-0.8-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="avahi" version="0.8" release="11.uel20" epoch="0" arch="aarch64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-0.8-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="avahi-autoipd" version="0.8" release="11.uel20" epoch="0" arch="aarch64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-autoipd-0.8-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="avahi-tools" version="0.8" release="11.uel20" epoch="0" arch="aarch64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-tools-0.8-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="avahi-compat-howl-devel" version="0.8" release="11.uel20" epoch="0" arch="aarch64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-compat-howl-devel-0.8-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="avahi-ui-devel" version="0.8" release="11.uel20" epoch="0" arch="aarch64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-ui-devel-0.8-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="avahi-qt5-devel" version="0.8" release="11.uel20" epoch="0" arch="aarch64" src="avahi-0.8-11.uel20.src.rpm">
          <filename>avahi-qt5-devel-0.8-11.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20296</id>
    <title>Moderate: opensc security update</title>
    <updated date="2023-12-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: opensc security update</summary>
    <description> Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow 
compromise key generation, certificate loading, and other card management operations during enrollment.(CVE-2023-40661)
 A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.(CVE-2023-40660)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-40661" type="cve" title="fix CVE-2023-40661" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-40660" type="cve" title="fix CVE-2023-40660" />
    </references>
    <pkglist>
      <collection>
        <package name="opensc" version="0.20.0" release="13.uel20" epoch="0" arch="x86_64" src="opensc-0.20.0-13.uel20.src.rpm">
          <filename>opensc-0.20.0-13.uel20.x86_64.rpm</filename>
        </package>
        <package name="opensc-help" version="0.20.0" release="13.uel20" epoch="0" arch="noarch" src="opensc-0.20.0-13.uel20.src.rpm">
          <filename>opensc-help-0.20.0-13.uel20.noarch.rpm</filename>
        </package>
        <package name="opensc" version="0.20.0" release="13.uel20" epoch="0" arch="aarch64" src="opensc-0.20.0-13.uel20.src.rpm">
          <filename>opensc-0.20.0-13.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20297</id>
    <title>Critical: sqlite-jdbc security update</title>
    <updated date="2023-11-09 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: sqlite-jdbc security update</summary>
    <description> SQLite JDBC is a library for accessing and creating SQLite database files in Java. Sqlite-jdbc addresses a remote code execution vulnerability via JDBC URL. This issue impacting versions 3.6.14.1 through 3.41.2.1 and has been fixed in version 3.41.2.2.
(CVE-2023-32697)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-32697" type="cve" title="fix CVE-2023-32697" />
    </references>
    <pkglist>
      <collection>
        <package name="sqlite-jdbc" version="3.15.1" release="2.uel20" epoch="0" arch="x86_64" src="sqlite-jdbc-3.15.1-2.uel20.src.rpm">
          <filename>sqlite-jdbc-3.15.1-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="sqlite-jdbc-javadoc" version="3.15.1" release="2.uel20" epoch="0" arch="noarch" src="sqlite-jdbc-3.15.1-2.uel20.src.rpm">
          <filename>sqlite-jdbc-javadoc-3.15.1-2.uel20.noarch.rpm</filename>
        </package>
        <package name="sqlite-jdbc" version="3.15.1" release="2.uel20" epoch="0" arch="aarch64" src="sqlite-jdbc-3.15.1-2.uel20.src.rpm">
          <filename>sqlite-jdbc-3.15.1-2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20303</id>
    <title>Moderate: python-urllib3 security update</title>
    <updated date="2023-12-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: python-urllib3 security update</summary>
    <description> urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn't exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren't expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.
(CVE-2023-45803)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-45803" type="cve" title="fix CVE-2023-45803" />
    </references>
    <pkglist>
      <collection>
        <package name="python2-urllib3" version="1.25.9" release="10.uel20" epoch="0" arch="noarch" src="python-urllib3-1.25.9-10.uel20.src.rpm">
          <filename>python2-urllib3-1.25.9-10.uel20.noarch.rpm</filename>
        </package>
        <package name="python3-urllib3" version="1.25.9" release="10.uel20" epoch="0" arch="noarch" src="python-urllib3-1.25.9-10.uel20.src.rpm">
          <filename>python3-urllib3-1.25.9-10.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20305</id>
    <title>Moderate: gdb security update</title>
    <updated date="2023-11-28 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: gdb security update</summary>
    <description> GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a heap buffer overflow via the function pe_as16() at /gdb/coff-pe-read.c.(CVE-2023-39130)
 GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a heap use after free via the function add_pe_exported_sym() at /gdb/coff-pe-read.c.(CVE-2023-39129)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-39130" type="cve" title="fix CVE-2023-39130" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-39129" type="cve" title="fix CVE-2023-39129" />
    </references>
    <pkglist>
      <collection>
        <package name="gdb-headless" version="9.2" release="7.uel20.01" epoch="0" arch="x86_64" src="gdb-9.2-7.uel20.01.src.rpm">
          <filename>gdb-headless-9.2-7.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="gdb" version="9.2" release="7.uel20.01" epoch="0" arch="x86_64" src="gdb-9.2-7.uel20.01.src.rpm">
          <filename>gdb-9.2-7.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="gdb-gdbserver" version="9.2" release="7.uel20.01" epoch="0" arch="x86_64" src="gdb-9.2-7.uel20.01.src.rpm">
          <filename>gdb-gdbserver-9.2-7.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="gdb-headless" version="9.2" release="7.uel20.01" epoch="0" arch="aarch64" src="gdb-9.2-7.uel20.01.src.rpm">
          <filename>gdb-headless-9.2-7.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="gdb-gdbserver" version="9.2" release="7.uel20.01" epoch="0" arch="aarch64" src="gdb-9.2-7.uel20.01.src.rpm">
          <filename>gdb-gdbserver-9.2-7.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="gdb" version="9.2" release="7.uel20.01" epoch="0" arch="aarch64" src="gdb-9.2-7.uel20.01.src.rpm">
          <filename>gdb-9.2-7.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="gdb-help" version="9.2" release="7.uel20.01" epoch="0" arch="noarch" src="gdb-9.2-7.uel20.01.src.rpm">
          <filename>gdb-help-9.2-7.uel20.01.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20307</id>
    <title>Moderate: apache-commons-net security update</title>
    <updated date="2023-11-27 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: apache-commons-net security update</summary>
    <description> Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.(CVE-2021-37533)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-37533" type="cve" title="fix CVE-2021-37533" />
    </references>
    <pkglist>
      <collection>
        <package name="apache-commons-net-help" version="3.6" release="7.uel20" epoch="0" arch="noarch" src="apache-commons-net-3.6-7.uel20.src.rpm">
          <filename>apache-commons-net-help-3.6-7.uel20.noarch.rpm</filename>
        </package>
        <package name="apache-commons-net" version="3.6" release="7.uel20" epoch="0" arch="noarch" src="apache-commons-net-3.6-7.uel20.src.rpm">
          <filename>apache-commons-net-3.6-7.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20308</id>
    <title>Moderate: shadow security update</title>
    <updated date="2023-12-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: shadow security update</summary>
    <description> shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees(CVE-2013-4235)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2013-4235" type="cve" title="fix CVE-2013-4235" />
    </references>
    <pkglist>
      <collection>
        <package name="shadow" version="4.8.1" release="9.uel20" epoch="2" arch="x86_64" src="shadow-4.8.1-9.uel20.src.rpm">
          <filename>shadow-4.8.1-9.uel20.x86_64.rpm</filename>
        </package>
        <package name="shadow" version="4.8.1" release="9.uel20" epoch="2" arch="aarch64" src="shadow-4.8.1-9.uel20.src.rpm">
          <filename>shadow-4.8.1-9.uel20.aarch64.rpm</filename>
        </package>
        <package name="shadow-help" version="4.8.1" release="9.uel20" epoch="2" arch="noarch" src="shadow-4.8.1-9.uel20.src.rpm">
          <filename>shadow-help-4.8.1-9.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20311</id>
    <title>Critical: strongswan security update</title>
    <updated date="2023-12-19 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: strongswan security update</summary>
    <description> strongSwan before 5.9.12 has a buffer overflow and possible unauthenticated remote code execution via a DH public value that exceeds the internal buffer in charon-tkm's DH proxy. The earliest affected version is 5.3.0. An attack can occur via a crafted IKE_SA_INIT message.(CVE-2023-41913)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-41913" type="cve" title="fix CVE-2023-41913" />
    </references>
    <pkglist>
      <collection>
        <package name="strongswan" version="5.7.2" release="11.uel20" epoch="0" arch="x86_64" src="strongswan-5.7.2-11.uel20.src.rpm">
          <filename>strongswan-5.7.2-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="strongswan-help" version="5.7.2" release="11.uel20" epoch="0" arch="noarch" src="strongswan-5.7.2-11.uel20.src.rpm">
          <filename>strongswan-help-5.7.2-11.uel20.noarch.rpm</filename>
        </package>
        <package name="strongswan" version="5.7.2" release="11.uel20" epoch="0" arch="aarch64" src="strongswan-5.7.2-11.uel20.src.rpm">
          <filename>strongswan-5.7.2-11.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20315</id>
    <title>Important: activemq security update</title>
    <updated date="2023-12-11 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: activemq security update</summary>
    <description> Once an user is authenticated on Jolokia, he can potentially trigger arbitrary code execution. 

In details, in ActiveMQ configurations, jetty allows
org.jolokia.http.AgentServlet to handler request to /api/jolokia

org.jolokia.http.HttpRequestHandler#handlePostRequest is able to
create JmxRequest through JSONObject. And calls to
org.jolokia.http.HttpRequestHandler#executeRequest.

Into deeper calling stacks,
org.jolokia.handler.ExecHandler#doHandleRequest is able to invoke
through refection.

And then, RCE is able to be achieved via
jdk.management.jfr.FlightRecorderMXBeanImpl which exists on Java version above 11.

1 Call newRecording.

2 Call setConfiguration. And a webshell data hides in it.

3 Call startRecording.

4 Call copyTo method. The webshell will be written to a .jsp file.

The mitigation is to restrict (by default) the actions authorized on Jolokia, or disable Jolokia.
A more restrictive Jolokia configuration has been defined in default ActiveMQ distribution. We encourage users to upgrade to ActiveMQ distributions version including updated Jolokia configuration: 5.16.6, 5.17.4, 5.18.0, 6.0.0.
(CVE-2022-41678)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-41678" type="cve" title="fix CVE-2022-41678" />
    </references>
    <pkglist>
      <collection>
        <package name="activemq" version="5.16.7" release="1.uel20" epoch="0" arch="x86_64" src="activemq-5.16.7-1.uel20.src.rpm">
          <filename>activemq-5.16.7-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="activemq" version="5.16.7" release="1.uel20" epoch="0" arch="aarch64" src="activemq-5.16.7-1.uel20.src.rpm">
          <filename>activemq-5.16.7-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20316</id>
    <title>Important: logback security update</title>
    <updated date="2023-12-19 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: logback security update</summary>
    <description> A serialization vulnerability in logback receiver component part of 
logback version 1.4.13, 1.3.13 and 1.2.12 allows an attacker to mount a Denial-Of-Service 
attack by sending poisoned data.

(CVE-2023-6481)
 A serialization vulnerability in logback receiver component part of 
logback version 1.4.11 allows an attacker to mount a Denial-Of-Service 
attack by sending poisoned data.

(CVE-2023-6378)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-6481" type="cve" title="fix CVE-2023-6481" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-6378" type="cve" title="fix CVE-2023-6378" />
    </references>
    <pkglist>
      <collection>
        <package name="logback-help" version="1.2.8" release="3.uel20" epoch="0" arch="noarch" src="logback-1.2.8-3.uel20.src.rpm">
          <filename>logback-help-1.2.8-3.uel20.noarch.rpm</filename>
        </package>
        <package name="logback" version="1.2.8" release="3.uel20" epoch="0" arch="noarch" src="logback-1.2.8-3.uel20.src.rpm">
          <filename>logback-1.2.8-3.uel20.noarch.rpm</filename>
        </package>
        <package name="logback-examples" version="1.2.8" release="3.uel20" epoch="0" arch="noarch" src="logback-1.2.8-3.uel20.src.rpm">
          <filename>logback-examples-1.2.8-3.uel20.noarch.rpm</filename>
        </package>
        <package name="logback-access" version="1.2.8" release="3.uel20" epoch="0" arch="noarch" src="logback-1.2.8-3.uel20.src.rpm">
          <filename>logback-access-1.2.8-3.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20317</id>
    <title>Important: haproxy security update</title>
    <updated date="2023-12-11 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: haproxy security update</summary>
    <description> HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end rule, such as routing index.html#.png to a static server.(CVE-2023-45539)
 An information leak vulnerability was discovered in HAProxy 2.1, 2.2 before 2.2.27, 2.3, 2.4 before 2.4.21, 2.5 before 2.5.11, 2.6 before 2.6.8, 2.7 before 2.7.1. There are 5 bytes left uninitialized in the connection buffer when encoding the FCGI_BEGIN_REQUEST record. Sensitive data may be disclosed to configured FastCGI backends in an unexpected way.(CVE-2023-0836)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-45539" type="cve" title="fix CVE-2023-45539" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-0836" type="cve" title="fix CVE-2023-0836" />
    </references>
    <pkglist>
      <collection>
        <package name="haproxy" version="2.2.16" release="7.uel20" epoch="0" arch="x86_64" src="haproxy-2.2.16-7.uel20.src.rpm">
          <filename>haproxy-2.2.16-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="haproxy" version="2.2.16" release="7.uel20" epoch="0" arch="aarch64" src="haproxy-2.2.16-7.uel20.src.rpm">
          <filename>haproxy-2.2.16-7.uel20.aarch64.rpm</filename>
        </package>
        <package name="haproxy-help" version="2.2.16" release="7.uel20" epoch="0" arch="noarch" src="haproxy-2.2.16-7.uel20.src.rpm">
          <filename>haproxy-help-2.2.16-7.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20318</id>
    <title>Moderate: vim security update</title>
    <updated date="2023-12-15 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: vim security update</summary>
    <description> Vim is a UNIX editor that, prior to version 9.0.2121, has a heap-use-after-free vulnerability. When executing a `:s` command for the very first time and using a sub-replace-special atom inside the substitution part, it is possible that the recursive `:s` call causes free-ing of memory which may later then be accessed by the initial `:s` command. The user must intentionally execute the payload and the whole process is a bit tricky to do since it seems to work only reliably for the very first :s command. It may also cause a crash of Vim. Version 9.0.2121 contains a fix for this issue.(CVE-2023-48706)
 Vim is an open source command line text editor. In affected versions when shifting lines in operator pending mode and using a very large value, it may be possible to overflow the size of integer. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `6bf131888` which has been included in version 9.0.2112. Users are advised to upgrade. There are no known workarounds for this vulnerability.(CVE-2023-48237)
 Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger
than MAX_INT. Impact is low, user interaction is required and a crash may not even happen in all situations. This vulnerability has been addressed in commit `73b2d379` which has been included in release version 9.0.2111. Users are advised to upgrade. There are no known workarounds for this vulnerability.(CVE-2023-48236)
 Vim is an open source command line text editor. When parsing relative ex addresses one may unintentionally cause an
overflow. Ironically this happens in the existing overflow check, because the line number becomes negative and LONG_MAX - lnum will cause the overflow. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `060623e` which has been included in release version 9.0.2110. Users are advised to upgrade. There are no known workarounds for this vulnerability.(CVE-2023-48235)
 Vim is an open source command line text editor. When getting the count for a normal mode z command, it may overflow for large counts given. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `58f9befca1` which has been included in release version 9.0.2109. Users are advised to upgrade. There are no known workarounds for this vulnerability.(CVE-2023-48234)
 Vim is an open source command line text editor. If the count after the :s command is larger than what fits into a (signed) long variable, abort with e_value_too_large. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `ac6378773` which has been included in release version 9.0.2108. Users are advised to upgrade. There are no known workarounds for this vulnerability.(CVE-2023-48233)
 Vim is an open source command line text editor. When closing a window, vim may try to access already freed window structure. Exploitation beyond crashing the application has not been shown to be viable. This issue has been addressed in commit `25aabc2b` which has been included in release version 9.0.2106. Users are advised to upgrade. There are no known workarounds for this vulnerability.(CVE-2023-48231)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-48706" type="cve" title="fix CVE-2023-48706" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-48237" type="cve" title="fix CVE-2023-48237" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-48236" type="cve" title="fix CVE-2023-48236" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-48235" type="cve" title="fix CVE-2023-48235" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-48234" type="cve" title="fix CVE-2023-48234" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-48233" type="cve" title="fix CVE-2023-48233" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-48231" type="cve" title="fix CVE-2023-48231" />
    </references>
    <pkglist>
      <collection>
        <package name="vim-common" version="9.0" release="19.uel20.01" epoch="2" arch="x86_64" src="vim-9.0-19.uel20.01.src.rpm">
          <filename>vim-common-9.0-19.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="vim-X11" version="9.0" release="19.uel20.01" epoch="2" arch="x86_64" src="vim-9.0-19.uel20.01.src.rpm">
          <filename>vim-X11-9.0-19.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="vim-enhanced" version="9.0" release="19.uel20.01" epoch="2" arch="x86_64" src="vim-9.0-19.uel20.01.src.rpm">
          <filename>vim-enhanced-9.0-19.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="vim-minimal" version="9.0" release="19.uel20.01" epoch="2" arch="x86_64" src="vim-9.0-19.uel20.01.src.rpm">
          <filename>vim-minimal-9.0-19.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="vim-common" version="9.0" release="19.uel20.01" epoch="2" arch="aarch64" src="vim-9.0-19.uel20.01.src.rpm">
          <filename>vim-common-9.0-19.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="vim-enhanced" version="9.0" release="19.uel20.01" epoch="2" arch="aarch64" src="vim-9.0-19.uel20.01.src.rpm">
          <filename>vim-enhanced-9.0-19.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="vim-minimal" version="9.0" release="19.uel20.01" epoch="2" arch="aarch64" src="vim-9.0-19.uel20.01.src.rpm">
          <filename>vim-minimal-9.0-19.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="vim-X11" version="9.0" release="19.uel20.01" epoch="2" arch="aarch64" src="vim-9.0-19.uel20.01.src.rpm">
          <filename>vim-X11-9.0-19.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="vim-filesystem" version="9.0" release="19.uel20.01" epoch="2" arch="noarch" src="vim-9.0-19.uel20.01.src.rpm">
          <filename>vim-filesystem-9.0-19.uel20.01.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20319</id>
    <title>None: gimp security update</title>
    <updated date="2023-12-06 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: gimp security update</summary>
    <description> ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2023-44444)
 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2023-44442)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-44444" type="cve" title="fix CVE-2023-44444" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-44442" type="cve" title="fix CVE-2023-44442" />
    </references>
    <pkglist>
      <collection>
        <package name="gimp" version="2.10.6" release="10.uel20" epoch="2" arch="x86_64" src="gimp-2.10.6-10.uel20.src.rpm">
          <filename>gimp-2.10.6-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="gimp-devel" version="2.10.6" release="10.uel20" epoch="2" arch="x86_64" src="gimp-2.10.6-10.uel20.src.rpm">
          <filename>gimp-devel-2.10.6-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="gimp-help" version="2.10.6" release="10.uel20" epoch="2" arch="x86_64" src="gimp-2.10.6-10.uel20.src.rpm">
          <filename>gimp-help-2.10.6-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="gimp-libs" version="2.10.6" release="10.uel20" epoch="2" arch="x86_64" src="gimp-2.10.6-10.uel20.src.rpm">
          <filename>gimp-libs-2.10.6-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="gimp-libs" version="2.10.6" release="10.uel20" epoch="2" arch="aarch64" src="gimp-2.10.6-10.uel20.src.rpm">
          <filename>gimp-libs-2.10.6-10.uel20.aarch64.rpm</filename>
        </package>
        <package name="gimp-help" version="2.10.6" release="10.uel20" epoch="2" arch="aarch64" src="gimp-2.10.6-10.uel20.src.rpm">
          <filename>gimp-help-2.10.6-10.uel20.aarch64.rpm</filename>
        </package>
        <package name="gimp" version="2.10.6" release="10.uel20" epoch="2" arch="aarch64" src="gimp-2.10.6-10.uel20.src.rpm">
          <filename>gimp-2.10.6-10.uel20.aarch64.rpm</filename>
        </package>
        <package name="gimp-devel" version="2.10.6" release="10.uel20" epoch="2" arch="aarch64" src="gimp-2.10.6-10.uel20.src.rpm">
          <filename>gimp-devel-2.10.6-10.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20321</id>
    <title>Important: optipng security update</title>
    <updated date="2023-12-07 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: optipng security update</summary>
    <description> OptiPNG v0.7.7 was discovered to contain a global buffer overflow via the 'buffer' variable at gifread.c.(CVE-2023-43907)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-43907" type="cve" title="fix CVE-2023-43907" />
    </references>
    <pkglist>
      <collection>
        <package name="optipng" version="0.7.8" release="1.uel20" epoch="0" arch="x86_64" src="optipng-0.7.8-1.uel20.src.rpm">
          <filename>optipng-0.7.8-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="optipng" version="0.7.8" release="1.uel20" epoch="0" arch="aarch64" src="optipng-0.7.8-1.uel20.src.rpm">
          <filename>optipng-0.7.8-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20322</id>
    <title>None: ceph security update</title>
    <updated date="2023-10-30 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: ceph security update</summary>
    <description> ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2023-43040)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-43040" type="cve" title="fix CVE-2023-43040" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-cephfs" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>python3-cephfs-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph-test" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>ceph-test-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="rados-objclass-devel" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>rados-objclass-devel-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-rados" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>python3-rados-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="libcephfs2" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>libcephfs2-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-rbd" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>python3-rbd-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="rbd-nbd" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>rbd-nbd-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph-mgr" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>ceph-mgr-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph-fuse" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>ceph-fuse-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph-mds" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>ceph-mds-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="rbd-mirror" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>rbd-mirror-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="librados2" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>librados2-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="librgw-devel" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>librgw-devel-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="libradosstriper-devel" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>libradosstriper-devel-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="rbd-fuse" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>rbd-fuse-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="librados-devel" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>librados-devel-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph-resource-agents" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>ceph-resource-agents-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="libradosstriper1" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>libradosstriper1-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="python-cephfs" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>python-cephfs-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-rgw" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>python3-rgw-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph-mon" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>ceph-mon-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph-base" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>ceph-base-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="librbd-devel" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>librbd-devel-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="librgw2" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>librgw2-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-ceph-argparse" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>python3-ceph-argparse-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph-selinux" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>ceph-selinux-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="python-rados" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>python-rados-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="python-ceph-compat" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>python-ceph-compat-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>ceph-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph-radosgw" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>ceph-radosgw-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph-osd" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>ceph-osd-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="python-rgw" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>python-rgw-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="libcephfs-devel" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>libcephfs-devel-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="python-rbd" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>python-rbd-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="librbd1" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>librbd1-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph-common" version="12.2.8" release="23.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>ceph-common-12.2.8-23.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph-test" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>ceph-test-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ceph-radosgw" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>ceph-radosgw-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="librados2" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>librados2-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ceph-base" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>ceph-base-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="rbd-fuse" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>rbd-fuse-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-rados" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>python3-rados-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ceph-common" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>ceph-common-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="libradosstriper-devel" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>libradosstriper-devel-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="libcephfs2" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>libcephfs2-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="python-ceph-compat" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>python-ceph-compat-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="libcephfs-devel" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>libcephfs-devel-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="librgw2" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>librgw2-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-rbd" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>python3-rbd-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="librbd-devel" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>librbd-devel-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="librgw-devel" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>librgw-devel-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="libradosstriper1" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>libradosstriper1-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="rados-objclass-devel" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>rados-objclass-devel-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ceph" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>ceph-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ceph-mds" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>ceph-mds-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-cephfs" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>python3-cephfs-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ceph-fuse" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>ceph-fuse-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="python-rbd" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>python-rbd-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-ceph-argparse" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>python3-ceph-argparse-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ceph-selinux" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>ceph-selinux-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="rbd-nbd" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>rbd-nbd-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="librados-devel" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>librados-devel-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="python-rados" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>python-rados-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="python-cephfs" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>python-cephfs-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ceph-mon" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>ceph-mon-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ceph-osd" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>ceph-osd-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="rbd-mirror" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>rbd-mirror-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="python-rgw" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>python-rgw-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="librbd1" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>librbd1-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-rgw" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>python3-rgw-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ceph-resource-agents" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>ceph-resource-agents-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ceph-mgr" version="12.2.8" release="23.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-23.up2.uel20.src.rpm">
          <filename>ceph-mgr-12.2.8-23.up2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20323</id>
    <title>Important: qt security update</title>
    <updated date="2023-12-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: qt security update</summary>
    <description> An issue was discovered in Qt before 5.15.16, 6.x before 6.2.10, and 6.3.x through 6.5.x before 6.5.3 on Windows. When using the GDI font engine, if a corrupted font is loaded via QFontDatabase::addApplicationFont{FromData], then it can cause the application to crash because of missing length checks.(CVE-2023-43114)
 In Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2, there can be an application crash in QXmlStreamReader via a crafted XML string that triggers a situation in which a prefix is greater than a length.(CVE-2023-37369)
 An issue was discovered in Qt before 5.15.15, 6.x before 6.2.10, and 6.3.x through 6.5.x before 6.5.3. There are infinite loops in recursive entity expansion.(CVE-2023-38197)
 An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2. Certificate validation for TLS does not always consider whether the root of a chain is a configured CA certificate.(CVE-2023-34410)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-43114" type="cve" title="fix CVE-2023-43114" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-37369" type="cve" title="fix CVE-2023-37369" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-38197" type="cve" title="fix CVE-2023-38197" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-34410" type="cve" title="fix CVE-2023-34410" />
    </references>
    <pkglist>
      <collection>
        <package name="qt" version="4.8.7" release="55.uel20" epoch="1" arch="x86_64" src="qt-4.8.7-55.uel20.src.rpm">
          <filename>qt-4.8.7-55.uel20.x86_64.rpm</filename>
        </package>
        <package name="qt-devel" version="4.8.7" release="55.uel20" epoch="1" arch="x86_64" src="qt-4.8.7-55.uel20.src.rpm">
          <filename>qt-devel-4.8.7-55.uel20.x86_64.rpm</filename>
        </package>
        <package name="qt" version="4.8.7" release="55.uel20" epoch="1" arch="aarch64" src="qt-4.8.7-55.uel20.src.rpm">
          <filename>qt-4.8.7-55.uel20.aarch64.rpm</filename>
        </package>
        <package name="qt-devel" version="4.8.7" release="55.uel20" epoch="1" arch="aarch64" src="qt-4.8.7-55.uel20.src.rpm">
          <filename>qt-devel-4.8.7-55.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20324</id>
    <title>Important: freeimage security update</title>
    <updated date="2023-12-06 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: freeimage security update</summary>
    <description> Buffer Overflow vulnerability in function LoadRGB in PluginDDS.cpp in FreeImage 3.18.0 allows remote attackers to run arbitrary code and cause other impacts via crafted image file.(CVE-2020-21428)
 Buffer Overflow vulnerability in function LoadPixelDataRLE8 in PluginBMP.cpp in FreeImage 3.18.0 allows remote attackers to run arbitrary code and cause other impacts via crafted image file.(CVE-2020-21427)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-21428" type="cve" title="fix CVE-2020-21428" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-21427" type="cve" title="fix CVE-2020-21427" />
    </references>
    <pkglist>
      <collection>
        <package name="freeimage-devel" version="3.18.0" release="5.up2.uel20" epoch="0" arch="x86_64" src="freeimage-3.18.0-5.up2.uel20.src.rpm">
          <filename>freeimage-devel-3.18.0-5.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeimage" version="3.18.0" release="5.up2.uel20" epoch="0" arch="x86_64" src="freeimage-3.18.0-5.up2.uel20.src.rpm">
          <filename>freeimage-3.18.0-5.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeimage-devel" version="3.18.0" release="5.up2.uel20" epoch="0" arch="aarch64" src="freeimage-3.18.0-5.up2.uel20.src.rpm">
          <filename>freeimage-devel-3.18.0-5.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="freeimage" version="3.18.0" release="5.up2.uel20" epoch="0" arch="aarch64" src="freeimage-3.18.0-5.up2.uel20.src.rpm">
          <filename>freeimage-3.18.0-5.up2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20325</id>
    <title>Important: sox security update</title>
    <updated date="2023-12-11 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: sox security update</summary>
    <description> A heap buffer overflow vulnerability was found in sox, in the lsx_readbuf function at sox/src/formats_i.c:98:16. This flaw can lead to a denial of service, code execution, or information disclosure.(CVE-2023-34432)
 A floating point exception vulnerability was found in sox, in the read_samples function at sox/src/voc.c:334:18. This flaw can lead to a denial of service.(CVE-2023-32627)
 A floating point exception vulnerability was found in sox, in the lsx_aiffstartwrite function at sox/src/aiff.c:622:58. This flaw can lead to a denial of service.(CVE-2023-26590)
 A heap buffer overflow vulnerability was found in sox, in the startread function at sox/src/hcom.c:160:41. This flaw can lead to a denial of service, code execution, or information disclosure.(CVE-2023-34318)
 A floating point exception (divide-by-zero) issue was discovered in SoX in functon startread() of wav.c file. An attacker with a crafted wav file, could cause an application to crash.(CVE-2021-33844)
 A vulnerability was found in SoX, where a heap-buffer-overflow occurs in function lsx_read_w_buf() in formats_i.c file. The vulnerability is exploitable with a crafted file, that could cause an application to crash.(CVE-2021-23159)
 A floating point exception (divide-by-zero) issue was discovered in SoX in functon read_samples() of voc.c file. An attacker with a crafted file, could cause an application to crash.(CVE-2021-23210)
 A vulnerability was found in SoX, where a heap-buffer-overflow occurs in function startread() in hcom.c file. The vulnerability is exploitable with a crafted hcomn file, that could cause an application to crash.(CVE-2021-23172)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-34432" type="cve" title="fix CVE-2023-34432" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-32627" type="cve" title="fix CVE-2023-32627" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-26590" type="cve" title="fix CVE-2023-26590" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-34318" type="cve" title="fix CVE-2023-34318" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-33844" type="cve" title="fix CVE-2021-33844" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-23159" type="cve" title="fix CVE-2021-23159" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-23210" type="cve" title="fix CVE-2021-23210" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-23172" type="cve" title="fix CVE-2021-23172" />
    </references>
    <pkglist>
      <collection>
        <package name="sox" version="14.4.2.0" release="29.uel20" epoch="0" arch="x86_64" src="sox-14.4.2.0-29.uel20.src.rpm">
          <filename>sox-14.4.2.0-29.uel20.x86_64.rpm</filename>
        </package>
        <package name="sox-devel" version="14.4.2.0" release="29.uel20" epoch="0" arch="x86_64" src="sox-14.4.2.0-29.uel20.src.rpm">
          <filename>sox-devel-14.4.2.0-29.uel20.x86_64.rpm</filename>
        </package>
        <package name="sox" version="14.4.2.0" release="29.uel20" epoch="0" arch="aarch64" src="sox-14.4.2.0-29.uel20.src.rpm">
          <filename>sox-14.4.2.0-29.uel20.aarch64.rpm</filename>
        </package>
        <package name="sox-devel" version="14.4.2.0" release="29.uel20" epoch="0" arch="aarch64" src="sox-14.4.2.0-29.uel20.src.rpm">
          <filename>sox-devel-14.4.2.0-29.uel20.aarch64.rpm</filename>
        </package>
        <package name="sox-help" version="14.4.2.0" release="29.uel20" epoch="0" arch="noarch" src="sox-14.4.2.0-29.uel20.src.rpm">
          <filename>sox-help-14.4.2.0-29.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20326</id>
    <title>Critical: nodejs-tough-cookie security update</title>
    <updated date="2023-12-18 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: nodejs-tough-cookie security update</summary>
    <description> Versions of the package tough-cookie before 4.1.3 are vulnerable to Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized.(CVE-2023-26136)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-26136" type="cve" title="fix CVE-2023-26136" />
    </references>
    <pkglist>
      <collection>
        <package name="nodejs-tough-cookie" version="2.3.2" release="3.uel20" epoch="0" arch="noarch" src="nodejs-tough-cookie-2.3.2-3.uel20.src.rpm">
          <filename>nodejs-tough-cookie-2.3.2-3.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20328</id>
    <title>Important: xstream security update</title>
    <updated date="2023-12-20 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: xstream security update</summary>
    <description> XStream serializes Java objects to XML and back again. Versions prior to 1.4.20 may allow a remote attacker to terminate the application with a stack overflow error, resulting in a denial of service only via manipulation the processed input stream. The attack uses the hash code implementation for collections and maps to force recursive hash calculation causing a stack overflow. This issue is patched in version 1.4.20 which handles the stack overflow and raises an InputManipulationException instead. A potential workaround for users who only use HashMap or HashSet and whose XML refers these only as default map or set, is to change the default implementation of java.util.Map and java.util per the code example in the referenced advisory. However, this implies that your application does not care about the implementation of the map and all elements are comparable.(CVE-2022-41966)
 Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.(CVE-2022-40151)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-41966" type="cve" title="fix CVE-2022-41966" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-40151" type="cve" title="fix CVE-2022-40151" />
    </references>
    <pkglist>
      <collection>
        <package name="xstream-parent" version="1.4.20" release="1.uel20" epoch="0" arch="noarch" src="xstream-1.4.20-1.uel20.src.rpm">
          <filename>xstream-parent-1.4.20-1.uel20.noarch.rpm</filename>
        </package>
        <package name="xstream-benchmark" version="1.4.20" release="1.uel20" epoch="0" arch="noarch" src="xstream-1.4.20-1.uel20.src.rpm">
          <filename>xstream-benchmark-1.4.20-1.uel20.noarch.rpm</filename>
        </package>
        <package name="xstream-hibernate" version="1.4.20" release="1.uel20" epoch="0" arch="noarch" src="xstream-1.4.20-1.uel20.src.rpm">
          <filename>xstream-hibernate-1.4.20-1.uel20.noarch.rpm</filename>
        </package>
        <package name="xstream" version="1.4.20" release="1.uel20" epoch="0" arch="noarch" src="xstream-1.4.20-1.uel20.src.rpm">
          <filename>xstream-1.4.20-1.uel20.noarch.rpm</filename>
        </package>
        <package name="xstream-javadoc" version="1.4.20" release="1.uel20" epoch="0" arch="noarch" src="xstream-1.4.20-1.uel20.src.rpm">
          <filename>xstream-javadoc-1.4.20-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20330</id>
    <title>Critical: hsqldb security update</title>
    <updated date="2023-12-11 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: hsqldb security update</summary>
    <description> Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb (HyperSQL DataBase) to process untrusted input may be vulnerable to a remote code execution attack. By default it is allowed to call any static method of any Java class in the classpath resulting in code execution. The issue can be prevented by updating to 2.7.1 or by setting the system property "hsqldb.method_class_names" to classes which are allowed to be called. For example, System.setProperty("hsqldb.method_class_names", "abc") or Java argument -Dhsqldb.method_class_names="abc" can be used. From version 2.7.1 all classes by default are not accessible except those in java.lang.Math and need to be manually enabled.(CVE-2022-41853)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-41853" type="cve" title="fix CVE-2022-41853" />
    </references>
    <pkglist>
      <collection>
        <package name="hsqldb-demo" version="2.4.0" release="4.uel20" epoch="1" arch="noarch" src="hsqldb-2.4.0-4.uel20.src.rpm">
          <filename>hsqldb-demo-2.4.0-4.uel20.noarch.rpm</filename>
        </package>
        <package name="hsqldb-lib" version="2.4.0" release="4.uel20" epoch="1" arch="noarch" src="hsqldb-2.4.0-4.uel20.src.rpm">
          <filename>hsqldb-lib-2.4.0-4.uel20.noarch.rpm</filename>
        </package>
        <package name="hsqldb-javadoc" version="2.4.0" release="4.uel20" epoch="1" arch="noarch" src="hsqldb-2.4.0-4.uel20.src.rpm">
          <filename>hsqldb-javadoc-2.4.0-4.uel20.noarch.rpm</filename>
        </package>
        <package name="hsqldb-manual" version="2.4.0" release="4.uel20" epoch="1" arch="noarch" src="hsqldb-2.4.0-4.uel20.src.rpm">
          <filename>hsqldb-manual-2.4.0-4.uel20.noarch.rpm</filename>
        </package>
        <package name="hsqldb" version="2.4.0" release="4.uel20" epoch="1" arch="noarch" src="hsqldb-2.4.0-4.uel20.src.rpm">
          <filename>hsqldb-2.4.0-4.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20331</id>
    <title>Important: liblouis security update</title>
    <updated date="2023-12-19 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: liblouis security update</summary>
    <description> Liblouis through 3.21.0 has a buffer overflow in compilePassOpcode in compileTranslationTable.c (called, indirectly, by tools/lou_checktable.c).(CVE-2022-26981)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-26981" type="cve" title="fix CVE-2022-26981" />
    </references>
    <pkglist>
      <collection>
        <package name="liblouis" version="3.7.0" release="5.uel20" epoch="0" arch="x86_64" src="liblouis-3.7.0-5.uel20.src.rpm">
          <filename>liblouis-3.7.0-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="liblouis-devel" version="3.7.0" release="5.uel20" epoch="0" arch="x86_64" src="liblouis-3.7.0-5.uel20.src.rpm">
          <filename>liblouis-devel-3.7.0-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="liblouis-utils" version="3.7.0" release="5.uel20" epoch="0" arch="x86_64" src="liblouis-3.7.0-5.uel20.src.rpm">
          <filename>liblouis-utils-3.7.0-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="liblouis" version="3.7.0" release="5.uel20" epoch="0" arch="aarch64" src="liblouis-3.7.0-5.uel20.src.rpm">
          <filename>liblouis-3.7.0-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="liblouis-help" version="3.7.0" release="5.uel20" epoch="0" arch="noarch" src="liblouis-3.7.0-5.uel20.src.rpm">
          <filename>liblouis-help-3.7.0-5.uel20.noarch.rpm</filename>
        </package>
        <package name="python3-louis" version="3.7.0" release="5.uel20" epoch="0" arch="noarch" src="liblouis-3.7.0-5.uel20.src.rpm">
          <filename>python3-louis-3.7.0-5.uel20.noarch.rpm</filename>
        </package>
        <package name="liblouis-devel" version="3.7.0" release="5.uel20" epoch="0" arch="aarch64" src="liblouis-3.7.0-5.uel20.src.rpm">
          <filename>liblouis-devel-3.7.0-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="python2-louis" version="3.7.0" release="5.uel20" epoch="0" arch="noarch" src="liblouis-3.7.0-5.uel20.src.rpm">
          <filename>python2-louis-3.7.0-5.uel20.noarch.rpm</filename>
        </package>
        <package name="liblouis-utils" version="3.7.0" release="5.uel20" epoch="0" arch="aarch64" src="liblouis-3.7.0-5.uel20.src.rpm">
          <filename>liblouis-utils-3.7.0-5.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2023:20332</id>
    <title>Important: SDL security update</title>
    <updated date="2021-03-03 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: SDL security update</summary>
    <description> SDL (Simple DirectMedia Layer) through 2.0.12 has an Integer Overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c via a crafted .BMP file.(CVE-2020-14409)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-14409" type="cve" title="fix CVE-2020-14409" />
    </references>
    <pkglist>
      <collection>
        <package name="SDL-devel" version="1.2.15" release="39.uel20" epoch="0" arch="x86_64" src="SDL-1.2.15-39.uel20.src.rpm">
          <filename>SDL-devel-1.2.15-39.uel20.x86_64.rpm</filename>
        </package>
        <package name="SDL" version="1.2.15" release="39.uel20" epoch="0" arch="x86_64" src="SDL-1.2.15-39.uel20.src.rpm">
          <filename>SDL-1.2.15-39.uel20.x86_64.rpm</filename>
        </package>
        <package name="SDL-help" version="1.2.15" release="39.uel20" epoch="0" arch="x86_64" src="SDL-1.2.15-39.uel20.src.rpm">
          <filename>SDL-help-1.2.15-39.uel20.x86_64.rpm</filename>
        </package>
        <package name="SDL-devel" version="1.2.15" release="39.uel20" epoch="0" arch="aarch64" src="SDL-1.2.15-39.uel20.src.rpm">
          <filename>SDL-devel-1.2.15-39.uel20.aarch64.rpm</filename>
        </package>
        <package name="SDL-help" version="1.2.15" release="39.uel20" epoch="0" arch="aarch64" src="SDL-1.2.15-39.uel20.src.rpm">
          <filename>SDL-help-1.2.15-39.uel20.aarch64.rpm</filename>
        </package>
        <package name="SDL" version="1.2.15" release="39.uel20" epoch="0" arch="aarch64" src="SDL-1.2.15-39.uel20.src.rpm">
          <filename>SDL-1.2.15-39.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20001</id>
    <title>None: libssh security update</title>
    <updated date="2024-01-09 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: libssh security update</summary>
    <description> The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.(CVE-2023-48795)
 A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.(CVE-2023-6918)
 A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.(CVE-2023-6004)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-48795" type="cve" title="fix CVE-2023-48795" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-6918" type="cve" title="fix CVE-2023-6918" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-6004" type="cve" title="fix CVE-2023-6004" />
    </references>
    <pkglist>
      <collection>
        <package name="libssh-devel" version="0.9.6" release="8.uel20" epoch="0" arch="x86_64" src="libssh-0.9.6-8.uel20.src.rpm">
          <filename>libssh-devel-0.9.6-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="libssh" version="0.9.6" release="8.uel20" epoch="0" arch="x86_64" src="libssh-0.9.6-8.uel20.src.rpm">
          <filename>libssh-0.9.6-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="libssh-devel" version="0.9.6" release="8.uel20" epoch="0" arch="aarch64" src="libssh-0.9.6-8.uel20.src.rpm">
          <filename>libssh-devel-0.9.6-8.uel20.aarch64.rpm</filename>
        </package>
        <package name="libssh" version="0.9.6" release="8.uel20" epoch="0" arch="aarch64" src="libssh-0.9.6-8.uel20.src.rpm">
          <filename>libssh-0.9.6-8.uel20.aarch64.rpm</filename>
        </package>
        <package name="libssh-help" version="0.9.6" release="8.uel20" epoch="0" arch="noarch" src="libssh-0.9.6-8.uel20.src.rpm">
          <filename>libssh-help-0.9.6-8.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20003</id>
    <title>None: bluez security update</title>
    <updated date="2024-01-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: bluez security update</summary>
    <description> ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2023-50230)
 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2023-50229)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-50230" type="cve" title="fix CVE-2023-50230" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-50229" type="cve" title="fix CVE-2023-50229" />
    </references>
    <pkglist>
      <collection>
        <package name="bluez" version="5.54" release="14.uel20" epoch="0" arch="x86_64" src="bluez-5.54-14.uel20.src.rpm">
          <filename>bluez-5.54-14.uel20.x86_64.rpm</filename>
        </package>
        <package name="bluez-libs" version="5.54" release="14.uel20" epoch="0" arch="x86_64" src="bluez-5.54-14.uel20.src.rpm">
          <filename>bluez-libs-5.54-14.uel20.x86_64.rpm</filename>
        </package>
        <package name="bluez-cups" version="5.54" release="14.uel20" epoch="0" arch="x86_64" src="bluez-5.54-14.uel20.src.rpm">
          <filename>bluez-cups-5.54-14.uel20.x86_64.rpm</filename>
        </package>
        <package name="bluez-devel" version="5.54" release="14.uel20" epoch="0" arch="x86_64" src="bluez-5.54-14.uel20.src.rpm">
          <filename>bluez-devel-5.54-14.uel20.x86_64.rpm</filename>
        </package>
        <package name="bluez-libs" version="5.54" release="14.uel20" epoch="0" arch="aarch64" src="bluez-5.54-14.uel20.src.rpm">
          <filename>bluez-libs-5.54-14.uel20.aarch64.rpm</filename>
        </package>
        <package name="bluez" version="5.54" release="14.uel20" epoch="0" arch="aarch64" src="bluez-5.54-14.uel20.src.rpm">
          <filename>bluez-5.54-14.uel20.aarch64.rpm</filename>
        </package>
        <package name="bluez-cups" version="5.54" release="14.uel20" epoch="0" arch="aarch64" src="bluez-5.54-14.uel20.src.rpm">
          <filename>bluez-cups-5.54-14.uel20.aarch64.rpm</filename>
        </package>
        <package name="bluez-help" version="5.54" release="14.uel20" epoch="0" arch="noarch" src="bluez-5.54-14.uel20.src.rpm">
          <filename>bluez-help-5.54-14.uel20.noarch.rpm</filename>
        </package>
        <package name="bluez-devel" version="5.54" release="14.uel20" epoch="0" arch="aarch64" src="bluez-5.54-14.uel20.src.rpm">
          <filename>bluez-devel-5.54-14.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20006</id>
    <title>None: gstreamer1-plugins-bad-free security update</title>
    <updated date="2023-12-21 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: gstreamer1-plugins-bad-free security update</summary>
    <description> ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2023-37329)
 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2023-44446)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-37329" type="cve" title="fix CVE-2023-37329" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-44446" type="cve" title="fix CVE-2023-44446" />
    </references>
    <pkglist>
      <collection>
        <package name="gstreamer1-plugins-bad-free" version="1.16.2" release="4.uel20" epoch="0" arch="x86_64" src="gstreamer1-plugins-bad-free-1.16.2-4.uel20.src.rpm">
          <filename>gstreamer1-plugins-bad-free-1.16.2-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="gstreamer1-plugins-bad-free-devel" version="1.16.2" release="4.uel20" epoch="0" arch="x86_64" src="gstreamer1-plugins-bad-free-1.16.2-4.uel20.src.rpm">
          <filename>gstreamer1-plugins-bad-free-devel-1.16.2-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="gstreamer1-plugins-bad-free-devel" version="1.16.2" release="4.uel20" epoch="0" arch="aarch64" src="gstreamer1-plugins-bad-free-1.16.2-4.uel20.src.rpm">
          <filename>gstreamer1-plugins-bad-free-devel-1.16.2-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="gstreamer1-plugins-bad-free" version="1.16.2" release="4.uel20" epoch="0" arch="aarch64" src="gstreamer1-plugins-bad-free-1.16.2-4.uel20.src.rpm">
          <filename>gstreamer1-plugins-bad-free-1.16.2-4.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20007</id>
    <title>None: gstreamer1-plugins-good security update</title>
    <updated date="2023-12-21 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: gstreamer1-plugins-good security update</summary>
    <description> ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2023-37327)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-37327" type="cve" title="fix CVE-2023-37327" />
    </references>
    <pkglist>
      <collection>
        <package name="gstreamer1-plugins-good" version="1.16.2" release="4.uel20" epoch="0" arch="x86_64" src="gstreamer1-plugins-good-1.16.2-4.uel20.src.rpm">
          <filename>gstreamer1-plugins-good-1.16.2-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="gstreamer1-plugins-good-gtk" version="1.16.2" release="4.uel20" epoch="0" arch="x86_64" src="gstreamer1-plugins-good-1.16.2-4.uel20.src.rpm">
          <filename>gstreamer1-plugins-good-gtk-1.16.2-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="gstreamer1-plugins-good" version="1.16.2" release="4.uel20" epoch="0" arch="aarch64" src="gstreamer1-plugins-good-1.16.2-4.uel20.src.rpm">
          <filename>gstreamer1-plugins-good-1.16.2-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="gstreamer1-plugins-good-help" version="1.16.2" release="4.uel20" epoch="0" arch="noarch" src="gstreamer1-plugins-good-1.16.2-4.uel20.src.rpm">
          <filename>gstreamer1-plugins-good-help-1.16.2-4.uel20.noarch.rpm</filename>
        </package>
        <package name="gstreamer1-plugins-good-gtk" version="1.16.2" release="4.uel20" epoch="0" arch="aarch64" src="gstreamer1-plugins-good-1.16.2-4.uel20.src.rpm">
          <filename>gstreamer1-plugins-good-gtk-1.16.2-4.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20010</id>
    <title>None: tar security update</title>
    <updated date="2023-12-27 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: tar security update</summary>
    <description> ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2023-39804)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-39804" type="cve" title="fix CVE-2023-39804" />
    </references>
    <pkglist>
      <collection>
        <package name="tar" version="1.32" release="3.uel20.05" epoch="2" arch="x86_64" src="tar-1.32-3.uel20.05.src.rpm">
          <filename>tar-1.32-3.uel20.05.x86_64.rpm</filename>
        </package>
        <package name="tar" version="1.32" release="3.uel20.05" epoch="2" arch="aarch64" src="tar-1.32-3.uel20.05.src.rpm">
          <filename>tar-1.32-3.uel20.05.aarch64.rpm</filename>
        </package>
        <package name="tar-help" version="1.32" release="3.uel20.05" epoch="2" arch="noarch" src="tar-1.32-3.uel20.05.src.rpm">
          <filename>tar-help-1.32-3.uel20.05.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20011</id>
    <title>Important: python-cryptography security update</title>
    <updated date="2023-12-25 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: python-cryptography security update</summary>
    <description> cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Calling `load_pem_pkcs7_certificates` or `load_der_pkcs7_certificates` could lead to a NULL-pointer dereference and segfault. Exploitation of this vulnerability poses a serious risk of Denial of Service (DoS) for any application attempting to deserialize a PKCS7 blob/certificate. The consequences extend to potential disruptions in system availability and stability. This vulnerability has been patched in version 41.0.6.(CVE-2023-49083)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-49083" type="cve" title="fix CVE-2023-49083" />
    </references>
    <pkglist>
      <collection>
        <package name="python2-cryptography" version="3.3.1" release="5.uel20" epoch="0" arch="x86_64" src="python-cryptography-3.3.1-5.uel20.src.rpm">
          <filename>python2-cryptography-3.3.1-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-cryptography" version="3.3.1" release="5.uel20" epoch="0" arch="x86_64" src="python-cryptography-3.3.1-5.uel20.src.rpm">
          <filename>python3-cryptography-3.3.1-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-cryptography" version="3.3.1" release="5.uel20" epoch="0" arch="aarch64" src="python-cryptography-3.3.1-5.uel20.src.rpm">
          <filename>python3-cryptography-3.3.1-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="python2-cryptography" version="3.3.1" release="5.uel20" epoch="0" arch="aarch64" src="python-cryptography-3.3.1-5.uel20.src.rpm">
          <filename>python2-cryptography-3.3.1-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="python-cryptography-help" version="3.3.1" release="5.uel20" epoch="0" arch="noarch" src="python-cryptography-3.3.1-5.uel20.src.rpm">
          <filename>python-cryptography-help-3.3.1-5.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20012</id>
    <title>Important: jgit security update</title>
    <updated date="2024-01-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: jgit security update</summary>
    <description> Arbitrary File Overwrite in Eclipse JGit &lt;= 6.6.0

In Eclipse JGit, all versions &lt;= 6.6.0.202305301015-r, a symbolic link present in a specially crafted git repository can be used to write a file to locations outside the working tree when this repository is cloned with JGit to a case-insensitive filesystem, or when a checkout from a clone of such a repository is performed on a case-insensitive filesystem.

This can happen on checkout (DirCacheCheckout), merge (ResolveMerger via its WorkingTreeUpdater), pull (PullCommand using merge), and when applying a patch (PatchApplier). This can be exploited for remote code execution (RCE), for instance if the file written outside the working tree is a git filter that gets executed on a subsequent git command.

The issue occurs only on case-insensitive filesystems, like the default filesystems on Windows and macOS. The user performing the clone or checkout must have the rights to create symbolic links for the problem to occur, and symbolic links must be enabled in the git configuration.

Setting git configuration option core.symlinks = false before checking out avoids the problem.

The issue was fixed in Eclipse JGit version 6.6.1.202309021850-r and 6.7.0.202309050840-r, available via  Maven Central https://repo1.maven.org/maven2/org/eclipse/jgit/  and  repo.eclipse.org https://repo.eclipse.org/content/repositories/jgit-releases/ .


The JGit maintainers would like to thank RyotaK for finding and reporting this issue.



(CVE-2023-4759)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-4759" type="cve" title="fix CVE-2023-4759" />
    </references>
    <pkglist>
      <collection>
        <package name="jgit-javadoc" version="5.11.0" release="3.uel20" epoch="0" arch="noarch" src="jgit-5.11.0-3.uel20.src.rpm">
          <filename>jgit-javadoc-5.11.0-3.uel20.noarch.rpm</filename>
        </package>
        <package name="jgit" version="5.11.0" release="3.uel20" epoch="0" arch="noarch" src="jgit-5.11.0-3.uel20.src.rpm">
          <filename>jgit-5.11.0-3.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20013</id>
    <title>Important: libsass security update</title>
    <updated date="2024-01-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: libsass security update</summary>
    <description> Stack overflow vulnerability in ast_selectors.cpp: in function Sass::ComplexSelector::has_placeholder in libsass:3.6.5-8-g210218, which can be exploited by attackers to cause a denial of service (DoS).(CVE-2022-43358)
 Stack overflow vulnerability in ast_selectors.cpp in function Sass::CompoundSelector::has_real_parent_ref in libsass:3.6.5-8-g210218, which can be exploited by attackers to causea denial of service (DoS). Also affects the command line driver for libsass, sassc 3.6.2.(CVE-2022-43357)
 Stack Overflow vulnerability in libsass 3.6.5 via the CompoundSelector::has_real_parent_ref function.(CVE-2022-26592)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-43358" type="cve" title="fix CVE-2022-43358" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-43357" type="cve" title="fix CVE-2022-43357" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-26592" type="cve" title="fix CVE-2022-26592" />
    </references>
    <pkglist>
      <collection>
        <package name="libsass" version="3.6.4" release="2.uel20" epoch="0" arch="x86_64" src="libsass-3.6.4-2.uel20.src.rpm">
          <filename>libsass-3.6.4-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="libsass-devel" version="3.6.4" release="2.uel20" epoch="0" arch="x86_64" src="libsass-3.6.4-2.uel20.src.rpm">
          <filename>libsass-devel-3.6.4-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="libsass-devel" version="3.6.4" release="2.uel20" epoch="0" arch="aarch64" src="libsass-3.6.4-2.uel20.src.rpm">
          <filename>libsass-devel-3.6.4-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="libsass" version="3.6.4" release="2.uel20" epoch="0" arch="aarch64" src="libsass-3.6.4-2.uel20.src.rpm">
          <filename>libsass-3.6.4-2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20014</id>
    <title>Important: python-flask security update</title>
    <updated date="2023-12-25 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: python-flask security update</summary>
    <description> Flask is a lightweight WSGI web application framework. When all of the following conditions are met, a response containing data intended for one client may be cached and subsequently sent by the proxy to other clients. If the proxy also caches `Set-Cookie` headers, it may send one client's `session` cookie to other clients. The severity depends on the application's use of the session and the proxy's behavior regarding cookies. The risk depends on all these conditions being met.

1. The application must be hosted behind a caching proxy that does not strip cookies or ignore responses with cookies.
2. The application sets `session.permanent = True`
3. The application does not access or modify the session at any point during a request.
4. `SESSION_REFRESH_EACH_REQUEST` enabled (the default).
5. The application does not set a `Cache-Control` header to indicate that a page is private or should not be cached.

This happens because vulnerable versions of Flask only set the `Vary: Cookie` header when the session is accessed or modified, not when it is refreshed (re-sent to update the expiration) without being accessed or modified. This issue has been fixed in versions 2.3.2 and 2.2.5.(CVE-2023-30861)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-30861" type="cve" title="fix CVE-2023-30861" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-flask" version="1.1.2" release="5.uel20" epoch="1" arch="noarch" src="python-flask-1.1.2-5.uel20.src.rpm">
          <filename>python3-flask-1.1.2-5.uel20.noarch.rpm</filename>
        </package>
        <package name="python2-flask" version="1.1.2" release="5.uel20" epoch="1" arch="noarch" src="python-flask-1.1.2-5.uel20.src.rpm">
          <filename>python2-flask-1.1.2-5.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20015</id>
    <title>Critical: mybatis security update</title>
    <updated date="2023-12-28 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: mybatis security update</summary>
    <description> A SQL injection vulnerability in Mybatis plus below 3.5.3.1 allows remote attackers to execute arbitrary SQL commands via the tenant ID valuer.(CVE-2023-25330)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-25330" type="cve" title="fix CVE-2023-25330" />
    </references>
    <pkglist>
      <collection>
        <package name="mybatis" version="3.5.8" release="1.uel20" epoch="0" arch="noarch" src="mybatis-3.5.8-1.uel20.src.rpm">
          <filename>mybatis-3.5.8-1.uel20.noarch.rpm</filename>
        </package>
        <package name="mybatis-javadoc" version="3.5.8" release="1.uel20" epoch="0" arch="noarch" src="mybatis-3.5.8-1.uel20.src.rpm">
          <filename>mybatis-javadoc-3.5.8-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20016</id>
    <title>Critical: containernetworking-plugins security update</title>
    <updated date="2024-01-10 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: containernetworking-plugins security update</summary>
    <description> Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g. "var a = {{.}}"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template.Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported, but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will now be escaped. This should be used with caution.(CVE-2023-24538)
 Calling any of the Parse functions on Go source code which contains //line directives with very large line numbers can cause an infinite loop due to integer overflow.(CVE-2023-24537)
 Multipart form parsing can consume large amounts of CPU and memory when processing form inputs containing very large numbers of parts. This stems from several causes: 1. mime/multipart.Reader.ReadForm limits the total memory a parsed multipart form can consume. ReadForm can undercount the amount of memory consumed, leading it to accept larger inputs than intended. 2. Limiting total memory does not account for increased pressure on the garbage collector from large numbers of small allocations in forms with many parts. 3. ReadForm can allocate a large number of short-lived buffers, further increasing pressure on the garbage collector. The combination of these factors can permit an attacker to cause an program that parses multipart forms to consume large amounts of CPU and memory, potentially resulting in a denial of service. This affects programs that use mime/multipart.Reader.ReadForm, as well as form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue. With fix, ReadForm now does a better job of estimating the memory consumption of parsed forms, and performs many fewer short-lived allocations. In addition, the fixed mime/multipart.Reader imposes the following limits on the size of parsed forms: 1. Forms parsed with ReadForm may contain no more than 1000 parts. This limit may be adjusted with the environment variable GODEBUG=multipartmaxparts=. 2. Form parts parsed with NextPart and NextRawPart may contain no more than 10,000 header fields. In addition, forms parsed with ReadForm may contain no more than 10,000 header fields across all parts. This limit may be adjusted with the environment variable GODEBUG=multipartmaxheaders=.(CVE-2023-24536)
 HTTP and MIME header parsing can allocate large amounts of memory, even when parsing small inputs, potentially leading to a denial of service. Certain unusual patterns of input data can cause the common function used to parse HTTP and MIME headers to allocate substantially more memory than required to hold the parsed headers. An attacker can exploit this behavior to cause an HTTP server to allocate large amounts of memory from a small request, potentially leading to memory exhaustion and a denial of service. With fix, header parsing now correctly allocates only the memory required to hold parsed headers.(CVE-2023-24534)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-24538" type="cve" title="fix CVE-2023-24538" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-24537" type="cve" title="fix CVE-2023-24537" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-24536" type="cve" title="fix CVE-2023-24536" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-24534" type="cve" title="fix CVE-2023-24534" />
    </references>
    <pkglist>
      <collection>
        <package name="containernetworking-plugins-unit-test-devel" version="0.8.6" release="6.gitad10b6f.uel20" epoch="0" arch="x86_64" src="containernetworking-plugins-0.8.6-6.gitad10b6f.uel20.src.rpm">
          <filename>containernetworking-plugins-unit-test-devel-0.8.6-6.gitad10b6f.uel20.x86_64.rpm</filename>
        </package>
        <package name="containernetworking-plugins" version="0.8.6" release="6.gitad10b6f.uel20" epoch="0" arch="x86_64" src="containernetworking-plugins-0.8.6-6.gitad10b6f.uel20.src.rpm">
          <filename>containernetworking-plugins-0.8.6-6.gitad10b6f.uel20.x86_64.rpm</filename>
        </package>
        <package name="containernetworking-plugins-unit-test-devel" version="0.8.6" release="6.gitad10b6f.uel20" epoch="0" arch="aarch64" src="containernetworking-plugins-0.8.6-6.gitad10b6f.uel20.src.rpm">
          <filename>containernetworking-plugins-unit-test-devel-0.8.6-6.gitad10b6f.uel20.aarch64.rpm</filename>
        </package>
        <package name="containernetworking-plugins" version="0.8.6" release="6.gitad10b6f.uel20" epoch="0" arch="aarch64" src="containernetworking-plugins-0.8.6-6.gitad10b6f.uel20.src.rpm">
          <filename>containernetworking-plugins-0.8.6-6.gitad10b6f.uel20.aarch64.rpm</filename>
        </package>
        <package name="containernetworking-plugins-devel" version="0.8.6" release="6.gitad10b6f.uel20" epoch="0" arch="noarch" src="containernetworking-plugins-0.8.6-6.gitad10b6f.uel20.src.rpm">
          <filename>containernetworking-plugins-devel-0.8.6-6.gitad10b6f.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20017</id>
    <title>Moderate: rubygem-puma security update</title>
    <updated date="2024-01-03 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: rubygem-puma security update</summary>
    <description> Puma is a Ruby/Rack web server built for parallelism. Prior to `puma` version `5.6.2`, `puma` may not always call `close` on the response body. Rails, prior to version `7.0.2.2`, depended on the response body being closed in order for its `CurrentAttributes` implementation to work correctly. The combination of these two behaviors (Puma not closing the body + Rails' Executor implementation) causes information leakage. This problem is fixed in Puma versions 5.6.2 and 4.3.11. This problem is fixed in Rails versions 7.02.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2. Upgrading to a patched Rails _or_ Puma version fixes the vulnerability.(CVE-2022-23634)
 Puma is a HTTP 1.1 server for Ruby/Rack applications. Prior to versions 5.5.1 and 4.3.9, using `puma` with a proxy which forwards HTTP header values which contain the LF character could allow HTTP request smugggling. A client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. The only proxy which has this behavior, as far as the Puma team is aware of, is Apache Traffic Server. If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request's body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client. This vulnerability was patched in Puma 5.5.1 and 4.3.9. As a workaround, do not use Apache Traffic Server with `puma`.(CVE-2021-41136)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-23634" type="cve" title="fix CVE-2022-23634" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-41136" type="cve" title="fix CVE-2021-41136" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-puma" version="3.12.6" release="3.uel20" epoch="0" arch="x86_64" src="rubygem-puma-3.12.6-3.uel20.src.rpm">
          <filename>rubygem-puma-3.12.6-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-puma-doc" version="3.12.6" release="3.uel20" epoch="0" arch="noarch" src="rubygem-puma-3.12.6-3.uel20.src.rpm">
          <filename>rubygem-puma-doc-3.12.6-3.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-puma" version="3.12.6" release="3.uel20" epoch="0" arch="aarch64" src="rubygem-puma-3.12.6-3.uel20.src.rpm">
          <filename>rubygem-puma-3.12.6-3.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20018</id>
    <title>Important: jettison security update</title>
    <updated date="2023-12-25 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: jettison security update</summary>
    <description> An infinite recursion is triggered in Jettison when constructing a JSONArray from a Collection that contains a self-reference in one of its elements. This leads to a StackOverflowError exception being thrown.

(CVE-2023-1436)
 Jettison before v1.5.2 was discovered to contain a stack overflow via the map parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.(CVE-2022-45693)
 A stack overflow in Jettison before v1.5.2 allows attackers to cause a Denial of Service (DoS) via crafted JSON data.(CVE-2022-45685)
 Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by Out of memory. This effect may support a denial of service attack.(CVE-2022-40150)
 Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.(CVE-2022-40149)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-1436" type="cve" title="fix CVE-2023-1436" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-45693" type="cve" title="fix CVE-2022-45693" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-45685" type="cve" title="fix CVE-2022-45685" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-40150" type="cve" title="fix CVE-2022-40150" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-40149" type="cve" title="fix CVE-2022-40149" />
    </references>
    <pkglist>
      <collection>
        <package name="jettison-javadoc" version="1.5.4" release="1.uel20" epoch="0" arch="noarch" src="jettison-1.5.4-1.uel20.src.rpm">
          <filename>jettison-javadoc-1.5.4-1.uel20.noarch.rpm</filename>
        </package>
        <package name="jettison" version="1.5.4" release="1.uel20" epoch="0" arch="noarch" src="jettison-1.5.4-1.uel20.src.rpm">
          <filename>jettison-1.5.4-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20019</id>
    <title>Critical: tidy security update</title>
    <updated date="2024-01-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: tidy security update</summary>
    <description> An issue in HTACG HTML Tidy v5.7.28 allows attacker to execute arbitrary code via the -g option of the CleanNode() function in gdoc.c.(CVE-2021-33391)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-33391" type="cve" title="fix CVE-2021-33391" />
    </references>
    <pkglist>
      <collection>
        <package name="tidy" version="5.6.0" release="5.uel20" epoch="0" arch="x86_64" src="tidy-5.6.0-5.uel20.src.rpm">
          <filename>tidy-5.6.0-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="libtidy-devel" version="5.6.0" release="5.uel20" epoch="0" arch="x86_64" src="tidy-5.6.0-5.uel20.src.rpm">
          <filename>libtidy-devel-5.6.0-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="libtidy" version="5.6.0" release="5.uel20" epoch="0" arch="x86_64" src="tidy-5.6.0-5.uel20.src.rpm">
          <filename>libtidy-5.6.0-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="libtidy" version="5.6.0" release="5.uel20" epoch="0" arch="aarch64" src="tidy-5.6.0-5.uel20.src.rpm">
          <filename>libtidy-5.6.0-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="tidy-help" version="5.6.0" release="5.uel20" epoch="0" arch="noarch" src="tidy-5.6.0-5.uel20.src.rpm">
          <filename>tidy-help-5.6.0-5.uel20.noarch.rpm</filename>
        </package>
        <package name="tidy" version="5.6.0" release="5.uel20" epoch="0" arch="aarch64" src="tidy-5.6.0-5.uel20.src.rpm">
          <filename>tidy-5.6.0-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="libtidy-devel" version="5.6.0" release="5.uel20" epoch="0" arch="aarch64" src="tidy-5.6.0-5.uel20.src.rpm">
          <filename>libtidy-devel-5.6.0-5.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20022</id>
    <title>Important: netty security update</title>
    <updated date="2023-12-28 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: netty security update</summary>
    <description> Netty project is an event-driven asynchronous network application framework. In versions prior to 4.1.86.Final, a StackOverflowError can be raised when parsing a malformed crafted message due to an infinite recursion. This issue is patched in version 4.1.86.Final. There is no workaround, except using a custom HaProxyMessageDecoder.(CVE-2022-41881)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-41881" type="cve" title="fix CVE-2022-41881" />
    </references>
    <pkglist>
      <collection>
        <package name="netty" version="4.1.13" release="18.uel20" epoch="0" arch="x86_64" src="netty-4.1.13-18.uel20.src.rpm">
          <filename>netty-4.1.13-18.uel20.x86_64.rpm</filename>
        </package>
        <package name="netty-help" version="4.1.13" release="18.uel20" epoch="0" arch="noarch" src="netty-4.1.13-18.uel20.src.rpm">
          <filename>netty-help-4.1.13-18.uel20.noarch.rpm</filename>
        </package>
        <package name="netty" version="4.1.13" release="18.uel20" epoch="0" arch="aarch64" src="netty-4.1.13-18.uel20.src.rpm">
          <filename>netty-4.1.13-18.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20023</id>
    <title>Important: freeradius security update</title>
    <updated date="2023-12-21 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: freeradius security update</summary>
    <description> In freeradius, the EAP-PWD function compute_password_element() leaks information about the password which allows an attacker to substantially reduce the size of an offline dictionary attack.(CVE-2022-41859)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-41859" type="cve" title="fix CVE-2022-41859" />
    </references>
    <pkglist>
      <collection>
        <package name="freeradius-krb5" version="3.0.15" release="27.uel20" epoch="0" arch="x86_64" src="freeradius-3.0.15-27.uel20.src.rpm">
          <filename>freeradius-krb5-3.0.15-27.uel20.x86_64.rpm</filename>
        </package>
        <package name="python2-freeradius" version="3.0.15" release="27.uel20" epoch="0" arch="x86_64" src="freeradius-3.0.15-27.uel20.src.rpm">
          <filename>python2-freeradius-3.0.15-27.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeradius-perl" version="3.0.15" release="27.uel20" epoch="0" arch="x86_64" src="freeradius-3.0.15-27.uel20.src.rpm">
          <filename>freeradius-perl-3.0.15-27.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeradius-help" version="3.0.15" release="27.uel20" epoch="0" arch="x86_64" src="freeradius-3.0.15-27.uel20.src.rpm">
          <filename>freeradius-help-3.0.15-27.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeradius-devel" version="3.0.15" release="27.uel20" epoch="0" arch="x86_64" src="freeradius-3.0.15-27.uel20.src.rpm">
          <filename>freeradius-devel-3.0.15-27.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeradius-sqlite" version="3.0.15" release="27.uel20" epoch="0" arch="x86_64" src="freeradius-3.0.15-27.uel20.src.rpm">
          <filename>freeradius-sqlite-3.0.15-27.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeradius-utils" version="3.0.15" release="27.uel20" epoch="0" arch="x86_64" src="freeradius-3.0.15-27.uel20.src.rpm">
          <filename>freeradius-utils-3.0.15-27.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeradius-mysql" version="3.0.15" release="27.uel20" epoch="0" arch="x86_64" src="freeradius-3.0.15-27.uel20.src.rpm">
          <filename>freeradius-mysql-3.0.15-27.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeradius" version="3.0.15" release="27.uel20" epoch="0" arch="x86_64" src="freeradius-3.0.15-27.uel20.src.rpm">
          <filename>freeradius-3.0.15-27.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeradius-postgresql" version="3.0.15" release="27.uel20" epoch="0" arch="x86_64" src="freeradius-3.0.15-27.uel20.src.rpm">
          <filename>freeradius-postgresql-3.0.15-27.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeradius-ldap" version="3.0.15" release="27.uel20" epoch="0" arch="x86_64" src="freeradius-3.0.15-27.uel20.src.rpm">
          <filename>freeradius-ldap-3.0.15-27.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeradius-postgresql" version="3.0.15" release="27.uel20" epoch="0" arch="aarch64" src="freeradius-3.0.15-27.uel20.src.rpm">
          <filename>freeradius-postgresql-3.0.15-27.uel20.aarch64.rpm</filename>
        </package>
        <package name="freeradius-perl" version="3.0.15" release="27.uel20" epoch="0" arch="aarch64" src="freeradius-3.0.15-27.uel20.src.rpm">
          <filename>freeradius-perl-3.0.15-27.uel20.aarch64.rpm</filename>
        </package>
        <package name="freeradius-ldap" version="3.0.15" release="27.uel20" epoch="0" arch="aarch64" src="freeradius-3.0.15-27.uel20.src.rpm">
          <filename>freeradius-ldap-3.0.15-27.uel20.aarch64.rpm</filename>
        </package>
        <package name="freeradius" version="3.0.15" release="27.uel20" epoch="0" arch="aarch64" src="freeradius-3.0.15-27.uel20.src.rpm">
          <filename>freeradius-3.0.15-27.uel20.aarch64.rpm</filename>
        </package>
        <package name="freeradius-devel" version="3.0.15" release="27.uel20" epoch="0" arch="aarch64" src="freeradius-3.0.15-27.uel20.src.rpm">
          <filename>freeradius-devel-3.0.15-27.uel20.aarch64.rpm</filename>
        </package>
        <package name="freeradius-utils" version="3.0.15" release="27.uel20" epoch="0" arch="aarch64" src="freeradius-3.0.15-27.uel20.src.rpm">
          <filename>freeradius-utils-3.0.15-27.uel20.aarch64.rpm</filename>
        </package>
        <package name="freeradius-krb5" version="3.0.15" release="27.uel20" epoch="0" arch="aarch64" src="freeradius-3.0.15-27.uel20.src.rpm">
          <filename>freeradius-krb5-3.0.15-27.uel20.aarch64.rpm</filename>
        </package>
        <package name="freeradius-help" version="3.0.15" release="27.uel20" epoch="0" arch="aarch64" src="freeradius-3.0.15-27.uel20.src.rpm">
          <filename>freeradius-help-3.0.15-27.uel20.aarch64.rpm</filename>
        </package>
        <package name="python2-freeradius" version="3.0.15" release="27.uel20" epoch="0" arch="aarch64" src="freeradius-3.0.15-27.uel20.src.rpm">
          <filename>python2-freeradius-3.0.15-27.uel20.aarch64.rpm</filename>
        </package>
        <package name="freeradius-mysql" version="3.0.15" release="27.uel20" epoch="0" arch="aarch64" src="freeradius-3.0.15-27.uel20.src.rpm">
          <filename>freeradius-mysql-3.0.15-27.uel20.aarch64.rpm</filename>
        </package>
        <package name="freeradius-sqlite" version="3.0.15" release="27.uel20" epoch="0" arch="aarch64" src="freeradius-3.0.15-27.uel20.src.rpm">
          <filename>freeradius-sqlite-3.0.15-27.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20024</id>
    <title>Important: jackson-databind security update</title>
    <updated date="2023-12-25 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: jackson-databind security update</summary>
    <description> In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.(CVE-2022-42004)
 In FasterXML jackson-databind before 2.14.0-rc1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled. Additional fix version in 2.13.4.1 and 2.12.17.1(CVE-2022-42003)
 jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of service via a large depth of nested objects.(CVE-2020-36518)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-42004" type="cve" title="fix CVE-2022-42004" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-42003" type="cve" title="fix CVE-2022-42003" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-36518" type="cve" title="fix CVE-2020-36518" />
    </references>
    <pkglist>
      <collection>
        <package name="jackson-databind-javadoc" version="2.9.8" release="10.uel20" epoch="0" arch="noarch" src="jackson-databind-2.9.8-10.uel20.src.rpm">
          <filename>jackson-databind-javadoc-2.9.8-10.uel20.noarch.rpm</filename>
        </package>
        <package name="jackson-databind" version="2.9.8" release="10.uel20" epoch="0" arch="noarch" src="jackson-databind-2.9.8-10.uel20.src.rpm">
          <filename>jackson-databind-2.9.8-10.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20025</id>
    <title>Critical: hsqldb1 security update</title>
    <updated date="2023-12-21 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: hsqldb1 security update</summary>
    <description> Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb (HyperSQL DataBase) to process untrusted input may be vulnerable to a remote code execution attack. By default it is allowed to call any static method of any Java class in the classpath resulting in code execution. The issue can be prevented by updating to 2.7.1 or by setting the system property "hsqldb.method_class_names" to classes which are allowed to be called. For example, System.setProperty("hsqldb.method_class_names", "abc") or Java argument -Dhsqldb.method_class_names="abc" can be used. From version 2.7.1 all classes by default are not accessible except those in java.lang.Math and need to be manually enabled.(CVE-2022-41853)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-41853" type="cve" title="fix CVE-2022-41853" />
    </references>
    <pkglist>
      <collection>
        <package name="hsqldb1-javadoc" version="1.8.1.3" release="3.uel20" epoch="0" arch="noarch" src="hsqldb1-1.8.1.3-3.uel20.src.rpm">
          <filename>hsqldb1-javadoc-1.8.1.3-3.uel20.noarch.rpm</filename>
        </package>
        <package name="hsqldb1" version="1.8.1.3" release="3.uel20" epoch="0" arch="noarch" src="hsqldb1-1.8.1.3-3.uel20.src.rpm">
          <filename>hsqldb1-1.8.1.3-3.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20027</id>
    <title>Important: zeromq security update</title>
    <updated date="2024-02-05 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: zeromq security update</summary>
    <description> In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with CURVE/ZAP, legitimate clients will not be able to exchange any message. Handshakes complete successfully, and messages are delivered to the library, but the server application never receives them. This is patched in version 4.3.3.(CVE-2020-15166)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-15166" type="cve" title="fix CVE-2020-15166" />
    </references>
    <pkglist>
      <collection>
        <package name="zeromq-devel" version="4.3.4" release="1.uel20" epoch="0" arch="x86_64" src="zeromq-4.3.4-1.uel20.src.rpm">
          <filename>zeromq-devel-4.3.4-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="zeromq" version="4.3.4" release="1.uel20" epoch="0" arch="x86_64" src="zeromq-4.3.4-1.uel20.src.rpm">
          <filename>zeromq-4.3.4-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="zeromq-devel" version="4.3.4" release="1.uel20" epoch="0" arch="aarch64" src="zeromq-4.3.4-1.uel20.src.rpm">
          <filename>zeromq-devel-4.3.4-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="zeromq" version="4.3.4" release="1.uel20" epoch="0" arch="aarch64" src="zeromq-4.3.4-1.uel20.src.rpm">
          <filename>zeromq-4.3.4-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20029</id>
    <title>Moderate: imagemagick security update</title>
    <updated date="2024-02-18 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: imagemagick security update</summary>
    <description> A heap use-after-free flaw was found in coders/bmp.c in ImageMagick.(CVE-2023-5341)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-5341" type="cve" title="fix CVE-2023-5341" />
    </references>
    <pkglist>
      <collection>
        <package name="ImageMagick" version="6.9.12.86" release="5.uel20" epoch="1" arch="x86_64" src="ImageMagick-6.9.12.86-5.uel20.src.rpm">
          <filename>ImageMagick-6.9.12.86-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="ImageMagick-help" version="6.9.12.86" release="5.uel20" epoch="1" arch="x86_64" src="ImageMagick-6.9.12.86-5.uel20.src.rpm">
          <filename>ImageMagick-help-6.9.12.86-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="ImageMagick-devel" version="6.9.12.86" release="5.uel20" epoch="1" arch="x86_64" src="ImageMagick-6.9.12.86-5.uel20.src.rpm">
          <filename>ImageMagick-devel-6.9.12.86-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="ImageMagick-c++-devel" version="6.9.12.86" release="5.uel20" epoch="1" arch="x86_64" src="ImageMagick-6.9.12.86-5.uel20.src.rpm">
          <filename>ImageMagick-c++-devel-6.9.12.86-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="ImageMagick-perl" version="6.9.12.86" release="5.uel20" epoch="1" arch="x86_64" src="ImageMagick-6.9.12.86-5.uel20.src.rpm">
          <filename>ImageMagick-perl-6.9.12.86-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="ImageMagick-c++" version="6.9.12.86" release="5.uel20" epoch="1" arch="x86_64" src="ImageMagick-6.9.12.86-5.uel20.src.rpm">
          <filename>ImageMagick-c++-6.9.12.86-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="ImageMagick" version="6.9.12.86" release="5.uel20" epoch="1" arch="aarch64" src="ImageMagick-6.9.12.86-5.uel20.src.rpm">
          <filename>ImageMagick-6.9.12.86-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="ImageMagick-help" version="6.9.12.86" release="5.uel20" epoch="1" arch="aarch64" src="ImageMagick-6.9.12.86-5.uel20.src.rpm">
          <filename>ImageMagick-help-6.9.12.86-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="ImageMagick-perl" version="6.9.12.86" release="5.uel20" epoch="1" arch="aarch64" src="ImageMagick-6.9.12.86-5.uel20.src.rpm">
          <filename>ImageMagick-perl-6.9.12.86-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="ImageMagick-c++" version="6.9.12.86" release="5.uel20" epoch="1" arch="aarch64" src="ImageMagick-6.9.12.86-5.uel20.src.rpm">
          <filename>ImageMagick-c++-6.9.12.86-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="ImageMagick-c++-devel" version="6.9.12.86" release="5.uel20" epoch="1" arch="aarch64" src="ImageMagick-6.9.12.86-5.uel20.src.rpm">
          <filename>ImageMagick-c++-devel-6.9.12.86-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="ImageMagick-devel" version="6.9.12.86" release="5.uel20" epoch="1" arch="aarch64" src="ImageMagick-6.9.12.86-5.uel20.src.rpm">
          <filename>ImageMagick-devel-6.9.12.86-5.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20030</id>
    <title>Important: grafana security update</title>
    <updated date="2024-01-25 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: grafana security update</summary>
    <description> Improper exposure of client IP addresses in net/http before Go 1.17.12 and Go 1.18.4 can be triggered by calling httputil.ReverseProxy.ServeHTTP with a Request.Header map containing a nil value for the X-Forwarded-For header, which causes ReverseProxy to set the client IP as the value of the X-Forwarded-For header.(CVE-2022-32148)
 A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function.(CVE-2023-39325)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-32148" type="cve" title="fix CVE-2022-32148" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-39325" type="cve" title="fix CVE-2023-39325" />
    </references>
    <pkglist>
      <collection>
        <package name="grafana" version="7.5.15" release="5.up1.uel20" epoch="0" arch="x86_64" src="grafana-7.5.15-5.up1.uel20.src.rpm">
          <filename>grafana-7.5.15-5.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="grafana" version="7.5.15" release="5.up1.uel20" epoch="0" arch="aarch64" src="grafana-7.5.15-5.up1.uel20.src.rpm">
          <filename>grafana-7.5.15-5.up1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20031</id>
    <title>Important: tomcat security update</title>
    <updated date="2024-01-29 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: tomcat security update</summary>
    <description> Generation of Error Message Containing Sensitive Information vulnerability in Apache Tomcat.This issue affects Apache Tomcat: from 8.5.7 through 8.5.63, from 9.0.0-M11 through 9.0.43. Users are recommended to upgrade to version 8.5.64 onwards or 9.0.44 onwards, which contain a fix for the issue.(CVE-2024-21733)
 Incomplete Cleanup vulnerability in Apache Tomcat.When recycling various internal objects in Apache Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.80 and from 8.5.0 through 8.5.93, an error could 
cause Tomcat to skip some parts of the recycling process leading to 
information leaking from the current request/response to the next.

Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.

(CVE-2023-42795)
 The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP       connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was       submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur.




(CVE-2023-28709)
 Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads.




Note that, like all of the file upload limits, the
          new configuration option (FileUploadBase#setFileCountMax) is not
          enabled by default and must be explicitly configured.


(CVE-2023-24998)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21733" type="cve" title="fix CVE-2024-21733" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-42795" type="cve" title="fix CVE-2023-42795" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-28709" type="cve" title="fix CVE-2023-28709" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-24998" type="cve" title="fix CVE-2023-24998" />
    </references>
    <pkglist>
      <collection>
        <package name="tomcat-help" version="9.0.10" release="31.up1.uel20" epoch="1" arch="noarch" src="tomcat-9.0.10-31.up1.uel20.src.rpm">
          <filename>tomcat-help-9.0.10-31.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="tomcat" version="9.0.10" release="31.up1.uel20" epoch="1" arch="noarch" src="tomcat-9.0.10-31.up1.uel20.src.rpm">
          <filename>tomcat-9.0.10-31.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="tomcat-jsvc" version="9.0.10" release="31.up1.uel20" epoch="1" arch="noarch" src="tomcat-9.0.10-31.up1.uel20.src.rpm">
          <filename>tomcat-jsvc-9.0.10-31.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="tomcat-embed" version="9.0.10" release="31.up1.uel20" epoch="1" arch="noarch" src="tomcat-9.0.10-31.up1.uel20.src.rpm">
          <filename>tomcat-embed-9.0.10-31.up1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20032</id>
    <title>None: apache-sshd security update</title>
    <updated date="2024-01-24 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: apache-sshd security update</summary>
    <description> The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.(CVE-2023-48795)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-48795" type="cve" title="fix CVE-2023-48795" />
    </references>
    <pkglist>
      <collection>
        <package name="apache-sshd-javadoc" version="2.9.2" release="3.uel20" epoch="1" arch="noarch" src="apache-sshd-2.9.2-3.uel20.src.rpm">
          <filename>apache-sshd-javadoc-2.9.2-3.uel20.noarch.rpm</filename>
        </package>
        <package name="apache-sshd" version="2.9.2" release="3.uel20" epoch="1" arch="noarch" src="apache-sshd-2.9.2-3.uel20.src.rpm">
          <filename>apache-sshd-2.9.2-3.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20035</id>
    <title>None: mongo-c-driver security update</title>
    <updated date="2024-01-18 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: mongo-c-driver security update</summary>
    <description> When calling bson_utf8_validate on some inputs a loop with an exit condition that cannot be reached may occur, i.e. an infinite loop. This issue affects All MongoDB C Driver versions prior to versions 1.25.0.(CVE-2023-0437)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-0437" type="cve" title="fix CVE-2023-0437" />
    </references>
    <pkglist>
      <collection>
        <package name="mongo-c-driver-help" version="1.13.1" release="7.uel20" epoch="0" arch="x86_64" src="mongo-c-driver-1.13.1-7.uel20.src.rpm">
          <filename>mongo-c-driver-help-1.13.1-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="mongo-c-driver-devel" version="1.13.1" release="7.uel20" epoch="0" arch="x86_64" src="mongo-c-driver-1.13.1-7.uel20.src.rpm">
          <filename>mongo-c-driver-devel-1.13.1-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="mongo-c-driver" version="1.13.1" release="7.uel20" epoch="0" arch="x86_64" src="mongo-c-driver-1.13.1-7.uel20.src.rpm">
          <filename>mongo-c-driver-1.13.1-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="libbson-devel" version="1.13.1" release="7.uel20" epoch="0" arch="x86_64" src="mongo-c-driver-1.13.1-7.uel20.src.rpm">
          <filename>libbson-devel-1.13.1-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="libbson" version="1.13.1" release="7.uel20" epoch="0" arch="x86_64" src="mongo-c-driver-1.13.1-7.uel20.src.rpm">
          <filename>libbson-1.13.1-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="mongo-c-driver" version="1.13.1" release="7.uel20" epoch="0" arch="aarch64" src="mongo-c-driver-1.13.1-7.uel20.src.rpm">
          <filename>mongo-c-driver-1.13.1-7.uel20.aarch64.rpm</filename>
        </package>
        <package name="mongo-c-driver-help" version="1.13.1" release="7.uel20" epoch="0" arch="aarch64" src="mongo-c-driver-1.13.1-7.uel20.src.rpm">
          <filename>mongo-c-driver-help-1.13.1-7.uel20.aarch64.rpm</filename>
        </package>
        <package name="mongo-c-driver-devel" version="1.13.1" release="7.uel20" epoch="0" arch="aarch64" src="mongo-c-driver-1.13.1-7.uel20.src.rpm">
          <filename>mongo-c-driver-devel-1.13.1-7.uel20.aarch64.rpm</filename>
        </package>
        <package name="libbson-devel" version="1.13.1" release="7.uel20" epoch="0" arch="aarch64" src="mongo-c-driver-1.13.1-7.uel20.src.rpm">
          <filename>libbson-devel-1.13.1-7.uel20.aarch64.rpm</filename>
        </package>
        <package name="libbson" version="1.13.1" release="7.uel20" epoch="0" arch="aarch64" src="mongo-c-driver-1.13.1-7.uel20.src.rpm">
          <filename>libbson-1.13.1-7.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20038</id>
    <title>Critical: libexif security update</title>
    <updated date="2024-01-18 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: libexif security update</summary>
    <description> In exif_entry_get_value of exif-entry.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if a third party app used this library to process remote image data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-159625731(CVE-2020-0452)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-0452" type="cve" title="fix CVE-2020-0452" />
    </references>
    <pkglist>
      <collection>
        <package name="libexif-devel" version="0.6.21" release="26.uel20" epoch="0" arch="x86_64" src="libexif-0.6.21-26.uel20.src.rpm">
          <filename>libexif-devel-0.6.21-26.uel20.x86_64.rpm</filename>
        </package>
        <package name="libexif" version="0.6.21" release="26.uel20" epoch="0" arch="x86_64" src="libexif-0.6.21-26.uel20.src.rpm">
          <filename>libexif-0.6.21-26.uel20.x86_64.rpm</filename>
        </package>
        <package name="libexif" version="0.6.21" release="26.uel20" epoch="0" arch="aarch64" src="libexif-0.6.21-26.uel20.src.rpm">
          <filename>libexif-0.6.21-26.uel20.aarch64.rpm</filename>
        </package>
        <package name="libexif-help" version="0.6.21" release="26.uel20" epoch="0" arch="noarch" src="libexif-0.6.21-26.uel20.src.rpm">
          <filename>libexif-help-0.6.21-26.uel20.noarch.rpm</filename>
        </package>
        <package name="libexif-devel" version="0.6.21" release="26.uel20" epoch="0" arch="aarch64" src="libexif-0.6.21-26.uel20.src.rpm">
          <filename>libexif-devel-0.6.21-26.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20039</id>
    <title>Moderate: mysql-connector-java security update</title>
    <updated date="2024-01-30 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: mysql-connector-java security update</summary>
    <description> Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).(CVE-2022-21363)
 Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Connectors accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Connectors. CVSS 3.1 Base Score 5.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H).(CVE-2021-2471)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21363" type="cve" title="fix CVE-2022-21363" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-2471" type="cve" title="fix CVE-2021-2471" />
    </references>
    <pkglist>
      <collection>
        <package name="mysql-connector-java" version="8.0.30" release="1.uel20" epoch="1" arch="noarch" src="mysql-connector-java-8.0.30-1.uel20.src.rpm">
          <filename>mysql-connector-java-8.0.30-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20040</id>
    <title>None: sqlite security update</title>
    <updated date="2024-01-12 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: sqlite security update</summary>
    <description> A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.(CVE-2023-7104)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-7104" type="cve" title="fix CVE-2023-7104" />
    </references>
    <pkglist>
      <collection>
        <package name="sqlite-devel" version="3.32.3" release="6.uel20.03" epoch="0" arch="x86_64" src="sqlite-3.32.3-6.uel20.03.src.rpm">
          <filename>sqlite-devel-3.32.3-6.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="sqlite" version="3.32.3" release="6.uel20.03" epoch="0" arch="x86_64" src="sqlite-3.32.3-6.uel20.03.src.rpm">
          <filename>sqlite-3.32.3-6.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="sqlite-help" version="3.32.3" release="6.uel20.03" epoch="0" arch="noarch" src="sqlite-3.32.3-6.uel20.03.src.rpm">
          <filename>sqlite-help-3.32.3-6.uel20.03.noarch.rpm</filename>
        </package>
        <package name="sqlite" version="3.32.3" release="6.uel20.03" epoch="0" arch="aarch64" src="sqlite-3.32.3-6.uel20.03.src.rpm">
          <filename>sqlite-3.32.3-6.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="sqlite-devel" version="3.32.3" release="6.uel20.03" epoch="0" arch="aarch64" src="sqlite-3.32.3-6.uel20.03.src.rpm">
          <filename>sqlite-devel-3.32.3-6.uel20.03.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20041</id>
    <title>None: sudo security update</title>
    <updated date="2024-01-17 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: sudo security update</summary>
    <description> Sudo before 1.9.15 might allow row hammer attacks (for authentication bypass or privilege escalation) because application logic sometimes is based on not equaling an error value (instead of equaling a success value), and because the values do not resist flips of a single bit.(CVE-2023-42465)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-42465" type="cve" title="fix CVE-2023-42465" />
    </references>
    <pkglist>
      <collection>
        <package name="sudo" version="1.9.2" release="15.uel20.01" epoch="0" arch="x86_64" src="sudo-1.9.2-15.uel20.01.src.rpm">
          <filename>sudo-1.9.2-15.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="sudo-devel" version="1.9.2" release="15.uel20.01" epoch="0" arch="x86_64" src="sudo-1.9.2-15.uel20.01.src.rpm">
          <filename>sudo-devel-1.9.2-15.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="sudo" version="1.9.2" release="15.uel20.01" epoch="0" arch="aarch64" src="sudo-1.9.2-15.uel20.01.src.rpm">
          <filename>sudo-1.9.2-15.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="sudo-help" version="1.9.2" release="15.uel20.01" epoch="0" arch="noarch" src="sudo-1.9.2-15.uel20.01.src.rpm">
          <filename>sudo-help-1.9.2-15.uel20.01.noarch.rpm</filename>
        </package>
        <package name="sudo-devel" version="1.9.2" release="15.uel20.01" epoch="0" arch="aarch64" src="sudo-1.9.2-15.uel20.01.src.rpm">
          <filename>sudo-devel-1.9.2-15.uel20.01.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20042</id>
    <title>Important: espeak-ng security update</title>
    <updated date="2024-01-15 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: espeak-ng security update</summary>
    <description> Espeak-ng 1.52-dev was discovered to contain a Floating Point Exception via the function PeaksToHarmspect at wavegen.c.(CVE-2023-49994)
 Espeak-ng 1.52-dev was discovered to contain a Buffer Overflow via the function ReadClause at readclause.c.(CVE-2023-49993)
 Espeak-ng 1.52-dev was discovered to contain a Stack Buffer Overflow via the function RemoveEnding at dictionary.c.(CVE-2023-49992)
 Espeak-ng 1.52-dev was discovered to contain a Stack Buffer Underflow via the function CountVowelPosition at synthdata.c.(CVE-2023-49991)
 Espeak-ng 1.52-dev was discovered to contain a buffer-overflow via the function SetUpPhonemeTable at synthdata.c.(CVE-2023-49990)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-49994" type="cve" title="fix CVE-2023-49994" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-49993" type="cve" title="fix CVE-2023-49993" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-49992" type="cve" title="fix CVE-2023-49992" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-49991" type="cve" title="fix CVE-2023-49991" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-49990" type="cve" title="fix CVE-2023-49990" />
    </references>
    <pkglist>
      <collection>
        <package name="espeak-ng-devel" version="1.51" release="2.uel20" epoch="0" arch="x86_64" src="espeak-ng-1.51-2.uel20.src.rpm">
          <filename>espeak-ng-devel-1.51-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="espeak-ng" version="1.51" release="2.uel20" epoch="0" arch="x86_64" src="espeak-ng-1.51-2.uel20.src.rpm">
          <filename>espeak-ng-1.51-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="espeak-ng" version="1.51" release="2.uel20" epoch="0" arch="aarch64" src="espeak-ng-1.51-2.uel20.src.rpm">
          <filename>espeak-ng-1.51-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="espeak-ng-help" version="1.51" release="2.uel20" epoch="0" arch="noarch" src="espeak-ng-1.51-2.uel20.src.rpm">
          <filename>espeak-ng-help-1.51-2.uel20.noarch.rpm</filename>
        </package>
        <package name="espeak-ng-devel" version="1.51" release="2.uel20" epoch="0" arch="aarch64" src="espeak-ng-1.51-2.uel20.src.rpm">
          <filename>espeak-ng-devel-1.51-2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20044</id>
    <title>Important: testng security update</title>
    <updated date="2024-01-17 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: testng security update</summary>
    <description> A vulnerability was found in cbeust testng 7.5.0/7.6.0/7.6.1/7.7.0. It has been declared as critical. Affected by this vulnerability is the function testngXmlExistsInJar of the file testng-core/src/main/java/org/testng/JarFileUtils.java of the component XML File Parser. The manipulation leads to path traversal. The attack can be launched remotely. Upgrading to version 7.5.1 and 7.7.1 is able to address this issue. The patch is named 9150736cd2c123a6a3b60e6193630859f9f0422b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-214027.(CVE-2022-4065)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-4065" type="cve" title="fix CVE-2022-4065" />
    </references>
    <pkglist>
      <collection>
        <package name="testng-javadoc" version="6.14.3" release="7.uel20" epoch="0" arch="noarch" src="testng-6.14.3-7.uel20.src.rpm">
          <filename>testng-javadoc-6.14.3-7.uel20.noarch.rpm</filename>
        </package>
        <package name="testng" version="6.14.3" release="7.uel20" epoch="0" arch="noarch" src="testng-6.14.3-7.uel20.src.rpm">
          <filename>testng-6.14.3-7.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20045</id>
    <title>None: apache-mime4j security update</title>
    <updated date="2024-03-05 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: apache-mime4j security update</summary>
    <description> Improper input validation allows for header injection in MIME4J library when using MIME4J DOM for composing message.
This can be exploited by an attacker to add unintended headers to MIME messages.
(CVE-2024-21742)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21742" type="cve" title="fix CVE-2024-21742" />
    </references>
    <pkglist>
      <collection>
        <package name="apache-mime4j-javadoc" version="0.8.1" release="2.uel20" epoch="0" arch="noarch" src="apache-mime4j-0.8.1-2.uel20.src.rpm">
          <filename>apache-mime4j-javadoc-0.8.1-2.uel20.noarch.rpm</filename>
        </package>
        <package name="apache-mime4j" version="0.8.1" release="2.uel20" epoch="0" arch="noarch" src="apache-mime4j-0.8.1-2.uel20.src.rpm">
          <filename>apache-mime4j-0.8.1-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20047</id>
    <title>None: fontforge security update</title>
    <updated date="2024-03-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: fontforge security update</summary>
    <description> Splinefont in FontForge through 20230101 allows command injection via crafted archives or compressed files.(CVE-2024-25082)
 Splinefont in FontForge through 20230101 allows command injection via crafted filenames.(CVE-2024-25081)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-25082" type="cve" title="fix CVE-2024-25082" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-25081" type="cve" title="fix CVE-2024-25081" />
    </references>
    <pkglist>
      <collection>
        <package name="fontforge" version="20200314" release="5.uel20" epoch="0" arch="x86_64" src="fontforge-20200314-5.uel20.src.rpm">
          <filename>fontforge-20200314-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="fontforge-devel" version="20200314" release="5.uel20" epoch="0" arch="x86_64" src="fontforge-20200314-5.uel20.src.rpm">
          <filename>fontforge-devel-20200314-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="fontforge" version="20200314" release="5.uel20" epoch="0" arch="aarch64" src="fontforge-20200314-5.uel20.src.rpm">
          <filename>fontforge-20200314-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="fontforge-devel" version="20200314" release="5.uel20" epoch="0" arch="aarch64" src="fontforge-20200314-5.uel20.src.rpm">
          <filename>fontforge-devel-20200314-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="fontforge-help" version="20200314" release="5.uel20" epoch="0" arch="noarch" src="fontforge-20200314-5.uel20.src.rpm">
          <filename>fontforge-help-20200314-5.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20049</id>
    <title>None: less security update</title>
    <updated date="2024-02-26 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: less security update</summary>
    <description> close_altfile in filename.c in less before 606 omits shell_quote calls for LESSCLOSE.(CVE-2022-48624)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-48624" type="cve" title="fix CVE-2022-48624" />
    </references>
    <pkglist>
      <collection>
        <package name="less" version="590" release="2.uel20.02" epoch="0" arch="x86_64" src="less-590-2.uel20.02.src.rpm">
          <filename>less-590-2.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="less-help" version="590" release="2.uel20.02" epoch="0" arch="noarch" src="less-590-2.uel20.02.src.rpm">
          <filename>less-help-590-2.uel20.02.noarch.rpm</filename>
        </package>
        <package name="less" version="590" release="2.uel20.02" epoch="0" arch="aarch64" src="less-590-2.uel20.02.src.rpm">
          <filename>less-590-2.uel20.02.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20050</id>
    <title>Moderate: squid security update</title>
    <updated date="2024-02-22 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: squid security update</summary>
    <description> Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Collapse of Data into Unsafe Value bug ,Squid may be vulnerable to a Denial of Service attack against HTTP header parsing. This problem allows a remote client or a remote server to perform Denial of Service when sending oversized headers in HTTP messages. In versions of Squid prior to 6.5 this can be achieved if the request_header_max_size or reply_header_max_size settings are unchanged from the default. In Squid version 6.5 and later, the default setting of these parameters is safe. Squid will emit a critical warning in cache.log if the administrator is setting these parameters to unsafe values. Squid will not at this time prevent these settings from being changed to unsafe values. Users are advised to upgrade to version 6.5. There are no known workarounds for this vulnerability. This issue is also tracked as SQUID-2024:2 (CVE-2024-25617)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-25617" type="cve" title="fix CVE-2024-25617" />
    </references>
    <pkglist>
      <collection>
        <package name="squid" version="4.9" release="20.uel20" epoch="7" arch="x86_64" src="squid-4.9-20.uel20.src.rpm">
          <filename>squid-4.9-20.uel20.x86_64.rpm</filename>
        </package>
        <package name="squid" version="4.9" release="20.uel20" epoch="7" arch="aarch64" src="squid-4.9-20.uel20.src.rpm">
          <filename>squid-4.9-20.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20051</id>
    <title>Important: freeglut security update</title>
    <updated date="2024-02-19 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: freeglut security update</summary>
    <description> freeglut through 3.4.0 was discovered to contain a memory leak via the menuEntry variable in the glutAddMenuEntry function.(CVE-2024-24259)
 freeglut 3.4.0 was discovered to contain a memory leak via the menuEntry variable in the glutAddSubMenu function.(CVE-2024-24258)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-24259" type="cve" title="fix CVE-2024-24259" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-24258" type="cve" title="fix CVE-2024-24258" />
    </references>
    <pkglist>
      <collection>
        <package name="freeglut-help" version="3.0.0" release="11.uel20" epoch="0" arch="x86_64" src="freeglut-3.0.0-11.uel20.src.rpm">
          <filename>freeglut-help-3.0.0-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeglut" version="3.0.0" release="11.uel20" epoch="0" arch="x86_64" src="freeglut-3.0.0-11.uel20.src.rpm">
          <filename>freeglut-3.0.0-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeglut-devel" version="3.0.0" release="11.uel20" epoch="0" arch="x86_64" src="freeglut-3.0.0-11.uel20.src.rpm">
          <filename>freeglut-devel-3.0.0-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeglut-devel" version="3.0.0" release="11.uel20" epoch="0" arch="aarch64" src="freeglut-3.0.0-11.uel20.src.rpm">
          <filename>freeglut-devel-3.0.0-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="freeglut" version="3.0.0" release="11.uel20" epoch="0" arch="aarch64" src="freeglut-3.0.0-11.uel20.src.rpm">
          <filename>freeglut-3.0.0-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="freeglut-help" version="3.0.0" release="11.uel20" epoch="0" arch="aarch64" src="freeglut-3.0.0-11.uel20.src.rpm">
          <filename>freeglut-help-3.0.0-11.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20052</id>
    <title>Important: jss security update</title>
    <updated date="2024-02-28 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: jss security update</summary>
    <description> A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server’s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service.(CVE-2021-4213)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-4213" type="cve" title="fix CVE-2021-4213" />
    </references>
    <pkglist>
      <collection>
        <package name="jss-help" version="4.9.3" release="1.uel20" epoch="0" arch="x86_64" src="jss-4.9.3-1.uel20.src.rpm">
          <filename>jss-help-4.9.3-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="jss" version="4.9.3" release="1.uel20" epoch="0" arch="x86_64" src="jss-4.9.3-1.uel20.src.rpm">
          <filename>jss-4.9.3-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="jss-help" version="4.9.3" release="1.uel20" epoch="0" arch="aarch64" src="jss-4.9.3-1.uel20.src.rpm">
          <filename>jss-help-4.9.3-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="jss" version="4.9.3" release="1.uel20" epoch="0" arch="aarch64" src="jss-4.9.3-1.uel20.src.rpm">
          <filename>jss-4.9.3-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20054</id>
    <title>Important: libuv security update</title>
    <updated date="2024-02-20 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: libuv security update</summary>
    <description> libuv is a multi-platform support library with a focus on asynchronous I/O. The `uv_getaddrinfo` function in `src/unix/getaddrinfo.c` (and its windows counterpart `src/win/getaddrinfo.c`), truncates hostnames to 256 characters before calling `getaddrinfo`. This behavior can be exploited to create addresses like `0x00007f000001`, which are considered valid by `getaddrinfo` and could allow an attacker to craft payloads that resolve to unintended IP addresses, bypassing developer checks. The vulnerability arises due to how the `hostname_ascii` variable (with a length of 256 bytes) is handled in `uv_getaddrinfo` and subsequently in `uv__idna_toascii`. When the hostname exceeds 256 characters, it gets truncated without a terminating null byte. As a result attackers may be able to access internal APIs or for websites (similar to MySpace) that allows users to have `username.example.com` pages. Internal services that crawl or cache these user pages can be exposed to SSRF attacks if a malicious user chooses a long vulnerable username. This issue has been addressed in release version 1.48.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.(CVE-2024-24806)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-24806" type="cve" title="fix CVE-2024-24806" />
    </references>
    <pkglist>
      <collection>
        <package name="libuv" version="1.42.0" release="2.uel20" epoch="1" arch="x86_64" src="libuv-1.42.0-2.uel20.src.rpm">
          <filename>libuv-1.42.0-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="libuv-devel" version="1.42.0" release="2.uel20" epoch="1" arch="x86_64" src="libuv-1.42.0-2.uel20.src.rpm">
          <filename>libuv-devel-1.42.0-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="libuv" version="1.42.0" release="2.uel20" epoch="1" arch="aarch64" src="libuv-1.42.0-2.uel20.src.rpm">
          <filename>libuv-1.42.0-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="libuv-devel" version="1.42.0" release="2.uel20" epoch="1" arch="aarch64" src="libuv-1.42.0-2.uel20.src.rpm">
          <filename>libuv-devel-1.42.0-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="libuv-help" version="1.42.0" release="2.uel20" epoch="1" arch="noarch" src="libuv-1.42.0-2.uel20.src.rpm">
          <filename>libuv-help-1.42.0-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20056</id>
    <title>Critical: libgit2 security update</title>
    <updated date="2024-02-20 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: libgit2 security update</summary>
    <description> libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2.(CVE-2024-24577)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-24577" type="cve" title="fix CVE-2024-24577" />
    </references>
    <pkglist>
      <collection>
        <package name="libgit2-devel" version="0.27.8" release="8.uel20" epoch="0" arch="x86_64" src="libgit2-0.27.8-8.uel20.src.rpm">
          <filename>libgit2-devel-0.27.8-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="libgit2" version="0.27.8" release="8.uel20" epoch="0" arch="x86_64" src="libgit2-0.27.8-8.uel20.src.rpm">
          <filename>libgit2-0.27.8-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="libgit2-devel" version="0.27.8" release="8.uel20" epoch="0" arch="aarch64" src="libgit2-0.27.8-8.uel20.src.rpm">
          <filename>libgit2-devel-0.27.8-8.uel20.aarch64.rpm</filename>
        </package>
        <package name="libgit2" version="0.27.8" release="8.uel20" epoch="0" arch="aarch64" src="libgit2-0.27.8-8.uel20.src.rpm">
          <filename>libgit2-0.27.8-8.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20057</id>
    <title>Critical: rust security update</title>
    <updated date="2024-02-20 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: rust security update</summary>
    <description> libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2.(CVE-2024-24577)
 libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_revparse_single` can cause the function to enter an infinite loop, potentially causing a Denial of Service attack in the calling application. The revparse function in `src/libgit2/revparse.c` uses a loop to parse the user-provided spec string. There is an edge-case during parsing that allows a bad actor to force the loop conditions to access arbitrary memory. Potentially, this could also leak memory if the extracted rev spec is reflected back to the attacker. As such, libgit2 versions before 1.4.0 are not affected. Users should upgrade to version 1.6.5 or 1.7.2.(CVE-2024-24575)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-24577" type="cve" title="fix CVE-2024-24577" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-24575" type="cve" title="fix CVE-2024-24575" />
    </references>
    <pkglist>
      <collection>
        <package name="clippy" version="1.58.1" release="1.uel20.05" epoch="0" arch="x86_64" src="rust-1.58.1-1.uel20.05.src.rpm">
          <filename>clippy-1.58.1-1.uel20.05.x86_64.rpm</filename>
        </package>
        <package name="rust-help" version="1.58.1" release="1.uel20.05" epoch="0" arch="x86_64" src="rust-1.58.1-1.uel20.05.src.rpm">
          <filename>rust-help-1.58.1-1.uel20.05.x86_64.rpm</filename>
        </package>
        <package name="cargo" version="1.58.1" release="1.uel20.05" epoch="0" arch="x86_64" src="rust-1.58.1-1.uel20.05.src.rpm">
          <filename>cargo-1.58.1-1.uel20.05.x86_64.rpm</filename>
        </package>
        <package name="rust" version="1.58.1" release="1.uel20.05" epoch="0" arch="x86_64" src="rust-1.58.1-1.uel20.05.src.rpm">
          <filename>rust-1.58.1-1.uel20.05.x86_64.rpm</filename>
        </package>
        <package name="rust-std-static" version="1.58.1" release="1.uel20.05" epoch="0" arch="x86_64" src="rust-1.58.1-1.uel20.05.src.rpm">
          <filename>rust-std-static-1.58.1-1.uel20.05.x86_64.rpm</filename>
        </package>
        <package name="rustfmt" version="1.58.1" release="1.uel20.05" epoch="0" arch="x86_64" src="rust-1.58.1-1.uel20.05.src.rpm">
          <filename>rustfmt-1.58.1-1.uel20.05.x86_64.rpm</filename>
        </package>
        <package name="rls" version="1.58.1" release="1.uel20.05" epoch="0" arch="x86_64" src="rust-1.58.1-1.uel20.05.src.rpm">
          <filename>rls-1.58.1-1.uel20.05.x86_64.rpm</filename>
        </package>
        <package name="rust-analysis" version="1.58.1" release="1.uel20.05" epoch="0" arch="x86_64" src="rust-1.58.1-1.uel20.05.src.rpm">
          <filename>rust-analysis-1.58.1-1.uel20.05.x86_64.rpm</filename>
        </package>
        <package name="clippy" version="1.58.1" release="1.uel20.05" epoch="0" arch="aarch64" src="rust-1.58.1-1.uel20.05.src.rpm">
          <filename>clippy-1.58.1-1.uel20.05.aarch64.rpm</filename>
        </package>
        <package name="rust" version="1.58.1" release="1.uel20.05" epoch="0" arch="aarch64" src="rust-1.58.1-1.uel20.05.src.rpm">
          <filename>rust-1.58.1-1.uel20.05.aarch64.rpm</filename>
        </package>
        <package name="rust-gdb" version="1.58.1" release="1.uel20.05" epoch="0" arch="noarch" src="rust-1.58.1-1.uel20.05.src.rpm">
          <filename>rust-gdb-1.58.1-1.uel20.05.noarch.rpm</filename>
        </package>
        <package name="rust-debugger-common" version="1.58.1" release="1.uel20.05" epoch="0" arch="noarch" src="rust-1.58.1-1.uel20.05.src.rpm">
          <filename>rust-debugger-common-1.58.1-1.uel20.05.noarch.rpm</filename>
        </package>
        <package name="rust-help" version="1.58.1" release="1.uel20.05" epoch="0" arch="aarch64" src="rust-1.58.1-1.uel20.05.src.rpm">
          <filename>rust-help-1.58.1-1.uel20.05.aarch64.rpm</filename>
        </package>
        <package name="rls" version="1.58.1" release="1.uel20.05" epoch="0" arch="aarch64" src="rust-1.58.1-1.uel20.05.src.rpm">
          <filename>rls-1.58.1-1.uel20.05.aarch64.rpm</filename>
        </package>
        <package name="rust-src" version="1.58.1" release="1.uel20.05" epoch="0" arch="noarch" src="rust-1.58.1-1.uel20.05.src.rpm">
          <filename>rust-src-1.58.1-1.uel20.05.noarch.rpm</filename>
        </package>
        <package name="cargo" version="1.58.1" release="1.uel20.05" epoch="0" arch="aarch64" src="rust-1.58.1-1.uel20.05.src.rpm">
          <filename>cargo-1.58.1-1.uel20.05.aarch64.rpm</filename>
        </package>
        <package name="rustfmt" version="1.58.1" release="1.uel20.05" epoch="0" arch="aarch64" src="rust-1.58.1-1.uel20.05.src.rpm">
          <filename>rustfmt-1.58.1-1.uel20.05.aarch64.rpm</filename>
        </package>
        <package name="rust-lldb" version="1.58.1" release="1.uel20.05" epoch="0" arch="noarch" src="rust-1.58.1-1.uel20.05.src.rpm">
          <filename>rust-lldb-1.58.1-1.uel20.05.noarch.rpm</filename>
        </package>
        <package name="rust-std-static" version="1.58.1" release="1.uel20.05" epoch="0" arch="aarch64" src="rust-1.58.1-1.uel20.05.src.rpm">
          <filename>rust-std-static-1.58.1-1.uel20.05.aarch64.rpm</filename>
        </package>
        <package name="rust-analysis" version="1.58.1" release="1.uel20.05" epoch="0" arch="aarch64" src="rust-1.58.1-1.uel20.05.src.rpm">
          <filename>rust-analysis-1.58.1-1.uel20.05.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20058</id>
    <title>Critical: qt5-qtbase security update</title>
    <updated date="2024-02-22 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: qt5-qtbase security update</summary>
    <description> An issue was discovered in the HTTP2 implementation in Qt before 5.15.17, 6.x before 6.2.11, 6.3.x through 6.5.x before 6.5.4, and 6.6.x before 6.6.2. network/access/http2/hpacktable.cpp has an incorrect HPack integer overflow check.(CVE-2023-51714)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-51714" type="cve" title="fix CVE-2023-51714" />
    </references>
    <pkglist>
      <collection>
        <package name="qt5-qtbase-devel" version="5.11.1" release="21.up7.uel20" epoch="0" arch="x86_64" src="qt5-qtbase-5.11.1-21.up7.uel20.src.rpm">
          <filename>qt5-qtbase-devel-5.11.1-21.up7.uel20.x86_64.rpm</filename>
        </package>
        <package name="qt5-qtbase" version="5.11.1" release="21.up7.uel20" epoch="0" arch="x86_64" src="qt5-qtbase-5.11.1-21.up7.uel20.src.rpm">
          <filename>qt5-qtbase-5.11.1-21.up7.uel20.x86_64.rpm</filename>
        </package>
        <package name="qt5-qtbase-gui" version="5.11.1" release="21.up7.uel20" epoch="0" arch="x86_64" src="qt5-qtbase-5.11.1-21.up7.uel20.src.rpm">
          <filename>qt5-qtbase-gui-5.11.1-21.up7.uel20.x86_64.rpm</filename>
        </package>
        <package name="qt5-qtbase-mysql" version="5.11.1" release="21.up7.uel20" epoch="0" arch="x86_64" src="qt5-qtbase-5.11.1-21.up7.uel20.src.rpm">
          <filename>qt5-qtbase-mysql-5.11.1-21.up7.uel20.x86_64.rpm</filename>
        </package>
        <package name="qt5-qtbase-odbc" version="5.11.1" release="21.up7.uel20" epoch="0" arch="x86_64" src="qt5-qtbase-5.11.1-21.up7.uel20.src.rpm">
          <filename>qt5-qtbase-odbc-5.11.1-21.up7.uel20.x86_64.rpm</filename>
        </package>
        <package name="qt5-qtbase-postgresql" version="5.11.1" release="21.up7.uel20" epoch="0" arch="x86_64" src="qt5-qtbase-5.11.1-21.up7.uel20.src.rpm">
          <filename>qt5-qtbase-postgresql-5.11.1-21.up7.uel20.x86_64.rpm</filename>
        </package>
        <package name="qt5-qtbase-devel" version="5.11.1" release="21.up7.uel20" epoch="0" arch="aarch64" src="qt5-qtbase-5.11.1-21.up7.uel20.src.rpm">
          <filename>qt5-qtbase-devel-5.11.1-21.up7.uel20.aarch64.rpm</filename>
        </package>
        <package name="qt5-qtbase" version="5.11.1" release="21.up7.uel20" epoch="0" arch="aarch64" src="qt5-qtbase-5.11.1-21.up7.uel20.src.rpm">
          <filename>qt5-qtbase-5.11.1-21.up7.uel20.aarch64.rpm</filename>
        </package>
        <package name="qt5-qtbase-gui" version="5.11.1" release="21.up7.uel20" epoch="0" arch="aarch64" src="qt5-qtbase-5.11.1-21.up7.uel20.src.rpm">
          <filename>qt5-qtbase-gui-5.11.1-21.up7.uel20.aarch64.rpm</filename>
        </package>
        <package name="qt5-qtbase-mysql" version="5.11.1" release="21.up7.uel20" epoch="0" arch="aarch64" src="qt5-qtbase-5.11.1-21.up7.uel20.src.rpm">
          <filename>qt5-qtbase-mysql-5.11.1-21.up7.uel20.aarch64.rpm</filename>
        </package>
        <package name="qt5-qtbase-postgresql" version="5.11.1" release="21.up7.uel20" epoch="0" arch="aarch64" src="qt5-qtbase-5.11.1-21.up7.uel20.src.rpm">
          <filename>qt5-qtbase-postgresql-5.11.1-21.up7.uel20.aarch64.rpm</filename>
        </package>
        <package name="qt5-qtbase-common" version="5.11.1" release="21.up7.uel20" epoch="0" arch="noarch" src="qt5-qtbase-5.11.1-21.up7.uel20.src.rpm">
          <filename>qt5-qtbase-common-5.11.1-21.up7.uel20.noarch.rpm</filename>
        </package>
        <package name="qt5-qtbase-odbc" version="5.11.1" release="21.up7.uel20" epoch="0" arch="aarch64" src="qt5-qtbase-5.11.1-21.up7.uel20.src.rpm">
          <filename>qt5-qtbase-odbc-5.11.1-21.up7.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20061</id>
    <title>Important: rubygem-actionpack security update</title>
    <updated date="2024-02-20 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: rubygem-actionpack security update</summary>
    <description> A regular expression based DoS vulnerability in Action Dispatch &lt;6.1.7.1 and &lt;7.0.4.1 related to the If-None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.(CVE-2023-22795)
 A regular expression based DoS vulnerability in Action Dispatch &lt;6.0.6.1,&lt; 6.1.7.1, and &lt;7.0.4.1. Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.(CVE-2023-22792)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22795" type="cve" title="fix CVE-2023-22795" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22792" type="cve" title="fix CVE-2023-22792" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-actionpack-doc" version="5.2.4.4" release="4.uel20" epoch="1" arch="noarch" src="rubygem-actionpack-5.2.4.4-4.uel20.src.rpm">
          <filename>rubygem-actionpack-doc-5.2.4.4-4.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-actionpack" version="5.2.4.4" release="4.uel20" epoch="1" arch="noarch" src="rubygem-actionpack-5.2.4.4-4.uel20.src.rpm">
          <filename>rubygem-actionpack-5.2.4.4-4.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20062</id>
    <title>Important: runc security update</title>
    <updated date="2024-02-21 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: runc security update</summary>
    <description> runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue. (CVE-2024-21626)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21626" type="cve" title="fix CVE-2024-21626" />
    </references>
    <pkglist>
      <collection>
        <package name="docker-runc" version="1.0.0.rc3" release="224.up1.uel20" epoch="0" arch="x86_64" src="docker-runc-1.0.0.rc3-224.up1.uel20.src.rpm">
          <filename>docker-runc-1.0.0.rc3-224.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="docker-runc" version="1.0.0.rc3" release="224.up1.uel20" epoch="0" arch="aarch64" src="docker-runc-1.0.0.rc3-224.up1.uel20.src.rpm">
          <filename>docker-runc-1.0.0.rc3-224.up1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20063</id>
    <title>Important: graphviz security update</title>
    <updated date="2024-02-19 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: graphviz security update</summary>
    <description> Graphviz 2.36 before 10.0.0 has an out-of-bounds read via a crafted config6a file. NOTE: exploitability may be uncommon because this file is typically owned by root.(CVE-2023-46045)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-46045" type="cve" title="fix CVE-2023-46045" />
    </references>
    <pkglist>
      <collection>
        <package name="graphviz-java" version="2.44.0" release="5.uel20" epoch="0" arch="x86_64" src="graphviz-2.44.0-5.uel20.src.rpm">
          <filename>graphviz-java-2.44.0-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="graphviz-devel" version="2.44.0" release="5.uel20" epoch="0" arch="x86_64" src="graphviz-2.44.0-5.uel20.src.rpm">
          <filename>graphviz-devel-2.44.0-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="graphviz-ruby" version="2.44.0" release="5.uel20" epoch="0" arch="x86_64" src="graphviz-2.44.0-5.uel20.src.rpm">
          <filename>graphviz-ruby-2.44.0-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="graphviz-ocaml" version="2.44.0" release="5.uel20" epoch="0" arch="x86_64" src="graphviz-2.44.0-5.uel20.src.rpm">
          <filename>graphviz-ocaml-2.44.0-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="graphviz" version="2.44.0" release="5.uel20" epoch="0" arch="x86_64" src="graphviz-2.44.0-5.uel20.src.rpm">
          <filename>graphviz-2.44.0-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="graphviz-perl" version="2.44.0" release="5.uel20" epoch="0" arch="x86_64" src="graphviz-2.44.0-5.uel20.src.rpm">
          <filename>graphviz-perl-2.44.0-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="graphviz-docs" version="2.44.0" release="5.uel20" epoch="0" arch="x86_64" src="graphviz-2.44.0-5.uel20.src.rpm">
          <filename>graphviz-docs-2.44.0-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="graphviz-python3" version="2.44.0" release="5.uel20" epoch="0" arch="x86_64" src="graphviz-2.44.0-5.uel20.src.rpm">
          <filename>graphviz-python3-2.44.0-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="graphviz-lua" version="2.44.0" release="5.uel20" epoch="0" arch="x86_64" src="graphviz-2.44.0-5.uel20.src.rpm">
          <filename>graphviz-lua-2.44.0-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="graphviz-tcl" version="2.44.0" release="5.uel20" epoch="0" arch="x86_64" src="graphviz-2.44.0-5.uel20.src.rpm">
          <filename>graphviz-tcl-2.44.0-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="graphviz-python2" version="2.44.0" release="5.uel20" epoch="0" arch="x86_64" src="graphviz-2.44.0-5.uel20.src.rpm">
          <filename>graphviz-python2-2.44.0-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="graphviz-python2" version="2.44.0" release="5.uel20" epoch="0" arch="aarch64" src="graphviz-2.44.0-5.uel20.src.rpm">
          <filename>graphviz-python2-2.44.0-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="graphviz-perl" version="2.44.0" release="5.uel20" epoch="0" arch="aarch64" src="graphviz-2.44.0-5.uel20.src.rpm">
          <filename>graphviz-perl-2.44.0-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="graphviz-python3" version="2.44.0" release="5.uel20" epoch="0" arch="aarch64" src="graphviz-2.44.0-5.uel20.src.rpm">
          <filename>graphviz-python3-2.44.0-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="graphviz-ocaml" version="2.44.0" release="5.uel20" epoch="0" arch="aarch64" src="graphviz-2.44.0-5.uel20.src.rpm">
          <filename>graphviz-ocaml-2.44.0-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="graphviz-java" version="2.44.0" release="5.uel20" epoch="0" arch="aarch64" src="graphviz-2.44.0-5.uel20.src.rpm">
          <filename>graphviz-java-2.44.0-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="graphviz-ruby" version="2.44.0" release="5.uel20" epoch="0" arch="aarch64" src="graphviz-2.44.0-5.uel20.src.rpm">
          <filename>graphviz-ruby-2.44.0-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="graphviz-devel" version="2.44.0" release="5.uel20" epoch="0" arch="aarch64" src="graphviz-2.44.0-5.uel20.src.rpm">
          <filename>graphviz-devel-2.44.0-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="graphviz-docs" version="2.44.0" release="5.uel20" epoch="0" arch="aarch64" src="graphviz-2.44.0-5.uel20.src.rpm">
          <filename>graphviz-docs-2.44.0-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="graphviz-tcl" version="2.44.0" release="5.uel20" epoch="0" arch="aarch64" src="graphviz-2.44.0-5.uel20.src.rpm">
          <filename>graphviz-tcl-2.44.0-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="graphviz-lua" version="2.44.0" release="5.uel20" epoch="0" arch="aarch64" src="graphviz-2.44.0-5.uel20.src.rpm">
          <filename>graphviz-lua-2.44.0-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="graphviz" version="2.44.0" release="5.uel20" epoch="0" arch="aarch64" src="graphviz-2.44.0-5.uel20.src.rpm">
          <filename>graphviz-2.44.0-5.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20064</id>
    <title>Important: containerd security update</title>
    <updated date="2024-02-19 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: containerd security update</summary>
    <description> A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.(CVE-2022-41723)
 A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function.(CVE-2023-39325)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-41723" type="cve" title="fix CVE-2022-41723" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-39325" type="cve" title="fix CVE-2023-39325" />
    </references>
    <pkglist>
      <collection>
        <package name="containerd-stress" version="1.5.3" release="1.uel20.12" epoch="0" arch="x86_64" src="containerd-1.5.3-1.uel20.12.src.rpm">
          <filename>containerd-stress-1.5.3-1.uel20.12.x86_64.rpm</filename>
        </package>
        <package name="containerd" version="1.5.3" release="1.uel20.12" epoch="0" arch="x86_64" src="containerd-1.5.3-1.uel20.12.src.rpm">
          <filename>containerd-1.5.3-1.uel20.12.x86_64.rpm</filename>
        </package>
        <package name="containerd" version="1.5.3" release="1.uel20.12" epoch="0" arch="aarch64" src="containerd-1.5.3-1.uel20.12.src.rpm">
          <filename>containerd-1.5.3-1.uel20.12.aarch64.rpm</filename>
        </package>
        <package name="containerd-stress" version="1.5.3" release="1.uel20.12" epoch="0" arch="aarch64" src="containerd-1.5.3-1.uel20.12.src.rpm">
          <filename>containerd-stress-1.5.3-1.uel20.12.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20065</id>
    <title>None: ncurses security update</title>
    <updated date="2024-02-07 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: ncurses security update</summary>
    <description> ncurses 6.4-20230610 has a NULL pointer dereference in tgetstr in tinfo/lib_termcap.c.(CVE-2023-45918)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-45918" type="cve" title="fix CVE-2023-45918" />
    </references>
    <pkglist>
      <collection>
        <package name="ncurses-libs" version="6.2" release="5.uel20.02" epoch="0" arch="x86_64" src="ncurses-6.2-5.uel20.02.src.rpm">
          <filename>ncurses-libs-6.2-5.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="ncurses" version="6.2" release="5.uel20.02" epoch="0" arch="x86_64" src="ncurses-6.2-5.uel20.02.src.rpm">
          <filename>ncurses-6.2-5.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="ncurses-devel" version="6.2" release="5.uel20.02" epoch="0" arch="x86_64" src="ncurses-6.2-5.uel20.02.src.rpm">
          <filename>ncurses-devel-6.2-5.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="ncurses-help" version="6.2" release="5.uel20.02" epoch="0" arch="x86_64" src="ncurses-6.2-5.uel20.02.src.rpm">
          <filename>ncurses-help-6.2-5.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="ncurses" version="6.2" release="5.uel20.02" epoch="0" arch="aarch64" src="ncurses-6.2-5.uel20.02.src.rpm">
          <filename>ncurses-6.2-5.uel20.02.aarch64.rpm</filename>
        </package>
        <package name="ncurses-help" version="6.2" release="5.uel20.02" epoch="0" arch="aarch64" src="ncurses-6.2-5.uel20.02.src.rpm">
          <filename>ncurses-help-6.2-5.uel20.02.aarch64.rpm</filename>
        </package>
        <package name="ncurses-devel" version="6.2" release="5.uel20.02" epoch="0" arch="aarch64" src="ncurses-6.2-5.uel20.02.src.rpm">
          <filename>ncurses-devel-6.2-5.uel20.02.aarch64.rpm</filename>
        </package>
        <package name="ncurses-libs" version="6.2" release="5.uel20.02" epoch="0" arch="aarch64" src="ncurses-6.2-5.uel20.02.src.rpm">
          <filename>ncurses-libs-6.2-5.uel20.02.aarch64.rpm</filename>
        </package>
        <package name="ncurses-base" version="6.2" release="5.uel20.02" epoch="0" arch="noarch" src="ncurses-6.2-5.uel20.02.src.rpm">
          <filename>ncurses-base-6.2-5.uel20.02.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20066</id>
    <title>Moderate: indent security update</title>
    <updated date="2024-02-26 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: indent security update</summary>
    <description> A flaw was found in indent, a program for formatting C code. This issue may allow an attacker to trick a user into processing a specially crafted file to trigger a heap-based buffer overflow, causing the application to crash.(CVE-2024-0911)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-0911" type="cve" title="fix CVE-2024-0911" />
    </references>
    <pkglist>
      <collection>
        <package name="indent" version="2.2.11" release="30.uel20" epoch="0" arch="x86_64" src="indent-2.2.11-30.uel20.src.rpm">
          <filename>indent-2.2.11-30.uel20.x86_64.rpm</filename>
        </package>
        <package name="indent" version="2.2.11" release="30.uel20" epoch="0" arch="aarch64" src="indent-2.2.11-30.uel20.src.rpm">
          <filename>indent-2.2.11-30.uel20.aarch64.rpm</filename>
        </package>
        <package name="indent-help" version="2.2.11" release="30.uel20" epoch="0" arch="noarch" src="indent-2.2.11-30.uel20.src.rpm">
          <filename>indent-help-2.2.11-30.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20067</id>
    <title>Moderate: jruby security update</title>
    <updated date="2024-02-26 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: jruby security update</summary>
    <description> A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2.(CVE-2023-28756)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-28756" type="cve" title="fix CVE-2023-28756" />
    </references>
    <pkglist>
      <collection>
        <package name="jruby-javadoc" version="1.7.22" release="4.uel20" epoch="0" arch="noarch" src="jruby-1.7.22-4.uel20.src.rpm">
          <filename>jruby-javadoc-1.7.22-4.uel20.noarch.rpm</filename>
        </package>
        <package name="jruby" version="1.7.22" release="4.uel20" epoch="0" arch="noarch" src="jruby-1.7.22-4.uel20.src.rpm">
          <filename>jruby-1.7.22-4.uel20.noarch.rpm</filename>
        </package>
        <package name="jruby-devel" version="1.7.22" release="4.uel20" epoch="0" arch="noarch" src="jruby-1.7.22-4.uel20.src.rpm">
          <filename>jruby-devel-1.7.22-4.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20068</id>
    <title>Critical: freerdp security update</title>
    <updated date="2024-02-02 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: freerdp security update</summary>
    <description> FreeRDP is a set of free and open source remote desktop protocol library and clients. In affected versions an integer overflow in `freerdp_bitmap_planar_context_reset` leads to heap-buffer overflow. This affects FreeRDP based clients. FreeRDP based server implementations and proxy are not affected. A malicious server could prepare a `RDPGFX_RESET_GRAPHICS_PDU` to allocate too small buffers, possibly triggering later out of bound read/write. Data extraction over network is not possible, the buffers are used to display an image. This issue has been addressed in version 2.11.5 and 3.2.0. Users are advised to upgrade. there are no know workarounds for this vulnerability.
(CVE-2024-22211)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-22211" type="cve" title="fix CVE-2024-22211" />
    </references>
    <pkglist>
      <collection>
        <package name="libwinpr" version="2.11.1" release="2.uel20" epoch="2" arch="x86_64" src="freerdp-2.11.1-2.uel20.src.rpm">
          <filename>libwinpr-2.11.1-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="libwinpr-devel" version="2.11.1" release="2.uel20" epoch="2" arch="x86_64" src="freerdp-2.11.1-2.uel20.src.rpm">
          <filename>libwinpr-devel-2.11.1-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="freerdp-help" version="2.11.1" release="2.uel20" epoch="2" arch="x86_64" src="freerdp-2.11.1-2.uel20.src.rpm">
          <filename>freerdp-help-2.11.1-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="freerdp" version="2.11.1" release="2.uel20" epoch="2" arch="x86_64" src="freerdp-2.11.1-2.uel20.src.rpm">
          <filename>freerdp-2.11.1-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="freerdp-devel" version="2.11.1" release="2.uel20" epoch="2" arch="x86_64" src="freerdp-2.11.1-2.uel20.src.rpm">
          <filename>freerdp-devel-2.11.1-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="freerdp-devel" version="2.11.1" release="2.uel20" epoch="2" arch="aarch64" src="freerdp-2.11.1-2.uel20.src.rpm">
          <filename>freerdp-devel-2.11.1-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="libwinpr" version="2.11.1" release="2.uel20" epoch="2" arch="aarch64" src="freerdp-2.11.1-2.uel20.src.rpm">
          <filename>libwinpr-2.11.1-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="freerdp-help" version="2.11.1" release="2.uel20" epoch="2" arch="aarch64" src="freerdp-2.11.1-2.uel20.src.rpm">
          <filename>freerdp-help-2.11.1-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="freerdp" version="2.11.1" release="2.uel20" epoch="2" arch="aarch64" src="freerdp-2.11.1-2.uel20.src.rpm">
          <filename>freerdp-2.11.1-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="libwinpr-devel" version="2.11.1" release="2.uel20" epoch="2" arch="aarch64" src="freerdp-2.11.1-2.uel20.src.rpm">
          <filename>libwinpr-devel-2.11.1-2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20070</id>
    <title>Moderate: ansible security update</title>
    <updated date="2024-02-19 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: ansible security update</summary>
    <description> An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. It was discovered that information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values.(CVE-2024-0690)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-0690" type="cve" title="fix CVE-2024-0690" />
    </references>
    <pkglist>
      <collection>
        <package name="ansible" version="2.9.11" release="1.uel20.01" epoch="0" arch="noarch" src="ansible-2.9.11-1.uel20.01.src.rpm">
          <filename>ansible-2.9.11-1.uel20.01.noarch.rpm</filename>
        </package>
        <package name="ansible-doc" version="2.9.11" release="1.uel20.01" epoch="0" arch="noarch" src="ansible-2.9.11-1.uel20.01.src.rpm">
          <filename>ansible-doc-2.9.11-1.uel20.01.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20074</id>
    <title>Moderate: python-jinja2 security update</title>
    <updated date="2024-02-22 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: python-jinja2 security update</summary>
    <description> Jinja is an extensible templating engine. Special placeholders in the template allow writing code similar to Python syntax. It is possible to inject arbitrary HTML attributes into the rendered HTML template, potentially leading to Cross-Site Scripting (XSS). The Jinja `xmlattr` filter can be abused to inject arbitrary HTML attribute keys and values, bypassing the auto escaping mechanism and potentially leading to XSS. It may also be possible to bypass attribute validation checks if they are blacklist-based.
(CVE-2024-22195)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-22195" type="cve" title="fix CVE-2024-22195" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-jinja2" version="2.11.2" release="6.uel20" epoch="0" arch="noarch" src="python-jinja2-2.11.2-6.uel20.src.rpm">
          <filename>python3-jinja2-2.11.2-6.uel20.noarch.rpm</filename>
        </package>
        <package name="python-jinja2-help" version="2.11.2" release="6.uel20" epoch="0" arch="noarch" src="python-jinja2-2.11.2-6.uel20.src.rpm">
          <filename>python-jinja2-help-2.11.2-6.uel20.noarch.rpm</filename>
        </package>
        <package name="python2-jinja2" version="2.11.2" release="6.uel20" epoch="0" arch="noarch" src="python-jinja2-2.11.2-6.uel20.src.rpm">
          <filename>python2-jinja2-2.11.2-6.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20075</id>
    <title>Moderate: python-paramiko security update</title>
    <updated date="2024-02-22 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: python-paramiko security update</summary>
    <description> The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.(CVE-2023-48795)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-48795" type="cve" title="fix CVE-2023-48795" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-paramiko" version="2.11.0" release="2.uel20" epoch="0" arch="noarch" src="python-paramiko-2.11.0-2.uel20.src.rpm">
          <filename>python3-paramiko-2.11.0-2.uel20.noarch.rpm</filename>
        </package>
        <package name="python-paramiko-help" version="2.11.0" release="2.uel20" epoch="0" arch="noarch" src="python-paramiko-2.11.0-2.uel20.src.rpm">
          <filename>python-paramiko-help-2.11.0-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20076</id>
    <title>Moderate: python-pycryptodome security update</title>
    <updated date="2024-02-22 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: python-pycryptodome security update</summary>
    <description> PyCryptodome and pycryptodomex before 3.19.1 allow side-channel leakage for OAEP decryption, exploitable for a Manger attack.(CVE-2023-52323)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-52323" type="cve" title="fix CVE-2023-52323" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-pycryptodome" version="3.19.1" release="1.uel20" epoch="0" arch="x86_64" src="python-pycryptodome-3.19.1-1.uel20.src.rpm">
          <filename>python3-pycryptodome-3.19.1-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="python2-pycryptodome" version="3.19.1" release="1.uel20" epoch="0" arch="x86_64" src="python-pycryptodome-3.19.1-1.uel20.src.rpm">
          <filename>python2-pycryptodome-3.19.1-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="python2-pycryptodome" version="3.19.1" release="1.uel20" epoch="0" arch="aarch64" src="python-pycryptodome-3.19.1-1.uel20.src.rpm">
          <filename>python2-pycryptodome-3.19.1-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-pycryptodome" version="3.19.1" release="1.uel20" epoch="0" arch="aarch64" src="python-pycryptodome-3.19.1-1.uel20.src.rpm">
          <filename>python3-pycryptodome-3.19.1-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20077</id>
    <title>Moderate: python-pycryptodomex security update</title>
    <updated date="2024-02-22 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: python-pycryptodomex security update</summary>
    <description> PyCryptodome and pycryptodomex before 3.19.1 allow side-channel leakage for OAEP decryption, exploitable for a Manger attack.(CVE-2023-52323)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-52323" type="cve" title="fix CVE-2023-52323" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-pycryptodomex" version="3.19.1" release="1.uel20" epoch="0" arch="x86_64" src="python-pycryptodomex-3.19.1-1.uel20.src.rpm">
          <filename>python3-pycryptodomex-3.19.1-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-pycryptodomex" version="3.19.1" release="1.uel20" epoch="0" arch="aarch64" src="python-pycryptodomex-3.19.1-1.uel20.src.rpm">
          <filename>python3-pycryptodomex-3.19.1-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="python-pycryptodomex-help" version="3.19.1" release="1.uel20" epoch="0" arch="noarch" src="python-pycryptodomex-3.19.1-1.uel20.src.rpm">
          <filename>python-pycryptodomex-help-3.19.1-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20078</id>
    <title>Important: proftpd security update</title>
    <updated date="2024-02-22 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: proftpd security update</summary>
    <description> The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.(CVE-2023-48795)
 make_ftp_cmd in main.c in ProFTPD before 1.3.8a has a one-byte out-of-bounds read, and daemon crash, because of mishandling of quote/backslash semantics.(CVE-2023-51713)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-48795" type="cve" title="fix CVE-2023-48795" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-51713" type="cve" title="fix CVE-2023-51713" />
    </references>
    <pkglist>
      <collection>
        <package name="proftpd-postgresql" version="1.3.8b" release="2.uel20" epoch="0" arch="x86_64" src="proftpd-1.3.8b-2.uel20.src.rpm">
          <filename>proftpd-postgresql-1.3.8b-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="proftpd-sqlite" version="1.3.8b" release="2.uel20" epoch="0" arch="x86_64" src="proftpd-1.3.8b-2.uel20.src.rpm">
          <filename>proftpd-sqlite-1.3.8b-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="proftpd-utils" version="1.3.8b" release="2.uel20" epoch="0" arch="x86_64" src="proftpd-1.3.8b-2.uel20.src.rpm">
          <filename>proftpd-utils-1.3.8b-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="proftpd-mysql" version="1.3.8b" release="2.uel20" epoch="0" arch="x86_64" src="proftpd-1.3.8b-2.uel20.src.rpm">
          <filename>proftpd-mysql-1.3.8b-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="proftpd-ldap" version="1.3.8b" release="2.uel20" epoch="0" arch="x86_64" src="proftpd-1.3.8b-2.uel20.src.rpm">
          <filename>proftpd-ldap-1.3.8b-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="proftpd" version="1.3.8b" release="2.uel20" epoch="0" arch="x86_64" src="proftpd-1.3.8b-2.uel20.src.rpm">
          <filename>proftpd-1.3.8b-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="proftpd-devel" version="1.3.8b" release="2.uel20" epoch="0" arch="x86_64" src="proftpd-1.3.8b-2.uel20.src.rpm">
          <filename>proftpd-devel-1.3.8b-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="proftpd-devel" version="1.3.8b" release="2.uel20" epoch="0" arch="aarch64" src="proftpd-1.3.8b-2.uel20.src.rpm">
          <filename>proftpd-devel-1.3.8b-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="proftpd-postgresql" version="1.3.8b" release="2.uel20" epoch="0" arch="aarch64" src="proftpd-1.3.8b-2.uel20.src.rpm">
          <filename>proftpd-postgresql-1.3.8b-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="proftpd" version="1.3.8b" release="2.uel20" epoch="0" arch="aarch64" src="proftpd-1.3.8b-2.uel20.src.rpm">
          <filename>proftpd-1.3.8b-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="proftpd-utils" version="1.3.8b" release="2.uel20" epoch="0" arch="aarch64" src="proftpd-1.3.8b-2.uel20.src.rpm">
          <filename>proftpd-utils-1.3.8b-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="proftpd-mysql" version="1.3.8b" release="2.uel20" epoch="0" arch="aarch64" src="proftpd-1.3.8b-2.uel20.src.rpm">
          <filename>proftpd-mysql-1.3.8b-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="proftpd-ldap" version="1.3.8b" release="2.uel20" epoch="0" arch="aarch64" src="proftpd-1.3.8b-2.uel20.src.rpm">
          <filename>proftpd-ldap-1.3.8b-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="proftpd-sqlite" version="1.3.8b" release="2.uel20" epoch="0" arch="aarch64" src="proftpd-1.3.8b-2.uel20.src.rpm">
          <filename>proftpd-sqlite-1.3.8b-2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20079</id>
    <title>Important: libpq security update</title>
    <updated date="2024-02-27 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: libpq security update</summary>
    <description> A flaw was found in PostgreSQL involving the pg_cancel_backend role that signals background workers, including the logical replication launcher, autovacuum workers, and the autovacuum launcher. Successful exploitation requires a non-core extension with a less-resilient background worker and would affect that specific background worker only. This issue may allow a remote high privileged user to launch a denial of service (DoS) attack.(CVE-2023-5870)
 A flaw was found in PostgreSQL that allows authenticated database users to execute arbitrary code through missing overflow checks during SQL array value modification. This issue exists due to an integer overflow during array modification where a remote user can trigger the overflow by providing specially crafted data. This enables the execution of arbitrary code on the target system, allowing users to write arbitrary bytes to memory and extensively read the server's memory.(CVE-2023-5869)
 A memory disclosure vulnerability was found in PostgreSQL that allows remote users to access sensitive information by exploiting certain aggregate function calls with 'unknown'-type arguments. Handling 'unknown'-type values from string literals without type designation can disclose bytes, potentially revealing notable and confidential information. This issue exists due to excessive data output in aggregate function calls, enabling remote users to read some portion of system memory.(CVE-2023-5868)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-5870" type="cve" title="fix CVE-2023-5870" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-5869" type="cve" title="fix CVE-2023-5869" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-5868" type="cve" title="fix CVE-2023-5868" />
    </references>
    <pkglist>
      <collection>
        <package name="libpq" version="13.13" release="1.uel20" epoch="0" arch="x86_64" src="libpq-13.13-1.uel20.src.rpm">
          <filename>libpq-13.13-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libpq-devel" version="13.13" release="1.uel20" epoch="0" arch="x86_64" src="libpq-13.13-1.uel20.src.rpm">
          <filename>libpq-devel-13.13-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libpq" version="13.13" release="1.uel20" epoch="0" arch="aarch64" src="libpq-13.13-1.uel20.src.rpm">
          <filename>libpq-13.13-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libpq-devel" version="13.13" release="1.uel20" epoch="0" arch="aarch64" src="libpq-13.13-1.uel20.src.rpm">
          <filename>libpq-devel-13.13-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20081</id>
    <title>Important: libsndfile security update</title>
    <updated date="2024-02-27 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: libsndfile security update</summary>
    <description> Multiple signed integers overflow in function au_read_header in src/au.c and in functions mat4_open and mat4_read_header in src/mat4.c in Libsndfile, allows an attacker to cause Denial of Service or other unspecified impacts.(CVE-2022-33065)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-33065" type="cve" title="fix CVE-2022-33065" />
    </references>
    <pkglist>
      <collection>
        <package name="libsndfile" version="1.0.28" release="21.uel20" epoch="0" arch="x86_64" src="libsndfile-1.0.28-21.uel20.src.rpm">
          <filename>libsndfile-1.0.28-21.uel20.x86_64.rpm</filename>
        </package>
        <package name="libsndfile-utils" version="1.0.28" release="21.uel20" epoch="0" arch="x86_64" src="libsndfile-1.0.28-21.uel20.src.rpm">
          <filename>libsndfile-utils-1.0.28-21.uel20.x86_64.rpm</filename>
        </package>
        <package name="libsndfile-devel" version="1.0.28" release="21.uel20" epoch="0" arch="x86_64" src="libsndfile-1.0.28-21.uel20.src.rpm">
          <filename>libsndfile-devel-1.0.28-21.uel20.x86_64.rpm</filename>
        </package>
        <package name="libsndfile-devel" version="1.0.28" release="21.uel20" epoch="0" arch="aarch64" src="libsndfile-1.0.28-21.uel20.src.rpm">
          <filename>libsndfile-devel-1.0.28-21.uel20.aarch64.rpm</filename>
        </package>
        <package name="libsndfile-utils-help" version="1.0.28" release="21.uel20" epoch="0" arch="noarch" src="libsndfile-1.0.28-21.uel20.src.rpm">
          <filename>libsndfile-utils-help-1.0.28-21.uel20.noarch.rpm</filename>
        </package>
        <package name="libsndfile" version="1.0.28" release="21.uel20" epoch="0" arch="aarch64" src="libsndfile-1.0.28-21.uel20.src.rpm">
          <filename>libsndfile-1.0.28-21.uel20.aarch64.rpm</filename>
        </package>
        <package name="libsndfile-utils" version="1.0.28" release="21.uel20" epoch="0" arch="aarch64" src="libsndfile-1.0.28-21.uel20.src.rpm">
          <filename>libsndfile-utils-1.0.28-21.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20082</id>
    <title>Low: yasm security update</title>
    <updated date="2024-02-01 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Low</severity>
    <summary>Low: yasm security update</summary>
    <description> yasm v1.3.0 was discovered to contain a memory leak via the function yasm_intnum_copy at /libyasm/intnum.c.(CVE-2023-31975)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-31975" type="cve" title="fix CVE-2023-31975" />
    </references>
    <pkglist>
      <collection>
        <package name="yasm" version="1.3.0" release="11.uel20" epoch="0" arch="x86_64" src="yasm-1.3.0-11.uel20.src.rpm">
          <filename>yasm-1.3.0-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="yasm-devel" version="1.3.0" release="11.uel20" epoch="0" arch="x86_64" src="yasm-1.3.0-11.uel20.src.rpm">
          <filename>yasm-devel-1.3.0-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="yasm" version="1.3.0" release="11.uel20" epoch="0" arch="aarch64" src="yasm-1.3.0-11.uel20.src.rpm">
          <filename>yasm-1.3.0-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="yasm-devel" version="1.3.0" release="11.uel20" epoch="0" arch="aarch64" src="yasm-1.3.0-11.uel20.src.rpm">
          <filename>yasm-devel-1.3.0-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="yasm-help" version="1.3.0" release="11.uel20" epoch="0" arch="noarch" src="yasm-1.3.0-11.uel20.src.rpm">
          <filename>yasm-help-1.3.0-11.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20083</id>
    <title>Critical: postgresql-jdbc security update</title>
    <updated date="2024-03-05 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: postgresql-jdbc security update</summary>
    <description> pgjdbc, the PostgreSQL JDBC Driver, allows attacker to inject SQL if using PreferQueryMode=SIMPLE. Note this is not the default. In the default mode there is no vulnerability. A placeholder for a numeric value must be immediately preceded by a minus. There must be a second placeholder for a string value after the first placeholder; both must be on the same line. By constructing a matching string payload, the attacker can inject SQL to alter the query,bypassing the protections that parameterized queries bring against SQL Injection attacks. Versions before 42.7.2, 42.6.1, 42.5.5, 42.4.4, 42.3.9, and 42.2.8 are affected.(CVE-2024-1597)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-1597" type="cve" title="fix CVE-2024-1597" />
    </references>
    <pkglist>
      <collection>
        <package name="postgresql-jdbc-javadoc" version="42.4.1" release="3.uel20" epoch="0" arch="noarch" src="postgresql-jdbc-42.4.1-3.uel20.src.rpm">
          <filename>postgresql-jdbc-javadoc-42.4.1-3.uel20.noarch.rpm</filename>
        </package>
        <package name="postgresql-jdbc" version="42.4.1" release="3.uel20" epoch="0" arch="noarch" src="postgresql-jdbc-42.4.1-3.uel20.src.rpm">
          <filename>postgresql-jdbc-42.4.1-3.uel20.noarch.rpm</filename>
        </package>
        <package name="postgresql-jdbc-help" version="42.4.1" release="3.uel20" epoch="0" arch="noarch" src="postgresql-jdbc-42.4.1-3.uel20.src.rpm">
          <filename>postgresql-jdbc-help-42.4.1-3.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20084</id>
    <title>Important: unbound security update</title>
    <updated date="2024-03-08 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: unbound security update</summary>
    <description> A vulnerability was found in Unbound due to incorrect default permissions, allowing any process outside the unbound group to modify the unbound runtime configuration. If a process can connect over localhost to port 8953, it can alter the configuration of unbound.service. This flaw allows an unprivileged attacker to manipulate a running instance, potentially altering forwarders, allowing them to track all queries forwarded by the local resolver, and, in some cases, disrupting resolving altogether.(CVE-2024-1488)
 The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.(CVE-2023-50868)
 Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.(CVE-2023-50387)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-1488" type="cve" title="fix CVE-2024-1488" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-50868" type="cve" title="fix CVE-2023-50868" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-50387" type="cve" title="fix CVE-2023-50387" />
    </references>
    <pkglist>
      <collection>
        <package name="unbound-help" version="1.16.2" release="5.uel20.03" epoch="0" arch="x86_64" src="unbound-1.16.2-5.uel20.03.src.rpm">
          <filename>unbound-help-1.16.2-5.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="python3-unbound" version="1.16.2" release="5.uel20.03" epoch="0" arch="x86_64" src="unbound-1.16.2-5.uel20.03.src.rpm">
          <filename>python3-unbound-1.16.2-5.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="unbound" version="1.16.2" release="5.uel20.03" epoch="0" arch="x86_64" src="unbound-1.16.2-5.uel20.03.src.rpm">
          <filename>unbound-1.16.2-5.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="unbound-libs" version="1.16.2" release="5.uel20.03" epoch="0" arch="x86_64" src="unbound-1.16.2-5.uel20.03.src.rpm">
          <filename>unbound-libs-1.16.2-5.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="unbound-devel" version="1.16.2" release="5.uel20.03" epoch="0" arch="x86_64" src="unbound-1.16.2-5.uel20.03.src.rpm">
          <filename>unbound-devel-1.16.2-5.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="unbound" version="1.16.2" release="5.uel20.03" epoch="0" arch="aarch64" src="unbound-1.16.2-5.uel20.03.src.rpm">
          <filename>unbound-1.16.2-5.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="unbound-libs" version="1.16.2" release="5.uel20.03" epoch="0" arch="aarch64" src="unbound-1.16.2-5.uel20.03.src.rpm">
          <filename>unbound-libs-1.16.2-5.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="unbound-help" version="1.16.2" release="5.uel20.03" epoch="0" arch="aarch64" src="unbound-1.16.2-5.uel20.03.src.rpm">
          <filename>unbound-help-1.16.2-5.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="unbound-devel" version="1.16.2" release="5.uel20.03" epoch="0" arch="aarch64" src="unbound-1.16.2-5.uel20.03.src.rpm">
          <filename>unbound-devel-1.16.2-5.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="python3-unbound" version="1.16.2" release="5.uel20.03" epoch="0" arch="aarch64" src="unbound-1.16.2-5.uel20.03.src.rpm">
          <filename>python3-unbound-1.16.2-5.uel20.03.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20092</id>
    <title>Important: firefox security update</title>
    <updated date="2024-03-01 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: firefox security update</summary>
    <description> A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.(CVE-2023-7104)
 Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)(CVE-2023-5217)
 Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)(CVE-2023-4863)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-7104" type="cve" title="fix CVE-2023-7104" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-5217" type="cve" title="fix CVE-2023-5217" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-4863" type="cve" title="fix CVE-2023-4863" />
    </references>
    <pkglist>
      <collection>
        <package name="firefox" version="79.0" release="15.uel20.01" epoch="0" arch="x86_64" src="firefox-79.0-15.uel20.01.src.rpm">
          <filename>firefox-79.0-15.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="firefox" version="79.0" release="15.uel20.01" epoch="0" arch="aarch64" src="firefox-79.0-15.uel20.01.src.rpm">
          <filename>firefox-79.0-15.uel20.01.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20093</id>
    <title>Important: glusterfs security update</title>
    <updated date="2024-03-06 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: glusterfs security update</summary>
    <description> In Gluster GlusterFS 11.0, there is an xlators/cluster/dht/src/dht-common.c dht_setxattr_mds_cbk use-after-free.(CVE-2022-48340)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-48340" type="cve" title="fix CVE-2022-48340" />
    </references>
    <pkglist>
      <collection>
        <package name="glusterfs" version="7.0" release="12.uel20" epoch="0" arch="x86_64" src="glusterfs-7.0-12.uel20.src.rpm">
          <filename>glusterfs-7.0-12.uel20.x86_64.rpm</filename>
        </package>
        <package name="glusterfs-devel" version="7.0" release="12.uel20" epoch="0" arch="x86_64" src="glusterfs-7.0-12.uel20.src.rpm">
          <filename>glusterfs-devel-7.0-12.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-gluster" version="7.0" release="12.uel20" epoch="0" arch="x86_64" src="glusterfs-7.0-12.uel20.src.rpm">
          <filename>python3-gluster-7.0-12.uel20.x86_64.rpm</filename>
        </package>
        <package name="glusterfs-help" version="7.0" release="12.uel20" epoch="0" arch="x86_64" src="glusterfs-7.0-12.uel20.src.rpm">
          <filename>glusterfs-help-7.0-12.uel20.x86_64.rpm</filename>
        </package>
        <package name="glusterfs-resource-agents" version="7.0" release="12.uel20" epoch="0" arch="noarch" src="glusterfs-7.0-12.uel20.src.rpm">
          <filename>glusterfs-resource-agents-7.0-12.uel20.noarch.rpm</filename>
        </package>
        <package name="glusterfs" version="7.0" release="12.uel20" epoch="0" arch="aarch64" src="glusterfs-7.0-12.uel20.src.rpm">
          <filename>glusterfs-7.0-12.uel20.aarch64.rpm</filename>
        </package>
        <package name="glusterfs-help" version="7.0" release="12.uel20" epoch="0" arch="aarch64" src="glusterfs-7.0-12.uel20.src.rpm">
          <filename>glusterfs-help-7.0-12.uel20.aarch64.rpm</filename>
        </package>
        <package name="glusterfs-devel" version="7.0" release="12.uel20" epoch="0" arch="aarch64" src="glusterfs-7.0-12.uel20.src.rpm">
          <filename>glusterfs-devel-7.0-12.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-gluster" version="7.0" release="12.uel20" epoch="0" arch="aarch64" src="glusterfs-7.0-12.uel20.src.rpm">
          <filename>python3-gluster-7.0-12.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20094</id>
    <title>None: python-django security update</title>
    <updated date="2024-03-15 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: python-django security update</summary>
    <description> In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665.(CVE-2024-27351)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-27351" type="cve" title="fix CVE-2024-27351" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-Django" version="2.2.27" release="11.uel20" epoch="0" arch="noarch" src="python-django-2.2.27-11.uel20.src.rpm">
          <filename>python3-Django-2.2.27-11.uel20.noarch.rpm</filename>
        </package>
        <package name="python-django-help" version="2.2.27" release="11.uel20" epoch="0" arch="noarch" src="python-django-2.2.27-11.uel20.src.rpm">
          <filename>python-django-help-2.2.27-11.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20095</id>
    <title>None: glade security update</title>
    <updated date="2024-03-08 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: glade security update</summary>
    <description> plugins/gtk+/glade-gtk-box.c in GNOME Glade before 3.38.1 and 3.39.x before 3.40.0 mishandles widget rebuilding for GladeGtkBox, leading to a denial of service (application crash).(CVE-2020-36774)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-36774" type="cve" title="fix CVE-2020-36774" />
    </references>
    <pkglist>
      <collection>
        <package name="glade" version="3.36.0" release="3.uel20" epoch="0" arch="x86_64" src="glade-3.36.0-3.uel20.src.rpm">
          <filename>glade-3.36.0-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="glade-libs" version="3.36.0" release="3.uel20" epoch="0" arch="x86_64" src="glade-3.36.0-3.uel20.src.rpm">
          <filename>glade-libs-3.36.0-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="glade-devel" version="3.36.0" release="3.uel20" epoch="0" arch="x86_64" src="glade-3.36.0-3.uel20.src.rpm">
          <filename>glade-devel-3.36.0-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="glade" version="3.36.0" release="3.uel20" epoch="0" arch="aarch64" src="glade-3.36.0-3.uel20.src.rpm">
          <filename>glade-3.36.0-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="glade-libs" version="3.36.0" release="3.uel20" epoch="0" arch="aarch64" src="glade-3.36.0-3.uel20.src.rpm">
          <filename>glade-libs-3.36.0-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="glade-devel" version="3.36.0" release="3.uel20" epoch="0" arch="aarch64" src="glade-3.36.0-3.uel20.src.rpm">
          <filename>glade-devel-3.36.0-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="glade-help" version="3.36.0" release="3.uel20" epoch="0" arch="noarch" src="glade-3.36.0-3.uel20.src.rpm">
          <filename>glade-help-3.36.0-3.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20098</id>
    <title>None: arm-trusted-firmware security update</title>
    <updated date="2024-03-06 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: arm-trusted-firmware security update</summary>
    <description> Trusted Firmware-A (TF-A) before 2.10 has a potential read out-of-bounds in the SDEI service. The input parameter passed in register x1 is not validated well enough in the function sdei_interrupt_bind. The parameter is passed to a call to plat_ic_get_interrupt_type. It can be any arbitrary value passing checks in the function plat_ic_is_sgi. A compromised Normal World (Linux kernel) can enable a root-privileged attacker to issue arbitrary SMC calls. Using this primitive, he can control the content of registers x0 through x6, which are used to send parameters to TF-A. Out-of-bounds addresses can be read in the context of TF-A (EL3). Because the read value is never returned to non-secure memory or in registers, no leak is possible. An attacker can still crash TF-A, however.(CVE-2023-49100)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-49100" type="cve" title="fix CVE-2023-49100" />
    </references>
    <pkglist>
      <collection>
        <package name="arm-trusted-firmware-armv8" version="1.6" release="4.uel20" epoch="0" arch="aarch64" src="arm-trusted-firmware-1.6-4.uel20.src.rpm">
          <filename>arm-trusted-firmware-armv8-1.6-4.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20099</id>
    <title>Moderate: json-path security update</title>
    <updated date="2024-03-08 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: json-path security update</summary>
    <description> json-path v2.8.0 was discovered to contain a stack overflow via the Criteria.parse() method.(CVE-2023-51074)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-51074" type="cve" title="fix CVE-2023-51074" />
    </references>
    <pkglist>
      <collection>
        <package name="json-path" version="2.1.0" release="2.uel20" epoch="0" arch="noarch" src="json-path-2.1.0-2.uel20.src.rpm">
          <filename>json-path-2.1.0-2.uel20.noarch.rpm</filename>
        </package>
        <package name="json-path-javadoc" version="2.1.0" release="2.uel20" epoch="0" arch="noarch" src="json-path-2.1.0-2.uel20.src.rpm">
          <filename>json-path-javadoc-2.1.0-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20100</id>
    <title>Moderate: jsoup security update</title>
    <updated date="2024-03-08 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: jsoup security update</summary>
    <description> jsoup is a Java HTML parser, built for HTML editing, cleaning, scraping, and cross-site scripting (XSS) safety. jsoup may incorrectly sanitize HTML including `javascript:` URL expressions, which could allow XSS attacks when a reader subsequently clicks that link. If the non-default `SafeList.preserveRelativeLinks` option is enabled, HTML including `javascript:` URLs that have been crafted with control characters will not be sanitized. If the site that this HTML is published on does not set a Content Security Policy, an XSS attack is then possible. This issue is patched in jsoup 1.15.3. Users should upgrade to this version. Additionally, as the unsanitized input may have been persisted, old content should be cleaned again using the updated version. To remediate this issue without immediately upgrading: - disable `SafeList.preserveRelativeLinks`, which will rewrite input URLs as absolute URLs - ensure an appropriate [Content Security Policy](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) is defined. (This should be used regardless of upgrading, as a defence-in-depth best practice.)(CVE-2022-36033)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-36033" type="cve" title="fix CVE-2022-36033" />
    </references>
    <pkglist>
      <collection>
        <package name="jsoup" version="1.14.2" release="2.uel20" epoch="0" arch="noarch" src="jsoup-1.14.2-2.uel20.src.rpm">
          <filename>jsoup-1.14.2-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20101</id>
    <title>Important: xorg-x11-server security update</title>
    <updated date="2024-04-10 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: xorg-x11-server security update</summary>
    <description> A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.(CVE-2024-31083)
 A heap-based buffer over-read vulnerability was found in the X.org server's ProcAppleDRICreatePixmap() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.(CVE-2024-31082)
 A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.(CVE-2024-31081)
 A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.(CVE-2024-31080)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-31083" type="cve" title="fix CVE-2024-31083" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-31082" type="cve" title="fix CVE-2024-31082" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-31081" type="cve" title="fix CVE-2024-31081" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-31080" type="cve" title="fix CVE-2024-31080" />
    </references>
    <pkglist>
      <collection>
        <package name="xorg-x11-server" version="1.20.8" release="26.up8.uel20" epoch="0" arch="x86_64" src="xorg-x11-server-1.20.8-26.up8.uel20.src.rpm">
          <filename>xorg-x11-server-1.20.8-26.up8.uel20.x86_64.rpm</filename>
        </package>
        <package name="xorg-x11-server-devel" version="1.20.8" release="26.up8.uel20" epoch="0" arch="x86_64" src="xorg-x11-server-1.20.8-26.up8.uel20.src.rpm">
          <filename>xorg-x11-server-devel-1.20.8-26.up8.uel20.x86_64.rpm</filename>
        </package>
        <package name="xorg-x11-server-Xephyr" version="1.20.8" release="26.up8.uel20" epoch="0" arch="x86_64" src="xorg-x11-server-1.20.8-26.up8.uel20.src.rpm">
          <filename>xorg-x11-server-Xephyr-1.20.8-26.up8.uel20.x86_64.rpm</filename>
        </package>
        <package name="xorg-x11-server" version="1.20.8" release="26.up8.uel20" epoch="0" arch="aarch64" src="xorg-x11-server-1.20.8-26.up8.uel20.src.rpm">
          <filename>xorg-x11-server-1.20.8-26.up8.uel20.aarch64.rpm</filename>
        </package>
        <package name="xorg-x11-server-devel" version="1.20.8" release="26.up8.uel20" epoch="0" arch="aarch64" src="xorg-x11-server-1.20.8-26.up8.uel20.src.rpm">
          <filename>xorg-x11-server-devel-1.20.8-26.up8.uel20.aarch64.rpm</filename>
        </package>
        <package name="xorg-x11-server-Xephyr" version="1.20.8" release="26.up8.uel20" epoch="0" arch="aarch64" src="xorg-x11-server-1.20.8-26.up8.uel20.src.rpm">
          <filename>xorg-x11-server-Xephyr-1.20.8-26.up8.uel20.aarch64.rpm</filename>
        </package>
        <package name="xorg-x11-server-help" version="1.20.8" release="26.up8.uel20" epoch="0" arch="noarch" src="xorg-x11-server-1.20.8-26.up8.uel20.src.rpm">
          <filename>xorg-x11-server-help-1.20.8-26.up8.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20102</id>
    <title>Moderate: nghttp2 security update</title>
    <updated date="2024-04-09 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: nghttp2 security update</summary>
    <description> nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync.  This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.(CVE-2024-28182)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-28182" type="cve" title="fix CVE-2024-28182" />
    </references>
    <pkglist>
      <collection>
        <package name="nghttp2" version="1.41.0" release="5.uel20.6" epoch="0" arch="x86_64" src="nghttp2-1.41.0-5.uel20.6.src.rpm">
          <filename>nghttp2-1.41.0-5.uel20.6.x86_64.rpm</filename>
        </package>
        <package name="libnghttp2" version="1.41.0" release="5.uel20.6" epoch="0" arch="x86_64" src="nghttp2-1.41.0-5.uel20.6.src.rpm">
          <filename>libnghttp2-1.41.0-5.uel20.6.x86_64.rpm</filename>
        </package>
        <package name="libnghttp2-devel" version="1.41.0" release="5.uel20.6" epoch="0" arch="x86_64" src="nghttp2-1.41.0-5.uel20.6.src.rpm">
          <filename>libnghttp2-devel-1.41.0-5.uel20.6.x86_64.rpm</filename>
        </package>
        <package name="nghttp2" version="1.41.0" release="5.uel20.6" epoch="0" arch="aarch64" src="nghttp2-1.41.0-5.uel20.6.src.rpm">
          <filename>nghttp2-1.41.0-5.uel20.6.aarch64.rpm</filename>
        </package>
        <package name="libnghttp2-devel" version="1.41.0" release="5.uel20.6" epoch="0" arch="aarch64" src="nghttp2-1.41.0-5.uel20.6.src.rpm">
          <filename>libnghttp2-devel-1.41.0-5.uel20.6.aarch64.rpm</filename>
        </package>
        <package name="nghttp2-help" version="1.41.0" release="5.uel20.6" epoch="0" arch="noarch" src="nghttp2-1.41.0-5.uel20.6.src.rpm">
          <filename>nghttp2-help-1.41.0-5.uel20.6.noarch.rpm</filename>
        </package>
        <package name="libnghttp2" version="1.41.0" release="5.uel20.6" epoch="0" arch="aarch64" src="nghttp2-1.41.0-5.uel20.6.src.rpm">
          <filename>libnghttp2-1.41.0-5.uel20.6.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20103</id>
    <title>None: mod_http2 security update</title>
    <updated date="2024-04-09 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: mod_http2 security update</summary>
    <description> HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.(CVE-2024-27316)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-27316" type="cve" title="fix CVE-2024-27316" />
    </references>
    <pkglist>
      <collection>
        <package name="mod_http2" version="1.15.13" release="2.uel20" epoch="0" arch="x86_64" src="mod_http2-1.15.13-2.uel20.src.rpm">
          <filename>mod_http2-1.15.13-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="mod_http2-help" version="1.15.13" release="2.uel20" epoch="0" arch="noarch" src="mod_http2-1.15.13-2.uel20.src.rpm">
          <filename>mod_http2-help-1.15.13-2.uel20.noarch.rpm</filename>
        </package>
        <package name="mod_http2" version="1.15.13" release="2.uel20" epoch="0" arch="aarch64" src="mod_http2-1.15.13-2.uel20.src.rpm">
          <filename>mod_http2-1.15.13-2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20104</id>
    <title>Moderate: iperf3 security update</title>
    <updated date="2024-04-09 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: iperf3 security update</summary>
    <description> A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service.(CVE-2023-7250)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-7250" type="cve" title="fix CVE-2023-7250" />
    </references>
    <pkglist>
      <collection>
        <package name="iperf3" version="3.16" release="1.uel20" epoch="0" arch="x86_64" src="iperf3-3.16-1.uel20.src.rpm">
          <filename>iperf3-3.16-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="iperf3-devel" version="3.16" release="1.uel20" epoch="0" arch="x86_64" src="iperf3-3.16-1.uel20.src.rpm">
          <filename>iperf3-devel-3.16-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="iperf3" version="3.16" release="1.uel20" epoch="0" arch="aarch64" src="iperf3-3.16-1.uel20.src.rpm">
          <filename>iperf3-3.16-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="iperf3-help" version="3.16" release="1.uel20" epoch="0" arch="noarch" src="iperf3-3.16-1.uel20.src.rpm">
          <filename>iperf3-help-3.16-1.uel20.noarch.rpm</filename>
        </package>
        <package name="iperf3-devel" version="3.16" release="1.uel20" epoch="0" arch="aarch64" src="iperf3-3.16-1.uel20.src.rpm">
          <filename>iperf3-devel-3.16-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20105</id>
    <title>None: util-linux security update</title>
    <updated date="2024-04-01 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: util-linux security update</summary>
    <description> wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.(CVE-2024-28085)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-28085" type="cve" title="fix CVE-2024-28085" />
    </references>
    <pkglist>
      <collection>
        <package name="util-linux" version="2.35.2" release="12.up4.uel20.09" epoch="0" arch="x86_64" src="util-linux-2.35.2-12.up4.uel20.09.src.rpm">
          <filename>util-linux-2.35.2-12.up4.uel20.09.x86_64.rpm</filename>
        </package>
        <package name="libblkid" version="2.35.2" release="12.up4.uel20.09" epoch="0" arch="x86_64" src="util-linux-2.35.2-12.up4.uel20.09.src.rpm">
          <filename>libblkid-2.35.2-12.up4.uel20.09.x86_64.rpm</filename>
        </package>
        <package name="libmount" version="2.35.2" release="12.up4.uel20.09" epoch="0" arch="x86_64" src="util-linux-2.35.2-12.up4.uel20.09.src.rpm">
          <filename>libmount-2.35.2-12.up4.uel20.09.x86_64.rpm</filename>
        </package>
        <package name="python-libmount" version="2.35.2" release="12.up4.uel20.09" epoch="0" arch="x86_64" src="util-linux-2.35.2-12.up4.uel20.09.src.rpm">
          <filename>python-libmount-2.35.2-12.up4.uel20.09.x86_64.rpm</filename>
        </package>
        <package name="libfdisk" version="2.35.2" release="12.up4.uel20.09" epoch="0" arch="x86_64" src="util-linux-2.35.2-12.up4.uel20.09.src.rpm">
          <filename>libfdisk-2.35.2-12.up4.uel20.09.x86_64.rpm</filename>
        </package>
        <package name="libuuid" version="2.35.2" release="12.up4.uel20.09" epoch="0" arch="x86_64" src="util-linux-2.35.2-12.up4.uel20.09.src.rpm">
          <filename>libuuid-2.35.2-12.up4.uel20.09.x86_64.rpm</filename>
        </package>
        <package name="uuidd" version="2.35.2" release="12.up4.uel20.09" epoch="0" arch="x86_64" src="util-linux-2.35.2-12.up4.uel20.09.src.rpm">
          <filename>uuidd-2.35.2-12.up4.uel20.09.x86_64.rpm</filename>
        </package>
        <package name="util-linux-devel" version="2.35.2" release="12.up4.uel20.09" epoch="0" arch="x86_64" src="util-linux-2.35.2-12.up4.uel20.09.src.rpm">
          <filename>util-linux-devel-2.35.2-12.up4.uel20.09.x86_64.rpm</filename>
        </package>
        <package name="util-linux-user" version="2.35.2" release="12.up4.uel20.09" epoch="0" arch="x86_64" src="util-linux-2.35.2-12.up4.uel20.09.src.rpm">
          <filename>util-linux-user-2.35.2-12.up4.uel20.09.x86_64.rpm</filename>
        </package>
        <package name="util-linux-help" version="2.35.2" release="12.up4.uel20.09" epoch="0" arch="x86_64" src="util-linux-2.35.2-12.up4.uel20.09.src.rpm">
          <filename>util-linux-help-2.35.2-12.up4.uel20.09.x86_64.rpm</filename>
        </package>
        <package name="libsmartcols" version="2.35.2" release="12.up4.uel20.09" epoch="0" arch="x86_64" src="util-linux-2.35.2-12.up4.uel20.09.src.rpm">
          <filename>libsmartcols-2.35.2-12.up4.uel20.09.x86_64.rpm</filename>
        </package>
        <package name="util-linux" version="2.35.2" release="12.up4.uel20.09" epoch="0" arch="aarch64" src="util-linux-2.35.2-12.up4.uel20.09.src.rpm">
          <filename>util-linux-2.35.2-12.up4.uel20.09.aarch64.rpm</filename>
        </package>
        <package name="libfdisk" version="2.35.2" release="12.up4.uel20.09" epoch="0" arch="aarch64" src="util-linux-2.35.2-12.up4.uel20.09.src.rpm">
          <filename>libfdisk-2.35.2-12.up4.uel20.09.aarch64.rpm</filename>
        </package>
        <package name="python-libmount" version="2.35.2" release="12.up4.uel20.09" epoch="0" arch="aarch64" src="util-linux-2.35.2-12.up4.uel20.09.src.rpm">
          <filename>python-libmount-2.35.2-12.up4.uel20.09.aarch64.rpm</filename>
        </package>
        <package name="libsmartcols" version="2.35.2" release="12.up4.uel20.09" epoch="0" arch="aarch64" src="util-linux-2.35.2-12.up4.uel20.09.src.rpm">
          <filename>libsmartcols-2.35.2-12.up4.uel20.09.aarch64.rpm</filename>
        </package>
        <package name="uuidd" version="2.35.2" release="12.up4.uel20.09" epoch="0" arch="aarch64" src="util-linux-2.35.2-12.up4.uel20.09.src.rpm">
          <filename>uuidd-2.35.2-12.up4.uel20.09.aarch64.rpm</filename>
        </package>
        <package name="libblkid" version="2.35.2" release="12.up4.uel20.09" epoch="0" arch="aarch64" src="util-linux-2.35.2-12.up4.uel20.09.src.rpm">
          <filename>libblkid-2.35.2-12.up4.uel20.09.aarch64.rpm</filename>
        </package>
        <package name="util-linux-help" version="2.35.2" release="12.up4.uel20.09" epoch="0" arch="aarch64" src="util-linux-2.35.2-12.up4.uel20.09.src.rpm">
          <filename>util-linux-help-2.35.2-12.up4.uel20.09.aarch64.rpm</filename>
        </package>
        <package name="util-linux-user" version="2.35.2" release="12.up4.uel20.09" epoch="0" arch="aarch64" src="util-linux-2.35.2-12.up4.uel20.09.src.rpm">
          <filename>util-linux-user-2.35.2-12.up4.uel20.09.aarch64.rpm</filename>
        </package>
        <package name="libuuid" version="2.35.2" release="12.up4.uel20.09" epoch="0" arch="aarch64" src="util-linux-2.35.2-12.up4.uel20.09.src.rpm">
          <filename>libuuid-2.35.2-12.up4.uel20.09.aarch64.rpm</filename>
        </package>
        <package name="libmount" version="2.35.2" release="12.up4.uel20.09" epoch="0" arch="aarch64" src="util-linux-2.35.2-12.up4.uel20.09.src.rpm">
          <filename>libmount-2.35.2-12.up4.uel20.09.aarch64.rpm</filename>
        </package>
        <package name="util-linux-devel" version="2.35.2" release="12.up4.uel20.09" epoch="0" arch="aarch64" src="util-linux-2.35.2-12.up4.uel20.09.src.rpm">
          <filename>util-linux-devel-2.35.2-12.up4.uel20.09.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20106</id>
    <title>None: curl security update</title>
    <updated date="2024-04-08 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: curl security update</summary>
    <description> When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory.  Further, this error condition fails silently and is therefore not easily detected by an application.(CVE-2024-2398)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-2398" type="cve" title="fix CVE-2024-2398" />
    </references>
    <pkglist>
      <collection>
        <package name="libcurl" version="7.71.1" release="33.up3.uel20.03" epoch="0" arch="x86_64" src="curl-7.71.1-33.up3.uel20.03.src.rpm">
          <filename>libcurl-7.71.1-33.up3.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="curl" version="7.71.1" release="33.up3.uel20.03" epoch="0" arch="x86_64" src="curl-7.71.1-33.up3.uel20.03.src.rpm">
          <filename>curl-7.71.1-33.up3.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="libcurl-devel" version="7.71.1" release="33.up3.uel20.03" epoch="0" arch="x86_64" src="curl-7.71.1-33.up3.uel20.03.src.rpm">
          <filename>libcurl-devel-7.71.1-33.up3.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="curl" version="7.71.1" release="33.up3.uel20.03" epoch="0" arch="aarch64" src="curl-7.71.1-33.up3.uel20.03.src.rpm">
          <filename>curl-7.71.1-33.up3.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="libcurl" version="7.71.1" release="33.up3.uel20.03" epoch="0" arch="aarch64" src="curl-7.71.1-33.up3.uel20.03.src.rpm">
          <filename>libcurl-7.71.1-33.up3.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="libcurl-devel" version="7.71.1" release="33.up3.uel20.03" epoch="0" arch="aarch64" src="curl-7.71.1-33.up3.uel20.03.src.rpm">
          <filename>libcurl-devel-7.71.1-33.up3.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="curl-help" version="7.71.1" release="33.up3.uel20.03" epoch="0" arch="noarch" src="curl-7.71.1-33.up3.uel20.03.src.rpm">
          <filename>curl-help-7.71.1-33.up3.uel20.03.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20109</id>
    <title>Important: mod_security security update</title>
    <updated date="2024-04-03 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: mod_security security update</summary>
    <description> In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart requests were incorrectly parsed and could bypass the Web Application Firewall. NOTE: this is related to CVE-2022-39956 but can be considered independent changes to the ModSecurity (C language) codebase.(CVE-2022-48279)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-48279" type="cve" title="fix CVE-2022-48279" />
    </references>
    <pkglist>
      <collection>
        <package name="mod_security" version="2.9.5" release="2.up1.uel20" epoch="0" arch="x86_64" src="mod_security-2.9.5-2.up1.uel20.src.rpm">
          <filename>mod_security-2.9.5-2.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mod_security" version="2.9.5" release="2.up1.uel20" epoch="0" arch="aarch64" src="mod_security-2.9.5-2.up1.uel20.src.rpm">
          <filename>mod_security-2.9.5-2.up1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20110</id>
    <title>Important: telnet security update</title>
    <updated date="2024-04-08 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: telnet security update</summary>
    <description> telnetd in GNU Inetutils through 2.3, MIT krb5-appl through 1.0.3, and derivative works has a NULL pointer dereference via 0xff 0xf7 or 0xff 0xf8. In a typical installation, the telnetd application would crash but the telnet service would remain available through inetd. However, if the telnetd application has many crashes within a short time interval, the telnet service would become unavailable after inetd logs a "telnet/tcp server failing (looping), service terminated" error. NOTE: MIT krb5-appl is not supported upstream but is shipped by a few Linux distributions. The affected code was removed from the supported MIT Kerberos 5 (aka krb5) product many years ago, at version 1.8.(CVE-2022-39028)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-39028" type="cve" title="fix CVE-2022-39028" />
    </references>
    <pkglist>
      <collection>
        <package name="telnet" version="0.17" release="78.uel20" epoch="1" arch="x86_64" src="telnet-0.17-78.uel20.src.rpm">
          <filename>telnet-0.17-78.uel20.x86_64.rpm</filename>
        </package>
        <package name="telnet-help" version="0.17" release="78.uel20" epoch="1" arch="x86_64" src="telnet-0.17-78.uel20.src.rpm">
          <filename>telnet-help-0.17-78.uel20.x86_64.rpm</filename>
        </package>
        <package name="telnet-help" version="0.17" release="78.uel20" epoch="1" arch="aarch64" src="telnet-0.17-78.uel20.src.rpm">
          <filename>telnet-help-0.17-78.uel20.aarch64.rpm</filename>
        </package>
        <package name="telnet" version="0.17" release="78.uel20" epoch="1" arch="aarch64" src="telnet-0.17-78.uel20.src.rpm">
          <filename>telnet-0.17-78.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20112</id>
    <title>Moderate: jpegoptim security update</title>
    <updated date="2024-04-03 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: jpegoptim security update</summary>
    <description> JPEGOPTIM v1.4.7 was discovered to contain a segmentation violation which is caused by a READ memory access at jpegoptim.c.(CVE-2022-32325)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-32325" type="cve" title="fix CVE-2022-32325" />
    </references>
    <pkglist>
      <collection>
        <package name="jpegoptim" version="1.5.5" release="1.uel20" epoch="0" arch="x86_64" src="jpegoptim-1.5.5-1.uel20.src.rpm">
          <filename>jpegoptim-1.5.5-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="jpegoptim" version="1.5.5" release="1.uel20" epoch="0" arch="aarch64" src="jpegoptim-1.5.5-1.uel20.src.rpm">
          <filename>jpegoptim-1.5.5-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20113</id>
    <title>Important: rubygem-tzinfo security update</title>
    <updated date="2024-04-01 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: rubygem-tzinfo security update</summary>
    <description> TZInfo is a Ruby library that provides access to time zone data and allows times to be converted using time zone rules. Versions prior to 0.36.1, as well as those prior to 1.2.10 when used with the Ruby data source tzinfo-data, are vulnerable to relative path traversal. With the Ruby data source, time zones are defined in Ruby files. There is one file per time zone. Time zone files are loaded with `require` on demand. In the affected versions, `TZInfo::Timezone.get` fails to validate time zone identifiers correctly, allowing a new line character within the identifier. With Ruby version 1.9.3 and later, `TZInfo::Timezone.get` can be made to load unintended files with `require`, executing them within the Ruby process. Versions 0.3.61 and 1.2.10 include fixes to correctly validate time zone identifiers. Versions 2.0.0 and later are not vulnerable. Version 0.3.61 can still load arbitrary files from the Ruby load path if their name follows the rules for a valid time zone identifier and the file has a prefix of `tzinfo/definition` within a directory in the load path. Applications should ensure that untrusted files are not placed in a directory on the load path. As a workaround, the time zone identifier can be validated before passing to `TZInfo::Timezone.get` by ensuring it matches the regular expression `\A[A-Za-z0-9+\-_]+(?:\/[A-Za-z0-9+\-_]+)*\z`.(CVE-2022-31163)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-31163" type="cve" title="fix CVE-2022-31163" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-tzinfo-doc" version="1.2.5" release="3.uel20" epoch="0" arch="noarch" src="rubygem-tzinfo-1.2.5-3.uel20.src.rpm">
          <filename>rubygem-tzinfo-doc-1.2.5-3.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-tzinfo" version="1.2.5" release="3.uel20" epoch="0" arch="noarch" src="rubygem-tzinfo-1.2.5-3.uel20.src.rpm">
          <filename>rubygem-tzinfo-1.2.5-3.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20114</id>
    <title>Important: openvswitch security update</title>
    <updated date="2024-04-01 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: openvswitch security update</summary>
    <description> An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.(CVE-2022-2639)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-2639" type="cve" title="fix CVE-2022-2639" />
    </references>
    <pkglist>
      <collection>
        <package name="openvswitch" version="2.12.4" release="10.uel20" epoch="0" arch="x86_64" src="openvswitch-2.12.4-10.uel20.src.rpm">
          <filename>openvswitch-2.12.4-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="openvswitch-devel" version="2.12.4" release="10.uel20" epoch="0" arch="x86_64" src="openvswitch-2.12.4-10.uel20.src.rpm">
          <filename>openvswitch-devel-2.12.4-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-openvswitch" version="2.12.4" release="10.uel20" epoch="0" arch="x86_64" src="openvswitch-2.12.4-10.uel20.src.rpm">
          <filename>python3-openvswitch-2.12.4-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="openvswitch-help" version="2.12.4" release="10.uel20" epoch="0" arch="x86_64" src="openvswitch-2.12.4-10.uel20.src.rpm">
          <filename>openvswitch-help-2.12.4-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="openvswitch" version="2.12.4" release="10.uel20" epoch="0" arch="aarch64" src="openvswitch-2.12.4-10.uel20.src.rpm">
          <filename>openvswitch-2.12.4-10.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-openvswitch" version="2.12.4" release="10.uel20" epoch="0" arch="aarch64" src="openvswitch-2.12.4-10.uel20.src.rpm">
          <filename>python3-openvswitch-2.12.4-10.uel20.aarch64.rpm</filename>
        </package>
        <package name="openvswitch-help" version="2.12.4" release="10.uel20" epoch="0" arch="aarch64" src="openvswitch-2.12.4-10.uel20.src.rpm">
          <filename>openvswitch-help-2.12.4-10.uel20.aarch64.rpm</filename>
        </package>
        <package name="openvswitch-devel" version="2.12.4" release="10.uel20" epoch="0" arch="aarch64" src="openvswitch-2.12.4-10.uel20.src.rpm">
          <filename>openvswitch-devel-2.12.4-10.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20115</id>
    <title>Important: nodejs-qs security update</title>
    <updated date="2024-04-01 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: nodejs-qs security update</summary>
    <description> qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&amp;a[__proto__]&amp;a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has "deps: qs@6.9.7" in its release description, is not vulnerable).(CVE-2022-24999)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-24999" type="cve" title="fix CVE-2022-24999" />
    </references>
    <pkglist>
      <collection>
        <package name="nodejs-qs" version="6.5.1" release="2.uel20" epoch="0" arch="noarch" src="nodejs-qs-6.5.1-2.uel20.src.rpm">
          <filename>nodejs-qs-6.5.1-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20116</id>
    <title>Important: libgsasl security update</title>
    <updated date="2024-04-01 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: libgsasl security update</summary>
    <description> GNU SASL libgsasl server-side read-out-of-bounds with malicious authenticated GSS-API client(CVE-2022-2469)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-2469" type="cve" title="fix CVE-2022-2469" />
    </references>
    <pkglist>
      <collection>
        <package name="libgsasl" version="1.8.0" release="17.uel20" epoch="0" arch="x86_64" src="libgsasl-1.8.0-17.uel20.src.rpm">
          <filename>libgsasl-1.8.0-17.uel20.x86_64.rpm</filename>
        </package>
        <package name="libgsasl-devel" version="1.8.0" release="17.uel20" epoch="0" arch="x86_64" src="libgsasl-1.8.0-17.uel20.src.rpm">
          <filename>libgsasl-devel-1.8.0-17.uel20.x86_64.rpm</filename>
        </package>
        <package name="libgsasl" version="1.8.0" release="17.uel20" epoch="0" arch="aarch64" src="libgsasl-1.8.0-17.uel20.src.rpm">
          <filename>libgsasl-1.8.0-17.uel20.aarch64.rpm</filename>
        </package>
        <package name="libgsasl-devel" version="1.8.0" release="17.uel20" epoch="0" arch="aarch64" src="libgsasl-1.8.0-17.uel20.src.rpm">
          <filename>libgsasl-devel-1.8.0-17.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20117</id>
    <title>Important: libdwarf security update</title>
    <updated date="2024-04-03 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: libdwarf security update</summary>
    <description> A double-free vulnerability was found in libdwarf. In a multiply-corrupted DWARF object, libdwarf may try to dealloc(free) an allocation twice, potentially causing unpredictable and various results.(CVE-2024-2002)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-2002" type="cve" title="fix CVE-2024-2002" />
    </references>
    <pkglist>
      <collection>
        <package name="libdwarf-devel" version="0.9.1" release="1.uel20" epoch="1" arch="x86_64" src="libdwarf-0.9.1-1.uel20.src.rpm">
          <filename>libdwarf-devel-0.9.1-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libdwarf-tools" version="0.9.1" release="1.uel20" epoch="1" arch="x86_64" src="libdwarf-0.9.1-1.uel20.src.rpm">
          <filename>libdwarf-tools-0.9.1-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libdwarf" version="0.9.1" release="1.uel20" epoch="1" arch="x86_64" src="libdwarf-0.9.1-1.uel20.src.rpm">
          <filename>libdwarf-0.9.1-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libdwarf-devel" version="0.9.1" release="1.uel20" epoch="1" arch="aarch64" src="libdwarf-0.9.1-1.uel20.src.rpm">
          <filename>libdwarf-devel-0.9.1-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libdwarf-help" version="0.9.1" release="1.uel20" epoch="1" arch="noarch" src="libdwarf-0.9.1-1.uel20.src.rpm">
          <filename>libdwarf-help-0.9.1-1.uel20.noarch.rpm</filename>
        </package>
        <package name="libdwarf-tools" version="0.9.1" release="1.uel20" epoch="1" arch="aarch64" src="libdwarf-0.9.1-1.uel20.src.rpm">
          <filename>libdwarf-tools-0.9.1-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libdwarf" version="0.9.1" release="1.uel20" epoch="1" arch="aarch64" src="libdwarf-0.9.1-1.uel20.src.rpm">
          <filename>libdwarf-0.9.1-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20118</id>
    <title>Moderate: microcode_ctl security update</title>
    <updated date="2024-03-22 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: microcode_ctl security update</summary>
    <description> Protection mechanism failure of bus lock regulator for some Intel(R) Processors may allow an unauthenticated user to potentially enable denial of service via network access.(CVE-2023-39368)
 Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.(CVE-2023-38575)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-39368" type="cve" title="fix CVE-2023-39368" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-38575" type="cve" title="fix CVE-2023-38575" />
    </references>
    <pkglist>
      <collection>
        <package name="microcode_ctl" version="20240312" release="1.uel20.01" epoch="4" arch="x86_64" src="microcode_ctl-20240312-1.uel20.01.src.rpm">
          <filename>microcode_ctl-20240312-1.uel20.01.x86_64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20119</id>
    <title>None: libreswan security update</title>
    <updated date="2024-04-03 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: libreswan security update</summary>
    <description> The Libreswan Project was notified of an issue causing libreswan to restart under some IKEv2 retransmit scenarios when a connection is configured to use PreSharedKeys (authby=secret) and the connection cannot find a matching configured secret. When such a connection is automatically added on startup using the auto= keyword, it can cause repeated crashes leading to a Denial of Service.(CVE-2024-2357)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-2357" type="cve" title="fix CVE-2024-2357" />
    </references>
    <pkglist>
      <collection>
        <package name="libreswan" version="4.14" release="1.uel20" epoch="0" arch="x86_64" src="libreswan-4.14-1.uel20.src.rpm">
          <filename>libreswan-4.14-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libreswan-help" version="4.14" release="1.uel20" epoch="0" arch="x86_64" src="libreswan-4.14-1.uel20.src.rpm">
          <filename>libreswan-help-4.14-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libreswan" version="4.14" release="1.uel20" epoch="0" arch="aarch64" src="libreswan-4.14-1.uel20.src.rpm">
          <filename>libreswan-4.14-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libreswan-help" version="4.14" release="1.uel20" epoch="0" arch="aarch64" src="libreswan-4.14-1.uel20.src.rpm">
          <filename>libreswan-help-4.14-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20121</id>
    <title>Moderate: c-ares security update</title>
    <updated date="2024-03-20 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: c-ares security update</summary>
    <description> c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these configuration files has an embedded `NULL` character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c-ares 1.27.0. No known workarounds exist.(CVE-2024-25629)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-25629" type="cve" title="fix CVE-2024-25629" />
    </references>
    <pkglist>
      <collection>
        <package name="c-ares" version="1.16.1" release="8.uel20.01" epoch="0" arch="x86_64" src="c-ares-1.16.1-8.uel20.01.src.rpm">
          <filename>c-ares-1.16.1-8.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="c-ares-devel" version="1.16.1" release="8.uel20.01" epoch="0" arch="x86_64" src="c-ares-1.16.1-8.uel20.01.src.rpm">
          <filename>c-ares-devel-1.16.1-8.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="c-ares-devel" version="1.16.1" release="8.uel20.01" epoch="0" arch="aarch64" src="c-ares-1.16.1-8.uel20.01.src.rpm">
          <filename>c-ares-devel-1.16.1-8.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="c-ares" version="1.16.1" release="8.uel20.01" epoch="0" arch="aarch64" src="c-ares-1.16.1-8.uel20.01.src.rpm">
          <filename>c-ares-1.16.1-8.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="c-ares-help" version="1.16.1" release="8.uel20.01" epoch="0" arch="noarch" src="c-ares-1.16.1-8.uel20.01.src.rpm">
          <filename>c-ares-help-1.16.1-8.uel20.01.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20124</id>
    <title>None: gstreamer1-plugins-base security update</title>
    <updated date="2024-03-29 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: gstreamer1-plugins-base security update</summary>
    <description> ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2023-37328)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-37328" type="cve" title="fix CVE-2023-37328" />
    </references>
    <pkglist>
      <collection>
        <package name="gstreamer1-plugins-base" version="1.16.2" release="3.uel20" epoch="0" arch="x86_64" src="gstreamer1-plugins-base-1.16.2-3.uel20.src.rpm">
          <filename>gstreamer1-plugins-base-1.16.2-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="gstreamer1-plugins-base-devel" version="1.16.2" release="3.uel20" epoch="0" arch="x86_64" src="gstreamer1-plugins-base-1.16.2-3.uel20.src.rpm">
          <filename>gstreamer1-plugins-base-devel-1.16.2-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="gstreamer1-plugins-base" version="1.16.2" release="3.uel20" epoch="0" arch="aarch64" src="gstreamer1-plugins-base-1.16.2-3.uel20.src.rpm">
          <filename>gstreamer1-plugins-base-1.16.2-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="gstreamer1-plugins-base-devel" version="1.16.2" release="3.uel20" epoch="0" arch="aarch64" src="gstreamer1-plugins-base-1.16.2-3.uel20.src.rpm">
          <filename>gstreamer1-plugins-base-devel-1.16.2-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="gstreamer1-plugins-base-help" version="1.16.2" release="3.uel20" epoch="0" arch="noarch" src="gstreamer1-plugins-base-1.16.2-3.uel20.src.rpm">
          <filename>gstreamer1-plugins-base-help-1.16.2-3.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20125</id>
    <title>Moderate: qemu security update</title>
    <updated date="2024-03-26 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: qemu security update</summary>
    <description> A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.(CVE-2023-3019)
 A vulnerability in the lsi53c895a device affects the latest version of qemu. A DMA-MMIO reentrancy problem may lead to memory corruption bugs like stack overflow or use-after-free.(CVE-2023-0330)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-3019" type="cve" title="fix CVE-2023-3019" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-0330" type="cve" title="fix CVE-2023-0330" />
    </references>
    <pkglist>
      <collection>
        <package name="qemu" version="4.1.0" release="82.up6.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-82.up6.uel20.src.rpm">
          <filename>qemu-4.1.0-82.up6.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-guest-agent" version="4.1.0" release="82.up6.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-82.up6.uel20.src.rpm">
          <filename>qemu-guest-agent-4.1.0-82.up6.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-block-curl" version="4.1.0" release="82.up6.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-82.up6.uel20.src.rpm">
          <filename>qemu-block-curl-4.1.0-82.up6.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-seabios" version="4.1.0" release="82.up6.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-82.up6.uel20.src.rpm">
          <filename>qemu-seabios-4.1.0-82.up6.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-block-ssh" version="4.1.0" release="82.up6.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-82.up6.uel20.src.rpm">
          <filename>qemu-block-ssh-4.1.0-82.up6.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-block-iscsi" version="4.1.0" release="82.up6.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-82.up6.uel20.src.rpm">
          <filename>qemu-block-iscsi-4.1.0-82.up6.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-img" version="4.1.0" release="82.up6.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-82.up6.uel20.src.rpm">
          <filename>qemu-img-4.1.0-82.up6.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-block-rbd" version="4.1.0" release="82.up6.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-82.up6.uel20.src.rpm">
          <filename>qemu-block-rbd-4.1.0-82.up6.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-help" version="4.1.0" release="82.up6.uel20" epoch="10" arch="noarch" src="qemu-4.1.0-82.up6.uel20.src.rpm">
          <filename>qemu-help-4.1.0-82.up6.uel20.noarch.rpm</filename>
        </package>
        <package name="qemu-block-curl" version="4.1.0" release="82.up6.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-82.up6.uel20.src.rpm">
          <filename>qemu-block-curl-4.1.0-82.up6.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu-block-ssh" version="4.1.0" release="82.up6.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-82.up6.uel20.src.rpm">
          <filename>qemu-block-ssh-4.1.0-82.up6.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu-block-rbd" version="4.1.0" release="82.up6.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-82.up6.uel20.src.rpm">
          <filename>qemu-block-rbd-4.1.0-82.up6.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu-guest-agent" version="4.1.0" release="82.up6.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-82.up6.uel20.src.rpm">
          <filename>qemu-guest-agent-4.1.0-82.up6.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu-block-iscsi" version="4.1.0" release="82.up6.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-82.up6.uel20.src.rpm">
          <filename>qemu-block-iscsi-4.1.0-82.up6.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu-img" version="4.1.0" release="82.up6.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-82.up6.uel20.src.rpm">
          <filename>qemu-img-4.1.0-82.up6.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu" version="4.1.0" release="82.up6.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-82.up6.uel20.src.rpm">
          <filename>qemu-4.1.0-82.up6.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20126</id>
    <title>Important: libxml2 security update</title>
    <updated date="2024-04-03 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: libxml2 security update</summary>
    <description> NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows triggering crashes through forged input data, given a vulnerable code sequence in the application. The vulnerability is caused by the iterwalk function (also used by the canonicalize function). Such code shouldn't be in wide-spread use, given that parsing + iterwalk would usually be replaced with the more efficient iterparse function. However, an XML converter that serialises to C14N would also be vulnerable, for example, and there are legitimate use cases for this code sequence. If untrusted input is received (also remotely) and processed via iterwalk function, a crash can be triggered.(CVE-2022-2309)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-2309" type="cve" title="fix CVE-2022-2309" />
    </references>
    <pkglist>
      <collection>
        <package name="libxml2" version="2.9.10" release="40.uel20" epoch="0" arch="x86_64" src="libxml2-2.9.10-40.uel20.src.rpm">
          <filename>libxml2-2.9.10-40.uel20.x86_64.rpm</filename>
        </package>
        <package name="python2-libxml2" version="2.9.10" release="40.uel20" epoch="0" arch="x86_64" src="libxml2-2.9.10-40.uel20.src.rpm">
          <filename>python2-libxml2-2.9.10-40.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-libxml2" version="2.9.10" release="40.uel20" epoch="0" arch="x86_64" src="libxml2-2.9.10-40.uel20.src.rpm">
          <filename>python3-libxml2-2.9.10-40.uel20.x86_64.rpm</filename>
        </package>
        <package name="libxml2-devel" version="2.9.10" release="40.uel20" epoch="0" arch="x86_64" src="libxml2-2.9.10-40.uel20.src.rpm">
          <filename>libxml2-devel-2.9.10-40.uel20.x86_64.rpm</filename>
        </package>
        <package name="libxml2-devel" version="2.9.10" release="40.uel20" epoch="0" arch="aarch64" src="libxml2-2.9.10-40.uel20.src.rpm">
          <filename>libxml2-devel-2.9.10-40.uel20.aarch64.rpm</filename>
        </package>
        <package name="libxml2-help" version="2.9.10" release="40.uel20" epoch="0" arch="noarch" src="libxml2-2.9.10-40.uel20.src.rpm">
          <filename>libxml2-help-2.9.10-40.uel20.noarch.rpm</filename>
        </package>
        <package name="python2-libxml2" version="2.9.10" release="40.uel20" epoch="0" arch="aarch64" src="libxml2-2.9.10-40.uel20.src.rpm">
          <filename>python2-libxml2-2.9.10-40.uel20.aarch64.rpm</filename>
        </package>
        <package name="libxml2" version="2.9.10" release="40.uel20" epoch="0" arch="aarch64" src="libxml2-2.9.10-40.uel20.src.rpm">
          <filename>libxml2-2.9.10-40.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-libxml2" version="2.9.10" release="40.uel20" epoch="0" arch="aarch64" src="libxml2-2.9.10-40.uel20.src.rpm">
          <filename>python3-libxml2-2.9.10-40.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20129</id>
    <title>Important: flatpak security update</title>
    <updated date="2024-04-24 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: flatpak security update</summary>
    <description> Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. in versions before 1.10.9, 1.12.9, 1.14.6, and 1.15.8, a malicious or compromised Flatpak app could execute arbitrary code outside its sandbox. Normally, the `--command` argument of `flatpak run` expects to be given a command to run in the specified Flatpak app, optionally along with some arguments. However it is possible to instead pass `bwrap` arguments to `--command=`, such as `--bind`. It's possible to pass an arbitrary `commandline` to the portal interface `org.freedesktop.portal.Background.RequestBackground` from within a Flatpak app. When this is converted into a `--command` and arguments, it achieves the same effect of passing arguments directly to `bwrap`, and thus can be used for a sandbox escape. The solution is to pass the `--` argument to `bwrap`, which makes it stop processing options. This has been supported since bubblewrap 0.3.0. All supported versions of Flatpak require at least that version of bubblewrap. xdg-desktop-portal version 1.18.4 will mitigate this vulnerability by only allowing Flatpak apps to create .desktop files for commands that do not start with --. The vulnerability is patched in 1.15.8, 1.10.9, 1.12.9, and 1.14.6.(CVE-2024-32462)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-32462" type="cve" title="fix CVE-2024-32462" />
    </references>
    <pkglist>
      <collection>
        <package name="flatpak" version="1.0.3" release="12.uel20" epoch="0" arch="x86_64" src="flatpak-1.0.3-12.uel20.src.rpm">
          <filename>flatpak-1.0.3-12.uel20.x86_64.rpm</filename>
        </package>
        <package name="flatpak-devel" version="1.0.3" release="12.uel20" epoch="0" arch="x86_64" src="flatpak-1.0.3-12.uel20.src.rpm">
          <filename>flatpak-devel-1.0.3-12.uel20.x86_64.rpm</filename>
        </package>
        <package name="flatpak-devel" version="1.0.3" release="12.uel20" epoch="0" arch="aarch64" src="flatpak-1.0.3-12.uel20.src.rpm">
          <filename>flatpak-devel-1.0.3-12.uel20.aarch64.rpm</filename>
        </package>
        <package name="flatpak-help" version="1.0.3" release="12.uel20" epoch="0" arch="noarch" src="flatpak-1.0.3-12.uel20.src.rpm">
          <filename>flatpak-help-1.0.3-12.uel20.noarch.rpm</filename>
        </package>
        <package name="flatpak" version="1.0.3" release="12.uel20" epoch="0" arch="aarch64" src="flatpak-1.0.3-12.uel20.src.rpm">
          <filename>flatpak-1.0.3-12.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20135</id>
    <title>None: systemd security update</title>
    <updated date="2024-04-23 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: systemd security update</summary>
    <description> The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.(CVE-2023-50868)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-50868" type="cve" title="fix CVE-2023-50868" />
    </references>
    <pkglist>
      <collection>
        <package name="systemd-libs" version="243" release="62.up9.uel20.08" epoch="0" arch="x86_64" src="systemd-243-62.up9.uel20.08.src.rpm">
          <filename>systemd-libs-243-62.up9.uel20.08.x86_64.rpm</filename>
        </package>
        <package name="systemd" version="243" release="62.up9.uel20.08" epoch="0" arch="x86_64" src="systemd-243-62.up9.uel20.08.src.rpm">
          <filename>systemd-243-62.up9.uel20.08.x86_64.rpm</filename>
        </package>
        <package name="systemd-devel" version="243" release="62.up9.uel20.08" epoch="0" arch="x86_64" src="systemd-243-62.up9.uel20.08.src.rpm">
          <filename>systemd-devel-243-62.up9.uel20.08.x86_64.rpm</filename>
        </package>
        <package name="systemd-container" version="243" release="62.up9.uel20.08" epoch="0" arch="x86_64" src="systemd-243-62.up9.uel20.08.src.rpm">
          <filename>systemd-container-243-62.up9.uel20.08.x86_64.rpm</filename>
        </package>
        <package name="systemd-udev" version="243" release="62.up9.uel20.08" epoch="0" arch="x86_64" src="systemd-243-62.up9.uel20.08.src.rpm">
          <filename>systemd-udev-243-62.up9.uel20.08.x86_64.rpm</filename>
        </package>
        <package name="systemd-journal-remote" version="243" release="62.up9.uel20.08" epoch="0" arch="x86_64" src="systemd-243-62.up9.uel20.08.src.rpm">
          <filename>systemd-journal-remote-243-62.up9.uel20.08.x86_64.rpm</filename>
        </package>
        <package name="systemd-udev-compat" version="243" release="62.up9.uel20.08" epoch="0" arch="x86_64" src="systemd-243-62.up9.uel20.08.src.rpm">
          <filename>systemd-udev-compat-243-62.up9.uel20.08.x86_64.rpm</filename>
        </package>
        <package name="systemd-container" version="243" release="62.up9.uel20.08" epoch="0" arch="aarch64" src="systemd-243-62.up9.uel20.08.src.rpm">
          <filename>systemd-container-243-62.up9.uel20.08.aarch64.rpm</filename>
        </package>
        <package name="systemd-libs" version="243" release="62.up9.uel20.08" epoch="0" arch="aarch64" src="systemd-243-62.up9.uel20.08.src.rpm">
          <filename>systemd-libs-243-62.up9.uel20.08.aarch64.rpm</filename>
        </package>
        <package name="systemd-help" version="243" release="62.up9.uel20.08" epoch="0" arch="noarch" src="systemd-243-62.up9.uel20.08.src.rpm">
          <filename>systemd-help-243-62.up9.uel20.08.noarch.rpm</filename>
        </package>
        <package name="systemd" version="243" release="62.up9.uel20.08" epoch="0" arch="aarch64" src="systemd-243-62.up9.uel20.08.src.rpm">
          <filename>systemd-243-62.up9.uel20.08.aarch64.rpm</filename>
        </package>
        <package name="systemd-journal-remote" version="243" release="62.up9.uel20.08" epoch="0" arch="aarch64" src="systemd-243-62.up9.uel20.08.src.rpm">
          <filename>systemd-journal-remote-243-62.up9.uel20.08.aarch64.rpm</filename>
        </package>
        <package name="systemd-udev-compat" version="243" release="62.up9.uel20.08" epoch="0" arch="aarch64" src="systemd-243-62.up9.uel20.08.src.rpm">
          <filename>systemd-udev-compat-243-62.up9.uel20.08.aarch64.rpm</filename>
        </package>
        <package name="systemd-devel" version="243" release="62.up9.uel20.08" epoch="0" arch="aarch64" src="systemd-243-62.up9.uel20.08.src.rpm">
          <filename>systemd-devel-243-62.up9.uel20.08.aarch64.rpm</filename>
        </package>
        <package name="systemd-udev" version="243" release="62.up9.uel20.08" epoch="0" arch="aarch64" src="systemd-243-62.up9.uel20.08.src.rpm">
          <filename>systemd-udev-243-62.up9.uel20.08.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20138</id>
    <title>Moderate: python-pymongo security update</title>
    <updated date="2024-04-09 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: python-pymongo security update</summary>
    <description> Versions of the package pymongo before 4.6.3 are vulnerable to Out-of-bounds Read in the bson module. Using the crafted payload the attacker could force the parser to deserialize unmanaged memory. The parser tries to interpret bytes next to buffer and throws an exception with string. If the following bytes are not printable UTF-8 the parser throws an exception with a single byte.(CVE-2024-21506)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21506" type="cve" title="fix CVE-2024-21506" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-pymongo" version="3.9.0" release="6.uel20" epoch="0" arch="x86_64" src="python-pymongo-3.9.0-6.uel20.src.rpm">
          <filename>python3-pymongo-3.9.0-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="python2-bson" version="3.9.0" release="6.uel20" epoch="0" arch="x86_64" src="python-pymongo-3.9.0-6.uel20.src.rpm">
          <filename>python2-bson-3.9.0-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="python2-pymongo-gridfs" version="3.9.0" release="6.uel20" epoch="0" arch="x86_64" src="python-pymongo-3.9.0-6.uel20.src.rpm">
          <filename>python2-pymongo-gridfs-3.9.0-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="python2-pymongo" version="3.9.0" release="6.uel20" epoch="0" arch="x86_64" src="python-pymongo-3.9.0-6.uel20.src.rpm">
          <filename>python2-pymongo-3.9.0-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-pymongo-gridfs" version="3.9.0" release="6.uel20" epoch="0" arch="x86_64" src="python-pymongo-3.9.0-6.uel20.src.rpm">
          <filename>python3-pymongo-gridfs-3.9.0-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-bson" version="3.9.0" release="6.uel20" epoch="0" arch="x86_64" src="python-pymongo-3.9.0-6.uel20.src.rpm">
          <filename>python3-bson-3.9.0-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="python2-pymongo" version="3.9.0" release="6.uel20" epoch="0" arch="aarch64" src="python-pymongo-3.9.0-6.uel20.src.rpm">
          <filename>python2-pymongo-3.9.0-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-bson" version="3.9.0" release="6.uel20" epoch="0" arch="aarch64" src="python-pymongo-3.9.0-6.uel20.src.rpm">
          <filename>python3-bson-3.9.0-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="python2-bson" version="3.9.0" release="6.uel20" epoch="0" arch="aarch64" src="python-pymongo-3.9.0-6.uel20.src.rpm">
          <filename>python2-bson-3.9.0-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-pymongo" version="3.9.0" release="6.uel20" epoch="0" arch="aarch64" src="python-pymongo-3.9.0-6.uel20.src.rpm">
          <filename>python3-pymongo-3.9.0-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-pymongo-gridfs" version="3.9.0" release="6.uel20" epoch="0" arch="aarch64" src="python-pymongo-3.9.0-6.uel20.src.rpm">
          <filename>python3-pymongo-gridfs-3.9.0-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="python-pymongo-help" version="3.9.0" release="6.uel20" epoch="0" arch="noarch" src="python-pymongo-3.9.0-6.uel20.src.rpm">
          <filename>python-pymongo-help-3.9.0-6.uel20.noarch.rpm</filename>
        </package>
        <package name="python2-pymongo-gridfs" version="3.9.0" release="6.uel20" epoch="0" arch="aarch64" src="python-pymongo-3.9.0-6.uel20.src.rpm">
          <filename>python2-pymongo-gridfs-3.9.0-6.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20139</id>
    <title>Important: tigervnc security update</title>
    <updated date="2024-04-12 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: tigervnc security update</summary>
    <description> A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.(CVE-2024-31083)
 A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.(CVE-2024-31081)
 A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.(CVE-2024-31080)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-31083" type="cve" title="fix CVE-2024-31083" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-31081" type="cve" title="fix CVE-2024-31081" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-31080" type="cve" title="fix CVE-2024-31080" />
    </references>
    <pkglist>
      <collection>
        <package name="tigervnc" version="1.10.1" release="8.uel20.02" epoch="0" arch="x86_64" src="tigervnc-1.10.1-8.uel20.02.src.rpm">
          <filename>tigervnc-1.10.1-8.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="tigervnc-server-module" version="1.10.1" release="8.uel20.02" epoch="0" arch="x86_64" src="tigervnc-1.10.1-8.uel20.02.src.rpm">
          <filename>tigervnc-server-module-1.10.1-8.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="tigervnc-server-minimal" version="1.10.1" release="8.uel20.02" epoch="0" arch="x86_64" src="tigervnc-1.10.1-8.uel20.02.src.rpm">
          <filename>tigervnc-server-minimal-1.10.1-8.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="tigervnc-server" version="1.10.1" release="8.uel20.02" epoch="0" arch="x86_64" src="tigervnc-1.10.1-8.uel20.02.src.rpm">
          <filename>tigervnc-server-1.10.1-8.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="tigervnc" version="1.10.1" release="8.uel20.02" epoch="0" arch="aarch64" src="tigervnc-1.10.1-8.uel20.02.src.rpm">
          <filename>tigervnc-1.10.1-8.uel20.02.aarch64.rpm</filename>
        </package>
        <package name="tigervnc-server-minimal" version="1.10.1" release="8.uel20.02" epoch="0" arch="aarch64" src="tigervnc-1.10.1-8.uel20.02.src.rpm">
          <filename>tigervnc-server-minimal-1.10.1-8.uel20.02.aarch64.rpm</filename>
        </package>
        <package name="tigervnc-server" version="1.10.1" release="8.uel20.02" epoch="0" arch="aarch64" src="tigervnc-1.10.1-8.uel20.02.src.rpm">
          <filename>tigervnc-server-1.10.1-8.uel20.02.aarch64.rpm</filename>
        </package>
        <package name="tigervnc-server-module" version="1.10.1" release="8.uel20.02" epoch="0" arch="aarch64" src="tigervnc-1.10.1-8.uel20.02.src.rpm">
          <filename>tigervnc-server-module-1.10.1-8.uel20.02.aarch64.rpm</filename>
        </package>
        <package name="tigervnc-server-applet" version="1.10.1" release="8.uel20.02" epoch="0" arch="noarch" src="tigervnc-1.10.1-8.uel20.02.src.rpm">
          <filename>tigervnc-server-applet-1.10.1-8.uel20.02.noarch.rpm</filename>
        </package>
        <package name="tigervnc-help" version="1.10.1" release="8.uel20.02" epoch="0" arch="noarch" src="tigervnc-1.10.1-8.uel20.02.src.rpm">
          <filename>tigervnc-help-1.10.1-8.uel20.02.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20140</id>
    <title>None: golang security update</title>
    <updated date="2024-04-22 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: golang security update</summary>
    <description> An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.(CVE-2023-45288)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-45288" type="cve" title="fix CVE-2023-45288" />
    </references>
    <pkglist>
      <collection>
        <package name="golang" version="1.15.7" release="43.uel20" epoch="0" arch="x86_64" src="golang-1.15.7-43.uel20.src.rpm">
          <filename>golang-1.15.7-43.uel20.x86_64.rpm</filename>
        </package>
        <package name="golang-devel" version="1.15.7" release="43.uel20" epoch="0" arch="noarch" src="golang-1.15.7-43.uel20.src.rpm">
          <filename>golang-devel-1.15.7-43.uel20.noarch.rpm</filename>
        </package>
        <package name="golang" version="1.15.7" release="43.uel20" epoch="0" arch="aarch64" src="golang-1.15.7-43.uel20.src.rpm">
          <filename>golang-1.15.7-43.uel20.aarch64.rpm</filename>
        </package>
        <package name="golang-help" version="1.15.7" release="43.uel20" epoch="0" arch="noarch" src="golang-1.15.7-43.uel20.src.rpm">
          <filename>golang-help-1.15.7-43.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20141</id>
    <title>Moderate: python-pillow security update</title>
    <updated date="2024-04-09 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: python-pillow security update</summary>
    <description> In _imagingcms.c in Pillow before 10.3.0, a buffer overflow exists because strcpy is used instead of strncpy.(CVE-2024-28219)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-28219" type="cve" title="fix CVE-2024-28219" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-pillow" version="9.0.1" release="7.uel20" epoch="0" arch="x86_64" src="python-pillow-9.0.1-7.uel20.src.rpm">
          <filename>python3-pillow-9.0.1-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-pillow-tk" version="9.0.1" release="7.uel20" epoch="0" arch="x86_64" src="python-pillow-9.0.1-7.uel20.src.rpm">
          <filename>python3-pillow-tk-9.0.1-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-pillow-qt" version="9.0.1" release="7.uel20" epoch="0" arch="x86_64" src="python-pillow-9.0.1-7.uel20.src.rpm">
          <filename>python3-pillow-qt-9.0.1-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-pillow-devel" version="9.0.1" release="7.uel20" epoch="0" arch="x86_64" src="python-pillow-9.0.1-7.uel20.src.rpm">
          <filename>python3-pillow-devel-9.0.1-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-pillow-qt" version="9.0.1" release="7.uel20" epoch="0" arch="aarch64" src="python-pillow-9.0.1-7.uel20.src.rpm">
          <filename>python3-pillow-qt-9.0.1-7.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-pillow-help" version="9.0.1" release="7.uel20" epoch="0" arch="noarch" src="python-pillow-9.0.1-7.uel20.src.rpm">
          <filename>python3-pillow-help-9.0.1-7.uel20.noarch.rpm</filename>
        </package>
        <package name="python3-pillow-tk" version="9.0.1" release="7.uel20" epoch="0" arch="aarch64" src="python-pillow-9.0.1-7.uel20.src.rpm">
          <filename>python3-pillow-tk-9.0.1-7.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-pillow" version="9.0.1" release="7.uel20" epoch="0" arch="aarch64" src="python-pillow-9.0.1-7.uel20.src.rpm">
          <filename>python3-pillow-9.0.1-7.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-pillow-devel" version="9.0.1" release="7.uel20" epoch="0" arch="aarch64" src="python-pillow-9.0.1-7.uel20.src.rpm">
          <filename>python3-pillow-devel-9.0.1-7.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20142</id>
    <title>None: llvm security update</title>
    <updated date="2024-04-15 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: llvm security update</summary>
    <description> LLVM 15.0.0 has a NULL pointer dereference in the parseOneMetadata() function via a crafted pdflatex.fmt file (or perhaps a crafted .o file) to llvm-lto. NOTE: this is disputed because the relationship between pdflatex.fmt and any LLVM language front end is not explained, and because a crash of the llvm-lto application should be categorized as a usability problem.(CVE-2023-46049)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-46049" type="cve" title="fix CVE-2023-46049" />
    </references>
    <pkglist>
      <collection>
        <package name="llvm" version="12.0.1" release="7.uel20.01" epoch="0" arch="x86_64" src="llvm-12.0.1-7.uel20.01.src.rpm">
          <filename>llvm-12.0.1-7.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="llvm-devel" version="12.0.1" release="7.uel20.01" epoch="0" arch="x86_64" src="llvm-12.0.1-7.uel20.01.src.rpm">
          <filename>llvm-devel-12.0.1-7.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="llvm-libs" version="12.0.1" release="7.uel20.01" epoch="0" arch="x86_64" src="llvm-12.0.1-7.uel20.01.src.rpm">
          <filename>llvm-libs-12.0.1-7.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="llvm-devel" version="12.0.1" release="7.uel20.01" epoch="0" arch="aarch64" src="llvm-12.0.1-7.uel20.01.src.rpm">
          <filename>llvm-devel-12.0.1-7.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="llvm-help" version="12.0.1" release="7.uel20.01" epoch="0" arch="noarch" src="llvm-12.0.1-7.uel20.01.src.rpm">
          <filename>llvm-help-12.0.1-7.uel20.01.noarch.rpm</filename>
        </package>
        <package name="llvm" version="12.0.1" release="7.uel20.01" epoch="0" arch="aarch64" src="llvm-12.0.1-7.uel20.01.src.rpm">
          <filename>llvm-12.0.1-7.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="llvm-libs" version="12.0.1" release="7.uel20.01" epoch="0" arch="aarch64" src="llvm-12.0.1-7.uel20.01.src.rpm">
          <filename>llvm-libs-12.0.1-7.uel20.01.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20143</id>
    <title>None: emacs security update</title>
    <updated date="2024-04-11 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: emacs security update</summary>
    <description> In Emacs before 29.3, Org mode considers contents of remote files to be trusted. This affects Org Mode before 9.6.23.(CVE-2024-30205)
 In Emacs before 29.3, LaTeX preview is enabled by default for e-mail attachments.(CVE-2024-30204)
 In Emacs before 29.3, Gnus treats inline MIME contents as trusted.(CVE-2024-30203)
 In Emacs before 29.3, arbitrary Lisp code is evaluated as part of turning on Org mode. This affects Org Mode before 9.6.23.(CVE-2024-30202)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-30205" type="cve" title="fix CVE-2024-30205" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-30204" type="cve" title="fix CVE-2024-30204" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-30203" type="cve" title="fix CVE-2024-30203" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-30202" type="cve" title="fix CVE-2024-30202" />
    </references>
    <pkglist>
      <collection>
        <package name="emacs-devel" version="27.1" release="11.uel20" epoch="1" arch="x86_64" src="emacs-27.1-11.uel20.src.rpm">
          <filename>emacs-devel-27.1-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="emacs" version="27.1" release="11.uel20" epoch="1" arch="x86_64" src="emacs-27.1-11.uel20.src.rpm">
          <filename>emacs-27.1-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="emacs-common" version="27.1" release="11.uel20" epoch="1" arch="x86_64" src="emacs-27.1-11.uel20.src.rpm">
          <filename>emacs-common-27.1-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="emacs-nox" version="27.1" release="11.uel20" epoch="1" arch="x86_64" src="emacs-27.1-11.uel20.src.rpm">
          <filename>emacs-nox-27.1-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="emacs-lucid" version="27.1" release="11.uel20" epoch="1" arch="x86_64" src="emacs-27.1-11.uel20.src.rpm">
          <filename>emacs-lucid-27.1-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="emacs-common" version="27.1" release="11.uel20" epoch="1" arch="aarch64" src="emacs-27.1-11.uel20.src.rpm">
          <filename>emacs-common-27.1-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="emacs" version="27.1" release="11.uel20" epoch="1" arch="aarch64" src="emacs-27.1-11.uel20.src.rpm">
          <filename>emacs-27.1-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="emacs-lucid" version="27.1" release="11.uel20" epoch="1" arch="aarch64" src="emacs-27.1-11.uel20.src.rpm">
          <filename>emacs-lucid-27.1-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="emacs-nox" version="27.1" release="11.uel20" epoch="1" arch="aarch64" src="emacs-27.1-11.uel20.src.rpm">
          <filename>emacs-nox-27.1-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="emacs-devel" version="27.1" release="11.uel20" epoch="1" arch="aarch64" src="emacs-27.1-11.uel20.src.rpm">
          <filename>emacs-devel-27.1-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="emacs-help" version="27.1" release="11.uel20" epoch="1" arch="noarch" src="emacs-27.1-11.uel20.src.rpm">
          <filename>emacs-help-27.1-11.uel20.noarch.rpm</filename>
        </package>
        <package name="emacs-terminal" version="27.1" release="11.uel20" epoch="1" arch="noarch" src="emacs-27.1-11.uel20.src.rpm">
          <filename>emacs-terminal-27.1-11.uel20.noarch.rpm</filename>
        </package>
        <package name="emacs-filesystem" version="27.1" release="11.uel20" epoch="1" arch="noarch" src="emacs-27.1-11.uel20.src.rpm">
          <filename>emacs-filesystem-27.1-11.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20144</id>
    <title>None: varnish security update</title>
    <updated date="2024-04-09 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: varnish security update</summary>
    <description> Varnish Cache before 7.3.2 and 7.4.x before 7.4.3 (and before 6.0.13 LTS), and Varnish Enterprise 6 before 6.0.12r6, allows credits exhaustion for an HTTP/2 connection control flow window, aka a Broke Window Attack.(CVE-2024-30156)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-30156" type="cve" title="fix CVE-2024-30156" />
    </references>
    <pkglist>
      <collection>
        <package name="varnish" version="7.4.3" release="1.uel20" epoch="0" arch="x86_64" src="varnish-7.4.3-1.uel20.src.rpm">
          <filename>varnish-7.4.3-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="varnish-devel" version="7.4.3" release="1.uel20" epoch="0" arch="x86_64" src="varnish-7.4.3-1.uel20.src.rpm">
          <filename>varnish-devel-7.4.3-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="varnish" version="7.4.3" release="1.uel20" epoch="0" arch="aarch64" src="varnish-7.4.3-1.uel20.src.rpm">
          <filename>varnish-7.4.3-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="varnish-devel" version="7.4.3" release="1.uel20" epoch="0" arch="aarch64" src="varnish-7.4.3-1.uel20.src.rpm">
          <filename>varnish-devel-7.4.3-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="varnish-help" version="7.4.3" release="1.uel20" epoch="0" arch="noarch" src="varnish-7.4.3-1.uel20.src.rpm">
          <filename>varnish-help-7.4.3-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20145</id>
    <title>Moderate: wireshark security update</title>
    <updated date="2024-04-09 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: wireshark security update</summary>
    <description> Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.(CVE-2023-0666)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-0666" type="cve" title="fix CVE-2023-0666" />
    </references>
    <pkglist>
      <collection>
        <package name="wireshark-devel" version="3.6.14" release="7.uel20" epoch="1" arch="x86_64" src="wireshark-3.6.14-7.uel20.src.rpm">
          <filename>wireshark-devel-3.6.14-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="wireshark" version="3.6.14" release="7.uel20" epoch="1" arch="x86_64" src="wireshark-3.6.14-7.uel20.src.rpm">
          <filename>wireshark-3.6.14-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="wireshark-help" version="3.6.14" release="7.uel20" epoch="1" arch="x86_64" src="wireshark-3.6.14-7.uel20.src.rpm">
          <filename>wireshark-help-3.6.14-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="wireshark-devel" version="3.6.14" release="7.uel20" epoch="1" arch="aarch64" src="wireshark-3.6.14-7.uel20.src.rpm">
          <filename>wireshark-devel-3.6.14-7.uel20.aarch64.rpm</filename>
        </package>
        <package name="wireshark" version="3.6.14" release="7.uel20" epoch="1" arch="aarch64" src="wireshark-3.6.14-7.uel20.src.rpm">
          <filename>wireshark-3.6.14-7.uel20.aarch64.rpm</filename>
        </package>
        <package name="wireshark-help" version="3.6.14" release="7.uel20" epoch="1" arch="aarch64" src="wireshark-3.6.14-7.uel20.src.rpm">
          <filename>wireshark-help-3.6.14-7.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20146</id>
    <title>None: ruby security update</title>
    <updated date="2024-04-18 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: ruby security update</summary>
    <description> ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2024-27281)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-27281" type="cve" title="fix CVE-2024-27281" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-io-console" version="0.4.6" release="122.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>rubygem-io-console-0.4.6-122.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-psych" version="3.0.2" release="122.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>rubygem-psych-3.0.2-122.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-bigdecimal" version="1.3.4" release="122.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>rubygem-bigdecimal-1.3.4-122.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-json" version="2.1.0" release="122.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>rubygem-json-2.1.0-122.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-openssl" version="2.1.2" release="122.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>rubygem-openssl-2.1.2-122.uel20.x86_64.rpm</filename>
        </package>
        <package name="ruby" version="2.5.8" release="122.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>ruby-2.5.8-122.uel20.x86_64.rpm</filename>
        </package>
        <package name="ruby-devel" version="2.5.8" release="122.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>ruby-devel-2.5.8-122.uel20.x86_64.rpm</filename>
        </package>
        <package name="ruby-help" version="2.5.8" release="122.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>ruby-help-2.5.8-122.uel20.noarch.rpm</filename>
        </package>
        <package name="ruby" version="2.5.8" release="122.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>ruby-2.5.8-122.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygems" version="2.7.6" release="122.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>rubygems-2.7.6-122.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-rdoc" version="6.0.1.1" release="122.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>rubygem-rdoc-6.0.1.1-122.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-rake" version="12.3.0" release="122.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>rubygem-rake-12.3.0-122.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-io-console" version="0.4.6" release="122.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>rubygem-io-console-0.4.6-122.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-json" version="2.1.0" release="122.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>rubygem-json-2.1.0-122.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-psych" version="3.0.2" release="122.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>rubygem-psych-3.0.2-122.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-openssl" version="2.1.2" release="122.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>rubygem-openssl-2.1.2-122.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-test-unit" version="3.2.7" release="122.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>rubygem-test-unit-3.2.7-122.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-xmlrpc" version="0.3.0" release="122.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>rubygem-xmlrpc-0.3.0-122.uel20.noarch.rpm</filename>
        </package>
        <package name="ruby-devel" version="2.5.8" release="122.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>ruby-devel-2.5.8-122.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-did_you_mean" version="1.2.0" release="122.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>rubygem-did_you_mean-1.2.0-122.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-minitest" version="5.10.3" release="122.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>rubygem-minitest-5.10.3-122.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-bigdecimal" version="1.3.4" release="122.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>rubygem-bigdecimal-1.3.4-122.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygems-devel" version="2.7.6" release="122.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>rubygems-devel-2.7.6-122.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-power_assert" version="1.1.1" release="122.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>rubygem-power_assert-1.1.1-122.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-net-telnet" version="0.1.1" release="122.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>rubygem-net-telnet-0.1.1-122.uel20.noarch.rpm</filename>
        </package>
        <package name="ruby-irb" version="2.5.8" release="122.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-122.uel20.src.rpm">
          <filename>ruby-irb-2.5.8-122.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20147</id>
    <title>Moderate: gnutls security update</title>
    <updated date="2024-04-15 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: gnutls security update</summary>
    <description> A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.(CVE-2024-28834)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-28834" type="cve" title="fix CVE-2024-28834" />
    </references>
    <pkglist>
      <collection>
        <package name="gnutls-devel" version="3.6.16" release="6.uel20.7" epoch="0" arch="x86_64" src="gnutls-3.6.16-6.uel20.7.src.rpm">
          <filename>gnutls-devel-3.6.16-6.uel20.7.x86_64.rpm</filename>
        </package>
        <package name="gnutls-help" version="3.6.16" release="6.uel20.7" epoch="0" arch="x86_64" src="gnutls-3.6.16-6.uel20.7.src.rpm">
          <filename>gnutls-help-3.6.16-6.uel20.7.x86_64.rpm</filename>
        </package>
        <package name="gnutls" version="3.6.16" release="6.uel20.7" epoch="0" arch="x86_64" src="gnutls-3.6.16-6.uel20.7.src.rpm">
          <filename>gnutls-3.6.16-6.uel20.7.x86_64.rpm</filename>
        </package>
        <package name="gnutls-devel" version="3.6.16" release="6.uel20.7" epoch="0" arch="aarch64" src="gnutls-3.6.16-6.uel20.7.src.rpm">
          <filename>gnutls-devel-3.6.16-6.uel20.7.aarch64.rpm</filename>
        </package>
        <package name="gnutls" version="3.6.16" release="6.uel20.7" epoch="0" arch="aarch64" src="gnutls-3.6.16-6.uel20.7.src.rpm">
          <filename>gnutls-3.6.16-6.uel20.7.aarch64.rpm</filename>
        </package>
        <package name="gnutls-help" version="3.6.16" release="6.uel20.7" epoch="0" arch="aarch64" src="gnutls-3.6.16-6.uel20.7.src.rpm">
          <filename>gnutls-help-3.6.16-6.uel20.7.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20148</id>
    <title>Moderate: libvirt security update</title>
    <updated date="2024-04-15 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: libvirt security update</summary>
    <description> A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash.(CVE-2024-2494)
 An off-by-one error flaw was found in the udevListInterfacesByStatus() function in libvirt when the number of interfaces exceeds the size of the `names` array. This issue can be reproduced by sending specially crafted data to the libvirt daemon, allowing an unprivileged client to perform a denial of service attack by causing the libvirt daemon to crash.(CVE-2024-1441)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-2494" type="cve" title="fix CVE-2024-2494" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-1441" type="cve" title="fix CVE-2024-1441" />
    </references>
    <pkglist>
      <collection>
        <package name="libvirt-client" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-client-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-qemu" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-qemu-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-mpath" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-mpath-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-nss" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-nss-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-config-nwfilter" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-config-nwfilter-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-logical" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-logical-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-secret" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-secret-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-libs" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-libs-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-docs" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-docs-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-core" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-core-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-kvm" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-kvm-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-iscsi" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-iscsi-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-wireshark" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-wireshark-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-bash-completion" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-bash-completion-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-iscsi-direct" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-iscsi-direct-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-rbd" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-rbd-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-gluster" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-gluster-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-disk" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-disk-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-nwfilter" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-nwfilter-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-admin" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-admin-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-interface" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-interface-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-devel" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-devel-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-lock-sanlock" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-lock-sanlock-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-nodedev" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-nodedev-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-qemu" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-qemu-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-scsi" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-scsi-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-config-network" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-config-network-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-network" version="6.2.0" release="24.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-network-6.2.0-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-disk" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-disk-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-secret" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-secret-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-nss" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-nss-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-devel" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-devel-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-libs" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-libs-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-client" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-client-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-gluster" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-gluster-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-core" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-core-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-bash-completion" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-bash-completion-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-logical" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-logical-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-config-network" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-config-network-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-qemu" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-qemu-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-nodedev" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-nodedev-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-rbd" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-rbd-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-docs" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-docs-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-network" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-network-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-wireshark" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-wireshark-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-lock-sanlock" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-lock-sanlock-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-kvm" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-kvm-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-nwfilter" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-nwfilter-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-scsi" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-scsi-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-config-nwfilter" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-config-nwfilter-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-admin" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-admin-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-iscsi" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-iscsi-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-iscsi-direct" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-iscsi-direct-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-qemu" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-qemu-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-mpath" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-mpath-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-interface" version="6.2.0" release="24.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-24.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-interface-6.2.0-24.up1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20149</id>
    <title>None: jose security update</title>
    <updated date="2024-04-12 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: jose security update</summary>
    <description> latchset jose through version 11 allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value.(CVE-2023-50967)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-50967" type="cve" title="fix CVE-2023-50967" />
    </references>
    <pkglist>
      <collection>
        <package name="jose" version="10" release="6.uel20" epoch="0" arch="x86_64" src="jose-10-6.uel20.src.rpm">
          <filename>jose-10-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="jose-devel" version="10" release="6.uel20" epoch="0" arch="x86_64" src="jose-10-6.uel20.src.rpm">
          <filename>jose-devel-10-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="jose-help" version="10" release="6.uel20" epoch="0" arch="x86_64" src="jose-10-6.uel20.src.rpm">
          <filename>jose-help-10-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="jose-help" version="10" release="6.uel20" epoch="0" arch="aarch64" src="jose-10-6.uel20.src.rpm">
          <filename>jose-help-10-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="jose-devel" version="10" release="6.uel20" epoch="0" arch="aarch64" src="jose-10-6.uel20.src.rpm">
          <filename>jose-devel-10-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="jose" version="10" release="6.uel20" epoch="0" arch="aarch64" src="jose-10-6.uel20.src.rpm">
          <filename>jose-10-6.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20150</id>
    <title>Moderate: expat security update</title>
    <updated date="2024-04-11 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: expat security update</summary>
    <description> libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).(CVE-2024-28757)
 libexpat through 2.5.0 allows recursive XML Entity Expansion if XML_DTD is undefined at compile time.(CVE-2023-52426)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-28757" type="cve" title="fix CVE-2024-28757" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-52426" type="cve" title="fix CVE-2023-52426" />
    </references>
    <pkglist>
      <collection>
        <package name="expat-devel" version="2.2.9" release="11.uel20" epoch="0" arch="x86_64" src="expat-2.2.9-11.uel20.src.rpm">
          <filename>expat-devel-2.2.9-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="expat" version="2.2.9" release="11.uel20" epoch="0" arch="x86_64" src="expat-2.2.9-11.uel20.src.rpm">
          <filename>expat-2.2.9-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="expat-help" version="2.2.9" release="11.uel20" epoch="0" arch="noarch" src="expat-2.2.9-11.uel20.src.rpm">
          <filename>expat-help-2.2.9-11.uel20.noarch.rpm</filename>
        </package>
        <package name="expat" version="2.2.9" release="11.uel20" epoch="0" arch="aarch64" src="expat-2.2.9-11.uel20.src.rpm">
          <filename>expat-2.2.9-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="expat-devel" version="2.2.9" release="11.uel20" epoch="0" arch="aarch64" src="expat-2.2.9-11.uel20.src.rpm">
          <filename>expat-devel-2.2.9-11.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20151</id>
    <title>Moderate: mozjs78 security update</title>
    <updated date="2024-04-12 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: mozjs78 security update</summary>
    <description> A mishandled security check when creating a WebSocket in a WebWorker caused the Content Security Policy connect-src header to be ignored. This could lead to connections to restricted origins from inside WebWorkers. This vulnerability affects Firefox &lt; 109, Thunderbird &lt; 102.7, and Firefox ESR &lt; 102.7.(CVE-2023-23602)
 Navigations were being allowed when dragging a URL from a cross-origin iframe into the same tab which could lead to website spoofing attacks. This vulnerability affects Firefox &lt; 109, Thunderbird &lt; 102.7, and Firefox ESR &lt; 102.7.(CVE-2023-23601)
 When copying a network request from the developer tools panel as a curl command the output was not being properly sanitized and could allow arbitrary commands to be hidden within. This vulnerability affects Firefox &lt; 109, Thunderbird &lt; 102.7, and Firefox ESR &lt; 102.7.(CVE-2023-23599)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-23602" type="cve" title="fix CVE-2023-23602" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-23601" type="cve" title="fix CVE-2023-23601" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-23599" type="cve" title="fix CVE-2023-23599" />
    </references>
    <pkglist>
      <collection>
        <package name="mozjs78-help" version="78.4.0" release="3.up1.uel20.01" epoch="0" arch="x86_64" src="mozjs78-78.4.0-3.up1.uel20.01.src.rpm">
          <filename>mozjs78-help-78.4.0-3.up1.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="mozjs78" version="78.4.0" release="3.up1.uel20.01" epoch="0" arch="x86_64" src="mozjs78-78.4.0-3.up1.uel20.01.src.rpm">
          <filename>mozjs78-78.4.0-3.up1.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="mozjs78-devel" version="78.4.0" release="3.up1.uel20.01" epoch="0" arch="x86_64" src="mozjs78-78.4.0-3.up1.uel20.01.src.rpm">
          <filename>mozjs78-devel-78.4.0-3.up1.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="mozjs78-devel" version="78.4.0" release="3.up1.uel20.01" epoch="0" arch="aarch64" src="mozjs78-78.4.0-3.up1.uel20.01.src.rpm">
          <filename>mozjs78-devel-78.4.0-3.up1.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="mozjs78" version="78.4.0" release="3.up1.uel20.01" epoch="0" arch="aarch64" src="mozjs78-78.4.0-3.up1.uel20.01.src.rpm">
          <filename>mozjs78-78.4.0-3.up1.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="mozjs78-help" version="78.4.0" release="3.up1.uel20.01" epoch="0" arch="aarch64" src="mozjs78-78.4.0-3.up1.uel20.01.src.rpm">
          <filename>mozjs78-help-78.4.0-3.up1.uel20.01.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20152</id>
    <title>Moderate: rubygem-rack security update</title>
    <updated date="2024-04-15 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: rubygem-rack security update</summary>
    <description> Rack is a modular Ruby web server interface. Carefully crafted content type headers can cause Rack’s media type parser to take much longer than expected, leading to a possible denial of service vulnerability (ReDos 2nd degree polynomial). This vulnerability is patched in 3.0.9.1 and 2.2.8.1.(CVE-2024-25126)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-25126" type="cve" title="fix CVE-2024-25126" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-rack-help" version="2.2.3.1" release="5.uel20.01" epoch="1" arch="noarch" src="rubygem-rack-2.2.3.1-5.uel20.01.src.rpm">
          <filename>rubygem-rack-help-2.2.3.1-5.uel20.01.noarch.rpm</filename>
        </package>
        <package name="rubygem-rack" version="2.2.3.1" release="5.uel20.01" epoch="1" arch="noarch" src="rubygem-rack-2.2.3.1-5.uel20.01.src.rpm">
          <filename>rubygem-rack-2.2.3.1-5.uel20.01.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20153</id>
    <title>Critical: ghostscript security update</title>
    <updated date="2024-04-22 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: ghostscript security update</summary>
    <description> Artifex Ghostscript before 9.53.0 has an out-of-bounds write and use-after-free in devices/vector/gdevtxtw.c (for txtwrite) because a single character code in a PDF document can map to more than one Unicode code point (e.g., for a ligature).(CVE-2020-36773)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-36773" type="cve" title="fix CVE-2020-36773" />
    </references>
    <pkglist>
      <collection>
        <package name="ghostscript" version="9.52" release="13.uel20.01" epoch="0" arch="x86_64" src="ghostscript-9.52-13.uel20.01.src.rpm">
          <filename>ghostscript-9.52-13.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="ghostscript-tools-dvipdf" version="9.52" release="13.uel20.01" epoch="0" arch="x86_64" src="ghostscript-9.52-13.uel20.01.src.rpm">
          <filename>ghostscript-tools-dvipdf-9.52-13.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="ghostscript-devel" version="9.52" release="13.uel20.01" epoch="0" arch="x86_64" src="ghostscript-9.52-13.uel20.01.src.rpm">
          <filename>ghostscript-devel-9.52-13.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="ghostscript-help" version="9.52" release="13.uel20.01" epoch="0" arch="noarch" src="ghostscript-9.52-13.uel20.01.src.rpm">
          <filename>ghostscript-help-9.52-13.uel20.01.noarch.rpm</filename>
        </package>
        <package name="ghostscript" version="9.52" release="13.uel20.01" epoch="0" arch="aarch64" src="ghostscript-9.52-13.uel20.01.src.rpm">
          <filename>ghostscript-9.52-13.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="ghostscript-tools-dvipdf" version="9.52" release="13.uel20.01" epoch="0" arch="aarch64" src="ghostscript-9.52-13.uel20.01.src.rpm">
          <filename>ghostscript-tools-dvipdf-9.52-13.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="ghostscript-devel" version="9.52" release="13.uel20.01" epoch="0" arch="aarch64" src="ghostscript-9.52-13.uel20.01.src.rpm">
          <filename>ghostscript-devel-9.52-13.uel20.01.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20155</id>
    <title>Important: postgresql security update</title>
    <updated date="2024-04-11 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: postgresql security update</summary>
    <description> Row security policies disregard user ID changes after inlining; PostgreSQL could permit incorrect policies to be applied in certain cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy.(CVE-2023-2455)
 schema_element defeats protective search_path changes; It was found that certain database calls in PostgreSQL could permit an authed attacker with elevated database-level privileges to execute arbitrary code.(CVE-2023-2454)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-2455" type="cve" title="fix CVE-2023-2455" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-2454" type="cve" title="fix CVE-2023-2454" />
    </references>
    <pkglist>
      <collection>
        <package name="postgresql-contrib" version="10.23" release="1.uel20.01" epoch="1" arch="x86_64" src="postgresql-10.23-1.uel20.01.src.rpm">
          <filename>postgresql-contrib-10.23-1.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="postgresql-server-devel" version="10.23" release="1.uel20.01" epoch="1" arch="x86_64" src="postgresql-10.23-1.uel20.01.src.rpm">
          <filename>postgresql-server-devel-10.23-1.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="postgresql-help" version="10.23" release="1.uel20.01" epoch="1" arch="x86_64" src="postgresql-10.23-1.uel20.01.src.rpm">
          <filename>postgresql-help-10.23-1.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="postgresql-test" version="10.23" release="1.uel20.01" epoch="1" arch="x86_64" src="postgresql-10.23-1.uel20.01.src.rpm">
          <filename>postgresql-test-10.23-1.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="postgresql-pltcl" version="10.23" release="1.uel20.01" epoch="1" arch="x86_64" src="postgresql-10.23-1.uel20.01.src.rpm">
          <filename>postgresql-pltcl-10.23-1.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="postgresql-plpython3" version="10.23" release="1.uel20.01" epoch="1" arch="x86_64" src="postgresql-10.23-1.uel20.01.src.rpm">
          <filename>postgresql-plpython3-10.23-1.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="postgresql" version="10.23" release="1.uel20.01" epoch="1" arch="x86_64" src="postgresql-10.23-1.uel20.01.src.rpm">
          <filename>postgresql-10.23-1.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="postgresql-plperl" version="10.23" release="1.uel20.01" epoch="1" arch="x86_64" src="postgresql-10.23-1.uel20.01.src.rpm">
          <filename>postgresql-plperl-10.23-1.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="postgresql-server" version="10.23" release="1.uel20.01" epoch="1" arch="x86_64" src="postgresql-10.23-1.uel20.01.src.rpm">
          <filename>postgresql-server-10.23-1.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="postgresql-test-rpm-macros" version="10.23" release="1.uel20.01" epoch="1" arch="x86_64" src="postgresql-10.23-1.uel20.01.src.rpm">
          <filename>postgresql-test-rpm-macros-10.23-1.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="postgresql-static" version="10.23" release="1.uel20.01" epoch="1" arch="x86_64" src="postgresql-10.23-1.uel20.01.src.rpm">
          <filename>postgresql-static-10.23-1.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="postgresql-test" version="10.23" release="1.uel20.01" epoch="1" arch="aarch64" src="postgresql-10.23-1.uel20.01.src.rpm">
          <filename>postgresql-test-10.23-1.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="postgresql-static" version="10.23" release="1.uel20.01" epoch="1" arch="aarch64" src="postgresql-10.23-1.uel20.01.src.rpm">
          <filename>postgresql-static-10.23-1.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="postgresql-server-devel" version="10.23" release="1.uel20.01" epoch="1" arch="aarch64" src="postgresql-10.23-1.uel20.01.src.rpm">
          <filename>postgresql-server-devel-10.23-1.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="postgresql-test-rpm-macros" version="10.23" release="1.uel20.01" epoch="1" arch="aarch64" src="postgresql-10.23-1.uel20.01.src.rpm">
          <filename>postgresql-test-rpm-macros-10.23-1.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="postgresql-plperl" version="10.23" release="1.uel20.01" epoch="1" arch="aarch64" src="postgresql-10.23-1.uel20.01.src.rpm">
          <filename>postgresql-plperl-10.23-1.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="postgresql-plpython3" version="10.23" release="1.uel20.01" epoch="1" arch="aarch64" src="postgresql-10.23-1.uel20.01.src.rpm">
          <filename>postgresql-plpython3-10.23-1.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="postgresql-pltcl" version="10.23" release="1.uel20.01" epoch="1" arch="aarch64" src="postgresql-10.23-1.uel20.01.src.rpm">
          <filename>postgresql-pltcl-10.23-1.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="postgresql-contrib" version="10.23" release="1.uel20.01" epoch="1" arch="aarch64" src="postgresql-10.23-1.uel20.01.src.rpm">
          <filename>postgresql-contrib-10.23-1.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="postgresql-server" version="10.23" release="1.uel20.01" epoch="1" arch="aarch64" src="postgresql-10.23-1.uel20.01.src.rpm">
          <filename>postgresql-server-10.23-1.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="postgresql-help" version="10.23" release="1.uel20.01" epoch="1" arch="aarch64" src="postgresql-10.23-1.uel20.01.src.rpm">
          <filename>postgresql-help-10.23-1.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="postgresql" version="10.23" release="1.uel20.01" epoch="1" arch="aarch64" src="postgresql-10.23-1.uel20.01.src.rpm">
          <filename>postgresql-10.23-1.uel20.01.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20156</id>
    <title>Critical: git security update</title>
    <updated date="2024-05-22 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: git security update</summary>
    <description> Git is a revision control system. The Git project recommends to avoid working in untrusted repositories, and instead to clone it first with `git clone --no-local` to obtain a clean copy. Git has specific protections to make that a safe operation even with an untrusted source repository, but vulnerabilities allow those protections to be bypassed. In the context of cloning local repositories owned by other users, this vulnerability has been covered in CVE-2024-32004. But there are circumstances where the fixes for CVE-2024-32004 are not enough: For example, when obtaining a `.zip` file containing a full copy of a Git repository, it should not be trusted by default to be safe, as e.g. hooks could be configured to run within the context of that repository. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. As a workaround, avoid using Git in repositories that have been obtained via archives from untrusted sources.(CVE-2024-32465)
 Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, when cloning a local source repository that contains symlinks via the filesystem, Git may create hardlinks to arbitrary user-readable files on the same filesystem as the target repository in the `objects/` directory. Cloning a local repository over the filesystem may creating hardlinks to arbitrary user-owned files on the same filesystem in the target Git repository's `objects/` directory. When cloning a repository over the filesystem (without explicitly specifying the `file://` protocol or `--no-local`), the optimizations for local cloning
will be used, which include attempting to hard link the object files instead of copying them. While the code includes checks against symbolic links in the source repository, which were added during the fix for CVE-2022-39253, these checks can still be raced because the hard link operation ultimately follows symlinks. If the object on the filesystem appears as a file during the check, and then a symlink during the operation, this will allow the adversary to bypass the check and create hardlinks in the destination objects directory to arbitrary, user-readable files. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4.(CVE-2024-32021)
 Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, local clones may end up hardlinking files into the target repository's object database when source and target repository reside on the same disk. If the source repository is owned by a different user, then those hardlinked files may be rewritten at any point in time by the untrusted user. Cloning local repositories will cause Git to either copy or hardlink files of the source repository into the target repository. This significantly speeds up such local clones compared to doing a "proper" clone and saves both disk space and compute time. When cloning a repository located on the same disk that is owned by a different user than the current user we also end up creating such hardlinks. These files will continue to be owned and controlled by the potentially-untrusted user and can be rewritten by them at will in the future. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4.(CVE-2024-32020)
 Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, an attacker can prepare a local repository in such a way that, when cloned, will execute arbitrary code during the operation. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. As a workaround, avoid cloning repositories from untrusted sources.(CVE-2024-32004)
 Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, repositories with submodules can be crafted in a way that exploits a bug in Git whereby it can be fooled into writing files not into the submodule's worktree but into a `.git/` directory. This allows writing a hook that will be executed while the clone operation is still running, giving the user no opportunity to inspect the code that is being executed. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. If symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. As always, it is best to avoid cloning repositories from untrusted sources.(CVE-2024-32002)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-32465" type="cve" title="fix CVE-2024-32465" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-32021" type="cve" title="fix CVE-2024-32021" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-32020" type="cve" title="fix CVE-2024-32020" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-32004" type="cve" title="fix CVE-2024-32004" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-32002" type="cve" title="fix CVE-2024-32002" />
    </references>
    <pkglist>
      <collection>
        <package name="git" version="2.27.0" release="20.uel20" epoch="0" arch="x86_64" src="git-2.27.0-20.uel20.src.rpm">
          <filename>git-2.27.0-20.uel20.x86_64.rpm</filename>
        </package>
        <package name="git-daemon" version="2.27.0" release="20.uel20" epoch="0" arch="x86_64" src="git-2.27.0-20.uel20.src.rpm">
          <filename>git-daemon-2.27.0-20.uel20.x86_64.rpm</filename>
        </package>
        <package name="git-web" version="2.27.0" release="20.uel20" epoch="0" arch="noarch" src="git-2.27.0-20.uel20.src.rpm">
          <filename>git-web-2.27.0-20.uel20.noarch.rpm</filename>
        </package>
        <package name="git-help" version="2.27.0" release="20.uel20" epoch="0" arch="noarch" src="git-2.27.0-20.uel20.src.rpm">
          <filename>git-help-2.27.0-20.uel20.noarch.rpm</filename>
        </package>
        <package name="git-gui" version="2.27.0" release="20.uel20" epoch="0" arch="noarch" src="git-2.27.0-20.uel20.src.rpm">
          <filename>git-gui-2.27.0-20.uel20.noarch.rpm</filename>
        </package>
        <package name="git-email" version="2.27.0" release="20.uel20" epoch="0" arch="noarch" src="git-2.27.0-20.uel20.src.rpm">
          <filename>git-email-2.27.0-20.uel20.noarch.rpm</filename>
        </package>
        <package name="git-svn" version="2.27.0" release="20.uel20" epoch="0" arch="noarch" src="git-2.27.0-20.uel20.src.rpm">
          <filename>git-svn-2.27.0-20.uel20.noarch.rpm</filename>
        </package>
        <package name="git" version="2.27.0" release="20.uel20" epoch="0" arch="aarch64" src="git-2.27.0-20.uel20.src.rpm">
          <filename>git-2.27.0-20.uel20.aarch64.rpm</filename>
        </package>
        <package name="perl-Git-SVN" version="2.27.0" release="20.uel20" epoch="0" arch="noarch" src="git-2.27.0-20.uel20.src.rpm">
          <filename>perl-Git-SVN-2.27.0-20.uel20.noarch.rpm</filename>
        </package>
        <package name="perl-Git" version="2.27.0" release="20.uel20" epoch="0" arch="noarch" src="git-2.27.0-20.uel20.src.rpm">
          <filename>perl-Git-2.27.0-20.uel20.noarch.rpm</filename>
        </package>
        <package name="git-daemon" version="2.27.0" release="20.uel20" epoch="0" arch="aarch64" src="git-2.27.0-20.uel20.src.rpm">
          <filename>git-daemon-2.27.0-20.uel20.aarch64.rpm</filename>
        </package>
        <package name="gitk" version="2.27.0" release="20.uel20" epoch="0" arch="noarch" src="git-2.27.0-20.uel20.src.rpm">
          <filename>gitk-2.27.0-20.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20157</id>
    <title>Moderate: python-jinja2 security update</title>
    <updated date="2024-05-16 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: python-jinja2 security update</summary>
    <description> Jinja is an extensible templating engine. The `xmlattr` filter in affected versions of Jinja accepts keys containing non-attribute characters. XML/HTML attributes cannot contain spaces, `/`, `&gt;`, or `=`, as each would then be interpreted as starting a separate attribute. If an application accepts keys (as opposed to only values) as user input, and renders these in pages that other users see as well, an attacker could use this to inject other attributes and perform XSS. The fix for CVE-2024-22195 only addressed spaces but not other characters. Accepting keys as user input is now explicitly considered an unintended use case of the `xmlattr` filter, and code that does so without otherwise validating the input should be flagged as insecure, regardless of Jinja version. Accepting _values_ as user input continues to be safe. This vulnerability is fixed in 3.1.4.(CVE-2024-34064)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-34064" type="cve" title="fix CVE-2024-34064" />
    </references>
    <pkglist>
      <collection>
        <package name="python-jinja2-help" version="2.11.2" release="7.uel20" epoch="0" arch="noarch" src="python-jinja2-2.11.2-7.uel20.src.rpm">
          <filename>python-jinja2-help-2.11.2-7.uel20.noarch.rpm</filename>
        </package>
        <package name="python3-jinja2" version="2.11.2" release="7.uel20" epoch="0" arch="noarch" src="python-jinja2-2.11.2-7.uel20.src.rpm">
          <filename>python3-jinja2-2.11.2-7.uel20.noarch.rpm</filename>
        </package>
        <package name="python2-jinja2" version="2.11.2" release="7.uel20" epoch="0" arch="noarch" src="python-jinja2-2.11.2-7.uel20.src.rpm">
          <filename>python2-jinja2-2.11.2-7.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20158</id>
    <title>Moderate: libvirt security update</title>
    <updated date="2024-05-29 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: libvirt security update</summary>
    <description> A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being "freed" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it.(CVE-2024-4418)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-4418" type="cve" title="fix CVE-2024-4418" />
    </references>
    <pkglist>
      <collection>
        <package name="libvirt-daemon-driver-interface" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-interface-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-network" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-network-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-secret" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-secret-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-client" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-client-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-core" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-core-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-libs" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-libs-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-nwfilter" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-nwfilter-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-admin" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-admin-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-logical" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-logical-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-rbd" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-rbd-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-kvm" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-kvm-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-disk" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-disk-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-mpath" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-mpath-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-config-nwfilter" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-config-nwfilter-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-lock-sanlock" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-lock-sanlock-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-iscsi-direct" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-iscsi-direct-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-iscsi" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-iscsi-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-wireshark" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-wireshark-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-nodedev" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-nodedev-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-nss" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-nss-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-bash-completion" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-bash-completion-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-qemu" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-qemu-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-gluster" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-gluster-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-scsi" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-scsi-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-docs" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-docs-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-devel" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-devel-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-qemu" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-qemu-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-config-network" version="6.2.0" release="25.up1.uel20" epoch="0" arch="x86_64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-config-network-6.2.0-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-nwfilter" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-nwfilter-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-interface" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-interface-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-libs" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-libs-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-client" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-client-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-qemu" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-qemu-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-nodedev" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-nodedev-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-network" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-network-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-kvm" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-kvm-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-gluster" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-gluster-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-mpath" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-mpath-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-secret" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-secret-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-iscsi-direct" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-iscsi-direct-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-core" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-core-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-iscsi" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-iscsi-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-rbd" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-rbd-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-scsi" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-scsi-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-config-nwfilter" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-config-nwfilter-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-disk" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-disk-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-wireshark" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-wireshark-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-driver-storage-logical" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-driver-storage-logical-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-config-network" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-config-network-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-admin" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-admin-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-nss" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-nss-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-daemon-qemu" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-daemon-qemu-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-bash-completion" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-bash-completion-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-docs" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-docs-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-lock-sanlock" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-lock-sanlock-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvirt-devel" version="6.2.0" release="25.up1.uel20" epoch="0" arch="aarch64" src="libvirt-6.2.0-25.up1.uel20.src.rpm">
          <filename>libvirt-devel-6.2.0-25.up1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20159</id>
    <title>None: tpm2-tss security update</title>
    <updated date="2024-05-14 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: tpm2-tss security update</summary>
    <description> ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2024-29040)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-29040" type="cve" title="fix CVE-2024-29040" />
    </references>
    <pkglist>
      <collection>
        <package name="tpm2-tss-devel" version="3.0.3" release="3.uel20.02" epoch="0" arch="x86_64" src="tpm2-tss-3.0.3-3.uel20.02.src.rpm">
          <filename>tpm2-tss-devel-3.0.3-3.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="tpm2-tss" version="3.0.3" release="3.uel20.02" epoch="0" arch="x86_64" src="tpm2-tss-3.0.3-3.uel20.02.src.rpm">
          <filename>tpm2-tss-3.0.3-3.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="tpm2-tss-help" version="3.0.3" release="3.uel20.02" epoch="0" arch="noarch" src="tpm2-tss-3.0.3-3.uel20.02.src.rpm">
          <filename>tpm2-tss-help-3.0.3-3.uel20.02.noarch.rpm</filename>
        </package>
        <package name="tpm2-tss-devel" version="3.0.3" release="3.uel20.02" epoch="0" arch="aarch64" src="tpm2-tss-3.0.3-3.uel20.02.src.rpm">
          <filename>tpm2-tss-devel-3.0.3-3.uel20.02.aarch64.rpm</filename>
        </package>
        <package name="tpm2-tss" version="3.0.3" release="3.uel20.02" epoch="0" arch="aarch64" src="tpm2-tss-3.0.3-3.uel20.02.src.rpm">
          <filename>tpm2-tss-3.0.3-3.uel20.02.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20160</id>
    <title>None: tpm2-tools security update</title>
    <updated date="2024-05-14 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: tpm2-tools security update</summary>
    <description> ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2024-29039)
 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2024-29038)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-29039" type="cve" title="fix CVE-2024-29039" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-29038" type="cve" title="fix CVE-2024-29038" />
    </references>
    <pkglist>
      <collection>
        <package name="tpm2-tools" version="5.0" release="5.uel20.01" epoch="0" arch="x86_64" src="tpm2-tools-5.0-5.uel20.01.src.rpm">
          <filename>tpm2-tools-5.0-5.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="tpm2-tools" version="5.0" release="5.uel20.01" epoch="0" arch="aarch64" src="tpm2-tools-5.0-5.uel20.01.src.rpm">
          <filename>tpm2-tools-5.0-5.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="tpm2-tools-help" version="5.0" release="5.uel20.01" epoch="0" arch="noarch" src="tpm2-tools-5.0-5.uel20.01.src.rpm">
          <filename>tpm2-tools-help-5.0-5.uel20.01.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20161</id>
    <title>None: glibc security update</title>
    <updated date="2024-05-10 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: glibc security update</summary>
    <description> nscd: netgroup cache assumes NSS callback uses in-buffer strings

The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory
when the NSS callback does not store all strings in the provided buffer.
The flaw was introduced in glibc 2.15 when the cache was added to nscd.

This vulnerability is only present in the nscd binary.

(CVE-2024-33602)
 nscd: netgroup cache may terminate daemon on memory allocation failure

The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or
xrealloc and these functions may terminate the process due to a memory
allocation failure resulting in a denial of service to the clients.  The
flaw was introduced in glibc 2.15 when the cache was added to nscd.

This vulnerability is only present in the nscd binary.

(CVE-2024-33601)
 nscd: Null pointer crashes after notfound response

If the Name Service Cache Daemon's (nscd) cache fails to add a not-found
netgroup response to the cache, the client request can result in a null
pointer dereference.  This flaw was introduced in glibc 2.15 when the
cache was added to nscd.

This vulnerability is only present in the nscd binary.

(CVE-2024-33600)
 nscd: Stack-based buffer overflow in netgroup cache

If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted
by client requests then a subsequent client request for netgroup data
may result in a stack-based buffer overflow.  This flaw was introduced
in glibc 2.15 when the cache was added to nscd.

This vulnerability is only present in the nscd binary.
(CVE-2024-33599)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-33602" type="cve" title="fix CVE-2024-33602" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-33601" type="cve" title="fix CVE-2024-33601" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-33600" type="cve" title="fix CVE-2024-33600" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-33599" type="cve" title="fix CVE-2024-33599" />
    </references>
    <pkglist>
      <collection>
        <package name="glibc-all-langpacks" version="2.28" release="101.uel20.07" epoch="0" arch="x86_64" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>glibc-all-langpacks-2.28-101.uel20.07.x86_64.rpm</filename>
        </package>
        <package name="glibc" version="2.28" release="101.uel20.07" epoch="0" arch="x86_64" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>glibc-2.28-101.uel20.07.x86_64.rpm</filename>
        </package>
        <package name="glibc-benchtests" version="2.28" release="101.uel20.07" epoch="0" arch="x86_64" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>glibc-benchtests-2.28-101.uel20.07.x86_64.rpm</filename>
        </package>
        <package name="glibc-devel" version="2.28" release="101.uel20.07" epoch="0" arch="x86_64" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>glibc-devel-2.28-101.uel20.07.x86_64.rpm</filename>
        </package>
        <package name="glibc-locale-source" version="2.28" release="101.uel20.07" epoch="0" arch="x86_64" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>glibc-locale-source-2.28-101.uel20.07.x86_64.rpm</filename>
        </package>
        <package name="glibc-compat-2.17" version="2.28" release="101.uel20.07" epoch="0" arch="x86_64" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>glibc-compat-2.17-2.28-101.uel20.07.x86_64.rpm</filename>
        </package>
        <package name="nscd" version="2.28" release="101.uel20.07" epoch="0" arch="x86_64" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>nscd-2.28-101.uel20.07.x86_64.rpm</filename>
        </package>
        <package name="glibc-nss-devel" version="2.28" release="101.uel20.07" epoch="0" arch="x86_64" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>glibc-nss-devel-2.28-101.uel20.07.x86_64.rpm</filename>
        </package>
        <package name="nss_modules" version="2.28" release="101.uel20.07" epoch="0" arch="x86_64" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>nss_modules-2.28-101.uel20.07.x86_64.rpm</filename>
        </package>
        <package name="glibc-debugutils" version="2.28" release="101.uel20.07" epoch="0" arch="x86_64" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>glibc-debugutils-2.28-101.uel20.07.x86_64.rpm</filename>
        </package>
        <package name="glibc-common" version="2.28" release="101.uel20.07" epoch="0" arch="x86_64" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>glibc-common-2.28-101.uel20.07.x86_64.rpm</filename>
        </package>
        <package name="libnsl" version="2.28" release="101.uel20.07" epoch="0" arch="x86_64" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>libnsl-2.28-101.uel20.07.x86_64.rpm</filename>
        </package>
        <package name="glibc-all-langpacks" version="2.28" release="101.uel20.07" epoch="0" arch="aarch64" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>glibc-all-langpacks-2.28-101.uel20.07.aarch64.rpm</filename>
        </package>
        <package name="glibc-locale-source" version="2.28" release="101.uel20.07" epoch="0" arch="aarch64" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>glibc-locale-source-2.28-101.uel20.07.aarch64.rpm</filename>
        </package>
        <package name="glibc" version="2.28" release="101.uel20.07" epoch="0" arch="aarch64" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>glibc-2.28-101.uel20.07.aarch64.rpm</filename>
        </package>
        <package name="glibc-benchtests" version="2.28" release="101.uel20.07" epoch="0" arch="aarch64" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>glibc-benchtests-2.28-101.uel20.07.aarch64.rpm</filename>
        </package>
        <package name="glibc-nss-devel" version="2.28" release="101.uel20.07" epoch="0" arch="aarch64" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>glibc-nss-devel-2.28-101.uel20.07.aarch64.rpm</filename>
        </package>
        <package name="nscd" version="2.28" release="101.uel20.07" epoch="0" arch="aarch64" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>nscd-2.28-101.uel20.07.aarch64.rpm</filename>
        </package>
        <package name="nss_modules" version="2.28" release="101.uel20.07" epoch="0" arch="aarch64" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>nss_modules-2.28-101.uel20.07.aarch64.rpm</filename>
        </package>
        <package name="glibc-devel" version="2.28" release="101.uel20.07" epoch="0" arch="aarch64" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>glibc-devel-2.28-101.uel20.07.aarch64.rpm</filename>
        </package>
        <package name="glibc-compat-2.17" version="2.28" release="101.uel20.07" epoch="0" arch="aarch64" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>glibc-compat-2.17-2.28-101.uel20.07.aarch64.rpm</filename>
        </package>
        <package name="glibc-common" version="2.28" release="101.uel20.07" epoch="0" arch="aarch64" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>glibc-common-2.28-101.uel20.07.aarch64.rpm</filename>
        </package>
        <package name="glibc-debugutils" version="2.28" release="101.uel20.07" epoch="0" arch="aarch64" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>glibc-debugutils-2.28-101.uel20.07.aarch64.rpm</filename>
        </package>
        <package name="glibc-help" version="2.28" release="101.uel20.07" epoch="0" arch="noarch" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>glibc-help-2.28-101.uel20.07.noarch.rpm</filename>
        </package>
        <package name="libnsl" version="2.28" release="101.uel20.07" epoch="0" arch="aarch64" src="glibc-2.28-101.uel20.07.src.rpm">
          <filename>libnsl-2.28-101.uel20.07.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20162</id>
    <title>None: python-idna security update</title>
    <updated date="2024-05-21 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: python-idna security update</summary>
    <description> ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2024-3651)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-3651" type="cve" title="fix CVE-2024-3651" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-idna" version="2.10" release="2.uel20" epoch="0" arch="noarch" src="python-idna-2.10-2.uel20.src.rpm">
          <filename>python3-idna-2.10-2.uel20.noarch.rpm</filename>
        </package>
        <package name="python2-idna" version="2.10" release="2.uel20" epoch="0" arch="noarch" src="python-idna-2.10-2.uel20.src.rpm">
          <filename>python2-idna-2.10-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20163</id>
    <title>None: edk2 security update</title>
    <updated date="2024-05-09 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: edk2 security update</summary>
    <description> Issue summary: Some non-default TLS server configurations can cause unbounded
memory growth when processing TLSv1.3 sessions

Impact summary: An attacker may exploit certain server configurations to trigger
unbounded memory growth that would lead to a Denial of Service

This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is
being used (but not if early_data support is also configured and the default
anti-replay protection is in use). In this case, under certain conditions, the
session cache can get into an incorrect state and it will fail to flush properly
as it fills. The session cache will continue to grow in an unbounded manner. A
malicious client could deliberately create the scenario for this failure to
force a Denial of Service. It may also happen by accident in normal operation.

This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS
clients.

The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL
1.0.2 is also not affected by this issue.(CVE-2024-2511)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-2511" type="cve" title="fix CVE-2024-2511" />
    </references>
    <pkglist>
      <collection>
        <package name="edk2-devel" version="202002" release="19.uel20.01.1" epoch="0" arch="x86_64" src="edk2-202002-19.uel20.01.1.src.rpm">
          <filename>edk2-devel-202002-19.uel20.01.1.x86_64.rpm</filename>
        </package>
        <package name="edk2-ovmf" version="202002" release="19.uel20.01.1" epoch="0" arch="noarch" src="edk2-202002-19.uel20.01.1.src.rpm">
          <filename>edk2-ovmf-202002-19.uel20.01.1.noarch.rpm</filename>
        </package>
        <package name="python3-edk2-devel" version="202002" release="19.uel20.01.1" epoch="0" arch="noarch" src="edk2-202002-19.uel20.01.1.src.rpm">
          <filename>python3-edk2-devel-202002-19.uel20.01.1.noarch.rpm</filename>
        </package>
        <package name="edk2-help" version="202002" release="19.uel20.01.1" epoch="0" arch="noarch" src="edk2-202002-19.uel20.01.1.src.rpm">
          <filename>edk2-help-202002-19.uel20.01.1.noarch.rpm</filename>
        </package>
        <package name="edk2-devel" version="202002" release="19.uel20.01.1" epoch="0" arch="aarch64" src="edk2-202002-19.uel20.01.1.src.rpm">
          <filename>edk2-devel-202002-19.uel20.01.1.aarch64.rpm</filename>
        </package>
        <package name="edk2-aarch64" version="202002" release="19.uel20.01.1" epoch="0" arch="noarch" src="edk2-202002-19.uel20.01.1.src.rpm">
          <filename>edk2-aarch64-202002-19.uel20.01.1.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20164</id>
    <title>None: sane-backends security update</title>
    <updated date="2024-05-14 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: sane-backends security update</summary>
    <description> Sane 1.2.1 heap bounds overwrite in init_options() from backend/test.c via a long init_mode string in a configuration file. NOTE: this is disputed because there is no expectation that test.c code should be executed with an attacker-controlled configuration file.(CVE-2023-46052)
 An issue in Sane 1.2.1 allows a local attacker to execute arbitrary code via a crafted file to the sanei_configure_attach() function. NOTE: this is disputed because there is no expectation that the product should be starting with an attacker-controlled configuration file.(CVE-2023-46047)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-46052" type="cve" title="fix CVE-2023-46052" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-46047" type="cve" title="fix CVE-2023-46047" />
    </references>
    <pkglist>
      <collection>
        <package name="sane-backends-drivers-scanners" version="1.0.28" release="12.uel20.01" epoch="0" arch="x86_64" src="sane-backends-1.0.28-12.uel20.01.src.rpm">
          <filename>sane-backends-drivers-scanners-1.0.28-12.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="sane-backends" version="1.0.28" release="12.uel20.01" epoch="0" arch="x86_64" src="sane-backends-1.0.28-12.uel20.01.src.rpm">
          <filename>sane-backends-1.0.28-12.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="sane-backends-drivers-cameras" version="1.0.28" release="12.uel20.01" epoch="0" arch="x86_64" src="sane-backends-1.0.28-12.uel20.01.src.rpm">
          <filename>sane-backends-drivers-cameras-1.0.28-12.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="sane-backends-help" version="1.0.28" release="12.uel20.01" epoch="0" arch="x86_64" src="sane-backends-1.0.28-12.uel20.01.src.rpm">
          <filename>sane-backends-help-1.0.28-12.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="sane-backends-libs" version="1.0.28" release="12.uel20.01" epoch="0" arch="x86_64" src="sane-backends-1.0.28-12.uel20.01.src.rpm">
          <filename>sane-backends-libs-1.0.28-12.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="sane-backends-devel" version="1.0.28" release="12.uel20.01" epoch="0" arch="x86_64" src="sane-backends-1.0.28-12.uel20.01.src.rpm">
          <filename>sane-backends-devel-1.0.28-12.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="sane-backends-daemon" version="1.0.28" release="12.uel20.01" epoch="0" arch="x86_64" src="sane-backends-1.0.28-12.uel20.01.src.rpm">
          <filename>sane-backends-daemon-1.0.28-12.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="sane-backends" version="1.0.28" release="12.uel20.01" epoch="0" arch="aarch64" src="sane-backends-1.0.28-12.uel20.01.src.rpm">
          <filename>sane-backends-1.0.28-12.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="sane-backends-drivers-cameras" version="1.0.28" release="12.uel20.01" epoch="0" arch="aarch64" src="sane-backends-1.0.28-12.uel20.01.src.rpm">
          <filename>sane-backends-drivers-cameras-1.0.28-12.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="sane-backends-libs" version="1.0.28" release="12.uel20.01" epoch="0" arch="aarch64" src="sane-backends-1.0.28-12.uel20.01.src.rpm">
          <filename>sane-backends-libs-1.0.28-12.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="sane-backends-drivers-scanners" version="1.0.28" release="12.uel20.01" epoch="0" arch="aarch64" src="sane-backends-1.0.28-12.uel20.01.src.rpm">
          <filename>sane-backends-drivers-scanners-1.0.28-12.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="sane-backends-daemon" version="1.0.28" release="12.uel20.01" epoch="0" arch="aarch64" src="sane-backends-1.0.28-12.uel20.01.src.rpm">
          <filename>sane-backends-daemon-1.0.28-12.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="sane-backends-devel" version="1.0.28" release="12.uel20.01" epoch="0" arch="aarch64" src="sane-backends-1.0.28-12.uel20.01.src.rpm">
          <filename>sane-backends-devel-1.0.28-12.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="sane-backends-help" version="1.0.28" release="12.uel20.01" epoch="0" arch="aarch64" src="sane-backends-1.0.28-12.uel20.01.src.rpm">
          <filename>sane-backends-help-1.0.28-12.uel20.01.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20165</id>
    <title>None: httpd security update</title>
    <updated date="2024-05-08 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: httpd security update</summary>
    <description> HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.

Users are recommended to upgrade to version 2.4.59, which fixes this issue.(CVE-2024-24795)
 Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.

This issue affects Apache HTTP Server: through 2.4.58.
(CVE-2023-38709)
 HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.(CVE-2024-27316)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-24795" type="cve" title="fix CVE-2024-24795" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-38709" type="cve" title="fix CVE-2023-38709" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-27316" type="cve" title="fix CVE-2024-27316" />
    </references>
    <pkglist>
      <collection>
        <package name="httpd" version="2.4.43" release="24.up1.uel20" epoch="0" arch="x86_64" src="httpd-2.4.43-24.up1.uel20.src.rpm">
          <filename>httpd-2.4.43-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mod_md" version="2.4.43" release="24.up1.uel20" epoch="0" arch="x86_64" src="httpd-2.4.43-24.up1.uel20.src.rpm">
          <filename>mod_md-2.4.43-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mod_ldap" version="2.4.43" release="24.up1.uel20" epoch="0" arch="x86_64" src="httpd-2.4.43-24.up1.uel20.src.rpm">
          <filename>mod_ldap-2.4.43-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mod_ssl" version="2.4.43" release="24.up1.uel20" epoch="1" arch="x86_64" src="httpd-2.4.43-24.up1.uel20.src.rpm">
          <filename>mod_ssl-2.4.43-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="httpd-tools" version="2.4.43" release="24.up1.uel20" epoch="0" arch="x86_64" src="httpd-2.4.43-24.up1.uel20.src.rpm">
          <filename>httpd-tools-2.4.43-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mod_proxy_html" version="2.4.43" release="24.up1.uel20" epoch="1" arch="x86_64" src="httpd-2.4.43-24.up1.uel20.src.rpm">
          <filename>mod_proxy_html-2.4.43-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mod_session" version="2.4.43" release="24.up1.uel20" epoch="0" arch="x86_64" src="httpd-2.4.43-24.up1.uel20.src.rpm">
          <filename>mod_session-2.4.43-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="httpd-devel" version="2.4.43" release="24.up1.uel20" epoch="0" arch="x86_64" src="httpd-2.4.43-24.up1.uel20.src.rpm">
          <filename>httpd-devel-2.4.43-24.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="httpd-help" version="2.4.43" release="24.up1.uel20" epoch="0" arch="noarch" src="httpd-2.4.43-24.up1.uel20.src.rpm">
          <filename>httpd-help-2.4.43-24.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="httpd" version="2.4.43" release="24.up1.uel20" epoch="0" arch="aarch64" src="httpd-2.4.43-24.up1.uel20.src.rpm">
          <filename>httpd-2.4.43-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mod_proxy_html" version="2.4.43" release="24.up1.uel20" epoch="1" arch="aarch64" src="httpd-2.4.43-24.up1.uel20.src.rpm">
          <filename>mod_proxy_html-2.4.43-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="httpd-filesystem" version="2.4.43" release="24.up1.uel20" epoch="0" arch="noarch" src="httpd-2.4.43-24.up1.uel20.src.rpm">
          <filename>httpd-filesystem-2.4.43-24.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="httpd-tools" version="2.4.43" release="24.up1.uel20" epoch="0" arch="aarch64" src="httpd-2.4.43-24.up1.uel20.src.rpm">
          <filename>httpd-tools-2.4.43-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mod_session" version="2.4.43" release="24.up1.uel20" epoch="0" arch="aarch64" src="httpd-2.4.43-24.up1.uel20.src.rpm">
          <filename>mod_session-2.4.43-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mod_ldap" version="2.4.43" release="24.up1.uel20" epoch="0" arch="aarch64" src="httpd-2.4.43-24.up1.uel20.src.rpm">
          <filename>mod_ldap-2.4.43-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mod_ssl" version="2.4.43" release="24.up1.uel20" epoch="1" arch="aarch64" src="httpd-2.4.43-24.up1.uel20.src.rpm">
          <filename>mod_ssl-2.4.43-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="httpd-devel" version="2.4.43" release="24.up1.uel20" epoch="0" arch="aarch64" src="httpd-2.4.43-24.up1.uel20.src.rpm">
          <filename>httpd-devel-2.4.43-24.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mod_md" version="2.4.43" release="24.up1.uel20" epoch="0" arch="aarch64" src="httpd-2.4.43-24.up1.uel20.src.rpm">
          <filename>mod_md-2.4.43-24.up1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20166</id>
    <title>Important: podman security update</title>
    <updated date="2024-05-06 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: podman security update</summary>
    <description> An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.(CVE-2022-32149)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-32149" type="cve" title="fix CVE-2022-32149" />
    </references>
    <pkglist>
      <collection>
        <package name="podman-help" version="3.4.4" release="2.uel20" epoch="1" arch="x86_64" src="podman-3.4.4-2.uel20.src.rpm">
          <filename>podman-help-3.4.4-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="podman" version="3.4.4" release="2.uel20" epoch="1" arch="x86_64" src="podman-3.4.4-2.uel20.src.rpm">
          <filename>podman-3.4.4-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="podman-gvproxy" version="3.4.4" release="2.uel20" epoch="1" arch="x86_64" src="podman-3.4.4-2.uel20.src.rpm">
          <filename>podman-gvproxy-3.4.4-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="podman-remote" version="3.4.4" release="2.uel20" epoch="1" arch="x86_64" src="podman-3.4.4-2.uel20.src.rpm">
          <filename>podman-remote-3.4.4-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="podman-plugins" version="3.4.4" release="2.uel20" epoch="1" arch="x86_64" src="podman-3.4.4-2.uel20.src.rpm">
          <filename>podman-plugins-3.4.4-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="podman" version="3.4.4" release="2.uel20" epoch="1" arch="aarch64" src="podman-3.4.4-2.uel20.src.rpm">
          <filename>podman-3.4.4-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="podman-help" version="3.4.4" release="2.uel20" epoch="1" arch="aarch64" src="podman-3.4.4-2.uel20.src.rpm">
          <filename>podman-help-3.4.4-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="podman-docker" version="3.4.4" release="2.uel20" epoch="1" arch="noarch" src="podman-3.4.4-2.uel20.src.rpm">
          <filename>podman-docker-3.4.4-2.uel20.noarch.rpm</filename>
        </package>
        <package name="podman-plugins" version="3.4.4" release="2.uel20" epoch="1" arch="aarch64" src="podman-3.4.4-2.uel20.src.rpm">
          <filename>podman-plugins-3.4.4-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="podman-gvproxy" version="3.4.4" release="2.uel20" epoch="1" arch="aarch64" src="podman-3.4.4-2.uel20.src.rpm">
          <filename>podman-gvproxy-3.4.4-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="podman-remote" version="3.4.4" release="2.uel20" epoch="1" arch="aarch64" src="podman-3.4.4-2.uel20.src.rpm">
          <filename>podman-remote-3.4.4-2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20167</id>
    <title>Moderate: ceph security update</title>
    <updated date="2024-05-10 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: ceph security update</summary>
    <description> IBM Storage Ceph 5.3z1, 5.3z5, and 6.1z1 could allow an authenticated user on the network to cause a denial of service from RGW.  IBM X-Force ID:  268906.(CVE-2023-46159)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-46159" type="cve" title="fix CVE-2023-46159" />
    </references>
    <pkglist>
      <collection>
        <package name="python-ceph-compat" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>python-ceph-compat-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>ceph-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="rados-objclass-devel" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>rados-objclass-devel-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph-resource-agents" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>ceph-resource-agents-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="librgw-devel" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>librgw-devel-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="rbd-fuse" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>rbd-fuse-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="libradosstriper-devel" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>libradosstriper-devel-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="librbd-devel" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>librbd-devel-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="libcephfs-devel" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>libcephfs-devel-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph-selinux" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>ceph-selinux-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-ceph-argparse" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>python3-ceph-argparse-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="rbd-nbd" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>rbd-nbd-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="python-rgw" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>python-rgw-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="librados-devel" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>librados-devel-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="python-cephfs" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>python-cephfs-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-rgw" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>python3-rgw-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="python-rbd" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>python-rbd-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-cephfs" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>python3-cephfs-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-rbd" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>python3-rbd-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="python-rados" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>python-rados-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="libradosstriper1" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>libradosstriper1-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="libcephfs2" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>libcephfs2-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-rados" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>python3-rados-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="librbd1" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>librbd1-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="rbd-mirror" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>rbd-mirror-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="librgw2" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>librgw2-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph-fuse" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>ceph-fuse-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="librados2" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>librados2-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph-mon" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>ceph-mon-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph-mgr" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>ceph-mgr-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph-radosgw" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>ceph-radosgw-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph-osd" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>ceph-osd-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph-test" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>ceph-test-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph-common" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>ceph-common-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph-mds" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>ceph-mds-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="ceph-base" version="12.2.8" release="25.up2.uel20" epoch="2" arch="x86_64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>ceph-base-12.2.8-25.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="librados2" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>librados2-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ceph-mds" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>ceph-mds-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ceph-osd" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>ceph-osd-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="librados-devel" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>librados-devel-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-rbd" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>python3-rbd-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="rbd-nbd" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>rbd-nbd-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-rados" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>python3-rados-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="librgw2" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>librgw2-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="rbd-fuse" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>rbd-fuse-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-cephfs" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>python3-cephfs-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ceph-fuse" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>ceph-fuse-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="libcephfs-devel" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>libcephfs-devel-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-ceph-argparse" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>python3-ceph-argparse-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="rbd-mirror" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>rbd-mirror-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="rados-objclass-devel" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>rados-objclass-devel-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-rgw" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>python3-rgw-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="libradosstriper1" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>libradosstriper1-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ceph-mgr" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>ceph-mgr-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ceph-base" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>ceph-base-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ceph-test" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>ceph-test-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="librgw-devel" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>librgw-devel-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ceph-resource-agents" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>ceph-resource-agents-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ceph" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>ceph-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="python-rbd" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>python-rbd-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="libcephfs2" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>libcephfs2-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="python-ceph-compat" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>python-ceph-compat-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="python-rgw" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>python-rgw-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="libradosstriper-devel" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>libradosstriper-devel-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="librbd-devel" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>librbd-devel-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ceph-selinux" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>ceph-selinux-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="python-cephfs" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>python-cephfs-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ceph-radosgw" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>ceph-radosgw-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ceph-mon" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>ceph-mon-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="librbd1" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>librbd1-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="python-rados" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>python-rados-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="ceph-common" version="12.2.8" release="25.up2.uel20" epoch="2" arch="aarch64" src="ceph-12.2.8-25.up2.uel20.src.rpm">
          <filename>ceph-common-12.2.8-25.up2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20168</id>
    <title>Moderate: three-eight-nine-ds-base security update</title>
    <updated date="2024-03-06 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: three-eight-nine-ds-base security update</summary>
    <description> A heap overflow flaw was found in 389-ds-base. This issue leads to a denial of service when writing a value larger than 256 chars in log_entry_attr.(CVE-2024-1062)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-1062" type="cve" title="fix CVE-2024-1062" />
    </references>
    <pkglist>
      <collection>
        <package name="389-ds-base" version="1.4.4.4" release="1.2.up1.uel20" epoch="0" arch="x86_64" src="389-ds-base-1.4.4.4-1.2.up1.uel20.src.rpm">
          <filename>389-ds-base-1.4.4.4-1.2.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="389-ds-base-snmp" version="1.4.4.4" release="1.2.up1.uel20" epoch="0" arch="x86_64" src="389-ds-base-1.4.4.4-1.2.up1.uel20.src.rpm">
          <filename>389-ds-base-snmp-1.4.4.4-1.2.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="389-ds-base-libs" version="1.4.4.4" release="1.2.up1.uel20" epoch="0" arch="x86_64" src="389-ds-base-1.4.4.4-1.2.up1.uel20.src.rpm">
          <filename>389-ds-base-libs-1.4.4.4-1.2.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="389-ds-base-devel" version="1.4.4.4" release="1.2.up1.uel20" epoch="0" arch="x86_64" src="389-ds-base-1.4.4.4-1.2.up1.uel20.src.rpm">
          <filename>389-ds-base-devel-1.4.4.4-1.2.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="389-ds-base" version="1.4.4.4" release="1.2.up1.uel20" epoch="0" arch="aarch64" src="389-ds-base-1.4.4.4-1.2.up1.uel20.src.rpm">
          <filename>389-ds-base-1.4.4.4-1.2.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="389-ds-base-devel" version="1.4.4.4" release="1.2.up1.uel20" epoch="0" arch="aarch64" src="389-ds-base-1.4.4.4-1.2.up1.uel20.src.rpm">
          <filename>389-ds-base-devel-1.4.4.4-1.2.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-lib389" version="1.4.4.4" release="1.2.up1.uel20" epoch="0" arch="noarch" src="389-ds-base-1.4.4.4-1.2.up1.uel20.src.rpm">
          <filename>python3-lib389-1.4.4.4-1.2.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="cockpit-389-ds" version="1.4.4.4" release="1.2.up1.uel20" epoch="0" arch="noarch" src="389-ds-base-1.4.4.4-1.2.up1.uel20.src.rpm">
          <filename>cockpit-389-ds-1.4.4.4-1.2.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="389-ds-base-libs" version="1.4.4.4" release="1.2.up1.uel20" epoch="0" arch="aarch64" src="389-ds-base-1.4.4.4-1.2.up1.uel20.src.rpm">
          <filename>389-ds-base-libs-1.4.4.4-1.2.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="389-ds-base-snmp" version="1.4.4.4" release="1.2.up1.uel20" epoch="0" arch="aarch64" src="389-ds-base-1.4.4.4-1.2.up1.uel20.src.rpm">
          <filename>389-ds-base-snmp-1.4.4.4-1.2.up1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20169</id>
    <title>Important: python-eventlet security update</title>
    <updated date="2023-10-26 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: python-eventlet security update</summary>
    <description> A regression was introduced in the Red Hat build of python-eventlet due to a change in the patch application strategy, resulting in a patch for CVE-2021-21419 not being applied for all builds of all products.(CVE-2023-5625)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-5625" type="cve" title="fix CVE-2023-5625" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-eventlet" version="0.30.2" release="2.uel20" epoch="0" arch="noarch" src="python-eventlet-0.30.2-2.uel20.src.rpm">
          <filename>python3-eventlet-0.30.2-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20170</id>
    <title>Moderate: libtiff security update</title>
    <updated date="2024-05-24 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: libtiff security update</summary>
    <description> A heap-buffer-overflow vulnerability was found in LibTIFF, in extractImageSection() at tools/tiffcrop.c:7916 and tools/tiffcrop.c:7801. This flaw allows attackers to cause a denial of service via a crafted tiff file.(CVE-2023-3164)
 A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a denial of service and limited information disclosure. This issue affects libtiff versions 4.x.(CVE-2023-1916)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-3164" type="cve" title="fix CVE-2023-3164" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-1916" type="cve" title="fix CVE-2023-1916" />
    </references>
    <pkglist>
      <collection>
        <package name="libtiff" version="4.3.0" release="23.uel20" epoch="0" arch="x86_64" src="libtiff-4.3.0-23.uel20.src.rpm">
          <filename>libtiff-4.3.0-23.uel20.x86_64.rpm</filename>
        </package>
        <package name="libtiff-devel" version="4.3.0" release="23.uel20" epoch="0" arch="x86_64" src="libtiff-4.3.0-23.uel20.src.rpm">
          <filename>libtiff-devel-4.3.0-23.uel20.x86_64.rpm</filename>
        </package>
        <package name="libtiff-help" version="4.3.0" release="23.uel20" epoch="0" arch="noarch" src="libtiff-4.3.0-23.uel20.src.rpm">
          <filename>libtiff-help-4.3.0-23.uel20.noarch.rpm</filename>
        </package>
        <package name="libtiff-devel" version="4.3.0" release="23.uel20" epoch="0" arch="aarch64" src="libtiff-4.3.0-23.uel20.src.rpm">
          <filename>libtiff-devel-4.3.0-23.uel20.aarch64.rpm</filename>
        </package>
        <package name="libtiff" version="4.3.0" release="23.uel20" epoch="0" arch="aarch64" src="libtiff-4.3.0-23.uel20.src.rpm">
          <filename>libtiff-4.3.0-23.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20171</id>
    <title>Moderate: nautilus security update</title>
    <updated date="2024-05-22 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: nautilus security update</summary>
    <description> GNOME Nautilus 42.2 allows a NULL pointer dereference and get_basename application crash via a pasted ZIP archive.(CVE-2022-37290)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-37290" type="cve" title="fix CVE-2022-37290" />
    </references>
    <pkglist>
      <collection>
        <package name="nautilus-devel" version="3.33.90" release="10.uel20" epoch="0" arch="x86_64" src="nautilus-3.33.90-10.uel20.src.rpm">
          <filename>nautilus-devel-3.33.90-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="nautilus" version="3.33.90" release="10.uel20" epoch="0" arch="x86_64" src="nautilus-3.33.90-10.uel20.src.rpm">
          <filename>nautilus-3.33.90-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="nautilus" version="3.33.90" release="10.uel20" epoch="0" arch="aarch64" src="nautilus-3.33.90-10.uel20.src.rpm">
          <filename>nautilus-3.33.90-10.uel20.aarch64.rpm</filename>
        </package>
        <package name="nautilus-help" version="3.33.90" release="10.uel20" epoch="0" arch="noarch" src="nautilus-3.33.90-10.uel20.src.rpm">
          <filename>nautilus-help-3.33.90-10.uel20.noarch.rpm</filename>
        </package>
        <package name="nautilus-devel" version="3.33.90" release="10.uel20" epoch="0" arch="aarch64" src="nautilus-3.33.90-10.uel20.src.rpm">
          <filename>nautilus-devel-3.33.90-10.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20172</id>
    <title>Important: python-sqlparse security update</title>
    <updated date="2024-05-08 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: python-sqlparse security update</summary>
    <description> Passing a heavily nested list to sqlparse.parse() leads to a Denial of Service due to RecursionError.

(CVE-2024-4340)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-4340" type="cve" title="fix CVE-2024-4340" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-sqlparse" version="0.3.1" release="3.uel20" epoch="0" arch="noarch" src="python-sqlparse-0.3.1-3.uel20.src.rpm">
          <filename>python3-sqlparse-0.3.1-3.uel20.noarch.rpm</filename>
        </package>
        <package name="python-sqlparse-help" version="0.3.1" release="3.uel20" epoch="0" arch="noarch" src="python-sqlparse-0.3.1-3.uel20.src.rpm">
          <filename>python-sqlparse-help-0.3.1-3.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20173</id>
    <title>Important: freerdp security update</title>
    <updated date="2024-05-08 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: freerdp security update</summary>
    <description> FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to a possible `NULL` access and crash. Version 3.5.1 contains a patch for the issue. No known workarounds are available.(CVE-2024-32661)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-32661" type="cve" title="fix CVE-2024-32661" />
    </references>
    <pkglist>
      <collection>
        <package name="libwinpr-devel" version="2.11.7" release="2.uel20" epoch="2" arch="x86_64" src="freerdp-2.11.7-2.uel20.src.rpm">
          <filename>libwinpr-devel-2.11.7-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="libwinpr" version="2.11.7" release="2.uel20" epoch="2" arch="x86_64" src="freerdp-2.11.7-2.uel20.src.rpm">
          <filename>libwinpr-2.11.7-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="freerdp-devel" version="2.11.7" release="2.uel20" epoch="2" arch="x86_64" src="freerdp-2.11.7-2.uel20.src.rpm">
          <filename>freerdp-devel-2.11.7-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="freerdp-help" version="2.11.7" release="2.uel20" epoch="2" arch="x86_64" src="freerdp-2.11.7-2.uel20.src.rpm">
          <filename>freerdp-help-2.11.7-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="freerdp" version="2.11.7" release="2.uel20" epoch="2" arch="x86_64" src="freerdp-2.11.7-2.uel20.src.rpm">
          <filename>freerdp-2.11.7-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="freerdp" version="2.11.7" release="2.uel20" epoch="2" arch="aarch64" src="freerdp-2.11.7-2.uel20.src.rpm">
          <filename>freerdp-2.11.7-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="freerdp-devel" version="2.11.7" release="2.uel20" epoch="2" arch="aarch64" src="freerdp-2.11.7-2.uel20.src.rpm">
          <filename>freerdp-devel-2.11.7-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="libwinpr" version="2.11.7" release="2.uel20" epoch="2" arch="aarch64" src="freerdp-2.11.7-2.uel20.src.rpm">
          <filename>libwinpr-2.11.7-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="libwinpr-devel" version="2.11.7" release="2.uel20" epoch="2" arch="aarch64" src="freerdp-2.11.7-2.uel20.src.rpm">
          <filename>libwinpr-devel-2.11.7-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="freerdp-help" version="2.11.7" release="2.uel20" epoch="2" arch="aarch64" src="freerdp-2.11.7-2.uel20.src.rpm">
          <filename>freerdp-help-2.11.7-2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20174</id>
    <title>None: libyaml security update</title>
    <updated date="2024-05-06 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: libyaml security update</summary>
    <description> Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: The maintainer identified an error in the libyaml fuzzers. It is not possible to reproduce nor exploit the issue.(CVE-2024-3205)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-3205" type="cve" title="fix CVE-2024-3205" />
    </references>
    <pkglist>
      <collection>
        <package name="libyaml" version="0.2.5" release="3.uel20.02" epoch="0" arch="x86_64" src="libyaml-0.2.5-3.uel20.02.src.rpm">
          <filename>libyaml-0.2.5-3.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="libyaml-devel" version="0.2.5" release="3.uel20.02" epoch="0" arch="x86_64" src="libyaml-0.2.5-3.uel20.02.src.rpm">
          <filename>libyaml-devel-0.2.5-3.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="libyaml" version="0.2.5" release="3.uel20.02" epoch="0" arch="aarch64" src="libyaml-0.2.5-3.uel20.02.src.rpm">
          <filename>libyaml-0.2.5-3.uel20.02.aarch64.rpm</filename>
        </package>
        <package name="libyaml-devel" version="0.2.5" release="3.uel20.02" epoch="0" arch="aarch64" src="libyaml-0.2.5-3.uel20.02.src.rpm">
          <filename>libyaml-devel-0.2.5-3.uel20.02.aarch64.rpm</filename>
        </package>
        <package name="libyaml-help" version="0.2.5" release="3.uel20.02" epoch="0" arch="noarch" src="libyaml-0.2.5-3.uel20.02.src.rpm">
          <filename>libyaml-help-0.2.5-3.uel20.02.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20175</id>
    <title>Important: expat security update</title>
    <updated date="2024-05-08 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: expat security update</summary>
    <description> libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.(CVE-2023-52425)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-52425" type="cve" title="fix CVE-2023-52425" />
    </references>
    <pkglist>
      <collection>
        <package name="expat" version="2.2.9" release="12.uel20" epoch="0" arch="x86_64" src="expat-2.2.9-12.uel20.src.rpm">
          <filename>expat-2.2.9-12.uel20.x86_64.rpm</filename>
        </package>
        <package name="expat-devel" version="2.2.9" release="12.uel20" epoch="0" arch="x86_64" src="expat-2.2.9-12.uel20.src.rpm">
          <filename>expat-devel-2.2.9-12.uel20.x86_64.rpm</filename>
        </package>
        <package name="expat" version="2.2.9" release="12.uel20" epoch="0" arch="aarch64" src="expat-2.2.9-12.uel20.src.rpm">
          <filename>expat-2.2.9-12.uel20.aarch64.rpm</filename>
        </package>
        <package name="expat-devel" version="2.2.9" release="12.uel20" epoch="0" arch="aarch64" src="expat-2.2.9-12.uel20.src.rpm">
          <filename>expat-devel-2.2.9-12.uel20.aarch64.rpm</filename>
        </package>
        <package name="expat-help" version="2.2.9" release="12.uel20" epoch="0" arch="noarch" src="expat-2.2.9-12.uel20.src.rpm">
          <filename>expat-help-2.2.9-12.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20176</id>
    <title>Important: giflib security update</title>
    <updated date="2024-05-24 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: giflib security update</summary>
    <description> A memory leak (out-of-memory) in gif2rgb in util/gif2rgb.c in giflib 5.1.4 allows remote attackers trigger an out of memory exception or denial of service via a gif format file.(CVE-2021-40633)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-40633" type="cve" title="fix CVE-2021-40633" />
    </references>
    <pkglist>
      <collection>
        <package name="giflib-devel" version="5.2.1" release="5.uel20" epoch="0" arch="x86_64" src="giflib-5.2.1-5.uel20.src.rpm">
          <filename>giflib-devel-5.2.1-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="giflib" version="5.2.1" release="5.uel20" epoch="0" arch="x86_64" src="giflib-5.2.1-5.uel20.src.rpm">
          <filename>giflib-5.2.1-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="giflib-utils" version="5.2.1" release="5.uel20" epoch="0" arch="x86_64" src="giflib-5.2.1-5.uel20.src.rpm">
          <filename>giflib-utils-5.2.1-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="giflib" version="5.2.1" release="5.uel20" epoch="0" arch="aarch64" src="giflib-5.2.1-5.uel20.src.rpm">
          <filename>giflib-5.2.1-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="giflib-utils" version="5.2.1" release="5.uel20" epoch="0" arch="aarch64" src="giflib-5.2.1-5.uel20.src.rpm">
          <filename>giflib-utils-5.2.1-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="giflib-help" version="5.2.1" release="5.uel20" epoch="0" arch="noarch" src="giflib-5.2.1-5.uel20.src.rpm">
          <filename>giflib-help-5.2.1-5.uel20.noarch.rpm</filename>
        </package>
        <package name="giflib-devel" version="5.2.1" release="5.uel20" epoch="0" arch="aarch64" src="giflib-5.2.1-5.uel20.src.rpm">
          <filename>giflib-devel-5.2.1-5.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20177</id>
    <title>Important: infinispan security update</title>
    <updated date="2024-05-31 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: infinispan security update</summary>
    <description> A vulnerability was found in Infinispan such that the invokeAccessibly method from the public class ReflectionUtil allows any application class to invoke private methods in any class with Infinispan's privileges. The attacker can use reflection to introduce new, malicious behavior into the application.(CVE-2019-10174)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2019-10174" type="cve" title="fix CVE-2019-10174" />
    </references>
    <pkglist>
      <collection>
        <package name="infinispan-help" version="8.2.4" release="13.uel20" epoch="0" arch="noarch" src="infinispan-8.2.4-13.uel20.src.rpm">
          <filename>infinispan-help-8.2.4-13.uel20.noarch.rpm</filename>
        </package>
        <package name="infinispan" version="8.2.4" release="13.uel20" epoch="0" arch="noarch" src="infinispan-8.2.4-13.uel20.src.rpm">
          <filename>infinispan-8.2.4-13.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20178</id>
    <title>None: libxml2 security update</title>
    <updated date="2024-05-22 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: libxml2 security update</summary>
    <description> An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlHTMLPrintFileContext in xmllint.c.(CVE-2024-34459)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-34459" type="cve" title="fix CVE-2024-34459" />
    </references>
    <pkglist>
      <collection>
        <package name="libxml2" version="2.9.10" release="41.uel20" epoch="0" arch="x86_64" src="libxml2-2.9.10-41.uel20.src.rpm">
          <filename>libxml2-2.9.10-41.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-libxml2" version="2.9.10" release="41.uel20" epoch="0" arch="x86_64" src="libxml2-2.9.10-41.uel20.src.rpm">
          <filename>python3-libxml2-2.9.10-41.uel20.x86_64.rpm</filename>
        </package>
        <package name="libxml2-devel" version="2.9.10" release="41.uel20" epoch="0" arch="x86_64" src="libxml2-2.9.10-41.uel20.src.rpm">
          <filename>libxml2-devel-2.9.10-41.uel20.x86_64.rpm</filename>
        </package>
        <package name="python2-libxml2" version="2.9.10" release="41.uel20" epoch="0" arch="x86_64" src="libxml2-2.9.10-41.uel20.src.rpm">
          <filename>python2-libxml2-2.9.10-41.uel20.x86_64.rpm</filename>
        </package>
        <package name="libxml2-devel" version="2.9.10" release="41.uel20" epoch="0" arch="aarch64" src="libxml2-2.9.10-41.uel20.src.rpm">
          <filename>libxml2-devel-2.9.10-41.uel20.aarch64.rpm</filename>
        </package>
        <package name="libxml2" version="2.9.10" release="41.uel20" epoch="0" arch="aarch64" src="libxml2-2.9.10-41.uel20.src.rpm">
          <filename>libxml2-2.9.10-41.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-libxml2" version="2.9.10" release="41.uel20" epoch="0" arch="aarch64" src="libxml2-2.9.10-41.uel20.src.rpm">
          <filename>python3-libxml2-2.9.10-41.uel20.aarch64.rpm</filename>
        </package>
        <package name="libxml2-help" version="2.9.10" release="41.uel20" epoch="0" arch="noarch" src="libxml2-2.9.10-41.uel20.src.rpm">
          <filename>libxml2-help-2.9.10-41.uel20.noarch.rpm</filename>
        </package>
        <package name="python2-libxml2" version="2.9.10" release="41.uel20" epoch="0" arch="aarch64" src="libxml2-2.9.10-41.uel20.src.rpm">
          <filename>python2-libxml2-2.9.10-41.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20179</id>
    <title>None: uharden security update</title>
    <updated date="2024-06-21 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: uharden security update</summary>
    <description>fix cve/bug or enhancement</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="UT-2024-0015" type="cve" title="fix UT-2024-0015" />
    </references>
    <pkglist>
      <collection>
        <package name="uharden-dbus" version="1.2.1" release="71.uel20" epoch="0" arch="aarch64" src="uharden-dbus-1.2.1-71.uel20.src.rpm">
          <filename>uharden-dbus-1.2.1-71.uel20.aarch64.rpm</filename>
        </package>
        <package name="uharden-dbus" version="1.2.1" release="71.uel20" epoch="0" arch="x86_64" src="uharden-dbus-1.2.1-71.uel20.src.rpm">
          <filename>uharden-dbus-1.2.1-71.uel20.x86_64.rpm</filename>
        </package>
        <package name="uharden-gui" version="1.2.0" release="1.uel20.25" epoch="0" arch="aarch64" src="uharden-gui-1.2.0-1.uel20.25.src.rpm">
          <filename>uharden-gui-1.2.0-1.uel20.25.aarch64.rpm</filename>
        </package>
        <package name="uharden-gui" version="1.2.0" release="1.uel20.25" epoch="0" arch="x86_64" src="uharden-gui-1.2.0-1.uel20.25.src.rpm">
          <filename>uharden-gui-1.2.0-1.uel20.25.x86_64.rpm</filename>
        </package>
        <package name="uharden-cli" version="1.2.1" release="21.uel20" epoch="0" arch="aarch64" src="uharden-cli-1.2.1-21.uel20.src.rpm">
          <filename>uharden-cli-1.2.1-21.uel20.aarch64.rpm</filename>
        </package>
        <package name="uharden-cli" version="1.2.1" release="21.uel20" epoch="0" arch="x86_64" src="uharden-cli-1.2.1-21.uel20.src.rpm">
          <filename>uharden-cli-1.2.1-21.uel20.x86_64.rpm</filename>
        </package>
        <package name="security-tool" version="2.1" release="19.uel20.18" epoch="0" arch="aarch64" src="security-tool-2.1-19.uel20.18.src.rpm">
          <filename>security-tool-2.1-19.uel20.18.aarch64.rpm</filename>
        </package>
        <package name="security-tool" version="2.1" release="19.uel20.18" epoch="0" arch="x86_64" src="security-tool-2.1-19.uel20.18.src.rpm">
          <filename>security-tool-2.1-19.uel20.18.x86_64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20180</id>
    <title>Moderate: edk2 security update</title>
    <updated date="2024-06-17 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: edk2 security update</summary>
    <description> EDK2 contains a vulnerability when S3 sleep is activated where an Attacker may cause a Division-By-Zero due to a UNIT32 overflow via local access. A successful exploit of this vulnerability may lead to a loss of Availability.(CVE-2024-1298)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-1298" type="cve" title="fix CVE-2024-1298" />
    </references>
    <pkglist>
      <collection>
        <package name="edk2-devel" version="202002" release="22.uel20.05" epoch="0" arch="aarch64" src="edk2-202002-22.uel20.05.src.rpm">
          <filename>edk2-devel-202002-22.uel20.05.aarch64.rpm</filename>
        </package>
        <package name="edk2-aarch64" version="202002" release="22.uel20.05" epoch="0" arch="noarch" src="edk2-202002-22.uel20.05.src.rpm">
          <filename>edk2-aarch64-202002-22.uel20.05.noarch.rpm</filename>
        </package>
        <package name="edk2-ovmf" version="202002" release="22.uel20.05" epoch="0" arch="noarch" src="edk2-202002-22.uel20.05.src.rpm">
          <filename>edk2-ovmf-202002-22.uel20.05.noarch.rpm</filename>
        </package>
        <package name="edk2-devel" version="202002" release="22.uel20.05" epoch="0" arch="x86_64" src="edk2-202002-22.uel20.05.src.rpm">
          <filename>edk2-devel-202002-22.uel20.05.x86_64.rpm</filename>
        </package>
        <package name="python3-edk2-devel" version="202002" release="22.uel20.05" epoch="0" arch="noarch" src="edk2-202002-22.uel20.05.src.rpm">
          <filename>python3-edk2-devel-202002-22.uel20.05.noarch.rpm</filename>
        </package>
        <package name="edk2-help" version="202002" release="22.uel20.05" epoch="0" arch="noarch" src="edk2-202002-22.uel20.05.src.rpm">
          <filename>edk2-help-202002-22.uel20.05.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20181</id>
    <title>Important: mozjs78 security update</title>
    <updated date="2024-06-18 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: mozjs78 security update</summary>
    <description> In the &lt;code&gt;nsTArray_Impl::ReplaceElementsAt()&lt;/code&gt; function, an integer overflow could have occurred when the number of elements to replace was too large for the container. This vulnerability affects Firefox &lt; 102, Firefox ESR &lt; 91.11, Thunderbird &lt; 102, and Thunderbird &lt; 91.11.(CVE-2022-34481)
 Ports that were written as an integer overflow above the bounds of a 16-bit integer could have bypassed port blocking restrictions when used in the Alt-Svc header. This vulnerability affects Firefox ESR &lt; 78.10, Thunderbird &lt; 78.10, and Firefox &lt; 88.(CVE-2021-29946)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-34481" type="cve" title="fix CVE-2022-34481" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-29946" type="cve" title="fix CVE-2021-29946" />
    </references>
    <pkglist>
      <collection>
        <package name="mozjs78-devel" version="78.4.0" release="3.up1.uel20.02" epoch="0" arch="x86_64" src="mozjs78-78.4.0-3.up1.uel20.02.src.rpm">
          <filename>mozjs78-devel-78.4.0-3.up1.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="mozjs78" version="78.4.0" release="3.up1.uel20.02" epoch="0" arch="x86_64" src="mozjs78-78.4.0-3.up1.uel20.02.src.rpm">
          <filename>mozjs78-78.4.0-3.up1.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="mozjs78-help" version="78.4.0" release="3.up1.uel20.02" epoch="0" arch="x86_64" src="mozjs78-78.4.0-3.up1.uel20.02.src.rpm">
          <filename>mozjs78-help-78.4.0-3.up1.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="mozjs78-devel" version="78.4.0" release="3.up1.uel20.02" epoch="0" arch="aarch64" src="mozjs78-78.4.0-3.up1.uel20.02.src.rpm">
          <filename>mozjs78-devel-78.4.0-3.up1.uel20.02.aarch64.rpm</filename>
        </package>
        <package name="mozjs78-help" version="78.4.0" release="3.up1.uel20.02" epoch="0" arch="aarch64" src="mozjs78-78.4.0-3.up1.uel20.02.src.rpm">
          <filename>mozjs78-help-78.4.0-3.up1.uel20.02.aarch64.rpm</filename>
        </package>
        <package name="mozjs78" version="78.4.0" release="3.up1.uel20.02" epoch="0" arch="aarch64" src="mozjs78-78.4.0-3.up1.uel20.02.src.rpm">
          <filename>mozjs78-78.4.0-3.up1.uel20.02.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20182</id>
    <title>Important: three-eight-nine-ds-base security update</title>
    <updated date="2024-06-14 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: three-eight-nine-ds-base security update</summary>
    <description> A flaw was found in 389-ds-base. A specially-crafted LDAP query can potentially cause a failure on the directory server, leading to a denial of service(CVE-2024-3657)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-3657" type="cve" title="fix CVE-2024-3657" />
    </references>
    <pkglist>
      <collection>
        <package name="389-ds-base-devel" version="1.4.4.4" release="1.2.up2.uel20" epoch="0" arch="x86_64" src="389-ds-base-1.4.4.4-1.2.up2.uel20.src.rpm">
          <filename>389-ds-base-devel-1.4.4.4-1.2.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="389-ds-base" version="1.4.4.4" release="1.2.up2.uel20" epoch="0" arch="x86_64" src="389-ds-base-1.4.4.4-1.2.up2.uel20.src.rpm">
          <filename>389-ds-base-1.4.4.4-1.2.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="389-ds-base-libs" version="1.4.4.4" release="1.2.up2.uel20" epoch="0" arch="x86_64" src="389-ds-base-1.4.4.4-1.2.up2.uel20.src.rpm">
          <filename>389-ds-base-libs-1.4.4.4-1.2.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="389-ds-base-snmp" version="1.4.4.4" release="1.2.up2.uel20" epoch="0" arch="x86_64" src="389-ds-base-1.4.4.4-1.2.up2.uel20.src.rpm">
          <filename>389-ds-base-snmp-1.4.4.4-1.2.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-lib389" version="1.4.4.4" release="1.2.up2.uel20" epoch="0" arch="noarch" src="389-ds-base-1.4.4.4-1.2.up2.uel20.src.rpm">
          <filename>python3-lib389-1.4.4.4-1.2.up2.uel20.noarch.rpm</filename>
        </package>
        <package name="389-ds-base" version="1.4.4.4" release="1.2.up2.uel20" epoch="0" arch="aarch64" src="389-ds-base-1.4.4.4-1.2.up2.uel20.src.rpm">
          <filename>389-ds-base-1.4.4.4-1.2.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="389-ds-base-snmp" version="1.4.4.4" release="1.2.up2.uel20" epoch="0" arch="aarch64" src="389-ds-base-1.4.4.4-1.2.up2.uel20.src.rpm">
          <filename>389-ds-base-snmp-1.4.4.4-1.2.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="389-ds-base-devel" version="1.4.4.4" release="1.2.up2.uel20" epoch="0" arch="aarch64" src="389-ds-base-1.4.4.4-1.2.up2.uel20.src.rpm">
          <filename>389-ds-base-devel-1.4.4.4-1.2.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="cockpit-389-ds" version="1.4.4.4" release="1.2.up2.uel20" epoch="0" arch="noarch" src="389-ds-base-1.4.4.4-1.2.up2.uel20.src.rpm">
          <filename>cockpit-389-ds-1.4.4.4-1.2.up2.uel20.noarch.rpm</filename>
        </package>
        <package name="389-ds-base-libs" version="1.4.4.4" release="1.2.up2.uel20" epoch="0" arch="aarch64" src="389-ds-base-1.4.4.4-1.2.up2.uel20.src.rpm">
          <filename>389-ds-base-libs-1.4.4.4-1.2.up2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20183</id>
    <title>None: openssl security update</title>
    <updated date="2024-06-18 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: openssl security update</summary>
    <description> ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2024-4741)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-4741" type="cve" title="fix CVE-2024-4741" />
    </references>
    <pkglist>
      <collection>
        <package name="openssl" version="1.1.1k" release="9.uel20.22.03" epoch="1" arch="x86_64" src="openssl-1.1.1k-9.uel20.22.03.src.rpm">
          <filename>openssl-1.1.1k-9.uel20.22.03.x86_64.rpm</filename>
        </package>
        <package name="openssl-libs" version="1.1.1k" release="9.uel20.22.03" epoch="1" arch="x86_64" src="openssl-1.1.1k-9.uel20.22.03.src.rpm">
          <filename>openssl-libs-1.1.1k-9.uel20.22.03.x86_64.rpm</filename>
        </package>
        <package name="openssl-devel" version="1.1.1k" release="9.uel20.22.03" epoch="1" arch="x86_64" src="openssl-1.1.1k-9.uel20.22.03.src.rpm">
          <filename>openssl-devel-1.1.1k-9.uel20.22.03.x86_64.rpm</filename>
        </package>
        <package name="openssl-help" version="1.1.1k" release="9.uel20.22.03" epoch="1" arch="noarch" src="openssl-1.1.1k-9.uel20.22.03.src.rpm">
          <filename>openssl-help-1.1.1k-9.uel20.22.03.noarch.rpm</filename>
        </package>
        <package name="openssl-devel" version="1.1.1k" release="9.uel20.22.03" epoch="1" arch="aarch64" src="openssl-1.1.1k-9.uel20.22.03.src.rpm">
          <filename>openssl-devel-1.1.1k-9.uel20.22.03.aarch64.rpm</filename>
        </package>
        <package name="openssl-libs" version="1.1.1k" release="9.uel20.22.03" epoch="1" arch="aarch64" src="openssl-1.1.1k-9.uel20.22.03.src.rpm">
          <filename>openssl-libs-1.1.1k-9.uel20.22.03.aarch64.rpm</filename>
        </package>
        <package name="openssl" version="1.1.1k" release="9.uel20.22.03" epoch="1" arch="aarch64" src="openssl-1.1.1k-9.uel20.22.03.src.rpm">
          <filename>openssl-1.1.1k-9.uel20.22.03.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20184</id>
    <title>Moderate: libva security update</title>
    <updated date="2024-06-07 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: libva security update</summary>
    <description> Uncontrolled search path in some Libva software maintained by Intel(R) before version 2.20.0 may allow an authenticated user to potentially enable escalation of privilege via local access.(CVE-2023-39929)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-39929" type="cve" title="fix CVE-2023-39929" />
    </references>
    <pkglist>
      <collection>
        <package name="libva" version="2.20.0" release="1.uel20" epoch="0" arch="x86_64" src="libva-2.20.0-1.uel20.src.rpm">
          <filename>libva-2.20.0-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libva-devel" version="2.20.0" release="1.uel20" epoch="0" arch="x86_64" src="libva-2.20.0-1.uel20.src.rpm">
          <filename>libva-devel-2.20.0-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libva-devel" version="2.20.0" release="1.uel20" epoch="0" arch="aarch64" src="libva-2.20.0-1.uel20.src.rpm">
          <filename>libva-devel-2.20.0-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libva" version="2.20.0" release="1.uel20" epoch="0" arch="aarch64" src="libva-2.20.0-1.uel20.src.rpm">
          <filename>libva-2.20.0-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20185</id>
    <title>None: ghostscript security update</title>
    <updated date="2024-06-07 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: ghostscript security update</summary>
    <description> ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2024-29510)
 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2024-33869)
 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2024-33870)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-29510" type="cve" title="fix CVE-2024-29510" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-33869" type="cve" title="fix CVE-2024-33869" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-33870" type="cve" title="fix CVE-2024-33870" />
    </references>
    <pkglist>
      <collection>
        <package name="ghostscript" version="9.52" release="14.uel20.01" epoch="0" arch="x86_64" src="ghostscript-9.52-14.uel20.01.src.rpm">
          <filename>ghostscript-9.52-14.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="ghostscript-tools-dvipdf" version="9.52" release="14.uel20.01" epoch="0" arch="x86_64" src="ghostscript-9.52-14.uel20.01.src.rpm">
          <filename>ghostscript-tools-dvipdf-9.52-14.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="ghostscript-devel" version="9.52" release="14.uel20.01" epoch="0" arch="x86_64" src="ghostscript-9.52-14.uel20.01.src.rpm">
          <filename>ghostscript-devel-9.52-14.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="ghostscript-devel" version="9.52" release="14.uel20.01" epoch="0" arch="aarch64" src="ghostscript-9.52-14.uel20.01.src.rpm">
          <filename>ghostscript-devel-9.52-14.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="ghostscript" version="9.52" release="14.uel20.01" epoch="0" arch="aarch64" src="ghostscript-9.52-14.uel20.01.src.rpm">
          <filename>ghostscript-9.52-14.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="ghostscript-help" version="9.52" release="14.uel20.01" epoch="0" arch="noarch" src="ghostscript-9.52-14.uel20.01.src.rpm">
          <filename>ghostscript-help-9.52-14.uel20.01.noarch.rpm</filename>
        </package>
        <package name="ghostscript-tools-dvipdf" version="9.52" release="14.uel20.01" epoch="0" arch="aarch64" src="ghostscript-9.52-14.uel20.01.src.rpm">
          <filename>ghostscript-tools-dvipdf-9.52-14.uel20.01.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20186</id>
    <title>None: golang security update</title>
    <updated date="2024-06-06 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: golang security update</summary>
    <description> On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a "#cgo LDFLAGS" directive.(CVE-2024-24787)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-24787" type="cve" title="fix CVE-2024-24787" />
    </references>
    <pkglist>
      <collection>
        <package name="golang" version="1.15.7" release="44.uel20" epoch="0" arch="x86_64" src="golang-1.15.7-44.uel20.src.rpm">
          <filename>golang-1.15.7-44.uel20.x86_64.rpm</filename>
        </package>
        <package name="golang-devel" version="1.15.7" release="44.uel20" epoch="0" arch="noarch" src="golang-1.15.7-44.uel20.src.rpm">
          <filename>golang-devel-1.15.7-44.uel20.noarch.rpm</filename>
        </package>
        <package name="golang" version="1.15.7" release="44.uel20" epoch="0" arch="aarch64" src="golang-1.15.7-44.uel20.src.rpm">
          <filename>golang-1.15.7-44.uel20.aarch64.rpm</filename>
        </package>
        <package name="golang-help" version="1.15.7" release="44.uel20" epoch="0" arch="noarch" src="golang-1.15.7-44.uel20.src.rpm">
          <filename>golang-help-1.15.7-44.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20187</id>
    <title>None: uriparser security update</title>
    <updated date="2024-05-29 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: uriparser security update</summary>
    <description> An issue was discovered in uriparser through 0.9.7. ComposeQueryEngine in UriQuery.c has an integer overflow via long keys or values, with a resultant buffer overflow.(CVE-2024-34402)
 An issue was discovered in uriparser through 0.9.7. ComposeQueryMallocExMm in UriQuery.c has an integer overflow via a long string.(CVE-2024-34403)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-34402" type="cve" title="fix CVE-2024-34402" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-34403" type="cve" title="fix CVE-2024-34403" />
    </references>
    <pkglist>
      <collection>
        <package name="uriparser-devel" version="0.9.6" release="2.uel20" epoch="0" arch="x86_64" src="uriparser-0.9.6-2.uel20.src.rpm">
          <filename>uriparser-devel-0.9.6-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="uriparser" version="0.9.6" release="2.uel20" epoch="0" arch="x86_64" src="uriparser-0.9.6-2.uel20.src.rpm">
          <filename>uriparser-0.9.6-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="uriparser-help" version="0.9.6" release="2.uel20" epoch="0" arch="noarch" src="uriparser-0.9.6-2.uel20.src.rpm">
          <filename>uriparser-help-0.9.6-2.uel20.noarch.rpm</filename>
        </package>
        <package name="uriparser-devel" version="0.9.6" release="2.uel20" epoch="0" arch="aarch64" src="uriparser-0.9.6-2.uel20.src.rpm">
          <filename>uriparser-devel-0.9.6-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="uriparser" version="0.9.6" release="2.uel20" epoch="0" arch="aarch64" src="uriparser-0.9.6-2.uel20.src.rpm">
          <filename>uriparser-0.9.6-2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20188</id>
    <title>Moderate: dde-daemon security update</title>
    <updated date="2024-04-17 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: dde-daemon security update</summary>
    <description>fix cve/bug or enhancement</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="UT-2024-0013" type="cve" title="fix UT-2024-0013" />
    </references>
    <pkglist>
      <collection>
        <package name="dde-daemon" version="5.15.24" release="2.uel20.02" epoch="0" arch="aarch64" src="dde-daemon-5.15.24-2.uel20.02.src.rpm">
          <filename>dde-daemon-5.15.24-2.uel20.02.aarch64.rpm</filename>
        </package>
        <package name="dde-daemon" version="5.15.24" release="2.uel20.02" epoch="0" arch="x86_64" src="dde-daemon-5.15.24-2.uel20.02.src.rpm">
          <filename>dde-daemon-5.15.24-2.uel20.02.x86_64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20189</id>
    <title>Important: qemu security update</title>
    <updated date="2024-06-19 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: qemu security update</summary>
    <description> A bug in QEMU could cause a guest I/O operation otherwise addressed to an arbitrary disk offset to be targeted to offset 0 instead (potentially overwriting the VM's boot code). This could be used, for example, by L2 guests with a virtual disk (vdiskL2) stored on a virtual disk of an L1 (vdiskL1) hypervisor to read and/or write data to LBA 0 of vdiskL1, potentially gaining control of L1 at its next reboot.(CVE-2023-5088)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-5088" type="cve" title="fix CVE-2023-5088" />
    </references>
    <pkglist>
      <collection>
        <package name="qemu-guest-agent" version="4.1.0" release="83.up7.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-83.up7.uel20.src.rpm">
          <filename>qemu-guest-agent-4.1.0-83.up7.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu" version="4.1.0" release="83.up7.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-83.up7.uel20.src.rpm">
          <filename>qemu-4.1.0-83.up7.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-img" version="4.1.0" release="83.up7.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-83.up7.uel20.src.rpm">
          <filename>qemu-img-4.1.0-83.up7.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-block-iscsi" version="4.1.0" release="83.up7.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-83.up7.uel20.src.rpm">
          <filename>qemu-block-iscsi-4.1.0-83.up7.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-seabios" version="4.1.0" release="83.up7.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-83.up7.uel20.src.rpm">
          <filename>qemu-seabios-4.1.0-83.up7.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-block-ssh" version="4.1.0" release="83.up7.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-83.up7.uel20.src.rpm">
          <filename>qemu-block-ssh-4.1.0-83.up7.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-block-curl" version="4.1.0" release="83.up7.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-83.up7.uel20.src.rpm">
          <filename>qemu-block-curl-4.1.0-83.up7.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-block-rbd" version="4.1.0" release="83.up7.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-83.up7.uel20.src.rpm">
          <filename>qemu-block-rbd-4.1.0-83.up7.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu" version="4.1.0" release="83.up7.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-83.up7.uel20.src.rpm">
          <filename>qemu-4.1.0-83.up7.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu-guest-agent" version="4.1.0" release="83.up7.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-83.up7.uel20.src.rpm">
          <filename>qemu-guest-agent-4.1.0-83.up7.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu-block-curl" version="4.1.0" release="83.up7.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-83.up7.uel20.src.rpm">
          <filename>qemu-block-curl-4.1.0-83.up7.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu-help" version="4.1.0" release="83.up7.uel20" epoch="10" arch="noarch" src="qemu-4.1.0-83.up7.uel20.src.rpm">
          <filename>qemu-help-4.1.0-83.up7.uel20.noarch.rpm</filename>
        </package>
        <package name="qemu-block-ssh" version="4.1.0" release="83.up7.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-83.up7.uel20.src.rpm">
          <filename>qemu-block-ssh-4.1.0-83.up7.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu-img" version="4.1.0" release="83.up7.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-83.up7.uel20.src.rpm">
          <filename>qemu-img-4.1.0-83.up7.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu-block-rbd" version="4.1.0" release="83.up7.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-83.up7.uel20.src.rpm">
          <filename>qemu-block-rbd-4.1.0-83.up7.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu-block-iscsi" version="4.1.0" release="83.up7.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-83.up7.uel20.src.rpm">
          <filename>qemu-block-iscsi-4.1.0-83.up7.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20190</id>
    <title>Moderate: booth security update</title>
    <updated date="2024-06-13 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: booth security update</summary>
    <description> A flaw was found in Booth, a cluster ticket manager. If a specially-crafted hash is passed to gcry_md_get_algo_dlen(), it may allow an invalid HMAC to be accepted by the Booth server.(CVE-2024-3049)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-3049" type="cve" title="fix CVE-2024-3049" />
    </references>
    <pkglist>
      <collection>
        <package name="booth" version="1.0" release="3.f2d38ce.git.3.01.uel20" epoch="0" arch="x86_64" src="booth-1.0-3.f2d38ce.git.3.01.uel20.src.rpm">
          <filename>booth-1.0-3.f2d38ce.git.3.01.uel20.x86_64.rpm</filename>
        </package>
        <package name="booth-core" version="1.0" release="3.f2d38ce.git.3.01.uel20" epoch="0" arch="x86_64" src="booth-1.0-3.f2d38ce.git.3.01.uel20.src.rpm">
          <filename>booth-core-1.0-3.f2d38ce.git.3.01.uel20.x86_64.rpm</filename>
        </package>
        <package name="booth-core" version="1.0" release="3.f2d38ce.git.3.01.uel20" epoch="0" arch="aarch64" src="booth-1.0-3.f2d38ce.git.3.01.uel20.src.rpm">
          <filename>booth-core-1.0-3.f2d38ce.git.3.01.uel20.aarch64.rpm</filename>
        </package>
        <package name="booth-site" version="1.0" release="3.f2d38ce.git.3.01.uel20" epoch="0" arch="noarch" src="booth-1.0-3.f2d38ce.git.3.01.uel20.src.rpm">
          <filename>booth-site-1.0-3.f2d38ce.git.3.01.uel20.noarch.rpm</filename>
        </package>
        <package name="booth" version="1.0" release="3.f2d38ce.git.3.01.uel20" epoch="0" arch="aarch64" src="booth-1.0-3.f2d38ce.git.3.01.uel20.src.rpm">
          <filename>booth-1.0-3.f2d38ce.git.3.01.uel20.aarch64.rpm</filename>
        </package>
        <package name="booth-test" version="1.0" release="3.f2d38ce.git.3.01.uel20" epoch="0" arch="noarch" src="booth-1.0-3.f2d38ce.git.3.01.uel20.src.rpm">
          <filename>booth-test-1.0-3.f2d38ce.git.3.01.uel20.noarch.rpm</filename>
        </package>
        <package name="booth-arbitrator" version="1.0" release="3.f2d38ce.git.3.01.uel20" epoch="0" arch="noarch" src="booth-1.0-3.f2d38ce.git.3.01.uel20.src.rpm">
          <filename>booth-arbitrator-1.0-3.f2d38ce.git.3.01.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20191</id>
    <title>Important: microcode_ctl security update</title>
    <updated date="2024-06-20 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: microcode_ctl security update</summary>
    <description> Hardware logic contains race conditions in some Intel(R) Processors may allow an authenticated user to potentially enable partial information disclosure via local access.(CVE-2023-45733)
 Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2023-45745)
 Sequence of processor instructions leads to unexpected behavior in Intel(R) Core(TM) Ultra Processors may allow an authenticated user to potentially enable denial of service via local access.(CVE-2023-46103)
 Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2023-47855)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-45733" type="cve" title="fix CVE-2023-45733" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-45745" type="cve" title="fix CVE-2023-45745" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-46103" type="cve" title="fix CVE-2023-46103" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-47855" type="cve" title="fix CVE-2023-47855" />
    </references>
    <pkglist>
      <collection>
        <package name="microcode_ctl" version="20240531" release="1.uel20.01" epoch="4" arch="x86_64" src="microcode_ctl-20240531-1.uel20.01.src.rpm">
          <filename>microcode_ctl-20240531-1.uel20.01.x86_64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20192</id>
    <title>Important: libarchive security update</title>
    <updated date="2024-06-20 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: libarchive security update</summary>
    <description> Windows Libarchive Remote Code Execution Vulnerability(CVE-2024-20696)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20696" type="cve" title="fix CVE-2024-20696" />
    </references>
    <pkglist>
      <collection>
        <package name="libarchive" version="3.5.3" release="3.uel20.02" epoch="0" arch="x86_64" src="libarchive-3.5.3-3.uel20.02.src.rpm">
          <filename>libarchive-3.5.3-3.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="libarchive-devel" version="3.5.3" release="3.uel20.02" epoch="0" arch="x86_64" src="libarchive-3.5.3-3.uel20.02.src.rpm">
          <filename>libarchive-devel-3.5.3-3.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="libarchive-help" version="3.5.3" release="3.uel20.02" epoch="0" arch="noarch" src="libarchive-3.5.3-3.uel20.02.src.rpm">
          <filename>libarchive-help-3.5.3-3.uel20.02.noarch.rpm</filename>
        </package>
        <package name="libarchive-devel" version="3.5.3" release="3.uel20.02" epoch="0" arch="aarch64" src="libarchive-3.5.3-3.uel20.02.src.rpm">
          <filename>libarchive-devel-3.5.3-3.uel20.02.aarch64.rpm</filename>
        </package>
        <package name="libarchive" version="3.5.3" release="3.uel20.02" epoch="0" arch="aarch64" src="libarchive-3.5.3-3.uel20.02.src.rpm">
          <filename>libarchive-3.5.3-3.uel20.02.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20193</id>
    <title>Important: libndp security update</title>
    <updated date="2024-06-19 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: libndp security update</summary>
    <description> A vulnerability was found in libndp. This flaw allows a local malicious user to cause a buffer overflow in NetworkManager, triggered by sending a malformed IPv6 router advertisement packet. This issue occurred as libndp was not correctly validating the route length information.(CVE-2024-5564)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-5564" type="cve" title="fix CVE-2024-5564" />
    </references>
    <pkglist>
      <collection>
        <package name="libndp-help" version="1.7" release="6.uel20.02" epoch="0" arch="x86_64" src="libndp-1.7-6.uel20.02.src.rpm">
          <filename>libndp-help-1.7-6.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="libndp" version="1.7" release="6.uel20.02" epoch="0" arch="x86_64" src="libndp-1.7-6.uel20.02.src.rpm">
          <filename>libndp-1.7-6.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="libndp-devel" version="1.7" release="6.uel20.02" epoch="0" arch="x86_64" src="libndp-1.7-6.uel20.02.src.rpm">
          <filename>libndp-devel-1.7-6.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="libndp" version="1.7" release="6.uel20.02" epoch="0" arch="aarch64" src="libndp-1.7-6.uel20.02.src.rpm">
          <filename>libndp-1.7-6.uel20.02.aarch64.rpm</filename>
        </package>
        <package name="libndp-help" version="1.7" release="6.uel20.02" epoch="0" arch="aarch64" src="libndp-1.7-6.uel20.02.src.rpm">
          <filename>libndp-help-1.7-6.uel20.02.aarch64.rpm</filename>
        </package>
        <package name="libndp-devel" version="1.7" release="6.uel20.02" epoch="0" arch="aarch64" src="libndp-1.7-6.uel20.02.src.rpm">
          <filename>libndp-devel-1.7-6.uel20.02.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20194</id>
    <title>Important: mozjs78 security update</title>
    <updated date="2024-06-20 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: mozjs78 security update</summary>
    <description> Certain network request objects were freed too early when releasing a network request handle. This could have lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 91.5, Firefox &lt; 96, and Thunderbird &lt; 91.5.(CVE-2022-22740)
 A local attacker can trick the Mozilla Maintenance Service into applying an unsigned update file by pointing the service at an update file on a malicious SMB server. The update file can be replaced after the signature check, before the use, because the write-lock requested by the service does not work on a SMB server.

*Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.* This vulnerability affects Firefox &lt; 112, Firefox ESR &lt; 102.10, and Thunderbird &lt; 102.10.

(CVE-2023-29532)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-22740" type="cve" title="fix CVE-2022-22740" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-29532" type="cve" title="fix CVE-2023-29532" />
    </references>
    <pkglist>
      <collection>
        <package name="mozjs78-devel" version="78.4.0" release="3.up1.uel20.03" epoch="0" arch="x86_64" src="mozjs78-78.4.0-3.up1.uel20.03.src.rpm">
          <filename>mozjs78-devel-78.4.0-3.up1.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="mozjs78" version="78.4.0" release="3.up1.uel20.03" epoch="0" arch="x86_64" src="mozjs78-78.4.0-3.up1.uel20.03.src.rpm">
          <filename>mozjs78-78.4.0-3.up1.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="mozjs78-help" version="78.4.0" release="3.up1.uel20.03" epoch="0" arch="x86_64" src="mozjs78-78.4.0-3.up1.uel20.03.src.rpm">
          <filename>mozjs78-help-78.4.0-3.up1.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="mozjs78-devel" version="78.4.0" release="3.up1.uel20.03" epoch="0" arch="aarch64" src="mozjs78-78.4.0-3.up1.uel20.03.src.rpm">
          <filename>mozjs78-devel-78.4.0-3.up1.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="mozjs78-help" version="78.4.0" release="3.up1.uel20.03" epoch="0" arch="aarch64" src="mozjs78-78.4.0-3.up1.uel20.03.src.rpm">
          <filename>mozjs78-help-78.4.0-3.up1.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="mozjs78" version="78.4.0" release="3.up1.uel20.03" epoch="0" arch="aarch64" src="mozjs78-78.4.0-3.up1.uel20.03.src.rpm">
          <filename>mozjs78-78.4.0-3.up1.uel20.03.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20195</id>
    <title>Low: cockpit security update</title>
    <updated date="2024-07-05 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Low</severity>
    <summary>Low: cockpit security update</summary>
    <description> A flaw was found in the cockpit package. This flaw allows an authenticated user to kill any process when enabling the pam_env's user_readenv option, which leads to a denial of service (DoS) attack.(CVE-2024-6126)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-6126" type="cve" title="fix CVE-2024-6126" />
    </references>
    <pkglist>
      <collection>
        <package name="cockpit-ws" version="310.4" release="1.uel20.02" epoch="0" arch="x86_64" src="cockpit-310.4-1.uel20.02.src.rpm">
          <filename>cockpit-ws-310.4-1.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="cockpit-bridge" version="310.4" release="1.uel20.02" epoch="0" arch="x86_64" src="cockpit-310.4-1.uel20.02.src.rpm">
          <filename>cockpit-bridge-310.4-1.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="cockpit" version="310.4" release="1.uel20.02" epoch="0" arch="x86_64" src="cockpit-310.4-1.uel20.02.src.rpm">
          <filename>cockpit-310.4-1.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="cockpit-system" version="310.4" release="1.uel20.02" epoch="0" arch="noarch" src="cockpit-310.4-1.uel20.02.src.rpm">
          <filename>cockpit-system-310.4-1.uel20.02.noarch.rpm</filename>
        </package>
        <package name="cockpit-ws" version="310.4" release="1.uel20.02" epoch="0" arch="aarch64" src="cockpit-310.4-1.uel20.02.src.rpm">
          <filename>cockpit-ws-310.4-1.uel20.02.aarch64.rpm</filename>
        </package>
        <package name="cockpit-bridge" version="310.4" release="1.uel20.02" epoch="0" arch="aarch64" src="cockpit-310.4-1.uel20.02.src.rpm">
          <filename>cockpit-bridge-310.4-1.uel20.02.aarch64.rpm</filename>
        </package>
        <package name="cockpit" version="310.4" release="1.uel20.02" epoch="0" arch="aarch64" src="cockpit-310.4-1.uel20.02.src.rpm">
          <filename>cockpit-310.4-1.uel20.02.aarch64.rpm</filename>
        </package>
        <package name="cockpit-doc" version="310.4" release="1.uel20.02" epoch="0" arch="noarch" src="cockpit-310.4-1.uel20.02.src.rpm">
          <filename>cockpit-doc-310.4-1.uel20.02.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20196</id>
    <title>Moderate: squid security update</title>
    <updated date="2024-07-03 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: squid security update</summary>
    <description> Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Out-of-bounds Write error when assigning ESI variables, Squid is susceptible to a Memory Corruption error. This error can lead to a Denial of Service attack.(CVE-2024-37894)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-37894" type="cve" title="fix CVE-2024-37894" />
    </references>
    <pkglist>
      <collection>
        <package name="squid" version="4.9" release="21.uel20" epoch="7" arch="x86_64" src="squid-4.9-21.uel20.src.rpm">
          <filename>squid-4.9-21.uel20.x86_64.rpm</filename>
        </package>
        <package name="squid" version="4.9" release="21.uel20" epoch="7" arch="aarch64" src="squid-4.9-21.uel20.src.rpm">
          <filename>squid-4.9-21.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20197</id>
    <title>Important: deepin-log-viewer security update</title>
    <updated date="2024-06-25 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: deepin-log-viewer security update</summary>
    <description>fix cve/bug or enhancement</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="UT-2024-0022" type="cve" title="fix UT-2024-0022" />
    </references>
    <pkglist>
      <collection>
        <package name="deepin-log-viewer" version="6.1.18" release="1.uel20" epoch="0" arch="aarch64" src="deepin-log-viewer-6.1.18-1.uel20.src.rpm">
          <filename>deepin-log-viewer-6.1.18-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="deepin-log-viewer-plugin" version="6.1.18" release="1.uel20" epoch="0" arch="aarch64" src="deepin-log-viewer-6.1.18-1.uel20.src.rpm">
          <filename>deepin-log-viewer-plugin-6.1.18-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="deepin-log-viewer-plugin-devel" version="6.1.18" release="1.uel20" epoch="0" arch="aarch64" src="deepin-log-viewer-6.1.18-1.uel20.src.rpm">
          <filename>deepin-log-viewer-plugin-devel-6.1.18-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="deepin-log-viewer" version="6.1.18" release="1.uel20" epoch="0" arch="x86_64" src="deepin-log-viewer-6.1.18-1.uel20.src.rpm">
          <filename>deepin-log-viewer-6.1.18-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="deepin-log-viewer-plugin" version="6.1.18" release="1.uel20" epoch="0" arch="x86_64" src="deepin-log-viewer-6.1.18-1.uel20.src.rpm">
          <filename>deepin-log-viewer-plugin-6.1.18-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="deepin-log-viewer-plugin-devel" version="6.1.18" release="1.uel20" epoch="0" arch="x86_64" src="deepin-log-viewer-6.1.18-1.uel20.src.rpm">
          <filename>deepin-log-viewer-plugin-devel-6.1.18-1.uel20.x86_64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20198</id>
    <title>Critical: mozjs78 security update</title>
    <updated date="2024-07-02 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: mozjs78 security update</summary>
    <description> xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.(CVE-2022-25235)
 In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).(CVE-2021-45960)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-25235" type="cve" title="fix CVE-2022-25235" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-45960" type="cve" title="fix CVE-2021-45960" />
    </references>
    <pkglist>
      <collection>
        <package name="mozjs78-devel" version="78.4.0" release="3.up1.uel20.04" epoch="0" arch="x86_64" src="mozjs78-78.4.0-3.up1.uel20.04.src.rpm">
          <filename>mozjs78-devel-78.4.0-3.up1.uel20.04.x86_64.rpm</filename>
        </package>
        <package name="mozjs78" version="78.4.0" release="3.up1.uel20.04" epoch="0" arch="x86_64" src="mozjs78-78.4.0-3.up1.uel20.04.src.rpm">
          <filename>mozjs78-78.4.0-3.up1.uel20.04.x86_64.rpm</filename>
        </package>
        <package name="mozjs78-help" version="78.4.0" release="3.up1.uel20.04" epoch="0" arch="x86_64" src="mozjs78-78.4.0-3.up1.uel20.04.src.rpm">
          <filename>mozjs78-help-78.4.0-3.up1.uel20.04.x86_64.rpm</filename>
        </package>
        <package name="mozjs78-devel" version="78.4.0" release="3.up1.uel20.04" epoch="0" arch="aarch64" src="mozjs78-78.4.0-3.up1.uel20.04.src.rpm">
          <filename>mozjs78-devel-78.4.0-3.up1.uel20.04.aarch64.rpm</filename>
        </package>
        <package name="mozjs78" version="78.4.0" release="3.up1.uel20.04" epoch="0" arch="aarch64" src="mozjs78-78.4.0-3.up1.uel20.04.src.rpm">
          <filename>mozjs78-78.4.0-3.up1.uel20.04.aarch64.rpm</filename>
        </package>
        <package name="mozjs78-help" version="78.4.0" release="3.up1.uel20.04" epoch="0" arch="aarch64" src="mozjs78-78.4.0-3.up1.uel20.04.src.rpm">
          <filename>mozjs78-help-78.4.0-3.up1.uel20.04.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20199</id>
    <title>Critical: emacs security update</title>
    <updated date="2024-07-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: emacs security update</summary>
    <description> In Emacs before 29.4, org-link-expand-abbrev in lisp/ol.el expands a %(...) link abbrev even when it specifies an unsafe function, such as shell-command-to-string. This affects Org Mode before 9.7.5.(CVE-2024-39331)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-39331" type="cve" title="fix CVE-2024-39331" />
    </references>
    <pkglist>
      <collection>
        <package name="emacs-lucid" version="27.1" release="14.uel20" epoch="1" arch="x86_64" src="emacs-27.1-14.uel20.src.rpm">
          <filename>emacs-lucid-27.1-14.uel20.x86_64.rpm</filename>
        </package>
        <package name="emacs-nox" version="27.1" release="14.uel20" epoch="1" arch="x86_64" src="emacs-27.1-14.uel20.src.rpm">
          <filename>emacs-nox-27.1-14.uel20.x86_64.rpm</filename>
        </package>
        <package name="emacs" version="27.1" release="14.uel20" epoch="1" arch="x86_64" src="emacs-27.1-14.uel20.src.rpm">
          <filename>emacs-27.1-14.uel20.x86_64.rpm</filename>
        </package>
        <package name="emacs-common" version="27.1" release="14.uel20" epoch="1" arch="x86_64" src="emacs-27.1-14.uel20.src.rpm">
          <filename>emacs-common-27.1-14.uel20.x86_64.rpm</filename>
        </package>
        <package name="emacs-devel" version="27.1" release="14.uel20" epoch="1" arch="x86_64" src="emacs-27.1-14.uel20.src.rpm">
          <filename>emacs-devel-27.1-14.uel20.x86_64.rpm</filename>
        </package>
        <package name="emacs-help" version="27.1" release="14.uel20" epoch="1" arch="noarch" src="emacs-27.1-14.uel20.src.rpm">
          <filename>emacs-help-27.1-14.uel20.noarch.rpm</filename>
        </package>
        <package name="emacs-devel" version="27.1" release="14.uel20" epoch="1" arch="aarch64" src="emacs-27.1-14.uel20.src.rpm">
          <filename>emacs-devel-27.1-14.uel20.aarch64.rpm</filename>
        </package>
        <package name="emacs-nox" version="27.1" release="14.uel20" epoch="1" arch="aarch64" src="emacs-27.1-14.uel20.src.rpm">
          <filename>emacs-nox-27.1-14.uel20.aarch64.rpm</filename>
        </package>
        <package name="emacs-filesystem" version="27.1" release="14.uel20" epoch="1" arch="noarch" src="emacs-27.1-14.uel20.src.rpm">
          <filename>emacs-filesystem-27.1-14.uel20.noarch.rpm</filename>
        </package>
        <package name="emacs-common" version="27.1" release="14.uel20" epoch="1" arch="aarch64" src="emacs-27.1-14.uel20.src.rpm">
          <filename>emacs-common-27.1-14.uel20.aarch64.rpm</filename>
        </package>
        <package name="emacs" version="27.1" release="14.uel20" epoch="1" arch="aarch64" src="emacs-27.1-14.uel20.src.rpm">
          <filename>emacs-27.1-14.uel20.aarch64.rpm</filename>
        </package>
        <package name="emacs-lucid" version="27.1" release="14.uel20" epoch="1" arch="aarch64" src="emacs-27.1-14.uel20.src.rpm">
          <filename>emacs-lucid-27.1-14.uel20.aarch64.rpm</filename>
        </package>
        <package name="emacs-terminal" version="27.1" release="14.uel20" epoch="1" arch="noarch" src="emacs-27.1-14.uel20.src.rpm">
          <filename>emacs-terminal-27.1-14.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20200</id>
    <title>Important: poppler security update</title>
    <updated date="2024-07-03 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: poppler security update</summary>
    <description> A flaw was found in the Poppler's Pdfinfo utility. This issue occurs when using -dests parameter with pdfinfo utility. By using certain malformed input files, an attacker could cause the utility to crash, leading to a denial of service.(CVE-2024-6239)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-6239" type="cve" title="fix CVE-2024-6239" />
    </references>
    <pkglist>
      <collection>
        <package name="poppler-cpp-devel" version="0.90.0" release="6.uel20.03" epoch="0" arch="x86_64" src="poppler-0.90.0-6.uel20.03.src.rpm">
          <filename>poppler-cpp-devel-0.90.0-6.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="poppler-glib" version="0.90.0" release="6.uel20.03" epoch="0" arch="x86_64" src="poppler-0.90.0-6.uel20.03.src.rpm">
          <filename>poppler-glib-0.90.0-6.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="poppler-cpp" version="0.90.0" release="6.uel20.03" epoch="0" arch="x86_64" src="poppler-0.90.0-6.uel20.03.src.rpm">
          <filename>poppler-cpp-0.90.0-6.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="poppler-devel" version="0.90.0" release="6.uel20.03" epoch="0" arch="x86_64" src="poppler-0.90.0-6.uel20.03.src.rpm">
          <filename>poppler-devel-0.90.0-6.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="poppler-qt5-devel" version="0.90.0" release="6.uel20.03" epoch="0" arch="x86_64" src="poppler-0.90.0-6.uel20.03.src.rpm">
          <filename>poppler-qt5-devel-0.90.0-6.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="poppler-glib-devel" version="0.90.0" release="6.uel20.03" epoch="0" arch="x86_64" src="poppler-0.90.0-6.uel20.03.src.rpm">
          <filename>poppler-glib-devel-0.90.0-6.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="poppler-utils" version="0.90.0" release="6.uel20.03" epoch="0" arch="x86_64" src="poppler-0.90.0-6.uel20.03.src.rpm">
          <filename>poppler-utils-0.90.0-6.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="poppler-qt5" version="0.90.0" release="6.uel20.03" epoch="0" arch="x86_64" src="poppler-0.90.0-6.uel20.03.src.rpm">
          <filename>poppler-qt5-0.90.0-6.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="poppler" version="0.90.0" release="6.uel20.03" epoch="0" arch="x86_64" src="poppler-0.90.0-6.uel20.03.src.rpm">
          <filename>poppler-0.90.0-6.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="poppler" version="0.90.0" release="6.uel20.03" epoch="0" arch="aarch64" src="poppler-0.90.0-6.uel20.03.src.rpm">
          <filename>poppler-0.90.0-6.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="poppler-glib-devel" version="0.90.0" release="6.uel20.03" epoch="0" arch="aarch64" src="poppler-0.90.0-6.uel20.03.src.rpm">
          <filename>poppler-glib-devel-0.90.0-6.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="poppler-glib-doc" version="0.90.0" release="6.uel20.03" epoch="0" arch="noarch" src="poppler-0.90.0-6.uel20.03.src.rpm">
          <filename>poppler-glib-doc-0.90.0-6.uel20.03.noarch.rpm</filename>
        </package>
        <package name="poppler-qt5-devel" version="0.90.0" release="6.uel20.03" epoch="0" arch="aarch64" src="poppler-0.90.0-6.uel20.03.src.rpm">
          <filename>poppler-qt5-devel-0.90.0-6.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="poppler-cpp" version="0.90.0" release="6.uel20.03" epoch="0" arch="aarch64" src="poppler-0.90.0-6.uel20.03.src.rpm">
          <filename>poppler-cpp-0.90.0-6.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="poppler-glib" version="0.90.0" release="6.uel20.03" epoch="0" arch="aarch64" src="poppler-0.90.0-6.uel20.03.src.rpm">
          <filename>poppler-glib-0.90.0-6.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="poppler-qt5" version="0.90.0" release="6.uel20.03" epoch="0" arch="aarch64" src="poppler-0.90.0-6.uel20.03.src.rpm">
          <filename>poppler-qt5-0.90.0-6.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="poppler-help" version="0.90.0" release="6.uel20.03" epoch="0" arch="noarch" src="poppler-0.90.0-6.uel20.03.src.rpm">
          <filename>poppler-help-0.90.0-6.uel20.03.noarch.rpm</filename>
        </package>
        <package name="poppler-devel" version="0.90.0" release="6.uel20.03" epoch="0" arch="aarch64" src="poppler-0.90.0-6.uel20.03.src.rpm">
          <filename>poppler-devel-0.90.0-6.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="poppler-cpp-devel" version="0.90.0" release="6.uel20.03" epoch="0" arch="aarch64" src="poppler-0.90.0-6.uel20.03.src.rpm">
          <filename>poppler-cpp-devel-0.90.0-6.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="poppler-utils" version="0.90.0" release="6.uel20.03" epoch="0" arch="aarch64" src="poppler-0.90.0-6.uel20.03.src.rpm">
          <filename>poppler-utils-0.90.0-6.uel20.03.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20201</id>
    <title>Important: dde-file-manager security update</title>
    <updated date="2024-06-26 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: dde-file-manager security update</summary>
    <description>fix cve/bug or enhancement</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="UT-2024-0019" type="cve" title="fix UT-2024-0019" />
      <reference href="https://usafe.uniontech.com/" id="UT-2024-0018" type="cve" title="fix UT-2024-0018" />
    </references>
    <pkglist>
      <collection>
        <package name="dde-file-manager" version="6.0.31" release="1.uel20.09" epoch="0" arch="aarch64" src="dde-file-manager-6.0.31-1.uel20.09.src.rpm">
          <filename>dde-file-manager-6.0.31-1.uel20.09.aarch64.rpm</filename>
        </package>
        <package name="dde-file-manager-devel" version="6.0.31" release="1.uel20.09" epoch="0" arch="aarch64" src="dde-file-manager-6.0.31-1.uel20.09.src.rpm">
          <filename>dde-file-manager-devel-6.0.31-1.uel20.09.aarch64.rpm</filename>
        </package>
        <package name="dde-desktop" version="6.0.31" release="1.uel20.09" epoch="0" arch="aarch64" src="dde-file-manager-6.0.31-1.uel20.09.src.rpm">
          <filename>dde-desktop-6.0.31-1.uel20.09.aarch64.rpm</filename>
        </package>
        <package name="dde-disk-mount-plugin" version="6.0.31" release="1.uel20.09" epoch="0" arch="aarch64" src="dde-file-manager-6.0.31-1.uel20.09.src.rpm">
          <filename>dde-disk-mount-plugin-6.0.31-1.uel20.09.aarch64.rpm</filename>
        </package>
        <package name="libdde-file-manager" version="6.0.31" release="1.uel20.09" epoch="0" arch="aarch64" src="dde-file-manager-6.0.31-1.uel20.09.src.rpm">
          <filename>libdde-file-manager-6.0.31-1.uel20.09.aarch64.rpm</filename>
        </package>
        <package name="dde-file-manager" version="6.0.31" release="1.uel20.09" epoch="0" arch="x86_64" src="dde-file-manager-6.0.31-1.uel20.09.src.rpm">
          <filename>dde-file-manager-6.0.31-1.uel20.09.x86_64.rpm</filename>
        </package>
        <package name="dde-desktop" version="6.0.31" release="1.uel20.09" epoch="0" arch="x86_64" src="dde-file-manager-6.0.31-1.uel20.09.src.rpm">
          <filename>dde-desktop-6.0.31-1.uel20.09.x86_64.rpm</filename>
        </package>
        <package name="dde-file-manager-devel" version="6.0.31" release="1.uel20.09" epoch="0" arch="x86_64" src="dde-file-manager-6.0.31-1.uel20.09.src.rpm">
          <filename>dde-file-manager-devel-6.0.31-1.uel20.09.x86_64.rpm</filename>
        </package>
        <package name="dde-disk-mount-plugin" version="6.0.31" release="1.uel20.09" epoch="0" arch="x86_64" src="dde-file-manager-6.0.31-1.uel20.09.src.rpm">
          <filename>dde-disk-mount-plugin-6.0.31-1.uel20.09.x86_64.rpm</filename>
        </package>
        <package name="libdde-file-manager" version="6.0.31" release="1.uel20.09" epoch="0" arch="x86_64" src="dde-file-manager-6.0.31-1.uel20.09.src.rpm">
          <filename>libdde-file-manager-6.0.31-1.uel20.09.x86_64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20202</id>
    <title>Moderate: deepin-image-editor security update</title>
    <updated date="2024-06-25 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: deepin-image-editor security update</summary>
    <description>fix cve/bug or enhancement</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="UT-2024-0016" type="cve" title="fix UT-2024-0016" />
    </references>
    <pkglist>
      <collection>
        <package name="libimagevisualresult-devel" version="1.0.34" release="1.uel20.04" epoch="0" arch="aarch64" src="deepin-image-editor-1.0.34-1.uel20.04.src.rpm">
          <filename>libimagevisualresult-devel-1.0.34-1.uel20.04.aarch64.rpm</filename>
        </package>
        <package name="libimageviewer" version="1.0.34" release="1.uel20.04" epoch="0" arch="aarch64" src="deepin-image-editor-1.0.34-1.uel20.04.src.rpm">
          <filename>libimageviewer-1.0.34-1.uel20.04.aarch64.rpm</filename>
        </package>
        <package name="libimageviewer-devel" version="1.0.34" release="1.uel20.04" epoch="0" arch="aarch64" src="deepin-image-editor-1.0.34-1.uel20.04.src.rpm">
          <filename>libimageviewer-devel-1.0.34-1.uel20.04.aarch64.rpm</filename>
        </package>
        <package name="deepin-image-editor" version="1.0.34" release="1.uel20.04" epoch="0" arch="aarch64" src="deepin-image-editor-1.0.34-1.uel20.04.src.rpm">
          <filename>deepin-image-editor-1.0.34-1.uel20.04.aarch64.rpm</filename>
        </package>
        <package name="libimagevisualresult" version="1.0.34" release="1.uel20.04" epoch="0" arch="aarch64" src="deepin-image-editor-1.0.34-1.uel20.04.src.rpm">
          <filename>libimagevisualresult-1.0.34-1.uel20.04.aarch64.rpm</filename>
        </package>
        <package name="libimagevisualresult-devel" version="1.0.34" release="1.uel20.04" epoch="0" arch="x86_64" src="deepin-image-editor-1.0.34-1.uel20.04.src.rpm">
          <filename>libimagevisualresult-devel-1.0.34-1.uel20.04.x86_64.rpm</filename>
        </package>
        <package name="libimageviewer-devel" version="1.0.34" release="1.uel20.04" epoch="0" arch="x86_64" src="deepin-image-editor-1.0.34-1.uel20.04.src.rpm">
          <filename>libimageviewer-devel-1.0.34-1.uel20.04.x86_64.rpm</filename>
        </package>
        <package name="deepin-image-editor" version="1.0.34" release="1.uel20.04" epoch="0" arch="x86_64" src="deepin-image-editor-1.0.34-1.uel20.04.src.rpm">
          <filename>deepin-image-editor-1.0.34-1.uel20.04.x86_64.rpm</filename>
        </package>
        <package name="libimageviewer" version="1.0.34" release="1.uel20.04" epoch="0" arch="x86_64" src="deepin-image-editor-1.0.34-1.uel20.04.src.rpm">
          <filename>libimageviewer-1.0.34-1.uel20.04.x86_64.rpm</filename>
        </package>
        <package name="libimagevisualresult" version="1.0.34" release="1.uel20.04" epoch="0" arch="x86_64" src="deepin-image-editor-1.0.34-1.uel20.04.src.rpm">
          <filename>libimagevisualresult-1.0.34-1.uel20.04.x86_64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20203</id>
    <title>Moderate: golang security update</title>
    <updated date="2024-06-28 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: golang security update</summary>
    <description> The archive/zip package's handling of certain types of invalid zip files differs from the behavior of most zip implementations. This misalignment could be exploited to create an zip file with contents that vary depending on the implementation reading the file. The archive/zip package now rejects files containing these errors.(CVE-2024-24789)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-24789" type="cve" title="fix CVE-2024-24789" />
    </references>
    <pkglist>
      <collection>
        <package name="golang" version="1.15.7" release="45.uel20.01" epoch="0" arch="x86_64" src="golang-1.15.7-45.uel20.01.src.rpm">
          <filename>golang-1.15.7-45.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="golang-help" version="1.15.7" release="45.uel20.01" epoch="0" arch="noarch" src="golang-1.15.7-45.uel20.01.src.rpm">
          <filename>golang-help-1.15.7-45.uel20.01.noarch.rpm</filename>
        </package>
        <package name="golang-devel" version="1.15.7" release="45.uel20.01" epoch="0" arch="noarch" src="golang-1.15.7-45.uel20.01.src.rpm">
          <filename>golang-devel-1.15.7-45.uel20.01.noarch.rpm</filename>
        </package>
        <package name="golang" version="1.15.7" release="45.uel20.01" epoch="0" arch="aarch64" src="golang-1.15.7-45.uel20.01.src.rpm">
          <filename>golang-1.15.7-45.uel20.01.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20204</id>
    <title>None: wget security update</title>
    <updated date="2024-06-27 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: wget security update</summary>
    <description> url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent.(CVE-2024-38428)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-38428" type="cve" title="fix CVE-2024-38428" />
    </references>
    <pkglist>
      <collection>
        <package name="wget" version="1.20.3" release="4.up2.uel20" epoch="0" arch="x86_64" src="wget-1.20.3-4.up2.uel20.src.rpm">
          <filename>wget-1.20.3-4.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="wget-help" version="1.20.3" release="4.up2.uel20" epoch="0" arch="x86_64" src="wget-1.20.3-4.up2.uel20.src.rpm">
          <filename>wget-help-1.20.3-4.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="wget-help" version="1.20.3" release="4.up2.uel20" epoch="0" arch="aarch64" src="wget-1.20.3-4.up2.uel20.src.rpm">
          <filename>wget-help-1.20.3-4.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="wget" version="1.20.3" release="4.up2.uel20" epoch="0" arch="aarch64" src="wget-1.20.3-4.up2.uel20.src.rpm">
          <filename>wget-1.20.3-4.up2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20205</id>
    <title>None: ntfs-3g security update</title>
    <updated date="2024-06-20 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: ntfs-3g security update</summary>
    <description> NTFS-3G before 75dcdc2 has a use-after-free in ntfs_uppercase_mbs in libntfs-3g/unistr.c. NOTE: discussion suggests that exploitation would be challenging.(CVE-2023-52890)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-52890" type="cve" title="fix CVE-2023-52890" />
    </references>
    <pkglist>
      <collection>
        <package name="ntfs-3g-devel" version="2022.5.17" release="3.uel20" epoch="2" arch="x86_64" src="ntfs-3g-2022.5.17-3.uel20.src.rpm">
          <filename>ntfs-3g-devel-2022.5.17-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="ntfs-3g" version="2022.5.17" release="3.uel20" epoch="2" arch="x86_64" src="ntfs-3g-2022.5.17-3.uel20.src.rpm">
          <filename>ntfs-3g-2022.5.17-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="ntfs-3g-help" version="2022.5.17" release="3.uel20" epoch="2" arch="x86_64" src="ntfs-3g-2022.5.17-3.uel20.src.rpm">
          <filename>ntfs-3g-help-2022.5.17-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="ntfs-3g-devel" version="2022.5.17" release="3.uel20" epoch="2" arch="aarch64" src="ntfs-3g-2022.5.17-3.uel20.src.rpm">
          <filename>ntfs-3g-devel-2022.5.17-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="ntfs-3g-help" version="2022.5.17" release="3.uel20" epoch="2" arch="aarch64" src="ntfs-3g-2022.5.17-3.uel20.src.rpm">
          <filename>ntfs-3g-help-2022.5.17-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="ntfs-3g" version="2022.5.17" release="3.uel20" epoch="2" arch="aarch64" src="ntfs-3g-2022.5.17-3.uel20.src.rpm">
          <filename>ntfs-3g-2022.5.17-3.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20206</id>
    <title>Moderate: nano security update</title>
    <updated date="2024-06-20 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: nano security update</summary>
    <description> A vulnerability was found in GNU Nano that allows a possible privilege escalation through an insecure temporary file. If Nano is killed while editing, a file it saves to an emergency file with the permissions of the running user provides a window of opportunity for attackers to escalate privileges through a malicious symlink.(CVE-2024-5742)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-5742" type="cve" title="fix CVE-2024-5742" />
    </references>
    <pkglist>
      <collection>
        <package name="nano" version="8.0" release="1.uel20" epoch="0" arch="x86_64" src="nano-8.0-1.uel20.src.rpm">
          <filename>nano-8.0-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="nano" version="8.0" release="1.uel20" epoch="0" arch="aarch64" src="nano-8.0-1.uel20.src.rpm">
          <filename>nano-8.0-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="nano-help" version="8.0" release="1.uel20" epoch="0" arch="noarch" src="nano-8.0-1.uel20.src.rpm">
          <filename>nano-help-8.0-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20207</id>
    <title>Moderate: cups security update</title>
    <updated date="2024-06-27 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: cups security update</summary>
    <description> OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.8 and earlier, when starting the cupsd server with a Listen configuration item pointing to a symbolic link, the cupsd process can be caused to perform an arbitrary chmod of the provided argument, providing world-writable access to the target. Given that cupsd is often running as root, this can result in the change of permission of any user or system files to be world writable. Given the aforementioned Ubuntu AppArmor context, on such systems this vulnerability is limited to those files modifiable by the cupsd process. In that specific case it was found to be possible to turn the configuration of the Listen argument into full control over the cupsd.conf and cups-files.conf configuration files. By later setting the User and Group arguments in cups-files.conf, and printing with a printer configured by PPD with a `FoomaticRIPCommandLine` argument, arbitrary user and group (not root) command execution could be achieved, which can further be used on Ubuntu systems to achieve full root command execution. Commit ff1f8a623e090dee8a8aadf12a6a4b25efac143d contains a patch for the issue.
(CVE-2024-35235)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-35235" type="cve" title="fix CVE-2024-35235" />
    </references>
    <pkglist>
      <collection>
        <package name="cups" version="2.2.13" release="20.up4.uel20" epoch="1" arch="x86_64" src="cups-2.2.13-20.up4.uel20.src.rpm">
          <filename>cups-2.2.13-20.up4.uel20.x86_64.rpm</filename>
        </package>
        <package name="cups-devel" version="2.2.13" release="20.up4.uel20" epoch="1" arch="x86_64" src="cups-2.2.13-20.up4.uel20.src.rpm">
          <filename>cups-devel-2.2.13-20.up4.uel20.x86_64.rpm</filename>
        </package>
        <package name="cups-libs" version="2.2.13" release="20.up4.uel20" epoch="1" arch="x86_64" src="cups-2.2.13-20.up4.uel20.src.rpm">
          <filename>cups-libs-2.2.13-20.up4.uel20.x86_64.rpm</filename>
        </package>
        <package name="cups" version="2.2.13" release="20.up4.uel20" epoch="1" arch="aarch64" src="cups-2.2.13-20.up4.uel20.src.rpm">
          <filename>cups-2.2.13-20.up4.uel20.aarch64.rpm</filename>
        </package>
        <package name="cups-libs" version="2.2.13" release="20.up4.uel20" epoch="1" arch="aarch64" src="cups-2.2.13-20.up4.uel20.src.rpm">
          <filename>cups-libs-2.2.13-20.up4.uel20.aarch64.rpm</filename>
        </package>
        <package name="cups-help" version="2.2.13" release="20.up4.uel20" epoch="1" arch="noarch" src="cups-2.2.13-20.up4.uel20.src.rpm">
          <filename>cups-help-2.2.13-20.up4.uel20.noarch.rpm</filename>
        </package>
        <package name="cups-devel" version="2.2.13" release="20.up4.uel20" epoch="1" arch="aarch64" src="cups-2.2.13-20.up4.uel20.src.rpm">
          <filename>cups-devel-2.2.13-20.up4.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20208</id>
    <title>None: python-lxml security update</title>
    <updated date="2024-06-25 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: python-lxml security update</summary>
    <description> An XML External Entity (XXE) vulnerability in the ebookmeta.get_metadata function of lxml before v4.9.1 allows attackers to access sensitive information or cause a Denial of Service (DoS) via crafted XML input.(CVE-2024-37388)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-37388" type="cve" title="fix CVE-2024-37388" />
    </references>
    <pkglist>
      <collection>
        <package name="python2-lxml" version="4.5.2" release="9.uel20" epoch="0" arch="x86_64" src="python-lxml-4.5.2-9.uel20.src.rpm">
          <filename>python2-lxml-4.5.2-9.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-lxml" version="4.5.2" release="9.uel20" epoch="0" arch="x86_64" src="python-lxml-4.5.2-9.uel20.src.rpm">
          <filename>python3-lxml-4.5.2-9.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-lxml" version="4.5.2" release="9.uel20" epoch="0" arch="aarch64" src="python-lxml-4.5.2-9.uel20.src.rpm">
          <filename>python3-lxml-4.5.2-9.uel20.aarch64.rpm</filename>
        </package>
        <package name="python2-lxml" version="4.5.2" release="9.uel20" epoch="0" arch="aarch64" src="python-lxml-4.5.2-9.uel20.src.rpm">
          <filename>python2-lxml-4.5.2-9.uel20.aarch64.rpm</filename>
        </package>
        <package name="python-lxml-help" version="4.5.2" release="9.uel20" epoch="0" arch="noarch" src="python-lxml-4.5.2-9.uel20.src.rpm">
          <filename>python-lxml-help-4.5.2-9.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20209</id>
    <title>Moderate: php security update</title>
    <updated date="2024-06-25 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: php security update</summary>
    <description> In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs (FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly.(CVE-2024-5458)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-5458" type="cve" title="fix CVE-2024-5458" />
    </references>
    <pkglist>
      <collection>
        <package name="php" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-soap" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-soap-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-devel" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-devel-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-gd" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-gd-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-bcmath" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-bcmath-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-opcache" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-opcache-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-ldap" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-ldap-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-process" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-process-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-gmp" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-gmp-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-dbg" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-dbg-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-cli" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-cli-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-pdo" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-pdo-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-embedded" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-embedded-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-fpm" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-fpm-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-mbstring" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-mbstring-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-pgsql" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-pgsql-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-odbc" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-odbc-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-snmp" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-snmp-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-dba" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-dba-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-xml" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-xml-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-mysqlnd" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-mysqlnd-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-help" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-help-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-tidy" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-tidy-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-ffi" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-ffi-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-intl" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-intl-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-sodium" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-sodium-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-enchant" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-enchant-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-common" version="8.0.30" release="4.uel20" epoch="0" arch="x86_64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-common-8.0.30-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-fpm" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-fpm-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-cli" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-cli-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-process" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-process-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-mysqlnd" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-mysqlnd-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-intl" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-intl-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-common" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-common-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-enchant" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-enchant-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-pgsql" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-pgsql-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-ldap" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-ldap-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-soap" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-soap-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-dba" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-dba-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-xml" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-xml-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-odbc" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-odbc-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-sodium" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-sodium-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-devel" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-devel-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-gmp" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-gmp-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-mbstring" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-mbstring-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-dbg" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-dbg-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-pdo" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-pdo-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-embedded" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-embedded-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-gd" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-gd-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-tidy" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-tidy-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-opcache" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-opcache-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-snmp" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-snmp-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-help" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-help-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-bcmath" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-bcmath-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-ffi" version="8.0.30" release="4.uel20" epoch="0" arch="aarch64" src="php-8.0.30-4.uel20.src.rpm">
          <filename>php-ffi-8.0.30-4.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20210</id>
    <title>Moderate: python-scikit-learn security update</title>
    <updated date="2024-06-26 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: python-scikit-learn security update</summary>
    <description> A sensitive data leakage vulnerability was identified in scikit-learn's TfidfVectorizer, specifically in versions up to and including 1.4.1.post1, which was fixed in version 1.5.0. The vulnerability arises from the unexpected storage of all tokens present in the training data within the `stop_words_` attribute, rather than only storing the subset of tokens required for the TF-IDF technique to function. This behavior leads to the potential leakage of sensitive information, as the `stop_words_` attribute could contain tokens that were meant to be discarded and not stored, such as passwords or keys. The impact of this vulnerability varies based on the nature of the data being processed by the vectorizer.(CVE-2024-5206)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-5206" type="cve" title="fix CVE-2024-5206" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-scikit-learn" version="0.20.4" release="5.uel20" epoch="0" arch="x86_64" src="python-scikit-learn-0.20.4-5.uel20.src.rpm">
          <filename>python3-scikit-learn-0.20.4-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-scikit-learn" version="0.20.4" release="5.uel20" epoch="0" arch="aarch64" src="python-scikit-learn-0.20.4-5.uel20.src.rpm">
          <filename>python3-scikit-learn-0.20.4-5.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20211</id>
    <title>None: libvpx security update</title>
    <updated date="2024-06-20 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: libvpx security update</summary>
    <description> There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond(CVE-2024-5197)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-5197" type="cve" title="fix CVE-2024-5197" />
    </references>
    <pkglist>
      <collection>
        <package name="libvpx-devel" version="1.7.0" release="11.uel20" epoch="0" arch="x86_64" src="libvpx-1.7.0-11.uel20.src.rpm">
          <filename>libvpx-devel-1.7.0-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvpx" version="1.7.0" release="11.uel20" epoch="0" arch="x86_64" src="libvpx-1.7.0-11.uel20.src.rpm">
          <filename>libvpx-1.7.0-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="libvpx" version="1.7.0" release="11.uel20" epoch="0" arch="aarch64" src="libvpx-1.7.0-11.uel20.src.rpm">
          <filename>libvpx-1.7.0-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="libvpx-devel" version="1.7.0" release="11.uel20" epoch="0" arch="aarch64" src="libvpx-1.7.0-11.uel20.src.rpm">
          <filename>libvpx-devel-1.7.0-11.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20212</id>
    <title>Moderate: ruby security update</title>
    <updated date="2024-06-24 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: ruby security update</summary>
    <description> Rubygems.org is the Ruby community's gem hosting service. A Gem publisher can cause a Remote DoS when publishing a Gem. This is due to how Ruby reads the Manifest of Gem files when using Gem::Specification.from_yaml. from_yaml makes use of SafeYAML.load which allows YAML aliases inside the YAML-based metadata of a gem. YAML aliases allow for Denial of Service attacks with so-called `YAML-bombs` (comparable to Billion laughs attacks). This was patched. There is is no action required by users. This issue is also tracked as GHSL-2024-001 and was discovered by the GitHub security lab.(CVE-2024-35221)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-35221" type="cve" title="fix CVE-2024-35221" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-io-console" version="0.4.6" release="125.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>rubygem-io-console-0.4.6-125.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-bigdecimal" version="1.3.4" release="125.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>rubygem-bigdecimal-1.3.4-125.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-json" version="2.1.0" release="125.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>rubygem-json-2.1.0-125.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-psych" version="3.0.2" release="125.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>rubygem-psych-3.0.2-125.uel20.x86_64.rpm</filename>
        </package>
        <package name="ruby" version="2.5.8" release="125.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>ruby-2.5.8-125.uel20.x86_64.rpm</filename>
        </package>
        <package name="ruby-devel" version="2.5.8" release="125.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>ruby-devel-2.5.8-125.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-openssl" version="2.1.2" release="125.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>rubygem-openssl-2.1.2-125.uel20.x86_64.rpm</filename>
        </package>
        <package name="ruby-help" version="2.5.8" release="125.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>ruby-help-2.5.8-125.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-did_you_mean" version="1.2.0" release="125.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>rubygem-did_you_mean-1.2.0-125.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-net-telnet" version="0.1.1" release="125.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>rubygem-net-telnet-0.1.1-125.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-json" version="2.1.0" release="125.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>rubygem-json-2.1.0-125.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-rake" version="12.3.0" release="125.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>rubygem-rake-12.3.0-125.uel20.noarch.rpm</filename>
        </package>
        <package name="ruby-irb" version="2.5.8" release="125.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>ruby-irb-2.5.8-125.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-psych" version="3.0.2" release="125.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>rubygem-psych-3.0.2-125.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-bigdecimal" version="1.3.4" release="125.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>rubygem-bigdecimal-1.3.4-125.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-io-console" version="0.4.6" release="125.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>rubygem-io-console-0.4.6-125.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-power_assert" version="1.1.1" release="125.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>rubygem-power_assert-1.1.1-125.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygems-devel" version="2.7.6" release="125.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>rubygems-devel-2.7.6-125.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-xmlrpc" version="0.3.0" release="125.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>rubygem-xmlrpc-0.3.0-125.uel20.noarch.rpm</filename>
        </package>
        <package name="ruby" version="2.5.8" release="125.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>ruby-2.5.8-125.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-minitest" version="5.10.3" release="125.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>rubygem-minitest-5.10.3-125.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-rdoc" version="6.0.1.1" release="125.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>rubygem-rdoc-6.0.1.1-125.uel20.noarch.rpm</filename>
        </package>
        <package name="ruby-devel" version="2.5.8" release="125.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>ruby-devel-2.5.8-125.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-openssl" version="2.1.2" release="125.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>rubygem-openssl-2.1.2-125.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygems" version="2.7.6" release="125.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>rubygems-2.7.6-125.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-test-unit" version="3.2.7" release="125.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-125.uel20.src.rpm">
          <filename>rubygem-test-unit-3.2.7-125.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20213</id>
    <title>Moderate: libldb security update</title>
    <updated date="2024-06-20 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: libldb security update</summary>
    <description> MaxQueryDuration not honoured in Samba AD DC LDAP(CVE-2021-3670)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-3670" type="cve" title="fix CVE-2021-3670" />
    </references>
    <pkglist>
      <collection>
        <package name="libldb" version="2.0.12" release="5.uel20" epoch="0" arch="x86_64" src="libldb-2.0.12-5.uel20.src.rpm">
          <filename>libldb-2.0.12-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="python-ldb-devel-common" version="2.0.12" release="5.uel20" epoch="0" arch="x86_64" src="libldb-2.0.12-5.uel20.src.rpm">
          <filename>python-ldb-devel-common-2.0.12-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-ldb" version="2.0.12" release="5.uel20" epoch="0" arch="x86_64" src="libldb-2.0.12-5.uel20.src.rpm">
          <filename>python3-ldb-2.0.12-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-ldb-devel" version="2.0.12" release="5.uel20" epoch="0" arch="x86_64" src="libldb-2.0.12-5.uel20.src.rpm">
          <filename>python3-ldb-devel-2.0.12-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="libldb-devel" version="2.0.12" release="5.uel20" epoch="0" arch="x86_64" src="libldb-2.0.12-5.uel20.src.rpm">
          <filename>libldb-devel-2.0.12-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="libldb" version="2.0.12" release="5.uel20" epoch="0" arch="aarch64" src="libldb-2.0.12-5.uel20.src.rpm">
          <filename>libldb-2.0.12-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-ldb" version="2.0.12" release="5.uel20" epoch="0" arch="aarch64" src="libldb-2.0.12-5.uel20.src.rpm">
          <filename>python3-ldb-2.0.12-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="python-ldb-devel-common" version="2.0.12" release="5.uel20" epoch="0" arch="aarch64" src="libldb-2.0.12-5.uel20.src.rpm">
          <filename>python-ldb-devel-common-2.0.12-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="libldb-devel" version="2.0.12" release="5.uel20" epoch="0" arch="aarch64" src="libldb-2.0.12-5.uel20.src.rpm">
          <filename>libldb-devel-2.0.12-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-ldb-devel" version="2.0.12" release="5.uel20" epoch="0" arch="aarch64" src="libldb-2.0.12-5.uel20.src.rpm">
          <filename>python3-ldb-devel-2.0.12-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="libldb-help" version="2.0.12" release="5.uel20" epoch="0" arch="noarch" src="libldb-2.0.12-5.uel20.src.rpm">
          <filename>libldb-help-2.0.12-5.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20214</id>
    <title>Moderate: wireshark security update</title>
    <updated date="2024-06-28 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: wireshark security update</summary>
    <description> Memory handling issue in editcap could cause denial of service via crafted capture file(CVE-2024-4853)
 Use after free issue in editcap could cause denial of service via crafted capture file(CVE-2024-4855)
 MONGO and ZigBee TLV dissector infinite loops in Wireshark 4.2.0 to 4.2.4, 4.0.0 to 4.0.14, and 3.6.0 to 3.6.22 allow denial of service via packet injection or crafted capture file(CVE-2024-4854)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-4853" type="cve" title="fix CVE-2024-4853" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-4855" type="cve" title="fix CVE-2024-4855" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-4854" type="cve" title="fix CVE-2024-4854" />
    </references>
    <pkglist>
      <collection>
        <package name="wireshark-help" version="3.6.14" release="8.uel20" epoch="1" arch="x86_64" src="wireshark-3.6.14-8.uel20.src.rpm">
          <filename>wireshark-help-3.6.14-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="wireshark" version="3.6.14" release="8.uel20" epoch="1" arch="x86_64" src="wireshark-3.6.14-8.uel20.src.rpm">
          <filename>wireshark-3.6.14-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="wireshark-devel" version="3.6.14" release="8.uel20" epoch="1" arch="x86_64" src="wireshark-3.6.14-8.uel20.src.rpm">
          <filename>wireshark-devel-3.6.14-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="wireshark" version="3.6.14" release="8.uel20" epoch="1" arch="aarch64" src="wireshark-3.6.14-8.uel20.src.rpm">
          <filename>wireshark-3.6.14-8.uel20.aarch64.rpm</filename>
        </package>
        <package name="wireshark-devel" version="3.6.14" release="8.uel20" epoch="1" arch="aarch64" src="wireshark-3.6.14-8.uel20.src.rpm">
          <filename>wireshark-devel-3.6.14-8.uel20.aarch64.rpm</filename>
        </package>
        <package name="wireshark-help" version="3.6.14" release="8.uel20" epoch="1" arch="aarch64" src="wireshark-3.6.14-8.uel20.src.rpm">
          <filename>wireshark-help-3.6.14-8.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20215</id>
    <title>None: glib2 security update</title>
    <updated date="2024-07-01 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: glib2 security update</summary>
    <description> An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.(CVE-2024-34397)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-34397" type="cve" title="fix CVE-2024-34397" />
    </references>
    <pkglist>
      <collection>
        <package name="glib2-devel" version="2.68.4" release="6.uel20.03" epoch="0" arch="aarch64" src="glib2-2.68.4-6.uel20.03.src.rpm">
          <filename>glib2-devel-2.68.4-6.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="glib2" version="2.68.4" release="6.uel20.03" epoch="0" arch="aarch64" src="glib2-2.68.4-6.uel20.03.src.rpm">
          <filename>glib2-2.68.4-6.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="glib2-devel" version="2.68.4" release="6.uel20.03" epoch="0" arch="x86_64" src="glib2-2.68.4-6.uel20.03.src.rpm">
          <filename>glib2-devel-2.68.4-6.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="glib2-help" version="2.68.4" release="6.uel20.03" epoch="0" arch="noarch" src="glib2-2.68.4-6.uel20.03.src.rpm">
          <filename>glib2-help-2.68.4-6.uel20.03.noarch.rpm</filename>
        </package>
        <package name="glib2" version="2.68.4" release="6.uel20.03" epoch="0" arch="x86_64" src="glib2-2.68.4-6.uel20.03.src.rpm">
          <filename>glib2-2.68.4-6.uel20.03.x86_64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20216</id>
    <title>Critical: ffmpeg security update</title>
    <updated date="2024-07-08 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: ffmpeg security update</summary>
    <description> Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a local attacker to execute arbitrary code via the libavutil/imgutils.c:353:9 in image_copy_plane.(CVE-2023-51793)
 A null pointer dereference issue was discovered in 'FFmpeg' in decode_main_header() function of libavformat/nutdec.c file. The flaw occurs because the function lacks check of the return value of avformat_new_stream() and triggers the null pointer dereference error, causing an application to crash.(CVE-2022-3341)
 An issue was discovered in the FFmpeg package, where vp3_decode_frame in libavcodec/vp3.c lacks check of the return value of av_malloc() and will cause a null pointer dereference, impacting availability.(CVE-2022-3109)
 adts_decode_extradata in libavformat/adtsenc.c in FFmpeg 4.4 does not check the init_get_bits return value, which is a necessary step because the second argument to init_get_bits can be crafted.(CVE-2021-38171)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-51793" type="cve" title="fix CVE-2023-51793" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-3341" type="cve" title="fix CVE-2022-3341" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-3109" type="cve" title="fix CVE-2022-3109" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-38171" type="cve" title="fix CVE-2021-38171" />
    </references>
    <pkglist>
      <collection>
        <package name="ffmpeg-libs" version="4.2.4" release="12.uel20" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-12.uel20.src.rpm">
          <filename>ffmpeg-libs-4.2.4-12.uel20.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg" version="4.2.4" release="12.uel20" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-12.uel20.src.rpm">
          <filename>ffmpeg-4.2.4-12.uel20.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg-devel" version="4.2.4" release="12.uel20" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-12.uel20.src.rpm">
          <filename>ffmpeg-devel-4.2.4-12.uel20.x86_64.rpm</filename>
        </package>
        <package name="libavdevice" version="4.2.4" release="12.uel20" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-12.uel20.src.rpm">
          <filename>libavdevice-4.2.4-12.uel20.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg-libs" version="4.2.4" release="12.uel20" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-12.uel20.src.rpm">
          <filename>ffmpeg-libs-4.2.4-12.uel20.aarch64.rpm</filename>
        </package>
        <package name="ffmpeg" version="4.2.4" release="12.uel20" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-12.uel20.src.rpm">
          <filename>ffmpeg-4.2.4-12.uel20.aarch64.rpm</filename>
        </package>
        <package name="ffmpeg-devel" version="4.2.4" release="12.uel20" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-12.uel20.src.rpm">
          <filename>ffmpeg-devel-4.2.4-12.uel20.aarch64.rpm</filename>
        </package>
        <package name="libavdevice" version="4.2.4" release="12.uel20" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-12.uel20.src.rpm">
          <filename>libavdevice-4.2.4-12.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20217</id>
    <title>Important: ffmpeg security update</title>
    <updated date="2024-06-28 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: ffmpeg security update</summary>
    <description> Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a local attacker to execute arbitrary code via a floating point exception (FPE) error at libavfilter/vf_minterpolate.c:1078:60 in interpolate.(CVE-2023-51798)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-51798" type="cve" title="fix CVE-2023-51798" />
    </references>
    <pkglist>
      <collection>
        <package name="ffmpeg-libs" version="4.2.4" release="8.uel20" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-8.uel20.src.rpm">
          <filename>ffmpeg-libs-4.2.4-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg" version="4.2.4" release="8.uel20" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-8.uel20.src.rpm">
          <filename>ffmpeg-4.2.4-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="libavdevice" version="4.2.4" release="8.uel20" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-8.uel20.src.rpm">
          <filename>libavdevice-4.2.4-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg-devel" version="4.2.4" release="8.uel20" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-8.uel20.src.rpm">
          <filename>ffmpeg-devel-4.2.4-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg-devel" version="4.2.4" release="8.uel20" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-8.uel20.src.rpm">
          <filename>ffmpeg-devel-4.2.4-8.uel20.aarch64.rpm</filename>
        </package>
        <package name="ffmpeg-libs" version="4.2.4" release="8.uel20" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-8.uel20.src.rpm">
          <filename>ffmpeg-libs-4.2.4-8.uel20.aarch64.rpm</filename>
        </package>
        <package name="libavdevice" version="4.2.4" release="8.uel20" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-8.uel20.src.rpm">
          <filename>libavdevice-4.2.4-8.uel20.aarch64.rpm</filename>
        </package>
        <package name="ffmpeg" version="4.2.4" release="8.uel20" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-8.uel20.src.rpm">
          <filename>ffmpeg-4.2.4-8.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20218</id>
    <title>None: rubygem-actionview security update</title>
    <updated date="2024-06-26 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: rubygem-actionview security update</summary>
    <description> ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2023-23913)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-23913" type="cve" title="fix CVE-2023-23913" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-actionview-doc" version="5.2.4.4" release="2.uel20" epoch="0" arch="noarch" src="rubygem-actionview-5.2.4.4-2.uel20.src.rpm">
          <filename>rubygem-actionview-doc-5.2.4.4-2.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-actionview" version="5.2.4.4" release="2.uel20" epoch="0" arch="noarch" src="rubygem-actionview-5.2.4.4-2.uel20.src.rpm">
          <filename>rubygem-actionview-5.2.4.4-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20219</id>
    <title>Important: rust security update</title>
    <updated date="2024-07-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: rust security update</summary>
    <description> Cargo is a package manager for the rust programming language. After a package is downloaded, Cargo extracts its source code in the ~/.cargo folder on disk, making it available to the Rust projects it builds. To record when an extraction is successful, Cargo writes "ok" to the .cargo-ok file at the root of the extracted source code once it extracted all the files. It was discovered that Cargo allowed packages to contain a .cargo-ok symbolic link, which Cargo would extract. Then, when Cargo attempted to write "ok" into .cargo-ok, it would actually replace the first two bytes of the file the symlink pointed to with ok. This would allow an attacker to corrupt one file on the machine using Cargo to extract the package. Note that by design Cargo allows code execution at build time, due to build scripts and procedural macros. The vulnerabilities in this advisory allow performing a subset of the possible damage in a harder to track down way. Your dependencies must still be trusted if you want to be protected from attacks, as it's possible to perform the same attacks with build scripts and procedural macros. The vulnerability is present in all versions of Cargo. Rust 1.64, to be released on September 22nd, will include a fix for it. Since the vulnerability is just a more limited way to accomplish what a malicious build scripts or procedural macros can do, we decided not to publish Rust point releases backporting the security fix. Patch files are available for Rust 1.63.0 are available in the wg-security-response repository for people building their own toolchain.
Mitigations We recommend users of alternate registries to exercise care in which package they download, by only including trusted dependencies in their projects. Please note that even with these vulnerabilities fixed, by design Cargo allows arbitrary code execution at build time thanks to build scripts and procedural macros: a malicious dependency will be able to cause damage regardless of these vulnerabilities. crates.io implemented server-side checks to reject these kinds of packages years ago, and there are no packages on crates.io exploiting these vulnerabilities. crates.io users still need to exercise care in choosing their dependencies though, as remote code execution is allowed by design there as well.(CVE-2022-36113)
 Cargo is a package manager for the rust programming language. It was discovered that Cargo did not limit the amount of data extracted from compressed archives. An attacker could upload to an alternate registry a specially crafted package that extracts way more data than its size (also known as a "zip bomb"), exhausting the disk space on the machine using Cargo to download the package. Note that by design Cargo allows code execution at build time, due to build scripts and procedural macros. The vulnerabilities in this advisory allow performing a subset of the possible damage in a harder to track down way. Your dependencies must still be trusted if you want to be protected from attacks, as it's possible to perform the same attacks with build scripts and procedural macros. The vulnerability is present in all versions of Cargo. Rust 1.64, to be released on September 22nd, will include a fix for it. Since the vulnerability is just a more limited way to accomplish what a malicious build scripts or procedural macros can do, we decided not to publish Rust point releases backporting the security fix. Patch files are available for Rust 1.63.0 are available in the wg-security-response repository for people building their own toolchain. We recommend users of alternate registries to excercise care in which package they download, by only including trusted dependencies in their projects. Please note that even with these vulnerabilities fixed, by design Cargo allows arbitrary code execution at build time thanks to build scripts and procedural macros: a malicious dependency will be able to cause damage regardless of these vulnerabilities. crates.io implemented server-side checks to reject these kinds of packages years ago, and there are no packages on crates.io exploiting these vulnerabilities. crates.io users still need to excercise care in choosing their dependencies though, as the same concerns about build scripts and procedural macros apply here.(CVE-2022-36114)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-36113" type="cve" title="fix CVE-2022-36113" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-36114" type="cve" title="fix CVE-2022-36114" />
    </references>
    <pkglist>
      <collection>
        <package name="clippy" version="1.58.1" release="1.uel20.06" epoch="0" arch="x86_64" src="rust-1.58.1-1.uel20.06.src.rpm">
          <filename>clippy-1.58.1-1.uel20.06.x86_64.rpm</filename>
        </package>
        <package name="rust-help" version="1.58.1" release="1.uel20.06" epoch="0" arch="x86_64" src="rust-1.58.1-1.uel20.06.src.rpm">
          <filename>rust-help-1.58.1-1.uel20.06.x86_64.rpm</filename>
        </package>
        <package name="rls" version="1.58.1" release="1.uel20.06" epoch="0" arch="x86_64" src="rust-1.58.1-1.uel20.06.src.rpm">
          <filename>rls-1.58.1-1.uel20.06.x86_64.rpm</filename>
        </package>
        <package name="cargo" version="1.58.1" release="1.uel20.06" epoch="0" arch="x86_64" src="rust-1.58.1-1.uel20.06.src.rpm">
          <filename>cargo-1.58.1-1.uel20.06.x86_64.rpm</filename>
        </package>
        <package name="rustfmt" version="1.58.1" release="1.uel20.06" epoch="0" arch="x86_64" src="rust-1.58.1-1.uel20.06.src.rpm">
          <filename>rustfmt-1.58.1-1.uel20.06.x86_64.rpm</filename>
        </package>
        <package name="rust-analysis" version="1.58.1" release="1.uel20.06" epoch="0" arch="x86_64" src="rust-1.58.1-1.uel20.06.src.rpm">
          <filename>rust-analysis-1.58.1-1.uel20.06.x86_64.rpm</filename>
        </package>
        <package name="rust" version="1.58.1" release="1.uel20.06" epoch="0" arch="x86_64" src="rust-1.58.1-1.uel20.06.src.rpm">
          <filename>rust-1.58.1-1.uel20.06.x86_64.rpm</filename>
        </package>
        <package name="rust-std-static" version="1.58.1" release="1.uel20.06" epoch="0" arch="x86_64" src="rust-1.58.1-1.uel20.06.src.rpm">
          <filename>rust-std-static-1.58.1-1.uel20.06.x86_64.rpm</filename>
        </package>
        <package name="rust-lldb" version="1.58.1" release="1.uel20.06" epoch="0" arch="noarch" src="rust-1.58.1-1.uel20.06.src.rpm">
          <filename>rust-lldb-1.58.1-1.uel20.06.noarch.rpm</filename>
        </package>
        <package name="rust-src" version="1.58.1" release="1.uel20.06" epoch="0" arch="noarch" src="rust-1.58.1-1.uel20.06.src.rpm">
          <filename>rust-src-1.58.1-1.uel20.06.noarch.rpm</filename>
        </package>
        <package name="rust-help" version="1.58.1" release="1.uel20.06" epoch="0" arch="aarch64" src="rust-1.58.1-1.uel20.06.src.rpm">
          <filename>rust-help-1.58.1-1.uel20.06.aarch64.rpm</filename>
        </package>
        <package name="rust-std-static" version="1.58.1" release="1.uel20.06" epoch="0" arch="aarch64" src="rust-1.58.1-1.uel20.06.src.rpm">
          <filename>rust-std-static-1.58.1-1.uel20.06.aarch64.rpm</filename>
        </package>
        <package name="rust-analysis" version="1.58.1" release="1.uel20.06" epoch="0" arch="aarch64" src="rust-1.58.1-1.uel20.06.src.rpm">
          <filename>rust-analysis-1.58.1-1.uel20.06.aarch64.rpm</filename>
        </package>
        <package name="rls" version="1.58.1" release="1.uel20.06" epoch="0" arch="aarch64" src="rust-1.58.1-1.uel20.06.src.rpm">
          <filename>rls-1.58.1-1.uel20.06.aarch64.rpm</filename>
        </package>
        <package name="cargo" version="1.58.1" release="1.uel20.06" epoch="0" arch="aarch64" src="rust-1.58.1-1.uel20.06.src.rpm">
          <filename>cargo-1.58.1-1.uel20.06.aarch64.rpm</filename>
        </package>
        <package name="rustfmt" version="1.58.1" release="1.uel20.06" epoch="0" arch="aarch64" src="rust-1.58.1-1.uel20.06.src.rpm">
          <filename>rustfmt-1.58.1-1.uel20.06.aarch64.rpm</filename>
        </package>
        <package name="rust-debugger-common" version="1.58.1" release="1.uel20.06" epoch="0" arch="noarch" src="rust-1.58.1-1.uel20.06.src.rpm">
          <filename>rust-debugger-common-1.58.1-1.uel20.06.noarch.rpm</filename>
        </package>
        <package name="rust" version="1.58.1" release="1.uel20.06" epoch="0" arch="aarch64" src="rust-1.58.1-1.uel20.06.src.rpm">
          <filename>rust-1.58.1-1.uel20.06.aarch64.rpm</filename>
        </package>
        <package name="clippy" version="1.58.1" release="1.uel20.06" epoch="0" arch="aarch64" src="rust-1.58.1-1.uel20.06.src.rpm">
          <filename>clippy-1.58.1-1.uel20.06.aarch64.rpm</filename>
        </package>
        <package name="rust-gdb" version="1.58.1" release="1.uel20.06" epoch="0" arch="noarch" src="rust-1.58.1-1.uel20.06.src.rpm">
          <filename>rust-gdb-1.58.1-1.uel20.06.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20220</id>
    <title>None: rubygem-activesupport security update</title>
    <updated date="2024-07-03 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: rubygem-activesupport security update</summary>
    <description> ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2023-28120)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-28120" type="cve" title="fix CVE-2023-28120" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-activesupport-doc" version="5.2.4.4" release="5.uel20" epoch="2" arch="noarch" src="rubygem-activesupport-5.2.4.4-5.uel20.src.rpm">
          <filename>rubygem-activesupport-doc-5.2.4.4-5.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-activesupport" version="5.2.4.4" release="5.uel20" epoch="2" arch="noarch" src="rubygem-activesupport-5.2.4.4-5.uel20.src.rpm">
          <filename>rubygem-activesupport-5.2.4.4-5.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20221</id>
    <title>Important: rubygem-rack security update</title>
    <updated date="2024-07-08 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: rubygem-rack security update</summary>
    <description> A denial of service vulnerability in the multipart parsing component of Rack fixed in 2.0.9.2, 2.1.4.2, 2.2.4.1 and 3.0.0.1 could allow an attacker tocraft input that can cause RFC2183 multipart boundary parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted.(CVE-2022-44572)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-44572" type="cve" title="fix CVE-2022-44572" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-rack-help" version="2.2.3.1" release="3.uel20" epoch="1" arch="noarch" src="rubygem-rack-2.2.3.1-3.uel20.src.rpm">
          <filename>rubygem-rack-help-2.2.3.1-3.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-rack" version="2.2.3.1" release="3.uel20" epoch="1" arch="noarch" src="rubygem-rack-2.2.3.1-3.uel20.src.rpm">
          <filename>rubygem-rack-2.2.3.1-3.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20222</id>
    <title>Moderate: wpa_supplicant security update</title>
    <updated date="2024-06-27 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: wpa_supplicant security update</summary>
    <description> The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.(CVE-2023-52160)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-52160" type="cve" title="fix CVE-2023-52160" />
    </references>
    <pkglist>
      <collection>
        <package name="wpa_supplicant-help" version="2.6" release="30.up2.uel20" epoch="1" arch="x86_64" src="wpa_supplicant-2.6-30.up2.uel20.src.rpm">
          <filename>wpa_supplicant-help-2.6-30.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="wpa_supplicant" version="2.6" release="30.up2.uel20" epoch="1" arch="x86_64" src="wpa_supplicant-2.6-30.up2.uel20.src.rpm">
          <filename>wpa_supplicant-2.6-30.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="wpa_supplicant-gui" version="2.6" release="30.up2.uel20" epoch="1" arch="x86_64" src="wpa_supplicant-2.6-30.up2.uel20.src.rpm">
          <filename>wpa_supplicant-gui-2.6-30.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="wpa_supplicant" version="2.6" release="30.up2.uel20" epoch="1" arch="aarch64" src="wpa_supplicant-2.6-30.up2.uel20.src.rpm">
          <filename>wpa_supplicant-2.6-30.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="wpa_supplicant-help" version="2.6" release="30.up2.uel20" epoch="1" arch="aarch64" src="wpa_supplicant-2.6-30.up2.uel20.src.rpm">
          <filename>wpa_supplicant-help-2.6-30.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="wpa_supplicant-gui" version="2.6" release="30.up2.uel20" epoch="1" arch="aarch64" src="wpa_supplicant-2.6-30.up2.uel20.src.rpm">
          <filename>wpa_supplicant-gui-2.6-30.up2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20223</id>
    <title>Important: gdk-pixbuf2 security update</title>
    <updated date="2024-07-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: gdk-pixbuf2 security update</summary>
    <description> In GNOME GdkPixbuf (aka gdk-pixbuf) through 2.42.10, the ANI (Windows animated cursor) decoder encounters heap memory corruption (in ani_load_chunk in io-ani.c) when parsing chunks in a crafted .ani file. A crafted file could allow an attacker to overwrite heap metadata, leading to a denial of service or code execution attack. This occurs in gdk_pixbuf_set_option() in gdk-pixbuf.c.(CVE-2022-48622)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-48622" type="cve" title="fix CVE-2022-48622" />
    </references>
    <pkglist>
      <collection>
        <package name="gdk-pixbuf2" version="2.40.0" release="5.uel20.01" epoch="0" arch="x86_64" src="gdk-pixbuf2-2.40.0-5.uel20.01.src.rpm">
          <filename>gdk-pixbuf2-2.40.0-5.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="gdk-pixbuf2-devel" version="2.40.0" release="5.uel20.01" epoch="0" arch="x86_64" src="gdk-pixbuf2-2.40.0-5.uel20.01.src.rpm">
          <filename>gdk-pixbuf2-devel-2.40.0-5.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="gdk-pixbuf2-devel" version="2.40.0" release="5.uel20.01" epoch="0" arch="aarch64" src="gdk-pixbuf2-2.40.0-5.uel20.01.src.rpm">
          <filename>gdk-pixbuf2-devel-2.40.0-5.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="gdk-pixbuf2" version="2.40.0" release="5.uel20.01" epoch="0" arch="aarch64" src="gdk-pixbuf2-2.40.0-5.uel20.01.src.rpm">
          <filename>gdk-pixbuf2-2.40.0-5.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="gdk-pixbuf2-help" version="2.40.0" release="5.uel20.01" epoch="0" arch="noarch" src="gdk-pixbuf2-2.40.0-5.uel20.01.src.rpm">
          <filename>gdk-pixbuf2-help-2.40.0-5.uel20.01.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20224</id>
    <title>Moderate: busybox security update</title>
    <updated date="2024-06-24 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: busybox security update</summary>
    <description> A use-after-free vulnerability was discovered in xasprintf function in xfuncs_printf.c:344 in BusyBox v.1.36.1.(CVE-2023-42363)
 A use-after-free vulnerability was discovered in BusyBox v.1.36.1 via a crafted awk pattern in the awk.c copyvar function.(CVE-2023-42365)
 A heap-buffer-overflow was discovered in BusyBox v.1.36.1 in the next_token function at awk.c:1159.(CVE-2023-42366)
 A use-after-free vulnerability in BusyBox v.1.36.1 allows attackers to cause a denial of service via a crafted awk pattern in the awk.c evaluate function.(CVE-2023-42364)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-42363" type="cve" title="fix CVE-2023-42363" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-42365" type="cve" title="fix CVE-2023-42365" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-42366" type="cve" title="fix CVE-2023-42366" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-42364" type="cve" title="fix CVE-2023-42364" />
    </references>
    <pkglist>
      <collection>
        <package name="busybox-petitboot" version="1.31.1" release="20.uel20" epoch="1" arch="x86_64" src="busybox-1.31.1-20.uel20.src.rpm">
          <filename>busybox-petitboot-1.31.1-20.uel20.x86_64.rpm</filename>
        </package>
        <package name="busybox-help" version="1.31.1" release="20.uel20" epoch="1" arch="x86_64" src="busybox-1.31.1-20.uel20.src.rpm">
          <filename>busybox-help-1.31.1-20.uel20.x86_64.rpm</filename>
        </package>
        <package name="busybox" version="1.31.1" release="20.uel20" epoch="1" arch="x86_64" src="busybox-1.31.1-20.uel20.src.rpm">
          <filename>busybox-1.31.1-20.uel20.x86_64.rpm</filename>
        </package>
        <package name="busybox-petitboot" version="1.31.1" release="20.uel20" epoch="1" arch="aarch64" src="busybox-1.31.1-20.uel20.src.rpm">
          <filename>busybox-petitboot-1.31.1-20.uel20.aarch64.rpm</filename>
        </package>
        <package name="busybox" version="1.31.1" release="20.uel20" epoch="1" arch="aarch64" src="busybox-1.31.1-20.uel20.src.rpm">
          <filename>busybox-1.31.1-20.uel20.aarch64.rpm</filename>
        </package>
        <package name="busybox-help" version="1.31.1" release="20.uel20" epoch="1" arch="aarch64" src="busybox-1.31.1-20.uel20.src.rpm">
          <filename>busybox-help-1.31.1-20.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20225</id>
    <title>Important: giflib security update</title>
    <updated date="2024-06-26 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: giflib security update</summary>
    <description> Buffer Overflow vulnerability in GifLib Project GifLib v.5.2.1 allows a local attacker to obtain sensitive information via the DumpSCreen2RGB function in gif2rgb.c(CVE-2023-48161)
 An issue was discovered in giflib through 5.1.4. DumpScreen2RGB in gif2rgb.c has a heap-based buffer over-read.(CVE-2020-23922)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-48161" type="cve" title="fix CVE-2023-48161" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-23922" type="cve" title="fix CVE-2020-23922" />
    </references>
    <pkglist>
      <collection>
        <package name="giflib-devel" version="5.2.2" release="1.uel20" epoch="0" arch="x86_64" src="giflib-5.2.2-1.uel20.src.rpm">
          <filename>giflib-devel-5.2.2-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="giflib" version="5.2.2" release="1.uel20" epoch="0" arch="x86_64" src="giflib-5.2.2-1.uel20.src.rpm">
          <filename>giflib-5.2.2-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="giflib-utils" version="5.2.2" release="1.uel20" epoch="0" arch="x86_64" src="giflib-5.2.2-1.uel20.src.rpm">
          <filename>giflib-utils-5.2.2-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="giflib-utils" version="5.2.2" release="1.uel20" epoch="0" arch="aarch64" src="giflib-5.2.2-1.uel20.src.rpm">
          <filename>giflib-utils-5.2.2-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="giflib" version="5.2.2" release="1.uel20" epoch="0" arch="aarch64" src="giflib-5.2.2-1.uel20.src.rpm">
          <filename>giflib-5.2.2-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="giflib-devel" version="5.2.2" release="1.uel20" epoch="0" arch="aarch64" src="giflib-5.2.2-1.uel20.src.rpm">
          <filename>giflib-devel-5.2.2-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="giflib-help" version="5.2.2" release="1.uel20" epoch="0" arch="noarch" src="giflib-5.2.2-1.uel20.src.rpm">
          <filename>giflib-help-5.2.2-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20226</id>
    <title>Moderate: nasm security update</title>
    <updated date="2024-07-01 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: nasm security update</summary>
    <description> A stack-use-after-scope issue discovered in expand_mmac_params function in preproc.c in nasm before 2.15.04 allows remote attackers to cause a denial of service via crafted asm file.(CVE-2020-21686)
 Buffer Overflow vulnerability in scan function in stdscan.c in nasm 2.15rc0 allows remote attackers to cause a denial of service via crafted asm file.(CVE-2020-21687)
 Buffer Overflow vulnerability in hash_findi function in hashtbl.c in nasm 2.15rc0 allows remote attackers to cause a denial of service via crafted asm file.(CVE-2020-21685)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-21686" type="cve" title="fix CVE-2020-21686" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-21687" type="cve" title="fix CVE-2020-21687" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-21685" type="cve" title="fix CVE-2020-21685" />
    </references>
    <pkglist>
      <collection>
        <package name="nasm" version="2.15.05" release="1.uel20" epoch="0" arch="x86_64" src="nasm-2.15.05-1.uel20.src.rpm">
          <filename>nasm-2.15.05-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="nasm-help" version="2.15.05" release="1.uel20" epoch="0" arch="noarch" src="nasm-2.15.05-1.uel20.src.rpm">
          <filename>nasm-help-2.15.05-1.uel20.noarch.rpm</filename>
        </package>
        <package name="nasm" version="2.15.05" release="1.uel20" epoch="0" arch="aarch64" src="nasm-2.15.05-1.uel20.src.rpm">
          <filename>nasm-2.15.05-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20227</id>
    <title>Moderate: ffmpeg security update</title>
    <updated date="2024-07-08 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: ffmpeg security update</summary>
    <description> Integer overflow vulnerability in av_timecode_make_string in libavutil/timecode.c in FFmpeg version 4.3.2, allows local attackers to cause a denial of service (DoS) via crafted .mov file.(CVE-2021-28429)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-28429" type="cve" title="fix CVE-2021-28429" />
    </references>
    <pkglist>
      <collection>
        <package name="ffmpeg-devel" version="4.2.4" release="13.uel20" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-13.uel20.src.rpm">
          <filename>ffmpeg-devel-4.2.4-13.uel20.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg-libs" version="4.2.4" release="13.uel20" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-13.uel20.src.rpm">
          <filename>ffmpeg-libs-4.2.4-13.uel20.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg" version="4.2.4" release="13.uel20" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-13.uel20.src.rpm">
          <filename>ffmpeg-4.2.4-13.uel20.x86_64.rpm</filename>
        </package>
        <package name="libavdevice" version="4.2.4" release="13.uel20" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-13.uel20.src.rpm">
          <filename>libavdevice-4.2.4-13.uel20.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg-libs" version="4.2.4" release="13.uel20" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-13.uel20.src.rpm">
          <filename>ffmpeg-libs-4.2.4-13.uel20.aarch64.rpm</filename>
        </package>
        <package name="libavdevice" version="4.2.4" release="13.uel20" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-13.uel20.src.rpm">
          <filename>libavdevice-4.2.4-13.uel20.aarch64.rpm</filename>
        </package>
        <package name="ffmpeg" version="4.2.4" release="13.uel20" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-13.uel20.src.rpm">
          <filename>ffmpeg-4.2.4-13.uel20.aarch64.rpm</filename>
        </package>
        <package name="ffmpeg-devel" version="4.2.4" release="13.uel20" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-13.uel20.src.rpm">
          <filename>ffmpeg-devel-4.2.4-13.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20228</id>
    <title>Moderate: samba security update</title>
    <updated date="2024-07-04 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: samba security update</summary>
    <description> An information leak vulnerability was discovered in Samba's LDAP server. Due to missing access control checks, an authenticated but unprivileged attacker could discover the names and preserved attributes of deleted objects in the LDAP store.(CVE-2018-14628)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2018-14628" type="cve" title="fix CVE-2018-14628" />
    </references>
    <pkglist>
      <collection>
        <package name="samba-winbind-krb5-locator" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-winbind-krb5-locator-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="samba-krb5-printing" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-krb5-printing-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libwbclient-devel" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>libwbclient-devel-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="samba-vfs-glusterfs" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-vfs-glusterfs-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="samba-winbind-modules" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-winbind-modules-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="samba-winbind-clients" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-winbind-clients-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libwbclient" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>libwbclient-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libsmbclient-devel" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>libsmbclient-devel-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libsmbclient" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>libsmbclient-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="samba-dc-bind-dlz" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-dc-bind-dlz-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="samba-libs" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-libs-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="samba-common" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-common-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="samba-help" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-help-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="samba-common-tools" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-common-tools-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="samba-devel" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-devel-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="samba-winbind" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-winbind-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="samba-dc" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-dc-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-samba-dc" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>python3-samba-dc-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="samba-client" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-client-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="samba" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="ctdb" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>ctdb-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="ctdb-tests" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>ctdb-tests-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="samba-test" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-test-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-samba" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>python3-samba-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="samba-dc-provision" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-dc-provision-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-samba-test" version="4.11.12" release="35.up1.uel20" epoch="0" arch="x86_64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>python3-samba-test-4.11.12-35.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libsmbclient-devel" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>libsmbclient-devel-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="samba-krb5-printing" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-krb5-printing-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="samba-client" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-client-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-samba" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>python3-samba-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="samba-winbind-modules" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-winbind-modules-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="samba-dc-bind-dlz" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-dc-bind-dlz-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="ctdb" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>ctdb-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="samba-winbind" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-winbind-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="samba-winbind-clients" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-winbind-clients-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="samba-devel" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-devel-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libwbclient" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>libwbclient-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="samba-dc" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-dc-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="ctdb-tests" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>ctdb-tests-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libwbclient-devel" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>libwbclient-devel-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="samba-test" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-test-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="samba-help" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-help-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="samba-pidl" version="4.11.12" release="35.up1.uel20" epoch="0" arch="noarch" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-pidl-4.11.12-35.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="samba-common" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-common-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="samba-libs" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-libs-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="samba-dc-provision" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-dc-provision-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libsmbclient" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>libsmbclient-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="samba" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="samba-common-tools" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-common-tools-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="samba-winbind-krb5-locator" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>samba-winbind-krb5-locator-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-samba-dc" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>python3-samba-dc-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-samba-test" version="4.11.12" release="35.up1.uel20" epoch="0" arch="aarch64" src="samba-4.11.12-35.up1.uel20.src.rpm">
          <filename>python3-samba-test-4.11.12-35.up1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20229</id>
    <title>Important: rubygem-activesupport security update</title>
    <updated date="2024-06-26 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: rubygem-activesupport security update</summary>
    <description> Action Pack is a framework for handling and responding to web requests. Under certain circumstances response bodies will not be closed. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests.This has been fixed in Rails 7.0.2.1, 6.1.4.5, 6.0.4.5, and 5.2.6.1. Upgrading is highly recommended, but to work around this problem a middleware described in GHSA-wh98-p28r-vrc9 can be used.(CVE-2022-23633)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-23633" type="cve" title="fix CVE-2022-23633" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-activesupport-doc" version="5.2.4.4" release="4.uel20" epoch="2" arch="noarch" src="rubygem-activesupport-5.2.4.4-4.uel20.src.rpm">
          <filename>rubygem-activesupport-doc-5.2.4.4-4.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-activesupport" version="5.2.4.4" release="4.uel20" epoch="2" arch="noarch" src="rubygem-activesupport-5.2.4.4-4.uel20.src.rpm">
          <filename>rubygem-activesupport-5.2.4.4-4.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20230</id>
    <title>Important: gtk2 security update</title>
    <updated date="2024-07-24 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: gtk2 security update</summary>
    <description> A flaw was found in the GTK library. Under certain conditions, it is possible for a library to be injected into a GTK application from the current working directory.(CVE-2024-6655)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-6655" type="cve" title="fix CVE-2024-6655" />
    </references>
    <pkglist>
      <collection>
        <package name="gtk2-help" version="2.24.32" release="11.uel20" epoch="0" arch="x86_64" src="gtk2-2.24.32-11.uel20.src.rpm">
          <filename>gtk2-help-2.24.32-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="gtk2-immodule-xim" version="2.24.32" release="11.uel20" epoch="0" arch="x86_64" src="gtk2-2.24.32-11.uel20.src.rpm">
          <filename>gtk2-immodule-xim-2.24.32-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="gtk2" version="2.24.32" release="11.uel20" epoch="0" arch="x86_64" src="gtk2-2.24.32-11.uel20.src.rpm">
          <filename>gtk2-2.24.32-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="gtk2-devel" version="2.24.32" release="11.uel20" epoch="0" arch="x86_64" src="gtk2-2.24.32-11.uel20.src.rpm">
          <filename>gtk2-devel-2.24.32-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="gtk2-help" version="2.24.32" release="11.uel20" epoch="0" arch="aarch64" src="gtk2-2.24.32-11.uel20.src.rpm">
          <filename>gtk2-help-2.24.32-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="gtk2-devel" version="2.24.32" release="11.uel20" epoch="0" arch="aarch64" src="gtk2-2.24.32-11.uel20.src.rpm">
          <filename>gtk2-devel-2.24.32-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="gtk2" version="2.24.32" release="11.uel20" epoch="0" arch="aarch64" src="gtk2-2.24.32-11.uel20.src.rpm">
          <filename>gtk2-2.24.32-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="gtk2-immodule-xim" version="2.24.32" release="11.uel20" epoch="0" arch="aarch64" src="gtk2-2.24.32-11.uel20.src.rpm">
          <filename>gtk2-immodule-xim-2.24.32-11.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20231</id>
    <title>Important: gtk3 security update</title>
    <updated date="2024-07-24 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: gtk3 security update</summary>
    <description> A flaw was found in the GTK library. Under certain conditions, it is possible for a library to be injected into a GTK application from the current working directory.(CVE-2024-6655)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-6655" type="cve" title="fix CVE-2024-6655" />
    </references>
    <pkglist>
      <collection>
        <package name="gtk3-devel" version="3.24.21" release="6.uel20" epoch="0" arch="x86_64" src="gtk3-3.24.21-6.uel20.src.rpm">
          <filename>gtk3-devel-3.24.21-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="gtk3-help" version="3.24.21" release="6.uel20" epoch="0" arch="x86_64" src="gtk3-3.24.21-6.uel20.src.rpm">
          <filename>gtk3-help-3.24.21-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="gtk3" version="3.24.21" release="6.uel20" epoch="0" arch="x86_64" src="gtk3-3.24.21-6.uel20.src.rpm">
          <filename>gtk3-3.24.21-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="gtk3-immodule-xim" version="3.24.21" release="6.uel20" epoch="0" arch="x86_64" src="gtk3-3.24.21-6.uel20.src.rpm">
          <filename>gtk3-immodule-xim-3.24.21-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="gtk3-devel" version="3.24.21" release="6.uel20" epoch="0" arch="aarch64" src="gtk3-3.24.21-6.uel20.src.rpm">
          <filename>gtk3-devel-3.24.21-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="gtk3-help" version="3.24.21" release="6.uel20" epoch="0" arch="aarch64" src="gtk3-3.24.21-6.uel20.src.rpm">
          <filename>gtk3-help-3.24.21-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="gtk3-immodule-xim" version="3.24.21" release="6.uel20" epoch="0" arch="aarch64" src="gtk3-3.24.21-6.uel20.src.rpm">
          <filename>gtk3-immodule-xim-3.24.21-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="gtk3" version="3.24.21" release="6.uel20" epoch="0" arch="aarch64" src="gtk3-3.24.21-6.uel20.src.rpm">
          <filename>gtk3-3.24.21-6.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20232</id>
    <title>None: freeradius security update</title>
    <updated date="2024-07-24 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: freeradius security update</summary>
    <description> RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.(CVE-2024-3596)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-3596" type="cve" title="fix CVE-2024-3596" />
    </references>
    <pkglist>
      <collection>
        <package name="freeradius-krb5" version="3.0.15" release="28.uel20" epoch="0" arch="x86_64" src="freeradius-3.0.15-28.uel20.src.rpm">
          <filename>freeradius-krb5-3.0.15-28.uel20.x86_64.rpm</filename>
        </package>
        <package name="python2-freeradius" version="3.0.15" release="28.uel20" epoch="0" arch="x86_64" src="freeradius-3.0.15-28.uel20.src.rpm">
          <filename>python2-freeradius-3.0.15-28.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeradius-perl" version="3.0.15" release="28.uel20" epoch="0" arch="x86_64" src="freeradius-3.0.15-28.uel20.src.rpm">
          <filename>freeradius-perl-3.0.15-28.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeradius-help" version="3.0.15" release="28.uel20" epoch="0" arch="x86_64" src="freeradius-3.0.15-28.uel20.src.rpm">
          <filename>freeradius-help-3.0.15-28.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeradius-sqlite" version="3.0.15" release="28.uel20" epoch="0" arch="x86_64" src="freeradius-3.0.15-28.uel20.src.rpm">
          <filename>freeradius-sqlite-3.0.15-28.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeradius-mysql" version="3.0.15" release="28.uel20" epoch="0" arch="x86_64" src="freeradius-3.0.15-28.uel20.src.rpm">
          <filename>freeradius-mysql-3.0.15-28.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeradius-postgresql" version="3.0.15" release="28.uel20" epoch="0" arch="x86_64" src="freeradius-3.0.15-28.uel20.src.rpm">
          <filename>freeradius-postgresql-3.0.15-28.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeradius-ldap" version="3.0.15" release="28.uel20" epoch="0" arch="x86_64" src="freeradius-3.0.15-28.uel20.src.rpm">
          <filename>freeradius-ldap-3.0.15-28.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeradius-devel" version="3.0.15" release="28.uel20" epoch="0" arch="x86_64" src="freeradius-3.0.15-28.uel20.src.rpm">
          <filename>freeradius-devel-3.0.15-28.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeradius-utils" version="3.0.15" release="28.uel20" epoch="0" arch="x86_64" src="freeradius-3.0.15-28.uel20.src.rpm">
          <filename>freeradius-utils-3.0.15-28.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeradius" version="3.0.15" release="28.uel20" epoch="0" arch="x86_64" src="freeradius-3.0.15-28.uel20.src.rpm">
          <filename>freeradius-3.0.15-28.uel20.x86_64.rpm</filename>
        </package>
        <package name="freeradius" version="3.0.15" release="28.uel20" epoch="0" arch="aarch64" src="freeradius-3.0.15-28.uel20.src.rpm">
          <filename>freeradius-3.0.15-28.uel20.aarch64.rpm</filename>
        </package>
        <package name="freeradius-utils" version="3.0.15" release="28.uel20" epoch="0" arch="aarch64" src="freeradius-3.0.15-28.uel20.src.rpm">
          <filename>freeradius-utils-3.0.15-28.uel20.aarch64.rpm</filename>
        </package>
        <package name="freeradius-postgresql" version="3.0.15" release="28.uel20" epoch="0" arch="aarch64" src="freeradius-3.0.15-28.uel20.src.rpm">
          <filename>freeradius-postgresql-3.0.15-28.uel20.aarch64.rpm</filename>
        </package>
        <package name="python2-freeradius" version="3.0.15" release="28.uel20" epoch="0" arch="aarch64" src="freeradius-3.0.15-28.uel20.src.rpm">
          <filename>python2-freeradius-3.0.15-28.uel20.aarch64.rpm</filename>
        </package>
        <package name="freeradius-perl" version="3.0.15" release="28.uel20" epoch="0" arch="aarch64" src="freeradius-3.0.15-28.uel20.src.rpm">
          <filename>freeradius-perl-3.0.15-28.uel20.aarch64.rpm</filename>
        </package>
        <package name="freeradius-devel" version="3.0.15" release="28.uel20" epoch="0" arch="aarch64" src="freeradius-3.0.15-28.uel20.src.rpm">
          <filename>freeradius-devel-3.0.15-28.uel20.aarch64.rpm</filename>
        </package>
        <package name="freeradius-ldap" version="3.0.15" release="28.uel20" epoch="0" arch="aarch64" src="freeradius-3.0.15-28.uel20.src.rpm">
          <filename>freeradius-ldap-3.0.15-28.uel20.aarch64.rpm</filename>
        </package>
        <package name="freeradius-sqlite" version="3.0.15" release="28.uel20" epoch="0" arch="aarch64" src="freeradius-3.0.15-28.uel20.src.rpm">
          <filename>freeradius-sqlite-3.0.15-28.uel20.aarch64.rpm</filename>
        </package>
        <package name="freeradius-help" version="3.0.15" release="28.uel20" epoch="0" arch="aarch64" src="freeradius-3.0.15-28.uel20.src.rpm">
          <filename>freeradius-help-3.0.15-28.uel20.aarch64.rpm</filename>
        </package>
        <package name="freeradius-krb5" version="3.0.15" release="28.uel20" epoch="0" arch="aarch64" src="freeradius-3.0.15-28.uel20.src.rpm">
          <filename>freeradius-krb5-3.0.15-28.uel20.aarch64.rpm</filename>
        </package>
        <package name="freeradius-mysql" version="3.0.15" release="28.uel20" epoch="0" arch="aarch64" src="freeradius-3.0.15-28.uel20.src.rpm">
          <filename>freeradius-mysql-3.0.15-28.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20233</id>
    <title>Important: rapidjson security update</title>
    <updated date="2024-07-16 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: rapidjson security update</summary>
    <description> Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.(CVE-2024-38517)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-38517" type="cve" title="fix CVE-2024-38517" />
    </references>
    <pkglist>
      <collection>
        <package name="rapidjson-help" version="1.1.0" release="12.uel20" epoch="0" arch="noarch" src="rapidjson-1.1.0-12.uel20.src.rpm">
          <filename>rapidjson-help-1.1.0-12.uel20.noarch.rpm</filename>
        </package>
        <package name="rapidjson-devel" version="1.1.0" release="12.uel20" epoch="0" arch="noarch" src="rapidjson-1.1.0-12.uel20.src.rpm">
          <filename>rapidjson-devel-1.1.0-12.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20234</id>
    <title>Moderate: openjpeg2 security update</title>
    <updated date="2024-07-16 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: openjpeg2 security update</summary>
    <description> A vulnerability was found in OpenJPEG similar to CVE-2019-6988. This flaw allows an attacker to bypass existing protections and cause an application crash through a maliciously crafted file.(CVE-2023-39328)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-39328" type="cve" title="fix CVE-2023-39328" />
    </references>
    <pkglist>
      <collection>
        <package name="openjpeg2" version="2.3.1" release="12.up2.uel20" epoch="0" arch="x86_64" src="openjpeg2-2.3.1-12.up2.uel20.src.rpm">
          <filename>openjpeg2-2.3.1-12.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="openjpeg2-help" version="2.3.1" release="12.up2.uel20" epoch="0" arch="x86_64" src="openjpeg2-2.3.1-12.up2.uel20.src.rpm">
          <filename>openjpeg2-help-2.3.1-12.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="openjpeg2-devel" version="2.3.1" release="12.up2.uel20" epoch="0" arch="x86_64" src="openjpeg2-2.3.1-12.up2.uel20.src.rpm">
          <filename>openjpeg2-devel-2.3.1-12.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="openjpeg2-help" version="2.3.1" release="12.up2.uel20" epoch="0" arch="aarch64" src="openjpeg2-2.3.1-12.up2.uel20.src.rpm">
          <filename>openjpeg2-help-2.3.1-12.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="openjpeg2-devel" version="2.3.1" release="12.up2.uel20" epoch="0" arch="aarch64" src="openjpeg2-2.3.1-12.up2.uel20.src.rpm">
          <filename>openjpeg2-devel-2.3.1-12.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="openjpeg2" version="2.3.1" release="12.up2.uel20" epoch="0" arch="aarch64" src="openjpeg2-2.3.1-12.up2.uel20.src.rpm">
          <filename>openjpeg2-2.3.1-12.up2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20235</id>
    <title>None: openvpn security update</title>
    <updated date="2024-07-15 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: openvpn security update</summary>
    <description> OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session(CVE-2024-28882)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-28882" type="cve" title="fix CVE-2024-28882" />
    </references>
    <pkglist>
      <collection>
        <package name="openvpn" version="2.4.8" release="9.uel20" epoch="0" arch="x86_64" src="openvpn-2.4.8-9.uel20.src.rpm">
          <filename>openvpn-2.4.8-9.uel20.x86_64.rpm</filename>
        </package>
        <package name="openvpn-devel" version="2.4.8" release="9.uel20" epoch="0" arch="x86_64" src="openvpn-2.4.8-9.uel20.src.rpm">
          <filename>openvpn-devel-2.4.8-9.uel20.x86_64.rpm</filename>
        </package>
        <package name="openvpn-devel" version="2.4.8" release="9.uel20" epoch="0" arch="aarch64" src="openvpn-2.4.8-9.uel20.src.rpm">
          <filename>openvpn-devel-2.4.8-9.uel20.aarch64.rpm</filename>
        </package>
        <package name="openvpn" version="2.4.8" release="9.uel20" epoch="0" arch="aarch64" src="openvpn-2.4.8-9.uel20.src.rpm">
          <filename>openvpn-2.4.8-9.uel20.aarch64.rpm</filename>
        </package>
        <package name="openvpn-help" version="2.4.8" release="9.uel20" epoch="0" arch="noarch" src="openvpn-2.4.8-9.uel20.src.rpm">
          <filename>openvpn-help-2.4.8-9.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20236</id>
    <title>Moderate: mongo-c-driver security update</title>
    <updated date="2024-07-17 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: mongo-c-driver security update</summary>
    <description> The bson_string_append function in MongoDB C Driver may be vulnerable to a buffer overflow where the function might attempt to allocate too small of buffer and may lead to memory corruption of neighbouring heap memory. This issue affects libbson versions prior to 1.27.1(CVE-2024-6383)
 The bson_strfreev function in the MongoDB C driver library may be susceptible to an integer overflow where the function will try to free memory at a negative offset. This may result in memory corruption. This issue affected libbson versions prior to 1.26.2(CVE-2024-6381)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-6383" type="cve" title="fix CVE-2024-6383" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-6381" type="cve" title="fix CVE-2024-6381" />
    </references>
    <pkglist>
      <collection>
        <package name="mongo-c-driver-help" version="1.27.4" release="1.uel20" epoch="0" arch="x86_64" src="mongo-c-driver-1.27.4-1.uel20.src.rpm">
          <filename>mongo-c-driver-help-1.27.4-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libbson-devel" version="1.27.4" release="1.uel20" epoch="0" arch="x86_64" src="mongo-c-driver-1.27.4-1.uel20.src.rpm">
          <filename>libbson-devel-1.27.4-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mongo-c-driver" version="1.27.4" release="1.uel20" epoch="0" arch="x86_64" src="mongo-c-driver-1.27.4-1.uel20.src.rpm">
          <filename>mongo-c-driver-1.27.4-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mongo-c-driver-devel" version="1.27.4" release="1.uel20" epoch="0" arch="x86_64" src="mongo-c-driver-1.27.4-1.uel20.src.rpm">
          <filename>mongo-c-driver-devel-1.27.4-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="libbson" version="1.27.4" release="1.uel20" epoch="0" arch="x86_64" src="mongo-c-driver-1.27.4-1.uel20.src.rpm">
          <filename>libbson-1.27.4-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mongo-c-driver-help" version="1.27.4" release="1.uel20" epoch="0" arch="aarch64" src="mongo-c-driver-1.27.4-1.uel20.src.rpm">
          <filename>mongo-c-driver-help-1.27.4-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libbson-devel" version="1.27.4" release="1.uel20" epoch="0" arch="aarch64" src="mongo-c-driver-1.27.4-1.uel20.src.rpm">
          <filename>libbson-devel-1.27.4-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mongo-c-driver" version="1.27.4" release="1.uel20" epoch="0" arch="aarch64" src="mongo-c-driver-1.27.4-1.uel20.src.rpm">
          <filename>mongo-c-driver-1.27.4-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mongo-c-driver-devel" version="1.27.4" release="1.uel20" epoch="0" arch="aarch64" src="mongo-c-driver-1.27.4-1.uel20.src.rpm">
          <filename>mongo-c-driver-devel-1.27.4-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="libbson" version="1.27.4" release="1.uel20" epoch="0" arch="aarch64" src="mongo-c-driver-1.27.4-1.uel20.src.rpm">
          <filename>libbson-1.27.4-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20237</id>
    <title>Critical: edk2 security update</title>
    <updated date="2024-07-15 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: edk2 security update</summary>
    <description> Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an
empty supported client protocols buffer may cause a crash or memory contents to
be sent to the peer.

Impact summary: A buffer overread can have a range of potential consequences
such as unexpected application beahviour or a crash. In particular this issue
could result in up to 255 bytes of arbitrary private data from memory being sent
to the peer leading to a loss of confidentiality. However, only applications
that directly call the SSL_select_next_proto function with a 0 length list of
supported client protocols are affected by this issue. This would normally never
be a valid scenario and is typically not under attacker control but may occur by
accident in the case of a configuration or programming error in the calling
application.

The OpenSSL API function SSL_select_next_proto is typically used by TLS
applications that support ALPN (Application Layer Protocol Negotiation) or NPN
(Next Protocol Negotiation). NPN is older, was never standardised and
is deprecated in favour of ALPN. We believe that ALPN is significantly more
widely deployed than NPN. The SSL_select_next_proto function accepts a list of
protocols from the server and a list of protocols from the client and returns
the first protocol that appears in the server list that also appears in the
client list. In the case of no overlap between the two lists it returns the
first item in the client list. In either case it will signal whether an overlap
between the two lists was found. In the case where SSL_select_next_proto is
called with a zero length client list it fails to notice this condition and
returns the memory immediately following the client list pointer (and reports
that there was no overlap in the lists).

This function is typically called from a server side application callback for
ALPN or a client side application callback for NPN. In the case of ALPN the list
of protocols supplied by the client is guaranteed by libssl to never be zero in
length. The list of server protocols comes from the application and should never
normally be expected to be of zero length. In this case if the
SSL_select_next_proto function has been called as expected (with the list
supplied by the client passed in the client/client_len parameters), then the
application will not be vulnerable to this issue. If the application has
accidentally been configured with a zero length server list, and has
accidentally passed that zero length server list in the client/client_len
parameters, and has additionally failed to correctly handle a "no overlap"
response (which would normally result in a handshake failure in ALPN) then it
will be vulnerable to this problem.

In the case of NPN, the protocol permits the client to opportunistically select
a protocol when there is no overlap. OpenSSL returns the first client protocol
in the no overlap case in support of this. The list of client protocols comes
from the application and should never normally be expected to be of zero length.
However if the SSL_select_next_proto function is accidentally called with a
client_len of 0 then an invalid memory pointer will be returned instead. If the
application uses this output as the opportunistic protocol then the loss of
confidentiality will occur.

This issue has been assessed as Low severity because applications are most
likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not
widely used. It also requires an application configuration or programming error.
Finally, this issue would not typically be under attacker control making active
exploitation unlikely.

The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.

Due to the low severity of this issue we are not issuing new releases of
OpenSSL at this time. The fix will be included in the next releases when they
become available.(CVE-2024-5535)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-5535" type="cve" title="fix CVE-2024-5535" />
    </references>
    <pkglist>
      <collection>
        <package name="edk2-devel" version="202002" release="23.uel20.06" epoch="0" arch="aarch64" src="edk2-202002-23.uel20.06.src.rpm">
          <filename>edk2-devel-202002-23.uel20.06.aarch64.rpm</filename>
        </package>
        <package name="edk2-aarch64" version="202002" release="23.uel20.06" epoch="0" arch="noarch" src="edk2-202002-23.uel20.06.src.rpm">
          <filename>edk2-aarch64-202002-23.uel20.06.noarch.rpm</filename>
        </package>
        <package name="edk2-devel" version="202002" release="23.uel20.06" epoch="0" arch="x86_64" src="edk2-202002-23.uel20.06.src.rpm">
          <filename>edk2-devel-202002-23.uel20.06.x86_64.rpm</filename>
        </package>
        <package name="python3-edk2-devel" version="202002" release="23.uel20.06" epoch="0" arch="noarch" src="edk2-202002-23.uel20.06.src.rpm">
          <filename>python3-edk2-devel-202002-23.uel20.06.noarch.rpm</filename>
        </package>
        <package name="edk2-ovmf" version="202002" release="23.uel20.06" epoch="0" arch="noarch" src="edk2-202002-23.uel20.06.src.rpm">
          <filename>edk2-ovmf-202002-23.uel20.06.noarch.rpm</filename>
        </package>
        <package name="edk2-help" version="202002" release="23.uel20.06" epoch="0" arch="noarch" src="edk2-202002-23.uel20.06.src.rpm">
          <filename>edk2-help-202002-23.uel20.06.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20238</id>
    <title>Critical: httpd security update</title>
    <updated date="2024-07-16 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: httpd security update</summary>
    <description> A regression in the core of Apache HTTP Server 2.4.60 ignores some use of the legacy content-type based configuration of handlers.   "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted.

Users are recommended to upgrade to version 2.4.61, which fixes this issue.(CVE-2024-39884)
 Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL's to be handled by mod_proxy.
Users are recommended to upgrade to version 2.4.60, which fixes this issue.(CVE-2024-39573)
 null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request.
Users are recommended to upgrade to version 2.4.60, which fixes this issue.(CVE-2024-38477)
 Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests.
Users are recommended to upgrade to version 2.4.60, which fixes this issue.(CVE-2024-38473)
 Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in
directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI.

Users are recommended to upgrade to version 2.4.60, which fixes this issue.

Some RewriteRules that capture and substitute unsafely will now fail unless rewrite flag "UnsafeAllow3F" is specified.(CVE-2024-38474)
 Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. 

Substitutions in server context that use a backreferences or variables as the first segment of the substitution are affected.  Some unsafe RewiteRules will be broken by this change and the rewrite flag "UnsafePrefixStat" can be used to opt back in once ensuring the substitution is appropriately constrained.(CVE-2024-38475)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-39884" type="cve" title="fix CVE-2024-39884" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-39573" type="cve" title="fix CVE-2024-39573" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-38477" type="cve" title="fix CVE-2024-38477" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-38473" type="cve" title="fix CVE-2024-38473" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-38474" type="cve" title="fix CVE-2024-38474" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-38475" type="cve" title="fix CVE-2024-38475" />
    </references>
    <pkglist>
      <collection>
        <package name="mod_proxy_html" version="2.4.43" release="25.up1.uel20" epoch="1" arch="x86_64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>mod_proxy_html-2.4.43-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mod_ldap" version="2.4.43" release="25.up1.uel20" epoch="0" arch="x86_64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>mod_ldap-2.4.43-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="httpd" version="2.4.43" release="25.up1.uel20" epoch="0" arch="x86_64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>httpd-2.4.43-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="httpd-devel" version="2.4.43" release="25.up1.uel20" epoch="0" arch="x86_64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>httpd-devel-2.4.43-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mod_md" version="2.4.43" release="25.up1.uel20" epoch="0" arch="x86_64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>mod_md-2.4.43-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mod_session" version="2.4.43" release="25.up1.uel20" epoch="0" arch="x86_64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>mod_session-2.4.43-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mod_ssl" version="2.4.43" release="25.up1.uel20" epoch="1" arch="x86_64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>mod_ssl-2.4.43-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="httpd-tools" version="2.4.43" release="25.up1.uel20" epoch="0" arch="x86_64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>httpd-tools-2.4.43-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="httpd" version="2.4.43" release="25.up1.uel20" epoch="0" arch="aarch64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>httpd-2.4.43-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mod_ssl" version="2.4.43" release="25.up1.uel20" epoch="1" arch="aarch64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>mod_ssl-2.4.43-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mod_proxy_html" version="2.4.43" release="25.up1.uel20" epoch="1" arch="aarch64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>mod_proxy_html-2.4.43-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="httpd-help" version="2.4.43" release="25.up1.uel20" epoch="0" arch="noarch" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>httpd-help-2.4.43-25.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="mod_ldap" version="2.4.43" release="25.up1.uel20" epoch="0" arch="aarch64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>mod_ldap-2.4.43-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="httpd-tools" version="2.4.43" release="25.up1.uel20" epoch="0" arch="aarch64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>httpd-tools-2.4.43-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="httpd-devel" version="2.4.43" release="25.up1.uel20" epoch="0" arch="aarch64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>httpd-devel-2.4.43-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mod_session" version="2.4.43" release="25.up1.uel20" epoch="0" arch="aarch64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>mod_session-2.4.43-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="httpd-filesystem" version="2.4.43" release="25.up1.uel20" epoch="0" arch="noarch" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>httpd-filesystem-2.4.43-25.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="mod_md" version="2.4.43" release="25.up1.uel20" epoch="0" arch="aarch64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>mod_md-2.4.43-25.up1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20239</id>
    <title>Important: qemu security update</title>
    <updated date="2024-07-16 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: qemu security update</summary>
    <description> A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.(CVE-2024-4467)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-4467" type="cve" title="fix CVE-2024-4467" />
    </references>
    <pkglist>
      <collection>
        <package name="qemu" version="4.1.0" release="85.up8.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-85.up8.uel20.src.rpm">
          <filename>qemu-4.1.0-85.up8.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-img" version="4.1.0" release="85.up8.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-85.up8.uel20.src.rpm">
          <filename>qemu-img-4.1.0-85.up8.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-guest-agent" version="4.1.0" release="85.up8.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-85.up8.uel20.src.rpm">
          <filename>qemu-guest-agent-4.1.0-85.up8.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-block-curl" version="4.1.0" release="85.up8.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-85.up8.uel20.src.rpm">
          <filename>qemu-block-curl-4.1.0-85.up8.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-seabios" version="4.1.0" release="85.up8.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-85.up8.uel20.src.rpm">
          <filename>qemu-seabios-4.1.0-85.up8.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-block-ssh" version="4.1.0" release="85.up8.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-85.up8.uel20.src.rpm">
          <filename>qemu-block-ssh-4.1.0-85.up8.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-block-iscsi" version="4.1.0" release="85.up8.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-85.up8.uel20.src.rpm">
          <filename>qemu-block-iscsi-4.1.0-85.up8.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-block-rbd" version="4.1.0" release="85.up8.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-85.up8.uel20.src.rpm">
          <filename>qemu-block-rbd-4.1.0-85.up8.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-block-curl" version="4.1.0" release="85.up8.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-85.up8.uel20.src.rpm">
          <filename>qemu-block-curl-4.1.0-85.up8.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu-block-ssh" version="4.1.0" release="85.up8.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-85.up8.uel20.src.rpm">
          <filename>qemu-block-ssh-4.1.0-85.up8.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu-img" version="4.1.0" release="85.up8.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-85.up8.uel20.src.rpm">
          <filename>qemu-img-4.1.0-85.up8.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu" version="4.1.0" release="85.up8.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-85.up8.uel20.src.rpm">
          <filename>qemu-4.1.0-85.up8.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu-block-rbd" version="4.1.0" release="85.up8.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-85.up8.uel20.src.rpm">
          <filename>qemu-block-rbd-4.1.0-85.up8.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu-block-iscsi" version="4.1.0" release="85.up8.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-85.up8.uel20.src.rpm">
          <filename>qemu-block-iscsi-4.1.0-85.up8.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu-guest-agent" version="4.1.0" release="85.up8.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-85.up8.uel20.src.rpm">
          <filename>qemu-guest-agent-4.1.0-85.up8.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu-help" version="4.1.0" release="85.up8.uel20" epoch="10" arch="noarch" src="qemu-4.1.0-85.up8.uel20.src.rpm">
          <filename>qemu-help-4.1.0-85.up8.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20240</id>
    <title>Moderate: rubygem-rack security update</title>
    <updated date="2024-07-15 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: rubygem-rack security update</summary>
    <description> Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior to version 3.1.5, Regular Expression Denial of Service (ReDoS) vulnerability exists in the `Rack::Request::Helpers` module when parsing HTTP Accept headers. This vulnerability can be exploited by an attacker sending specially crafted `Accept-Encoding` or `Accept-Language` headers, causing the server to spend excessive time processing the request and leading to a Denial of Service (DoS). The fix for CVE-2024-26146 was not applied to the main branch and thus while the issue was fixed for the Rack v3.0 release series, it was not fixed in the v3.1 release series until v3.1.5. Users of versions on the 3.1 branch should upgrade to version 3.1.5 to receive the fix.(CVE-2024-39316)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-39316" type="cve" title="fix CVE-2024-39316" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-rack-help" version="2.2.3.1" release="5.uel20.02" epoch="1" arch="noarch" src="rubygem-rack-2.2.3.1-5.uel20.02.src.rpm">
          <filename>rubygem-rack-help-2.2.3.1-5.uel20.02.noarch.rpm</filename>
        </package>
        <package name="rubygem-rack" version="2.2.3.1" release="5.uel20.02" epoch="1" arch="noarch" src="rubygem-rack-2.2.3.1-5.uel20.02.src.rpm">
          <filename>rubygem-rack-2.2.3.1-5.uel20.02.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20241</id>
    <title>Moderate: ffmpeg security update</title>
    <updated date="2024-07-16 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: ffmpeg security update</summary>
    <description> FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a negative-size-param bug at libavcodec/mpegvideo_enc.c:1216:21 in load_input_picture in FFmpeg7.0(CVE-2024-32230)
 Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a local attacker to execute arbitrary code via the libavfilter/af_stereowiden.c:120:69.(CVE-2023-51794)
 An integer overflow vulnerability was found in FFmpeg versions before 4.4.2 and before 5.0.1 in g729_parse() in llibavcodec/g729_parser.c when processing a specially crafted file.(CVE-2022-1475)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-32230" type="cve" title="fix CVE-2024-32230" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-51794" type="cve" title="fix CVE-2023-51794" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-1475" type="cve" title="fix CVE-2022-1475" />
    </references>
    <pkglist>
      <collection>
        <package name="ffmpeg-devel" version="4.2.4" release="16.uel20" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-16.uel20.src.rpm">
          <filename>ffmpeg-devel-4.2.4-16.uel20.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg-libs" version="4.2.4" release="16.uel20" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-16.uel20.src.rpm">
          <filename>ffmpeg-libs-4.2.4-16.uel20.x86_64.rpm</filename>
        </package>
        <package name="libavdevice" version="4.2.4" release="16.uel20" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-16.uel20.src.rpm">
          <filename>libavdevice-4.2.4-16.uel20.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg" version="4.2.4" release="16.uel20" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-16.uel20.src.rpm">
          <filename>ffmpeg-4.2.4-16.uel20.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg-libs" version="4.2.4" release="16.uel20" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-16.uel20.src.rpm">
          <filename>ffmpeg-libs-4.2.4-16.uel20.aarch64.rpm</filename>
        </package>
        <package name="libavdevice" version="4.2.4" release="16.uel20" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-16.uel20.src.rpm">
          <filename>libavdevice-4.2.4-16.uel20.aarch64.rpm</filename>
        </package>
        <package name="ffmpeg" version="4.2.4" release="16.uel20" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-16.uel20.src.rpm">
          <filename>ffmpeg-4.2.4-16.uel20.aarch64.rpm</filename>
        </package>
        <package name="ffmpeg-devel" version="4.2.4" release="16.uel20" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-16.uel20.src.rpm">
          <filename>ffmpeg-devel-4.2.4-16.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20242</id>
    <title>Critical: openssl security update</title>
    <updated date="2024-07-15 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: openssl security update</summary>
    <description> Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an
empty supported client protocols buffer may cause a crash or memory contents to
be sent to the peer.

Impact summary: A buffer overread can have a range of potential consequences
such as unexpected application beahviour or a crash. In particular this issue
could result in up to 255 bytes of arbitrary private data from memory being sent
to the peer leading to a loss of confidentiality. However, only applications
that directly call the SSL_select_next_proto function with a 0 length list of
supported client protocols are affected by this issue. This would normally never
be a valid scenario and is typically not under attacker control but may occur by
accident in the case of a configuration or programming error in the calling
application.

The OpenSSL API function SSL_select_next_proto is typically used by TLS
applications that support ALPN (Application Layer Protocol Negotiation) or NPN
(Next Protocol Negotiation). NPN is older, was never standardised and
is deprecated in favour of ALPN. We believe that ALPN is significantly more
widely deployed than NPN. The SSL_select_next_proto function accepts a list of
protocols from the server and a list of protocols from the client and returns
the first protocol that appears in the server list that also appears in the
client list. In the case of no overlap between the two lists it returns the
first item in the client list. In either case it will signal whether an overlap
between the two lists was found. In the case where SSL_select_next_proto is
called with a zero length client list it fails to notice this condition and
returns the memory immediately following the client list pointer (and reports
that there was no overlap in the lists).

This function is typically called from a server side application callback for
ALPN or a client side application callback for NPN. In the case of ALPN the list
of protocols supplied by the client is guaranteed by libssl to never be zero in
length. The list of server protocols comes from the application and should never
normally be expected to be of zero length. In this case if the
SSL_select_next_proto function has been called as expected (with the list
supplied by the client passed in the client/client_len parameters), then the
application will not be vulnerable to this issue. If the application has
accidentally been configured with a zero length server list, and has
accidentally passed that zero length server list in the client/client_len
parameters, and has additionally failed to correctly handle a "no overlap"
response (which would normally result in a handshake failure in ALPN) then it
will be vulnerable to this problem.

In the case of NPN, the protocol permits the client to opportunistically select
a protocol when there is no overlap. OpenSSL returns the first client protocol
in the no overlap case in support of this. The list of client protocols comes
from the application and should never normally be expected to be of zero length.
However if the SSL_select_next_proto function is accidentally called with a
client_len of 0 then an invalid memory pointer will be returned instead. If the
application uses this output as the opportunistic protocol then the loss of
confidentiality will occur.

This issue has been assessed as Low severity because applications are most
likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not
widely used. It also requires an application configuration or programming error.
Finally, this issue would not typically be under attacker control making active
exploitation unlikely.

The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.

Due to the low severity of this issue we are not issuing new releases of
OpenSSL at this time. The fix will be included in the next releases when they
become available.(CVE-2024-5535)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-5535" type="cve" title="fix CVE-2024-5535" />
    </references>
    <pkglist>
      <collection>
        <package name="openssl" version="1.1.1k" release="9.uel20.22.04" epoch="1" arch="x86_64" src="openssl-1.1.1k-9.uel20.22.04.src.rpm">
          <filename>openssl-1.1.1k-9.uel20.22.04.x86_64.rpm</filename>
        </package>
        <package name="openssl-devel" version="1.1.1k" release="9.uel20.22.04" epoch="1" arch="x86_64" src="openssl-1.1.1k-9.uel20.22.04.src.rpm">
          <filename>openssl-devel-1.1.1k-9.uel20.22.04.x86_64.rpm</filename>
        </package>
        <package name="openssl-libs" version="1.1.1k" release="9.uel20.22.04" epoch="1" arch="x86_64" src="openssl-1.1.1k-9.uel20.22.04.src.rpm">
          <filename>openssl-libs-1.1.1k-9.uel20.22.04.x86_64.rpm</filename>
        </package>
        <package name="openssl-help" version="1.1.1k" release="9.uel20.22.04" epoch="1" arch="noarch" src="openssl-1.1.1k-9.uel20.22.04.src.rpm">
          <filename>openssl-help-1.1.1k-9.uel20.22.04.noarch.rpm</filename>
        </package>
        <package name="openssl-libs" version="1.1.1k" release="9.uel20.22.04" epoch="1" arch="aarch64" src="openssl-1.1.1k-9.uel20.22.04.src.rpm">
          <filename>openssl-libs-1.1.1k-9.uel20.22.04.aarch64.rpm</filename>
        </package>
        <package name="openssl" version="1.1.1k" release="9.uel20.22.04" epoch="1" arch="aarch64" src="openssl-1.1.1k-9.uel20.22.04.src.rpm">
          <filename>openssl-1.1.1k-9.uel20.22.04.aarch64.rpm</filename>
        </package>
        <package name="openssl-devel" version="1.1.1k" release="9.uel20.22.04" epoch="1" arch="aarch64" src="openssl-1.1.1k-9.uel20.22.04.src.rpm">
          <filename>openssl-devel-1.1.1k-9.uel20.22.04.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20243</id>
    <title>Important: python-pip security update</title>
    <updated date="2024-07-22 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: python-pip security update</summary>
    <description>  urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the `Proxy-Authorization` HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects. Because this is a highly unlikely scenario, we believe the severity of this vulnerability is low for almost all users. Out of an abundance of caution urllib3 will automatically strip the `Proxy-Authorization` header during cross-origin redirects to avoid the small chance that users are doing this on accident. Users should use urllib3's proxy support or disable automatic redirects to achieve safe processing of the `Proxy-Authorization` header, but we still decided to strip the header by default in order to further protect users who aren't using the correct approach. We believe the number of usages affected by this advisory is low. It requires all of the following to be true to be exploited: 1. Setting the `Proxy-Authorization` header without using urllib3's built-in proxy support. 2. Not disabling HTTP redirects. 3. Either not using an HTTPS origin server or for the proxy or target origin to redirect to a malicious origin. Users are advised to update to either version 1.26.19 or version 2.2.2. Users unable to upgrade may use the `Proxy-Authorization` header with urllib3's `ProxyManager`, disable HTTP redirects using `redirects=False` when sending requests, or not user the `Proxy-Authorization` header as mitigations.(CVE-2024-37891)
 urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn't exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren't expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.
(CVE-2023-45803)
 urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.(CVE-2023-43804)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-37891" type="cve" title="fix CVE-2024-37891" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-45803" type="cve" title="fix CVE-2023-45803" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-43804" type="cve" title="fix CVE-2023-43804" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-pip" version="20.2.2" release="9.uel20" epoch="0" arch="noarch" src="python-pip-20.2.2-9.uel20.src.rpm">
          <filename>python3-pip-20.2.2-9.uel20.noarch.rpm</filename>
        </package>
        <package name="python2-pip" version="20.2.2" release="9.uel20" epoch="0" arch="noarch" src="python-pip-20.2.2-9.uel20.src.rpm">
          <filename>python2-pip-20.2.2-9.uel20.noarch.rpm</filename>
        </package>
        <package name="python-pip-help" version="20.2.2" release="9.uel20" epoch="0" arch="noarch" src="python-pip-20.2.2-9.uel20.src.rpm">
          <filename>python-pip-help-20.2.2-9.uel20.noarch.rpm</filename>
        </package>
        <package name="python-pip-wheel" version="20.2.2" release="9.uel20" epoch="0" arch="noarch" src="python-pip-20.2.2-9.uel20.src.rpm">
          <filename>python-pip-wheel-20.2.2-9.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20244</id>
    <title>Moderate: vte291 security update</title>
    <updated date="2024-07-16 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: vte291 security update</summary>
    <description> GNOME VTE before 0.76.3 allows an attacker to cause a denial of service (memory consumption) via a window resize escape sequence, a related issue to CVE-2000-0476.(CVE-2024-37535)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-37535" type="cve" title="fix CVE-2024-37535" />
    </references>
    <pkglist>
      <collection>
        <package name="vte291-devel" version="0.54.1" release="6.uel20" epoch="0" arch="x86_64" src="vte291-0.54.1-6.uel20.src.rpm">
          <filename>vte291-devel-0.54.1-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="vte291" version="0.54.1" release="6.uel20" epoch="0" arch="x86_64" src="vte291-0.54.1-6.uel20.src.rpm">
          <filename>vte291-0.54.1-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="vte291" version="0.54.1" release="6.uel20" epoch="0" arch="aarch64" src="vte291-0.54.1-6.uel20.src.rpm">
          <filename>vte291-0.54.1-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="vte291-devel" version="0.54.1" release="6.uel20" epoch="0" arch="aarch64" src="vte291-0.54.1-6.uel20.src.rpm">
          <filename>vte291-devel-0.54.1-6.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20245</id>
    <title>Moderate: ruby security update</title>
    <updated date="2024-07-15 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: ruby security update</summary>
    <description>  REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `&lt;`s in an attribute value. Those who need to parse untrusted XMLs may be impacted to this vulnerability. The REXML gem 3.2.7 or later include the patch to fix this vulnerability. As a workaround, don't parse untrusted XMLs.(CVE-2024-35176)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-35176" type="cve" title="fix CVE-2024-35176" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-io-console" version="0.4.6" release="126.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>rubygem-io-console-0.4.6-126.uel20.x86_64.rpm</filename>
        </package>
        <package name="ruby-devel" version="2.5.8" release="126.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>ruby-devel-2.5.8-126.uel20.x86_64.rpm</filename>
        </package>
        <package name="ruby" version="2.5.8" release="126.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>ruby-2.5.8-126.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-openssl" version="2.1.2" release="126.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>rubygem-openssl-2.1.2-126.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-bigdecimal" version="1.3.4" release="126.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>rubygem-bigdecimal-1.3.4-126.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-psych" version="3.0.2" release="126.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>rubygem-psych-3.0.2-126.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-json" version="2.1.0" release="126.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>rubygem-json-2.1.0-126.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-openssl" version="2.1.2" release="126.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>rubygem-openssl-2.1.2-126.uel20.aarch64.rpm</filename>
        </package>
        <package name="ruby-help" version="2.5.8" release="126.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>ruby-help-2.5.8-126.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-minitest" version="5.10.3" release="126.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>rubygem-minitest-5.10.3-126.uel20.noarch.rpm</filename>
        </package>
        <package name="ruby-irb" version="2.5.8" release="126.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>ruby-irb-2.5.8-126.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-test-unit" version="3.2.7" release="126.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>rubygem-test-unit-3.2.7-126.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygems" version="2.7.6" release="126.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>rubygems-2.7.6-126.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-rake" version="12.3.0" release="126.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>rubygem-rake-12.3.0-126.uel20.noarch.rpm</filename>
        </package>
        <package name="ruby-devel" version="2.5.8" release="126.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>ruby-devel-2.5.8-126.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-json" version="2.1.0" release="126.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>rubygem-json-2.1.0-126.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-psych" version="3.0.2" release="126.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>rubygem-psych-3.0.2-126.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygems-devel" version="2.7.6" release="126.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>rubygems-devel-2.7.6-126.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-io-console" version="0.4.6" release="126.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>rubygem-io-console-0.4.6-126.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-xmlrpc" version="0.3.0" release="126.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>rubygem-xmlrpc-0.3.0-126.uel20.noarch.rpm</filename>
        </package>
        <package name="ruby" version="2.5.8" release="126.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>ruby-2.5.8-126.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-power_assert" version="1.1.1" release="126.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>rubygem-power_assert-1.1.1-126.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-rdoc" version="6.0.1.1" release="126.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>rubygem-rdoc-6.0.1.1-126.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-net-telnet" version="0.1.1" release="126.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>rubygem-net-telnet-0.1.1-126.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-bigdecimal" version="1.3.4" release="126.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>rubygem-bigdecimal-1.3.4-126.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-did_you_mean" version="1.2.0" release="126.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-126.uel20.src.rpm">
          <filename>rubygem-did_you_mean-1.2.0-126.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20246</id>
    <title>Important: ffmpeg security update</title>
    <updated date="2024-07-17 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: ffmpeg security update</summary>
    <description> Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via the set_encoder_id function in /fftools/ffmpeg_enc.c component.(CVE-2023-50010)
 libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and other products, leaves stale hwaccel state in worker threads, which allows attackers to trigger a use-after-free and execute arbitrary code in some circumstances (e.g., hardware re-initialization upon a mid-video SPS change when Direct3D11 is used).(CVE-2022-48434)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-50010" type="cve" title="fix CVE-2023-50010" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-48434" type="cve" title="fix CVE-2022-48434" />
    </references>
    <pkglist>
      <collection>
        <package name="libavdevice" version="4.2.4" release="17.uel20" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-17.uel20.src.rpm">
          <filename>libavdevice-4.2.4-17.uel20.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg-libs" version="4.2.4" release="17.uel20" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-17.uel20.src.rpm">
          <filename>ffmpeg-libs-4.2.4-17.uel20.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg-devel" version="4.2.4" release="17.uel20" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-17.uel20.src.rpm">
          <filename>ffmpeg-devel-4.2.4-17.uel20.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg" version="4.2.4" release="17.uel20" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-17.uel20.src.rpm">
          <filename>ffmpeg-4.2.4-17.uel20.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg-libs" version="4.2.4" release="17.uel20" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-17.uel20.src.rpm">
          <filename>ffmpeg-libs-4.2.4-17.uel20.aarch64.rpm</filename>
        </package>
        <package name="libavdevice" version="4.2.4" release="17.uel20" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-17.uel20.src.rpm">
          <filename>libavdevice-4.2.4-17.uel20.aarch64.rpm</filename>
        </package>
        <package name="ffmpeg-devel" version="4.2.4" release="17.uel20" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-17.uel20.src.rpm">
          <filename>ffmpeg-devel-4.2.4-17.uel20.aarch64.rpm</filename>
        </package>
        <package name="ffmpeg" version="4.2.4" release="17.uel20" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-17.uel20.src.rpm">
          <filename>ffmpeg-4.2.4-17.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20247</id>
    <title>Moderate: libldb security update</title>
    <updated date="2022-08-09 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: libldb security update</summary>
    <description> A flaw was found in the Samba AD LDAP server. The AD DC database audit logging module can access LDAP message values freed by a preceding database module, resulting in a use-after-free issue. This issue is only possible when modifying certain privileged attributes, such as userAccountControl.(CVE-2022-32746)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-32746" type="cve" title="fix CVE-2022-32746" />
    </references>
    <pkglist>
      <collection>
        <package name="libldb" version="2.0.12" release="5.uel20" epoch="0" arch="x86_64" src="libldb-2.0.12-5.uel20.src.rpm">
          <filename>libldb-2.0.12-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-ldb" version="2.0.12" release="5.uel20" epoch="0" arch="x86_64" src="libldb-2.0.12-5.uel20.src.rpm">
          <filename>python3-ldb-2.0.12-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-ldb-devel" version="2.0.12" release="5.uel20" epoch="0" arch="x86_64" src="libldb-2.0.12-5.uel20.src.rpm">
          <filename>python3-ldb-devel-2.0.12-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="libldb-devel" version="2.0.12" release="5.uel20" epoch="0" arch="x86_64" src="libldb-2.0.12-5.uel20.src.rpm">
          <filename>libldb-devel-2.0.12-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="python-ldb-devel-common" version="2.0.12" release="5.uel20" epoch="0" arch="x86_64" src="libldb-2.0.12-5.uel20.src.rpm">
          <filename>python-ldb-devel-common-2.0.12-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="libldb" version="2.0.12" release="5.uel20" epoch="0" arch="aarch64" src="libldb-2.0.12-5.uel20.src.rpm">
          <filename>libldb-2.0.12-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="python-ldb-devel-common" version="2.0.12" release="5.uel20" epoch="0" arch="aarch64" src="libldb-2.0.12-5.uel20.src.rpm">
          <filename>python-ldb-devel-common-2.0.12-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-ldb" version="2.0.12" release="5.uel20" epoch="0" arch="aarch64" src="libldb-2.0.12-5.uel20.src.rpm">
          <filename>python3-ldb-2.0.12-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="libldb-devel" version="2.0.12" release="5.uel20" epoch="0" arch="aarch64" src="libldb-2.0.12-5.uel20.src.rpm">
          <filename>libldb-devel-2.0.12-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-ldb-devel" version="2.0.12" release="5.uel20" epoch="0" arch="aarch64" src="libldb-2.0.12-5.uel20.src.rpm">
          <filename>python3-ldb-devel-2.0.12-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="libldb-help" version="2.0.12" release="5.uel20" epoch="0" arch="noarch" src="libldb-2.0.12-5.uel20.src.rpm">
          <filename>libldb-help-2.0.12-5.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20248</id>
    <title>None: krb5 security update</title>
    <updated date="2024-07-12 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: krb5 security update</summary>
    <description> In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.(CVE-2024-37371)
 In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.(CVE-2024-37370)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-37371" type="cve" title="fix CVE-2024-37371" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-37370" type="cve" title="fix CVE-2024-37370" />
    </references>
    <pkglist>
      <collection>
        <package name="krb5-devel" version="1.18.2" release="11.uel20" epoch="0" arch="x86_64" src="krb5-1.18.2-11.uel20.src.rpm">
          <filename>krb5-devel-1.18.2-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="krb5-server" version="1.18.2" release="11.uel20" epoch="0" arch="x86_64" src="krb5-1.18.2-11.uel20.src.rpm">
          <filename>krb5-server-1.18.2-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="krb5-libs" version="1.18.2" release="11.uel20" epoch="0" arch="x86_64" src="krb5-1.18.2-11.uel20.src.rpm">
          <filename>krb5-libs-1.18.2-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="krb5-client" version="1.18.2" release="11.uel20" epoch="0" arch="x86_64" src="krb5-1.18.2-11.uel20.src.rpm">
          <filename>krb5-client-1.18.2-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="krb5" version="1.18.2" release="11.uel20" epoch="0" arch="x86_64" src="krb5-1.18.2-11.uel20.src.rpm">
          <filename>krb5-1.18.2-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="krb5-help" version="1.18.2" release="11.uel20" epoch="0" arch="noarch" src="krb5-1.18.2-11.uel20.src.rpm">
          <filename>krb5-help-1.18.2-11.uel20.noarch.rpm</filename>
        </package>
        <package name="krb5-server" version="1.18.2" release="11.uel20" epoch="0" arch="aarch64" src="krb5-1.18.2-11.uel20.src.rpm">
          <filename>krb5-server-1.18.2-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="krb5-devel" version="1.18.2" release="11.uel20" epoch="0" arch="aarch64" src="krb5-1.18.2-11.uel20.src.rpm">
          <filename>krb5-devel-1.18.2-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="krb5-client" version="1.18.2" release="11.uel20" epoch="0" arch="aarch64" src="krb5-1.18.2-11.uel20.src.rpm">
          <filename>krb5-client-1.18.2-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="krb5-libs" version="1.18.2" release="11.uel20" epoch="0" arch="aarch64" src="krb5-1.18.2-11.uel20.src.rpm">
          <filename>krb5-libs-1.18.2-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="krb5" version="1.18.2" release="11.uel20" epoch="0" arch="aarch64" src="krb5-1.18.2-11.uel20.src.rpm">
          <filename>krb5-1.18.2-11.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20249</id>
    <title>Important: java-1.8.0-openjdk security update</title>
    <updated date="2024-08-06 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: java-1.8.0-openjdk security update</summary>
    <description> Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot).  Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and  21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as  unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).(CVE-2024-21147)
 Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D).  Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and  21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as  unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).(CVE-2024-21145)
 Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Concurrency).  Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23; Oracle GraalVM Enterprise Edition: 20.3.14 and  21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).(CVE-2024-21144)
 Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot).  Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and  21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as  unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).(CVE-2024-21140)
 Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot).  Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and  21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).(CVE-2024-21138)
 Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot).  Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and  21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).(CVE-2024-21131)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21147" type="cve" title="fix CVE-2024-21147" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21145" type="cve" title="fix CVE-2024-21145" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21144" type="cve" title="fix CVE-2024-21144" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21140" type="cve" title="fix CVE-2024-21140" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21138" type="cve" title="fix CVE-2024-21138" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21131" type="cve" title="fix CVE-2024-21131" />
    </references>
    <pkglist>
      <collection>
        <package name="java-1.8.0-openjdk-javadoc" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-javadoc-1.8.0.422.b05-0.up2.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-devel" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-devel-1.8.0.422.b05-0.up2.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-headless" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-headless-1.8.0.422.b05-0.up2.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-javadoc-zip" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.422.b05-0.up2.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-accessibility-slowdebug" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.422.b05-0.up2.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-accessibility" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-accessibility-1.8.0.422.b05-0.up2.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-demo" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-demo-1.8.0.422.b05-0.up2.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-openjfx-slowdebug" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-openjfx-slowdebug-1.8.0.422.b05-0.up2.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-openjfx-devel" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-openjfx-devel-1.8.0.422.b05-0.up2.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-demo-slowdebug" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-demo-slowdebug-1.8.0.422.b05-0.up2.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-slowdebug" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-slowdebug-1.8.0.422.b05-0.up2.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-headless-slowdebug" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-headless-slowdebug-1.8.0.422.b05-0.up2.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-devel-slowdebug" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-devel-slowdebug-1.8.0.422.b05-0.up2.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-openjfx-devel-slowdebug" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-openjfx-devel-slowdebug-1.8.0.422.b05-0.up2.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-openjfx" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-openjfx-1.8.0.422.b05-0.up2.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-src" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-src-1.8.0.422.b05-0.up2.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-src-slowdebug" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="x86_64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-src-slowdebug-1.8.0.422.b05-0.up2.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-javadoc" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-javadoc-1.8.0.422.b05-0.up2.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-headless" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-headless-1.8.0.422.b05-0.up2.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-openjfx" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-openjfx-1.8.0.422.b05-0.up2.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-devel" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-devel-1.8.0.422.b05-0.up2.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-accessibility-slowdebug" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.422.b05-0.up2.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-openjfx-slowdebug" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-openjfx-slowdebug-1.8.0.422.b05-0.up2.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-javadoc-zip" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.422.b05-0.up2.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-openjfx-devel-slowdebug" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-openjfx-devel-slowdebug-1.8.0.422.b05-0.up2.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-devel-slowdebug" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-devel-slowdebug-1.8.0.422.b05-0.up2.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-openjfx-devel" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-openjfx-devel-1.8.0.422.b05-0.up2.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-demo" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-demo-1.8.0.422.b05-0.up2.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-accessibility" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-accessibility-1.8.0.422.b05-0.up2.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-demo-slowdebug" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-demo-slowdebug-1.8.0.422.b05-0.up2.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-slowdebug" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-slowdebug-1.8.0.422.b05-0.up2.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-src" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-src-1.8.0.422.b05-0.up2.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-headless-slowdebug" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-headless-slowdebug-1.8.0.422.b05-0.up2.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="java-1.8.0-openjdk-src-slowdebug" version="1.8.0.422.b05" release="0.up2.uel20.01" epoch="1" arch="aarch64" src="java-1.8.0-openjdk-1.8.0.422.b05-0.up2.uel20.01.src.rpm">
          <filename>java-1.8.0-openjdk-src-slowdebug-1.8.0.422.b05-0.up2.uel20.01.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20250</id>
    <title>Important: tomcat security update</title>
    <updated date="2024-08-07 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: tomcat security update</summary>
    <description> When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.(CVE-2020-9484)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-9484" type="cve" title="fix CVE-2020-9484" />
    </references>
    <pkglist>
      <collection>
        <package name="tomcat-help" version="9.0.10" release="31.up1.uel20" epoch="1" arch="noarch" src="tomcat-9.0.10-31.up1.uel20.src.rpm">
          <filename>tomcat-help-9.0.10-31.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="tomcat" version="9.0.10" release="31.up1.uel20" epoch="1" arch="noarch" src="tomcat-9.0.10-31.up1.uel20.src.rpm">
          <filename>tomcat-9.0.10-31.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="tomcat-jsvc" version="9.0.10" release="31.up1.uel20" epoch="1" arch="noarch" src="tomcat-9.0.10-31.up1.uel20.src.rpm">
          <filename>tomcat-jsvc-9.0.10-31.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="tomcat-embed" version="9.0.10" release="31.up1.uel20" epoch="1" arch="noarch" src="tomcat-9.0.10-31.up1.uel20.src.rpm">
          <filename>tomcat-embed-9.0.10-31.up1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20251</id>
    <title>Important: python-setuptools security update</title>
    <updated date="2024-08-05 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: python-setuptools security update</summary>
    <description> A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.(CVE-2024-6345)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-6345" type="cve" title="fix CVE-2024-6345" />
    </references>
    <pkglist>
      <collection>
        <package name="python-setuptools-help" version="44.1.1" release="3.uel20" epoch="0" arch="noarch" src="python-setuptools-44.1.1-3.uel20.src.rpm">
          <filename>python-setuptools-help-44.1.1-3.uel20.noarch.rpm</filename>
        </package>
        <package name="python3-setuptools" version="44.1.1" release="3.uel20" epoch="0" arch="noarch" src="python-setuptools-44.1.1-3.uel20.src.rpm">
          <filename>python3-setuptools-44.1.1-3.uel20.noarch.rpm</filename>
        </package>
        <package name="python2-setuptools" version="44.1.1" release="3.uel20" epoch="0" arch="noarch" src="python-setuptools-44.1.1-3.uel20.src.rpm">
          <filename>python2-setuptools-44.1.1-3.uel20.noarch.rpm</filename>
        </package>
        <package name="python-setuptools" version="44.1.1" release="3.uel20" epoch="0" arch="noarch" src="python-setuptools-44.1.1-3.uel20.src.rpm">
          <filename>python-setuptools-44.1.1-3.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="enhancement" version="2.0">
    <id>UTFA-2024:20256</id>
    <title>kernel-4.19 enhancement</title>
    <updated date="2024-07-12 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>kernel-4.19 enhancement</summary>
    <description>fix cve/bug or enhancement</description>
    <references />
    <pkglist>
      <collection>
        <package name="bpftool" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>bpftool-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="kernel" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="kernel-btf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-btf-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="kernel-tools" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-tools-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="perf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>perf-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="python2-perf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>python2-perf-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="kernel-tools-devel" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-tools-devel-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="bpftool-debuginfo" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>bpftool-debuginfo-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="kernel-devel" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-devel-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-perf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>python3-perf-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="kernel-tools-devel" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-tools-devel-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="bpftool-debuginfo" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>bpftool-debuginfo-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="python2-perf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>python2-perf-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-perf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>python3-perf-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="kernel-tools" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-tools-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="kernel-devel" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-devel-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="perf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>perf-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="kernel" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="kernel-btf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-btf-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="bpftool" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>bpftool-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20252</id>
    <title>Moderate: qpdf security update</title>
    <updated date="2024-08-08 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: qpdf security update</summary>
    <description> QPDF v8.4.2 was discovered to contain a heap buffer overflow via the function QPDF::processXRefStream. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted PDF file.(CVE-2022-34503)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-34503" type="cve" title="fix CVE-2022-34503" />
    </references>
    <pkglist>
      <collection>
        <package name="qpdf-devel" version="8.4.2" release="5.uel20" epoch="0" arch="x86_64" src="qpdf-8.4.2-5.uel20.src.rpm">
          <filename>qpdf-devel-8.4.2-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="qpdf" version="8.4.2" release="5.uel20" epoch="0" arch="x86_64" src="qpdf-8.4.2-5.uel20.src.rpm">
          <filename>qpdf-8.4.2-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="qpdf-devel" version="8.4.2" release="5.uel20" epoch="0" arch="aarch64" src="qpdf-8.4.2-5.uel20.src.rpm">
          <filename>qpdf-devel-8.4.2-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="qpdf" version="8.4.2" release="5.uel20" epoch="0" arch="aarch64" src="qpdf-8.4.2-5.uel20.src.rpm">
          <filename>qpdf-8.4.2-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="qpdf-help" version="8.4.2" release="5.uel20" epoch="0" arch="noarch" src="qpdf-8.4.2-5.uel20.src.rpm">
          <filename>qpdf-help-8.4.2-5.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20253</id>
    <title>Critical: expat security update</title>
    <updated date="2024-09-11 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: expat security update</summary>
    <description> An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.(CVE-2024-45490)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-45490" type="cve" title="fix CVE-2024-45490" />
    </references>
    <pkglist>
      <collection>
        <package name="expat-devel" version="2.2.9" release="13.uel20" epoch="0" arch="x86_64" src="expat-2.2.9-13.uel20.src.rpm">
          <filename>expat-devel-2.2.9-13.uel20.x86_64.rpm</filename>
        </package>
        <package name="expat" version="2.2.9" release="13.uel20" epoch="0" arch="x86_64" src="expat-2.2.9-13.uel20.src.rpm">
          <filename>expat-2.2.9-13.uel20.x86_64.rpm</filename>
        </package>
        <package name="expat" version="2.2.9" release="13.uel20" epoch="0" arch="aarch64" src="expat-2.2.9-13.uel20.src.rpm">
          <filename>expat-2.2.9-13.uel20.aarch64.rpm</filename>
        </package>
        <package name="expat-devel" version="2.2.9" release="13.uel20" epoch="0" arch="aarch64" src="expat-2.2.9-13.uel20.src.rpm">
          <filename>expat-devel-2.2.9-13.uel20.aarch64.rpm</filename>
        </package>
        <package name="expat-help" version="2.2.9" release="13.uel20" epoch="0" arch="noarch" src="expat-2.2.9-13.uel20.src.rpm">
          <filename>expat-help-2.2.9-13.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20254</id>
    <title>Critical: xmlrpc-c security update</title>
    <updated date="2024-09-13 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: xmlrpc-c security update</summary>
    <description> An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.(CVE-2024-45490)
 An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).(CVE-2024-45491)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-45490" type="cve" title="fix CVE-2024-45490" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-45491" type="cve" title="fix CVE-2024-45491" />
    </references>
    <pkglist>
      <collection>
        <package name="xmlrpc-c" version="1.51.06" release="2.uel20" epoch="0" arch="x86_64" src="xmlrpc-c-1.51.06-2.uel20.src.rpm">
          <filename>xmlrpc-c-1.51.06-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="xmlrpc-c-devel" version="1.51.06" release="2.uel20" epoch="0" arch="x86_64" src="xmlrpc-c-1.51.06-2.uel20.src.rpm">
          <filename>xmlrpc-c-devel-1.51.06-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="xmlrpc-c" version="1.51.06" release="2.uel20" epoch="0" arch="aarch64" src="xmlrpc-c-1.51.06-2.uel20.src.rpm">
          <filename>xmlrpc-c-1.51.06-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="xmlrpc-c-devel" version="1.51.06" release="2.uel20" epoch="0" arch="aarch64" src="xmlrpc-c-1.51.06-2.uel20.src.rpm">
          <filename>xmlrpc-c-devel-1.51.06-2.uel20.aarch64.rpm</filename>
        </package>
        <package name="xmlrpc-c-help" version="1.51.06" release="2.uel20" epoch="0" arch="noarch" src="xmlrpc-c-1.51.06-2.uel20.src.rpm">
          <filename>xmlrpc-c-help-1.51.06-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20255</id>
    <title>Critical: expat security update</title>
    <updated date="2024-09-13 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: expat security update</summary>
    <description> An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).(CVE-2024-45491)
 An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).(CVE-2024-45492)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-45491" type="cve" title="fix CVE-2024-45491" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-45492" type="cve" title="fix CVE-2024-45492" />
    </references>
    <pkglist>
      <collection>
        <package name="expat" version="2.2.9" release="14.uel20" epoch="0" arch="x86_64" src="expat-2.2.9-14.uel20.src.rpm">
          <filename>expat-2.2.9-14.uel20.x86_64.rpm</filename>
        </package>
        <package name="expat-devel" version="2.2.9" release="14.uel20" epoch="0" arch="x86_64" src="expat-2.2.9-14.uel20.src.rpm">
          <filename>expat-devel-2.2.9-14.uel20.x86_64.rpm</filename>
        </package>
        <package name="expat" version="2.2.9" release="14.uel20" epoch="0" arch="aarch64" src="expat-2.2.9-14.uel20.src.rpm">
          <filename>expat-2.2.9-14.uel20.aarch64.rpm</filename>
        </package>
        <package name="expat-help" version="2.2.9" release="14.uel20" epoch="0" arch="noarch" src="expat-2.2.9-14.uel20.src.rpm">
          <filename>expat-help-2.2.9-14.uel20.noarch.rpm</filename>
        </package>
        <package name="expat-devel" version="2.2.9" release="14.uel20" epoch="0" arch="aarch64" src="expat-2.2.9-14.uel20.src.rpm">
          <filename>expat-devel-2.2.9-14.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20256</id>
    <title>Critical: flatpak security update</title>
    <updated date="2024-09-10 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: flatpak security update</summary>
    <description> Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality.

When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access.

However, the application does have write access to the application directory `~/.var/app/$APPID` where this directory is stored. If the source directory for the `persistent`/`--persist` option is replaced by a symlink, then the next time the application is started, the bind mount will follow the symlink and mount whatever it points to into the sandbox.

Partial protection against this vulnerability can be provided by patching Flatpak using the patches in commits ceec2ffc and 98f79773. However, this leaves a race condition that could be exploited by two instances of a malicious app running in parallel. Closing the race condition requires updating or patching the version of bubblewrap that is used by Flatpak to add the new `--bind-fd` option using the patch and then patching Flatpak to use it. If Flatpak has been configured at build-time with `-Dsystem_bubblewrap=bwrap` (1.15.x) or `--with-system-bubblewrap=bwrap` (1.14.x or older), or a similar option, then the version of bubblewrap that needs to be patched is a system copy that is distributed separately, typically `/usr/bin/bwrap`. This configuration is the one that is typically used in Linux distributions. If Flatpak has been configured at build-time with `-Dsystem_bubblewrap=` (1.15.x) or with `--without-system-bubblewrap` (1.14.x or older), then it is the bundled version of bubblewrap that is included with Flatpak that must be patched. This is typically installed as `/usr/libexec/flatpak-bwrap`. This configuration is the default when building from source code.

For the 1.14.x stable branch, these changes are included in Flatpak 1.14.10. The bundled version of bubblewrap included in this release has been updated to 0.6.3. For the 1.15.x development branch, these changes are included in Flatpak 1.15.10. The bundled version of bubblewrap in this release is a Meson "wrap" subproject, which has been updated to 0.10.0. The 1.12.x and 1.10.x branches will not be updated for this vulnerability. Long-term support OS distributions should backport the individual changes into their versions of Flatpak and bubblewrap, or update to newer versions if their stability policy allows it. As a workaround, avoid using applications using the `persistent` (`--persist`) permission.(CVE-2024-42472)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-42472" type="cve" title="fix CVE-2024-42472" />
    </references>
    <pkglist>
      <collection>
        <package name="flatpak-devel" version="1.0.3" release="13.uel20" epoch="0" arch="x86_64" src="flatpak-1.0.3-13.uel20.src.rpm">
          <filename>flatpak-devel-1.0.3-13.uel20.x86_64.rpm</filename>
        </package>
        <package name="flatpak" version="1.0.3" release="13.uel20" epoch="0" arch="x86_64" src="flatpak-1.0.3-13.uel20.src.rpm">
          <filename>flatpak-1.0.3-13.uel20.x86_64.rpm</filename>
        </package>
        <package name="flatpak" version="1.0.3" release="13.uel20" epoch="0" arch="aarch64" src="flatpak-1.0.3-13.uel20.src.rpm">
          <filename>flatpak-1.0.3-13.uel20.aarch64.rpm</filename>
        </package>
        <package name="flatpak-help" version="1.0.3" release="13.uel20" epoch="0" arch="noarch" src="flatpak-1.0.3-13.uel20.src.rpm">
          <filename>flatpak-help-1.0.3-13.uel20.noarch.rpm</filename>
        </package>
        <package name="flatpak-devel" version="1.0.3" release="13.uel20" epoch="0" arch="aarch64" src="flatpak-1.0.3-13.uel20.src.rpm">
          <filename>flatpak-devel-1.0.3-13.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20257</id>
    <title>Important: microcode_ctl security update</title>
    <updated date="2024-09-18 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: microcode_ctl security update</summary>
    <description> Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2024-24853)
 Mirrored regions with different values in 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.(CVE-2024-25939)
 Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2024-24980)
 Improper isolation in the Intel(R) Core(TM) Ultra Processor stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.(CVE-2023-42667)
 Improper isolation in some Intel(R) Processors stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.(CVE-2023-49141)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-24853" type="cve" title="fix CVE-2024-24853" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-25939" type="cve" title="fix CVE-2024-25939" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-24980" type="cve" title="fix CVE-2024-24980" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-42667" type="cve" title="fix CVE-2023-42667" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-49141" type="cve" title="fix CVE-2023-49141" />
    </references>
    <pkglist>
      <collection>
        <package name="microcode_ctl" version="20240813" release="1.uel20.01" epoch="4" arch="x86_64" src="microcode_ctl-20240813-1.uel20.01.src.rpm">
          <filename>microcode_ctl-20240813-1.uel20.01.x86_64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20258</id>
    <title>Important: ruby security update</title>
    <updated date="2024-09-12 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: ruby security update</summary>
    <description> REXML is an XML toolkit for Ruby. The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. If you need to parse untrusted XMLs with tree parser API like REXML::Document.new, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected. The REXML gem 3.3.6 or later include the patch to fix the vulnerability.(CVE-2024-43398)
  REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as `&lt;`, `0` and `%&gt;`. If you need to parse untrusted XMLs, you many be impacted to these vulnerabilities. The REXML gem 3.3.2 or later include the patches to fix these vulnerabilities. Users are advised to upgrade. Users unable to upgrade should avoid parsing untrusted XML strings.(CVE-2024-39908)
 REXML is an XML toolkit for Ruby. The REXML gem 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API. The REXML gem 3.3.3 or later include the patch to fix the vulnerability.(CVE-2024-41946)
 REXML is an XML toolkit for Ruby. The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, `&gt;]` and `]&gt;`. The REXML gem 3.3.3 or later include the patches to fix these vulnerabilities.(CVE-2024-41123)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-43398" type="cve" title="fix CVE-2024-43398" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-39908" type="cve" title="fix CVE-2024-39908" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-41946" type="cve" title="fix CVE-2024-41946" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-41123" type="cve" title="fix CVE-2024-41123" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-json" version="2.1.0" release="129.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>rubygem-json-2.1.0-129.uel20.x86_64.rpm</filename>
        </package>
        <package name="ruby" version="2.5.8" release="129.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>ruby-2.5.8-129.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-bigdecimal" version="1.3.4" release="129.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>rubygem-bigdecimal-1.3.4-129.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-openssl" version="2.1.2" release="129.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>rubygem-openssl-2.1.2-129.uel20.x86_64.rpm</filename>
        </package>
        <package name="ruby-devel" version="2.5.8" release="129.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>ruby-devel-2.5.8-129.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-io-console" version="0.4.6" release="129.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>rubygem-io-console-0.4.6-129.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-psych" version="3.0.2" release="129.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>rubygem-psych-3.0.2-129.uel20.x86_64.rpm</filename>
        </package>
        <package name="ruby-help" version="2.5.8" release="129.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>ruby-help-2.5.8-129.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-power_assert" version="1.1.1" release="129.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>rubygem-power_assert-1.1.1-129.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-minitest" version="5.10.3" release="129.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>rubygem-minitest-5.10.3-129.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-net-telnet" version="0.1.1" release="129.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>rubygem-net-telnet-0.1.1-129.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-io-console" version="0.4.6" release="129.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>rubygem-io-console-0.4.6-129.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-rake" version="12.3.0" release="129.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>rubygem-rake-12.3.0-129.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-openssl" version="2.1.2" release="129.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>rubygem-openssl-2.1.2-129.uel20.aarch64.rpm</filename>
        </package>
        <package name="ruby" version="2.5.8" release="129.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>ruby-2.5.8-129.uel20.aarch64.rpm</filename>
        </package>
        <package name="ruby-devel" version="2.5.8" release="129.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>ruby-devel-2.5.8-129.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygems-devel" version="2.7.6" release="129.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>rubygems-devel-2.7.6-129.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygems" version="2.7.6" release="129.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>rubygems-2.7.6-129.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-psych" version="3.0.2" release="129.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>rubygem-psych-3.0.2-129.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-test-unit" version="3.2.7" release="129.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>rubygem-test-unit-3.2.7-129.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-json" version="2.1.0" release="129.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>rubygem-json-2.1.0-129.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-bigdecimal" version="1.3.4" release="129.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>rubygem-bigdecimal-1.3.4-129.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-did_you_mean" version="1.2.0" release="129.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>rubygem-did_you_mean-1.2.0-129.uel20.noarch.rpm</filename>
        </package>
        <package name="ruby-irb" version="2.5.8" release="129.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>ruby-irb-2.5.8-129.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-rdoc" version="6.0.1.1" release="129.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>rubygem-rdoc-6.0.1.1-129.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-xmlrpc" version="0.3.0" release="129.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-129.uel20.src.rpm">
          <filename>rubygem-xmlrpc-0.3.0-129.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20259</id>
    <title>Important: dovecot security update</title>
    <updated date="2024-09-11 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: dovecot security update</summary>
    <description> Very large headers can cause resource exhaustion when parsing message. The message-parser normally reads reasonably sized chunks of the message. However, when it feeds them to message-header-parser, it starts building up "full_value" buffer out of the smaller chunks. The full_value buffer has no size limit, so large headers can cause large memory usage. It doesn't matter whether it's a single long header line, or a single header split into multiple lines. This bug exists in all Dovecot versions. Incoming mails typically have some size limits set by MTA, so even largest possible header size may still fit into Dovecot's vsz_limit. So attackers probably can't DoS a victim user this way. A user could APPEND larger mails though, allowing them to DoS themselves (although maybe cause some memory issues for the backend in general). One can implement restrictions on headers on MTA component preceding Dovecot. No publicly available exploits are known.(CVE-2024-23185)
 Having a large number of address headers (From, To, Cc, Bcc, etc.) becomes excessively CPU intensive. With 100k header lines CPU usage is already 12 seconds, and in a production environment we observed 500k header lines taking 18 minutes to parse. Since this can be triggered by external actors sending emails to a victim, this is a security issue. An external attacker can send specially crafted messages that consume target system resources and cause outage. One can implement restrictions on address headers on MTA component preceding Dovecot. No publicly available exploits are known.(CVE-2024-23184)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-23185" type="cve" title="fix CVE-2024-23185" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-23184" type="cve" title="fix CVE-2024-23184" />
    </references>
    <pkglist>
      <collection>
        <package name="dovecot" version="2.3.15" release="6.uel20" epoch="1" arch="x86_64" src="dovecot-2.3.15-6.uel20.src.rpm">
          <filename>dovecot-2.3.15-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="dovecot-devel" version="2.3.15" release="6.uel20" epoch="1" arch="x86_64" src="dovecot-2.3.15-6.uel20.src.rpm">
          <filename>dovecot-devel-2.3.15-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="dovecot-help" version="2.3.15" release="6.uel20" epoch="1" arch="x86_64" src="dovecot-2.3.15-6.uel20.src.rpm">
          <filename>dovecot-help-2.3.15-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="dovecot-help" version="2.3.15" release="6.uel20" epoch="1" arch="aarch64" src="dovecot-2.3.15-6.uel20.src.rpm">
          <filename>dovecot-help-2.3.15-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="dovecot-devel" version="2.3.15" release="6.uel20" epoch="1" arch="aarch64" src="dovecot-2.3.15-6.uel20.src.rpm">
          <filename>dovecot-devel-2.3.15-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="dovecot" version="2.3.15" release="6.uel20" epoch="1" arch="aarch64" src="dovecot-2.3.15-6.uel20.src.rpm">
          <filename>dovecot-2.3.15-6.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20260</id>
    <title>Important: webkit2gtk3 security update</title>
    <updated date="2024-09-12 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: webkit2gtk3 security update</summary>
    <description> Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)(CVE-2024-4558)
 An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash.(CVE-2024-40779)
 An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash.(CVE-2024-40780)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-4558" type="cve" title="fix CVE-2024-4558" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-40779" type="cve" title="fix CVE-2024-40779" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-40780" type="cve" title="fix CVE-2024-40780" />
    </references>
    <pkglist>
      <collection>
        <package name="webkit2gtk3" version="2.22.2" release="13.up1.uel20" epoch="0" arch="x86_64" src="webkit2gtk3-2.22.2-13.up1.uel20.src.rpm">
          <filename>webkit2gtk3-2.22.2-13.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="webkit2gtk3-devel" version="2.22.2" release="13.up1.uel20" epoch="0" arch="x86_64" src="webkit2gtk3-2.22.2-13.up1.uel20.src.rpm">
          <filename>webkit2gtk3-devel-2.22.2-13.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="webkit2gtk3-jsc" version="2.22.2" release="13.up1.uel20" epoch="0" arch="x86_64" src="webkit2gtk3-2.22.2-13.up1.uel20.src.rpm">
          <filename>webkit2gtk3-jsc-2.22.2-13.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="webkit2gtk3-jsc-devel" version="2.22.2" release="13.up1.uel20" epoch="0" arch="x86_64" src="webkit2gtk3-2.22.2-13.up1.uel20.src.rpm">
          <filename>webkit2gtk3-jsc-devel-2.22.2-13.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="webkit2gtk3-devel" version="2.22.2" release="13.up1.uel20" epoch="0" arch="aarch64" src="webkit2gtk3-2.22.2-13.up1.uel20.src.rpm">
          <filename>webkit2gtk3-devel-2.22.2-13.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="webkit2gtk3-jsc-devel" version="2.22.2" release="13.up1.uel20" epoch="0" arch="aarch64" src="webkit2gtk3-2.22.2-13.up1.uel20.src.rpm">
          <filename>webkit2gtk3-jsc-devel-2.22.2-13.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="webkit2gtk3-help" version="2.22.2" release="13.up1.uel20" epoch="0" arch="noarch" src="webkit2gtk3-2.22.2-13.up1.uel20.src.rpm">
          <filename>webkit2gtk3-help-2.22.2-13.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="webkit2gtk3" version="2.22.2" release="13.up1.uel20" epoch="0" arch="aarch64" src="webkit2gtk3-2.22.2-13.up1.uel20.src.rpm">
          <filename>webkit2gtk3-2.22.2-13.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="webkit2gtk3-jsc" version="2.22.2" release="13.up1.uel20" epoch="0" arch="aarch64" src="webkit2gtk3-2.22.2-13.up1.uel20.src.rpm">
          <filename>webkit2gtk3-jsc-2.22.2-13.up1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20261</id>
    <title>Important: wireshark security update</title>
    <updated date="2024-09-09 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: wireshark security update</summary>
    <description> NTLMSSP dissector crash in Wireshark 4.2.0 to 4.0.6 and 4.0.0 to 4.0.16 allows denial of service via packet injection or crafted capture file(CVE-2024-8250)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-8250" type="cve" title="fix CVE-2024-8250" />
    </references>
    <pkglist>
      <collection>
        <package name="wireshark" version="3.6.14" release="9.uel20" epoch="1" arch="x86_64" src="wireshark-3.6.14-9.uel20.src.rpm">
          <filename>wireshark-3.6.14-9.uel20.x86_64.rpm</filename>
        </package>
        <package name="wireshark-devel" version="3.6.14" release="9.uel20" epoch="1" arch="x86_64" src="wireshark-3.6.14-9.uel20.src.rpm">
          <filename>wireshark-devel-3.6.14-9.uel20.x86_64.rpm</filename>
        </package>
        <package name="wireshark-help" version="3.6.14" release="9.uel20" epoch="1" arch="x86_64" src="wireshark-3.6.14-9.uel20.src.rpm">
          <filename>wireshark-help-3.6.14-9.uel20.x86_64.rpm</filename>
        </package>
        <package name="wireshark" version="3.6.14" release="9.uel20" epoch="1" arch="aarch64" src="wireshark-3.6.14-9.uel20.src.rpm">
          <filename>wireshark-3.6.14-9.uel20.aarch64.rpm</filename>
        </package>
        <package name="wireshark-devel" version="3.6.14" release="9.uel20" epoch="1" arch="aarch64" src="wireshark-3.6.14-9.uel20.src.rpm">
          <filename>wireshark-devel-3.6.14-9.uel20.aarch64.rpm</filename>
        </package>
        <package name="wireshark-help" version="3.6.14" release="9.uel20" epoch="1" arch="aarch64" src="wireshark-3.6.14-9.uel20.src.rpm">
          <filename>wireshark-help-3.6.14-9.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20262</id>
    <title>Important: libtiff security update</title>
    <updated date="2024-09-11 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: libtiff security update</summary>
    <description> A null pointer dereference flaw was found in Libtiff via `tif_dirinfo.c`. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service.(CVE-2024-7006)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-7006" type="cve" title="fix CVE-2024-7006" />
    </references>
    <pkglist>
      <collection>
        <package name="libtiff" version="4.3.0" release="24.uel20" epoch="0" arch="x86_64" src="libtiff-4.3.0-24.uel20.src.rpm">
          <filename>libtiff-4.3.0-24.uel20.x86_64.rpm</filename>
        </package>
        <package name="libtiff-devel" version="4.3.0" release="24.uel20" epoch="0" arch="x86_64" src="libtiff-4.3.0-24.uel20.src.rpm">
          <filename>libtiff-devel-4.3.0-24.uel20.x86_64.rpm</filename>
        </package>
        <package name="libtiff-devel" version="4.3.0" release="24.uel20" epoch="0" arch="aarch64" src="libtiff-4.3.0-24.uel20.src.rpm">
          <filename>libtiff-devel-4.3.0-24.uel20.aarch64.rpm</filename>
        </package>
        <package name="libtiff-help" version="4.3.0" release="24.uel20" epoch="0" arch="noarch" src="libtiff-4.3.0-24.uel20.src.rpm">
          <filename>libtiff-help-4.3.0-24.uel20.noarch.rpm</filename>
        </package>
        <package name="libtiff" version="4.3.0" release="24.uel20" epoch="0" arch="aarch64" src="libtiff-4.3.0-24.uel20.src.rpm">
          <filename>libtiff-4.3.0-24.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20263</id>
    <title>Important: linux-firmware security update</title>
    <updated date="2024-09-13 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: linux-firmware security update</summary>
    <description> Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution.(CVE-2023-31315)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-31315" type="cve" title="fix CVE-2023-31315" />
    </references>
    <pkglist>
      <collection>
        <package name="linux-firmware" version="20240811" release="1.uel20" epoch="0" arch="noarch" src="linux-firmware-20240811-1.uel20.src.rpm">
          <filename>linux-firmware-20240811-1.uel20.noarch.rpm</filename>
        </package>
        <package name="linux-firmware-iwlwifi" version="20240811" release="1.uel20" epoch="0" arch="noarch" src="linux-firmware-20240811-1.uel20.src.rpm">
          <filename>linux-firmware-iwlwifi-20240811-1.uel20.noarch.rpm</filename>
        </package>
        <package name="linux-firmware-ath" version="20240811" release="1.uel20" epoch="0" arch="noarch" src="linux-firmware-20240811-1.uel20.src.rpm">
          <filename>linux-firmware-ath-20240811-1.uel20.noarch.rpm</filename>
        </package>
        <package name="linux-firmware-libertas" version="20240811" release="1.uel20" epoch="0" arch="noarch" src="linux-firmware-20240811-1.uel20.src.rpm">
          <filename>linux-firmware-libertas-20240811-1.uel20.noarch.rpm</filename>
        </package>
        <package name="linux-firmware-mediatek" version="20240811" release="1.uel20" epoch="0" arch="noarch" src="linux-firmware-20240811-1.uel20.src.rpm">
          <filename>linux-firmware-mediatek-20240811-1.uel20.noarch.rpm</filename>
        </package>
        <package name="linux-firmware-netronome" version="20240811" release="1.uel20" epoch="0" arch="noarch" src="linux-firmware-20240811-1.uel20.src.rpm">
          <filename>linux-firmware-netronome-20240811-1.uel20.noarch.rpm</filename>
        </package>
        <package name="linux-firmware-ti-connectivity" version="20240811" release="1.uel20" epoch="0" arch="noarch" src="linux-firmware-20240811-1.uel20.src.rpm">
          <filename>linux-firmware-ti-connectivity-20240811-1.uel20.noarch.rpm</filename>
        </package>
        <package name="linux-firmware-cypress" version="20240811" release="1.uel20" epoch="0" arch="noarch" src="linux-firmware-20240811-1.uel20.src.rpm">
          <filename>linux-firmware-cypress-20240811-1.uel20.noarch.rpm</filename>
        </package>
        <package name="linux-firmware-mrvl" version="20240811" release="1.uel20" epoch="0" arch="noarch" src="linux-firmware-20240811-1.uel20.src.rpm">
          <filename>linux-firmware-mrvl-20240811-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20264</id>
    <title>Important: postgresql-13 security update</title>
    <updated date="2024-08-30 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: postgresql-13 security update</summary>
    <description> Time-of-check Time-of-use (TOCTOU) race condition in pg_dump in PostgreSQL allows an object creator to execute arbitrary SQL functions as the user running pg_dump, which is often a superuser. The attack involves replacing another relation type with a view or foreign table. The attack requires waiting for pg_dump to start, but winning the race condition is trivial if the attacker retains an open transaction. Versions before PostgreSQL 16.4, 15.8, 14.13, 13.16, and 12.20 are affected.(CVE-2024-7348)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-7348" type="cve" title="fix CVE-2024-7348" />
    </references>
    <pkglist>
      <collection>
        <package name="postgresql-13-docs" version="13.16" release="1.01.uel20" epoch="0" arch="x86_64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-docs-13.16-1.01.uel20.x86_64.rpm</filename>
        </package>
        <package name="postgresql-13-server-devel" version="13.16" release="1.01.uel20" epoch="0" arch="x86_64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-server-devel-13.16-1.01.uel20.x86_64.rpm</filename>
        </package>
        <package name="postgresql-13-llvmjit" version="13.16" release="1.01.uel20" epoch="0" arch="x86_64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-llvmjit-13.16-1.01.uel20.x86_64.rpm</filename>
        </package>
        <package name="postgresql-13-contrib" version="13.16" release="1.01.uel20" epoch="0" arch="x86_64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-contrib-13.16-1.01.uel20.x86_64.rpm</filename>
        </package>
        <package name="postgresql-13-test" version="13.16" release="1.01.uel20" epoch="0" arch="x86_64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-test-13.16-1.01.uel20.x86_64.rpm</filename>
        </package>
        <package name="postgresql-13" version="13.16" release="1.01.uel20" epoch="0" arch="x86_64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-13.16-1.01.uel20.x86_64.rpm</filename>
        </package>
        <package name="postgresql-13-server" version="13.16" release="1.01.uel20" epoch="0" arch="x86_64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-server-13.16-1.01.uel20.x86_64.rpm</filename>
        </package>
        <package name="postgresql-13-private-libs" version="13.16" release="1.01.uel20" epoch="0" arch="x86_64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-private-libs-13.16-1.01.uel20.x86_64.rpm</filename>
        </package>
        <package name="postgresql-13-pltcl" version="13.16" release="1.01.uel20" epoch="0" arch="x86_64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-pltcl-13.16-1.01.uel20.x86_64.rpm</filename>
        </package>
        <package name="postgresql-13-plpython3" version="13.16" release="1.01.uel20" epoch="0" arch="x86_64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-plpython3-13.16-1.01.uel20.x86_64.rpm</filename>
        </package>
        <package name="postgresql-13-private-devel" version="13.16" release="1.01.uel20" epoch="0" arch="x86_64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-private-devel-13.16-1.01.uel20.x86_64.rpm</filename>
        </package>
        <package name="postgresql-13-plperl" version="13.16" release="1.01.uel20" epoch="0" arch="x86_64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-plperl-13.16-1.01.uel20.x86_64.rpm</filename>
        </package>
        <package name="postgresql-13-static" version="13.16" release="1.01.uel20" epoch="0" arch="x86_64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-static-13.16-1.01.uel20.x86_64.rpm</filename>
        </package>
        <package name="postgresql-13-contrib" version="13.16" release="1.01.uel20" epoch="0" arch="aarch64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-contrib-13.16-1.01.uel20.aarch64.rpm</filename>
        </package>
        <package name="postgresql-13-test" version="13.16" release="1.01.uel20" epoch="0" arch="aarch64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-test-13.16-1.01.uel20.aarch64.rpm</filename>
        </package>
        <package name="postgresql-13-pltcl" version="13.16" release="1.01.uel20" epoch="0" arch="aarch64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-pltcl-13.16-1.01.uel20.aarch64.rpm</filename>
        </package>
        <package name="postgresql-13-plperl" version="13.16" release="1.01.uel20" epoch="0" arch="aarch64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-plperl-13.16-1.01.uel20.aarch64.rpm</filename>
        </package>
        <package name="postgresql-13-server" version="13.16" release="1.01.uel20" epoch="0" arch="aarch64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-server-13.16-1.01.uel20.aarch64.rpm</filename>
        </package>
        <package name="postgresql-13-llvmjit" version="13.16" release="1.01.uel20" epoch="0" arch="aarch64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-llvmjit-13.16-1.01.uel20.aarch64.rpm</filename>
        </package>
        <package name="postgresql-13-test-rpm-macros" version="13.16" release="1.01.uel20" epoch="0" arch="noarch" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-test-rpm-macros-13.16-1.01.uel20.noarch.rpm</filename>
        </package>
        <package name="postgresql-13" version="13.16" release="1.01.uel20" epoch="0" arch="aarch64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-13.16-1.01.uel20.aarch64.rpm</filename>
        </package>
        <package name="postgresql-13-plpython3" version="13.16" release="1.01.uel20" epoch="0" arch="aarch64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-plpython3-13.16-1.01.uel20.aarch64.rpm</filename>
        </package>
        <package name="postgresql-13-static" version="13.16" release="1.01.uel20" epoch="0" arch="aarch64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-static-13.16-1.01.uel20.aarch64.rpm</filename>
        </package>
        <package name="postgresql-13-private-libs" version="13.16" release="1.01.uel20" epoch="0" arch="aarch64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-private-libs-13.16-1.01.uel20.aarch64.rpm</filename>
        </package>
        <package name="postgresql-13-server-devel" version="13.16" release="1.01.uel20" epoch="0" arch="aarch64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-server-devel-13.16-1.01.uel20.aarch64.rpm</filename>
        </package>
        <package name="postgresql-13-docs" version="13.16" release="1.01.uel20" epoch="0" arch="aarch64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-docs-13.16-1.01.uel20.aarch64.rpm</filename>
        </package>
        <package name="postgresql-13-private-devel" version="13.16" release="1.01.uel20" epoch="0" arch="aarch64" src="postgresql-13-13.16-1.01.uel20.src.rpm">
          <filename>postgresql-13-private-devel-13.16-1.01.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20265</id>
    <title>Important: wpa_supplicant security update</title>
    <updated date="2024-09-13 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: wpa_supplicant security update</summary>
    <description> An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root).




Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.(CVE-2024-5290)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-5290" type="cve" title="fix CVE-2024-5290" />
    </references>
    <pkglist>
      <collection>
        <package name="wpa_supplicant-gui" version="2.6" release="30.up3.uel20" epoch="1" arch="x86_64" src="wpa_supplicant-2.6-30.up3.uel20.src.rpm">
          <filename>wpa_supplicant-gui-2.6-30.up3.uel20.x86_64.rpm</filename>
        </package>
        <package name="wpa_supplicant-help" version="2.6" release="30.up3.uel20" epoch="1" arch="x86_64" src="wpa_supplicant-2.6-30.up3.uel20.src.rpm">
          <filename>wpa_supplicant-help-2.6-30.up3.uel20.x86_64.rpm</filename>
        </package>
        <package name="wpa_supplicant" version="2.6" release="30.up3.uel20" epoch="1" arch="x86_64" src="wpa_supplicant-2.6-30.up3.uel20.src.rpm">
          <filename>wpa_supplicant-2.6-30.up3.uel20.x86_64.rpm</filename>
        </package>
        <package name="wpa_supplicant" version="2.6" release="30.up3.uel20" epoch="1" arch="aarch64" src="wpa_supplicant-2.6-30.up3.uel20.src.rpm">
          <filename>wpa_supplicant-2.6-30.up3.uel20.aarch64.rpm</filename>
        </package>
        <package name="wpa_supplicant-help" version="2.6" release="30.up3.uel20" epoch="1" arch="aarch64" src="wpa_supplicant-2.6-30.up3.uel20.src.rpm">
          <filename>wpa_supplicant-help-2.6-30.up3.uel20.aarch64.rpm</filename>
        </package>
        <package name="wpa_supplicant-gui" version="2.6" release="30.up3.uel20" epoch="1" arch="aarch64" src="wpa_supplicant-2.6-30.up3.uel20.src.rpm">
          <filename>wpa_supplicant-gui-2.6-30.up3.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20266</id>
    <title>Important: qemu security update</title>
    <updated date="2024-09-12 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: qemu security update</summary>
    <description> A flaw was found in the QEMU NBD Server. This vulnerability allows a denial of service (DoS) attack via improper synchronization during socket closure when a client keeps a socket open as the server is taken offline.(CVE-2024-7409)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-7409" type="cve" title="fix CVE-2024-7409" />
    </references>
    <pkglist>
      <collection>
        <package name="qemu" version="4.1.0" release="86.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-86.uel20.src.rpm">
          <filename>qemu-4.1.0-86.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-img" version="4.1.0" release="86.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-86.uel20.src.rpm">
          <filename>qemu-img-4.1.0-86.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-block-rbd" version="4.1.0" release="86.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-86.uel20.src.rpm">
          <filename>qemu-block-rbd-4.1.0-86.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-block-ssh" version="4.1.0" release="86.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-86.uel20.src.rpm">
          <filename>qemu-block-ssh-4.1.0-86.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-seabios" version="4.1.0" release="86.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-86.uel20.src.rpm">
          <filename>qemu-seabios-4.1.0-86.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-guest-agent" version="4.1.0" release="86.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-86.uel20.src.rpm">
          <filename>qemu-guest-agent-4.1.0-86.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-block-curl" version="4.1.0" release="86.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-86.uel20.src.rpm">
          <filename>qemu-block-curl-4.1.0-86.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu-block-iscsi" version="4.1.0" release="86.uel20" epoch="10" arch="x86_64" src="qemu-4.1.0-86.uel20.src.rpm">
          <filename>qemu-block-iscsi-4.1.0-86.uel20.x86_64.rpm</filename>
        </package>
        <package name="qemu" version="4.1.0" release="86.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-86.uel20.src.rpm">
          <filename>qemu-4.1.0-86.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu-guest-agent" version="4.1.0" release="86.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-86.uel20.src.rpm">
          <filename>qemu-guest-agent-4.1.0-86.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu-img" version="4.1.0" release="86.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-86.uel20.src.rpm">
          <filename>qemu-img-4.1.0-86.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu-block-curl" version="4.1.0" release="86.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-86.uel20.src.rpm">
          <filename>qemu-block-curl-4.1.0-86.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu-help" version="4.1.0" release="86.uel20" epoch="10" arch="noarch" src="qemu-4.1.0-86.uel20.src.rpm">
          <filename>qemu-help-4.1.0-86.uel20.noarch.rpm</filename>
        </package>
        <package name="qemu-block-iscsi" version="4.1.0" release="86.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-86.uel20.src.rpm">
          <filename>qemu-block-iscsi-4.1.0-86.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu-block-ssh" version="4.1.0" release="86.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-86.uel20.src.rpm">
          <filename>qemu-block-ssh-4.1.0-86.uel20.aarch64.rpm</filename>
        </package>
        <package name="qemu-block-rbd" version="4.1.0" release="86.uel20" epoch="10" arch="aarch64" src="qemu-4.1.0-86.uel20.src.rpm">
          <filename>qemu-block-rbd-4.1.0-86.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20267</id>
    <title>Important: bind security update</title>
    <updated date="2024-09-09 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: bind security update</summary>
    <description> If a server hosts a zone containing a "KEY" Resource Record, or a resolver DNSSEC-validates a "KEY" Resource Record from a DNSSEC-signed domain in cache, a client can exhaust resolver CPU resources by sending a stream of SIG(0) signed requests.
This issue affects BIND 9 versions 9.0.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.49-S1, and 9.18.11-S1 through 9.18.27-S1.(CVE-2024-1975)
 Resolver caches and authoritative zone databases that hold significant numbers of RRs for the same hostname (of any RTYPE) can suffer from degraded performance as content is being added or updated, and also when handling client queries for this name.
This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.4-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.(CVE-2024-1737)
 The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.(CVE-2023-50868)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-1975" type="cve" title="fix CVE-2024-1975" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-1737" type="cve" title="fix CVE-2024-1737" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-50868" type="cve" title="fix CVE-2023-50868" />
    </references>
    <pkglist>
      <collection>
        <package name="bind-chroot" version="9.11.21" release="19.uel20" epoch="32" arch="x86_64" src="bind-9.11.21-19.uel20.src.rpm">
          <filename>bind-chroot-9.11.21-19.uel20.x86_64.rpm</filename>
        </package>
        <package name="bind-pkcs11-devel" version="9.11.21" release="19.uel20" epoch="32" arch="x86_64" src="bind-9.11.21-19.uel20.src.rpm">
          <filename>bind-pkcs11-devel-9.11.21-19.uel20.x86_64.rpm</filename>
        </package>
        <package name="bind-libs" version="9.11.21" release="19.uel20" epoch="32" arch="x86_64" src="bind-9.11.21-19.uel20.src.rpm">
          <filename>bind-libs-9.11.21-19.uel20.x86_64.rpm</filename>
        </package>
        <package name="bind-utils" version="9.11.21" release="19.uel20" epoch="32" arch="x86_64" src="bind-9.11.21-19.uel20.src.rpm">
          <filename>bind-utils-9.11.21-19.uel20.x86_64.rpm</filename>
        </package>
        <package name="bind-export-devel" version="9.11.21" release="19.uel20" epoch="32" arch="x86_64" src="bind-9.11.21-19.uel20.src.rpm">
          <filename>bind-export-devel-9.11.21-19.uel20.x86_64.rpm</filename>
        </package>
        <package name="bind-devel" version="9.11.21" release="19.uel20" epoch="32" arch="x86_64" src="bind-9.11.21-19.uel20.src.rpm">
          <filename>bind-devel-9.11.21-19.uel20.x86_64.rpm</filename>
        </package>
        <package name="bind-pkcs11" version="9.11.21" release="19.uel20" epoch="32" arch="x86_64" src="bind-9.11.21-19.uel20.src.rpm">
          <filename>bind-pkcs11-9.11.21-19.uel20.x86_64.rpm</filename>
        </package>
        <package name="bind-export-libs" version="9.11.21" release="19.uel20" epoch="32" arch="x86_64" src="bind-9.11.21-19.uel20.src.rpm">
          <filename>bind-export-libs-9.11.21-19.uel20.x86_64.rpm</filename>
        </package>
        <package name="bind-libs-lite" version="9.11.21" release="19.uel20" epoch="32" arch="x86_64" src="bind-9.11.21-19.uel20.src.rpm">
          <filename>bind-libs-lite-9.11.21-19.uel20.x86_64.rpm</filename>
        </package>
        <package name="bind" version="9.11.21" release="19.uel20" epoch="32" arch="x86_64" src="bind-9.11.21-19.uel20.src.rpm">
          <filename>bind-9.11.21-19.uel20.x86_64.rpm</filename>
        </package>
        <package name="bind" version="9.11.21" release="19.uel20" epoch="32" arch="aarch64" src="bind-9.11.21-19.uel20.src.rpm">
          <filename>bind-9.11.21-19.uel20.aarch64.rpm</filename>
        </package>
        <package name="bind-pkcs11" version="9.11.21" release="19.uel20" epoch="32" arch="aarch64" src="bind-9.11.21-19.uel20.src.rpm">
          <filename>bind-pkcs11-9.11.21-19.uel20.aarch64.rpm</filename>
        </package>
        <package name="bind-utils" version="9.11.21" release="19.uel20" epoch="32" arch="aarch64" src="bind-9.11.21-19.uel20.src.rpm">
          <filename>bind-utils-9.11.21-19.uel20.aarch64.rpm</filename>
        </package>
        <package name="bind-libs-lite" version="9.11.21" release="19.uel20" epoch="32" arch="aarch64" src="bind-9.11.21-19.uel20.src.rpm">
          <filename>bind-libs-lite-9.11.21-19.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-bind" version="9.11.21" release="19.uel20" epoch="32" arch="noarch" src="bind-9.11.21-19.uel20.src.rpm">
          <filename>python3-bind-9.11.21-19.uel20.noarch.rpm</filename>
        </package>
        <package name="bind-chroot" version="9.11.21" release="19.uel20" epoch="32" arch="aarch64" src="bind-9.11.21-19.uel20.src.rpm">
          <filename>bind-chroot-9.11.21-19.uel20.aarch64.rpm</filename>
        </package>
        <package name="bind-devel" version="9.11.21" release="19.uel20" epoch="32" arch="aarch64" src="bind-9.11.21-19.uel20.src.rpm">
          <filename>bind-devel-9.11.21-19.uel20.aarch64.rpm</filename>
        </package>
        <package name="bind-libs" version="9.11.21" release="19.uel20" epoch="32" arch="aarch64" src="bind-9.11.21-19.uel20.src.rpm">
          <filename>bind-libs-9.11.21-19.uel20.aarch64.rpm</filename>
        </package>
        <package name="bind-export-libs" version="9.11.21" release="19.uel20" epoch="32" arch="aarch64" src="bind-9.11.21-19.uel20.src.rpm">
          <filename>bind-export-libs-9.11.21-19.uel20.aarch64.rpm</filename>
        </package>
        <package name="bind-export-devel" version="9.11.21" release="19.uel20" epoch="32" arch="aarch64" src="bind-9.11.21-19.uel20.src.rpm">
          <filename>bind-export-devel-9.11.21-19.uel20.aarch64.rpm</filename>
        </package>
        <package name="bind-pkcs11-devel" version="9.11.21" release="19.uel20" epoch="32" arch="aarch64" src="bind-9.11.21-19.uel20.src.rpm">
          <filename>bind-pkcs11-devel-9.11.21-19.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20268</id>
    <title>Important: golang security update</title>
    <updated date="2024-09-09 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: golang security update</summary>
    <description> The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.(CVE-2024-24791)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-24791" type="cve" title="fix CVE-2024-24791" />
    </references>
    <pkglist>
      <collection>
        <package name="golang" version="1.15.7" release="46.uel20.01" epoch="0" arch="x86_64" src="golang-1.15.7-46.uel20.01.src.rpm">
          <filename>golang-1.15.7-46.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="golang-devel" version="1.15.7" release="46.uel20.01" epoch="0" arch="noarch" src="golang-1.15.7-46.uel20.01.src.rpm">
          <filename>golang-devel-1.15.7-46.uel20.01.noarch.rpm</filename>
        </package>
        <package name="golang" version="1.15.7" release="46.uel20.01" epoch="0" arch="aarch64" src="golang-1.15.7-46.uel20.01.src.rpm">
          <filename>golang-1.15.7-46.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="golang-help" version="1.15.7" release="46.uel20.01" epoch="0" arch="noarch" src="golang-1.15.7-46.uel20.01.src.rpm">
          <filename>golang-help-1.15.7-46.uel20.01.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="enhancement" version="2.0">
    <id>UTFA-2024:20273</id>
    <title>kernel-4.19 enhancement</title>
    <updated date="2024-07-12 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>kernel-4.19 enhancement</summary>
    <description>fix cve/bug or enhancement</description>
    <references />
    <pkglist>
      <collection>
        <package name="bpftool" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>bpftool-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="kernel" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="kernel-btf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-btf-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="kernel-tools" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-tools-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="perf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>perf-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="python2-perf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>python2-perf-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="kernel-tools-devel" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-tools-devel-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="bpftool-debuginfo" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>bpftool-debuginfo-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="kernel-devel" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-devel-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-perf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>python3-perf-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="kernel-tools-devel" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-tools-devel-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="bpftool-debuginfo" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>bpftool-debuginfo-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="python2-perf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>python2-perf-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-perf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>python3-perf-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="kernel-tools" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-tools-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="kernel-devel" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-devel-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="perf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>perf-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="kernel" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="kernel-btf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-btf-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="bpftool" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>bpftool-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20269</id>
    <title>Critical: httpd security update</title>
    <updated date="2024-09-11 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: httpd security update</summary>
    <description> Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable.

Users are recommended to upgrade to version 2.4.60, which fixes this issue.(CVE-2024-38476)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-38476" type="cve" title="fix CVE-2024-38476" />
    </references>
    <pkglist>
      <collection>
        <package name="mod_proxy_html" version="2.4.43" release="25.up1.uel20" epoch="1" arch="x86_64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>mod_proxy_html-2.4.43-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mod_ldap" version="2.4.43" release="25.up1.uel20" epoch="0" arch="x86_64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>mod_ldap-2.4.43-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="httpd" version="2.4.43" release="25.up1.uel20" epoch="0" arch="x86_64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>httpd-2.4.43-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="httpd-devel" version="2.4.43" release="25.up1.uel20" epoch="0" arch="x86_64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>httpd-devel-2.4.43-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mod_md" version="2.4.43" release="25.up1.uel20" epoch="0" arch="x86_64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>mod_md-2.4.43-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mod_session" version="2.4.43" release="25.up1.uel20" epoch="0" arch="x86_64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>mod_session-2.4.43-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mod_ssl" version="2.4.43" release="25.up1.uel20" epoch="1" arch="x86_64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>mod_ssl-2.4.43-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="httpd-tools" version="2.4.43" release="25.up1.uel20" epoch="0" arch="x86_64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>httpd-tools-2.4.43-25.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="httpd" version="2.4.43" release="25.up1.uel20" epoch="0" arch="aarch64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>httpd-2.4.43-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mod_ssl" version="2.4.43" release="25.up1.uel20" epoch="1" arch="aarch64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>mod_ssl-2.4.43-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mod_proxy_html" version="2.4.43" release="25.up1.uel20" epoch="1" arch="aarch64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>mod_proxy_html-2.4.43-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="httpd-help" version="2.4.43" release="25.up1.uel20" epoch="0" arch="noarch" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>httpd-help-2.4.43-25.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="mod_ldap" version="2.4.43" release="25.up1.uel20" epoch="0" arch="aarch64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>mod_ldap-2.4.43-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="httpd-tools" version="2.4.43" release="25.up1.uel20" epoch="0" arch="aarch64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>httpd-tools-2.4.43-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="httpd-devel" version="2.4.43" release="25.up1.uel20" epoch="0" arch="aarch64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>httpd-devel-2.4.43-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mod_session" version="2.4.43" release="25.up1.uel20" epoch="0" arch="aarch64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>mod_session-2.4.43-25.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="httpd-filesystem" version="2.4.43" release="25.up1.uel20" epoch="0" arch="noarch" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>httpd-filesystem-2.4.43-25.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="mod_md" version="2.4.43" release="25.up1.uel20" epoch="0" arch="aarch64" src="httpd-2.4.43-25.up1.uel20.src.rpm">
          <filename>mod_md-2.4.43-25.up1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20270</id>
    <title>Critical: syslinux security update</title>
    <updated date="2024-09-23 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: syslinux security update</summary>
    <description> The png_format_buffer function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 allows remote attackers to cause a denial of service (application crash) via a crafted PNG image that triggers an out-of-bounds read during the copying of error-message data.  NOTE: this vulnerability exists because of a CVE-2004-0421 regression. NOTE: this is called an off-by-one error by some sources.(CVE-2011-2501)
 Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.(CVE-2011-2690)
 The png_err function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 makes a function call using a NULL pointer argument instead of an empty-string argument, which allows remote attackers to cause a denial of service (application crash) via a crafted PNG image.(CVE-2011-2691)
 The png_handle_sCAL function in pngrutil.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 does not properly handle invalid sCAL chunks, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted PNG image that triggers the reading of uninitialized memory.(CVE-2011-2692)
 Integer signedness error in the png_inflate function in pngrutil.c in libpng before 1.4.10beta01, as used in Google Chrome before 17.0.963.83 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file, a different vulnerability than CVE-2011-3026.(CVE-2011-3045)
 The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow.(CVE-2011-3048)
 The png_push_read_zTXt function in pngpread.c in libpng 1.0.x before 1.0.58, 1.2.x before 1.2.48, 1.4.x before 1.4.10, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large avail_in field value in a PNG image.(CVE-2012-3425)
 The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.(CVE-2015-7981)
 Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.(CVE-2015-8126)
 Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126.(CVE-2015-8472)
 Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 through 0.99, 1.0.x before 1.0.66, 1.1.x and 1.2.x before 1.2.56, 1.3.x and 1.4.x before 1.4.19, and 1.5.x before 1.5.26 allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read.(CVE-2015-8540)
 The png_set_text_2 function in libpng 0.71 before 1.0.67, 1.2.x before 1.2.57, 1.4.x before 1.4.20, 1.5.x before 1.5.28, and 1.6.x before 1.6.27 allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure.(CVE-2016-10087)
 libpng before 1.6.32 does not properly check the length of chunks against the user limit.(CVE-2017-12652)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2011-2501" type="cve" title="fix CVE-2011-2501" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2011-2690" type="cve" title="fix CVE-2011-2690" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2011-2691" type="cve" title="fix CVE-2011-2691" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2011-2692" type="cve" title="fix CVE-2011-2692" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2011-3045" type="cve" title="fix CVE-2011-3045" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2011-3048" type="cve" title="fix CVE-2011-3048" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2012-3425" type="cve" title="fix CVE-2012-3425" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2015-7981" type="cve" title="fix CVE-2015-7981" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2015-8126" type="cve" title="fix CVE-2015-8126" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2015-8472" type="cve" title="fix CVE-2015-8472" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2015-8540" type="cve" title="fix CVE-2015-8540" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2016-10087" type="cve" title="fix CVE-2016-10087" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2017-12652" type="cve" title="fix CVE-2017-12652" />
    </references>
    <pkglist>
      <collection>
        <package name="syslinux-extlinux" version="6.04" release="14.uel20.01" epoch="0" arch="x86_64" src="syslinux-6.04-14.uel20.01.src.rpm">
          <filename>syslinux-extlinux-6.04-14.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="syslinux-tftpboot" version="6.04" release="14.uel20.01" epoch="0" arch="noarch" src="syslinux-6.04-14.uel20.01.src.rpm">
          <filename>syslinux-tftpboot-6.04-14.uel20.01.noarch.rpm</filename>
        </package>
        <package name="syslinux-extlinux-nonlinux" version="6.04" release="14.uel20.01" epoch="0" arch="noarch" src="syslinux-6.04-14.uel20.01.src.rpm">
          <filename>syslinux-extlinux-nonlinux-6.04-14.uel20.01.noarch.rpm</filename>
        </package>
        <package name="syslinux-efi64" version="6.04" release="14.uel20.01" epoch="0" arch="x86_64" src="syslinux-6.04-14.uel20.01.src.rpm">
          <filename>syslinux-efi64-6.04-14.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="syslinux" version="6.04" release="14.uel20.01" epoch="0" arch="x86_64" src="syslinux-6.04-14.uel20.01.src.rpm">
          <filename>syslinux-6.04-14.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="syslinux-devel" version="6.04" release="14.uel20.01" epoch="0" arch="x86_64" src="syslinux-6.04-14.uel20.01.src.rpm">
          <filename>syslinux-devel-6.04-14.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="syslinux-perl" version="6.04" release="14.uel20.01" epoch="0" arch="x86_64" src="syslinux-6.04-14.uel20.01.src.rpm">
          <filename>syslinux-perl-6.04-14.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="syslinux-nonlinux" version="6.04" release="14.uel20.01" epoch="0" arch="noarch" src="syslinux-6.04-14.uel20.01.src.rpm">
          <filename>syslinux-nonlinux-6.04-14.uel20.01.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2024:20271</id>
    <title>None: osc security update</title>
    <updated date="2024-09-12 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: osc security update</summary>
    <description> ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2024-22034)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-22034" type="cve" title="fix CVE-2024-22034" />
    </references>
    <pkglist>
      <collection>
        <package name="osc" version="0.169.1" release="4.uel20" epoch="0" arch="noarch" src="osc-0.169.1-4.uel20.src.rpm">
          <filename>osc-0.169.1-4.uel20.noarch.rpm</filename>
        </package>
        <package name="osc-help" version="0.169.1" release="4.uel20" epoch="0" arch="noarch" src="osc-0.169.1-4.uel20.src.rpm">
          <filename>osc-help-0.169.1-4.uel20.noarch.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20001</id>
    <title>Important: php security update</title>
    <updated date="2024-10-10 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: php security update</summary>
    <description> In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for  CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3  may still be bypassed and the same command injection related to Windows "Best Fit" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.(CVE-2024-8926)
 In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability.(CVE-2024-9026)
 In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability.(CVE-2024-9026)
 In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability.(CVE-2024-9026)
 In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.(CVE-2024-8927)
 In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior.(CVE-2024-8925)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-8926" type="cve" title="fix CVE-2024-8926" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-9026" type="cve" title="fix CVE-2024-9026" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-9026" type="cve" title="fix CVE-2024-9026" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-9026" type="cve" title="fix CVE-2024-9026" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-8927" type="cve" title="fix CVE-2024-8927" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-8925" type="cve" title="fix CVE-2024-8925" />
    </references>
    <pkglist>
      <collection>
        <package name="php-cli" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-cli-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-pgsql" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-pgsql-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-intl" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-intl-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-help" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-help-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-process" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-process-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-ffi" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-ffi-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-dba" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-dba-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-sodium" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-sodium-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-common" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-common-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-dbg" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-dbg-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-pdo" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-pdo-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-fpm" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-fpm-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-embedded" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-embedded-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-devel" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-devel-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-xml" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-xml-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-enchant" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-enchant-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-soap" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-soap-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-gmp" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-gmp-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-bcmath" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-bcmath-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-mysqlnd" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-mysqlnd-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-snmp" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-snmp-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-tidy" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-tidy-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-odbc" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-odbc-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-ldap" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-ldap-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-gd" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-gd-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-mbstring" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-mbstring-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-opcache" version="8.0.30" release="6.uel20" epoch="0" arch="x86_64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-opcache-8.0.30-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="php-snmp" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-snmp-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-devel" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-devel-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-mysqlnd" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-mysqlnd-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-pdo" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-pdo-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-enchant" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-enchant-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-tidy" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-tidy-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-xml" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-xml-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-ldap" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-ldap-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-odbc" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-odbc-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-gd" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-gd-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-common" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-common-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-sodium" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-sodium-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-opcache" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-opcache-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-intl" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-intl-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-pgsql" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-pgsql-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-soap" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-soap-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-process" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-process-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-fpm" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-fpm-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-ffi" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-ffi-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-gmp" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-gmp-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-bcmath" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-bcmath-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-mbstring" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-mbstring-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-dbg" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-dbg-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-cli" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-cli-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-dba" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-dba-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-embedded" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-embedded-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="php-help" version="8.0.30" release="6.uel20" epoch="0" arch="aarch64" src="php-8.0.30-6.uel20.src.rpm">
          <filename>php-help-8.0.30-6.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20002</id>
    <title>Important: iperf3 security update</title>
    <updated date="2025-01-03 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: iperf3 security update</summary>
    <description> iperf v3.17.1 was discovered to contain a segmentation violation via the iperf_exchange_parameters() function.(CVE-2024-53580)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-53580" type="cve" title="fix CVE-2024-53580" />
    </references>
    <pkglist>
      <collection>
        <package name="iperf3" version="3.18" release="1.uel20" epoch="0" arch="x86_64" src="iperf3-3.18-1.uel20.src.rpm">
          <filename>iperf3-3.18-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="iperf3-devel" version="3.18" release="1.uel20" epoch="0" arch="x86_64" src="iperf3-3.18-1.uel20.src.rpm">
          <filename>iperf3-devel-3.18-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="iperf3" version="3.18" release="1.uel20" epoch="0" arch="aarch64" src="iperf3-3.18-1.uel20.src.rpm">
          <filename>iperf3-3.18-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="iperf3-devel" version="3.18" release="1.uel20" epoch="0" arch="aarch64" src="iperf3-3.18-1.uel20.src.rpm">
          <filename>iperf3-devel-3.18-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="iperf3-help" version="3.18" release="1.uel20" epoch="0" arch="noarch" src="iperf3-3.18-1.uel20.src.rpm">
          <filename>iperf3-help-3.18-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20003</id>
    <title>Important: libsoup security update</title>
    <updated date="2024-11-15 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: libsoup security update</summary>
    <description> GNOME libsoup before 3.6.1 has an infinite loop, and memory consumption. during the reading of certain patterns of WebSocket data from clients.(CVE-2024-52532)
 GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. Input received over the network cannot trigger this.(CVE-2024-52531)
 GNOME libsoup before 3.6.0 allows HTTP request smuggling in some configurations because '\0' characters at the end of header names are ignored, i.e., a "Transfer-Encoding\0: chunked" header is treated the same as a "Transfer-Encoding: chunked" header.(CVE-2024-52530)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-52532" type="cve" title="fix CVE-2024-52532" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-52531" type="cve" title="fix CVE-2024-52531" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-52530" type="cve" title="fix CVE-2024-52530" />
    </references>
    <pkglist>
      <collection>
        <package name="libsoup" version="2.71.0" release="4.uel20" epoch="0" arch="x86_64" src="libsoup-2.71.0-4.uel20.src.rpm">
          <filename>libsoup-2.71.0-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="libsoup-devel" version="2.71.0" release="4.uel20" epoch="0" arch="x86_64" src="libsoup-2.71.0-4.uel20.src.rpm">
          <filename>libsoup-devel-2.71.0-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="libsoup-devel" version="2.71.0" release="4.uel20" epoch="0" arch="aarch64" src="libsoup-2.71.0-4.uel20.src.rpm">
          <filename>libsoup-devel-2.71.0-4.uel20.aarch64.rpm</filename>
        </package>
        <package name="libsoup-help" version="2.71.0" release="4.uel20" epoch="0" arch="noarch" src="libsoup-2.71.0-4.uel20.src.rpm">
          <filename>libsoup-help-2.71.0-4.uel20.noarch.rpm</filename>
        </package>
        <package name="libsoup" version="2.71.0" release="4.uel20" epoch="0" arch="aarch64" src="libsoup-2.71.0-4.uel20.src.rpm">
          <filename>libsoup-2.71.0-4.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20004</id>
    <title>Important: tuned security update</title>
    <updated date="2024-12-05 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: tuned security update</summary>
    <description> A script injection vulnerability was identified in the Tuned package. The `instance_create()` D-Bus function can be called by locally logged-in users without authentication. This flaw allows a local non-privileged user to execute a D-Bus call with `script_pre` or `script_post` options that permit arbitrary scripts with their absolute paths to be passed. These user or attacker-controlled executable scripts or programs could then be executed by Tuned with root privileges that could allow attackers to local privilege escalation.(CVE-2024-52336)
 A log spoofing flaw was found in the Tuned package due to improper sanitization of some API arguments. This flaw allows an attacker to pass a controlled sequence of characters; newlines can be inserted into the log. Instead of the 'evil' the attacker could mimic a valid TuneD log line and trick the administrator. The quotes '' are usually used in TuneD logs citing raw user input, so there will always be the ' character ending the spoofed input, and the administrator can easily overlook this. This logged string is later used in logging and in the output of utilities, for example, `tuned-adm get_instances` or other third-party programs that use Tuned's D-Bus interface for such operations.(CVE-2024-52337)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-52336" type="cve" title="fix CVE-2024-52336" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-52337" type="cve" title="fix CVE-2024-52337" />
    </references>
    <pkglist>
      <collection>
        <package name="tuned" version="2.24.1" release="1.uel20" epoch="0" arch="noarch" src="tuned-2.24.1-1.uel20.src.rpm">
          <filename>tuned-2.24.1-1.uel20.noarch.rpm</filename>
        </package>
        <package name="tuned-profiles-devel" version="2.24.1" release="1.uel20" epoch="0" arch="noarch" src="tuned-2.24.1-1.uel20.src.rpm">
          <filename>tuned-profiles-devel-2.24.1-1.uel20.noarch.rpm</filename>
        </package>
        <package name="tuned-help" version="2.24.1" release="1.uel20" epoch="0" arch="noarch" src="tuned-2.24.1-1.uel20.src.rpm">
          <filename>tuned-help-2.24.1-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20005</id>
    <title>Low: gsl security update</title>
    <updated date="2024-11-05 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Low</severity>
    <summary>Low: gsl security update</summary>
    <description> GSL (GNU Scientific Library) through 2.8 has an integer signedness error in gsl_siman_solve_many in siman/siman.c. When params.n_tries is negative, incorrect memory allocation occurs.(CVE-2024-50610)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-50610" type="cve" title="fix CVE-2024-50610" />
    </references>
    <pkglist>
      <collection>
        <package name="gsl" version="2.4" release="10.uel20" epoch="0" arch="x86_64" src="gsl-2.4-10.uel20.src.rpm">
          <filename>gsl-2.4-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="gsl-devel" version="2.4" release="10.uel20" epoch="0" arch="x86_64" src="gsl-2.4-10.uel20.src.rpm">
          <filename>gsl-devel-2.4-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="gsl-devel" version="2.4" release="10.uel20" epoch="0" arch="aarch64" src="gsl-2.4-10.uel20.src.rpm">
          <filename>gsl-devel-2.4-10.uel20.aarch64.rpm</filename>
        </package>
        <package name="gsl-help" version="2.4" release="10.uel20" epoch="0" arch="noarch" src="gsl-2.4-10.uel20.src.rpm">
          <filename>gsl-help-2.4-10.uel20.noarch.rpm</filename>
        </package>
        <package name="gsl" version="2.4" release="10.uel20" epoch="0" arch="aarch64" src="gsl-2.4-10.uel20.src.rpm">
          <filename>gsl-2.4-10.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20006</id>
    <title>Important: proftpd security update</title>
    <updated date="2024-12-05 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: proftpd security update</summary>
    <description> In ProFTPD through 1.3.8b before cec01cc, supplemental group inheritance grants unintended access to GID 0 because of the lack of supplemental groups from mod_sql.(CVE-2024-48651)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-48651" type="cve" title="fix CVE-2024-48651" />
    </references>
    <pkglist>
      <collection>
        <package name="proftpd" version="1.3.8b" release="3.uel20" epoch="0" arch="x86_64" src="proftpd-1.3.8b-3.uel20.src.rpm">
          <filename>proftpd-1.3.8b-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="proftpd-mysql" version="1.3.8b" release="3.uel20" epoch="0" arch="x86_64" src="proftpd-1.3.8b-3.uel20.src.rpm">
          <filename>proftpd-mysql-1.3.8b-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="proftpd-utils" version="1.3.8b" release="3.uel20" epoch="0" arch="x86_64" src="proftpd-1.3.8b-3.uel20.src.rpm">
          <filename>proftpd-utils-1.3.8b-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="proftpd-postgresql" version="1.3.8b" release="3.uel20" epoch="0" arch="x86_64" src="proftpd-1.3.8b-3.uel20.src.rpm">
          <filename>proftpd-postgresql-1.3.8b-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="proftpd-devel" version="1.3.8b" release="3.uel20" epoch="0" arch="x86_64" src="proftpd-1.3.8b-3.uel20.src.rpm">
          <filename>proftpd-devel-1.3.8b-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="proftpd-ldap" version="1.3.8b" release="3.uel20" epoch="0" arch="x86_64" src="proftpd-1.3.8b-3.uel20.src.rpm">
          <filename>proftpd-ldap-1.3.8b-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="proftpd-sqlite" version="1.3.8b" release="3.uel20" epoch="0" arch="x86_64" src="proftpd-1.3.8b-3.uel20.src.rpm">
          <filename>proftpd-sqlite-1.3.8b-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="proftpd-devel" version="1.3.8b" release="3.uel20" epoch="0" arch="aarch64" src="proftpd-1.3.8b-3.uel20.src.rpm">
          <filename>proftpd-devel-1.3.8b-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="proftpd-utils" version="1.3.8b" release="3.uel20" epoch="0" arch="aarch64" src="proftpd-1.3.8b-3.uel20.src.rpm">
          <filename>proftpd-utils-1.3.8b-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="proftpd-mysql" version="1.3.8b" release="3.uel20" epoch="0" arch="aarch64" src="proftpd-1.3.8b-3.uel20.src.rpm">
          <filename>proftpd-mysql-1.3.8b-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="proftpd" version="1.3.8b" release="3.uel20" epoch="0" arch="aarch64" src="proftpd-1.3.8b-3.uel20.src.rpm">
          <filename>proftpd-1.3.8b-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="proftpd-sqlite" version="1.3.8b" release="3.uel20" epoch="0" arch="aarch64" src="proftpd-1.3.8b-3.uel20.src.rpm">
          <filename>proftpd-sqlite-1.3.8b-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="proftpd-ldap" version="1.3.8b" release="3.uel20" epoch="0" arch="aarch64" src="proftpd-1.3.8b-3.uel20.src.rpm">
          <filename>proftpd-ldap-1.3.8b-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="proftpd-postgresql" version="1.3.8b" release="3.uel20" epoch="0" arch="aarch64" src="proftpd-1.3.8b-3.uel20.src.rpm">
          <filename>proftpd-postgresql-1.3.8b-3.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20007</id>
    <title>Important: gstreamer1-plugins-good security update</title>
    <updated date="2024-12-20 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: gstreamer1-plugins-good security update</summary>
    <description> GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_wavparse_smpl_chunk function within gstwavparse.c. This function attempts to read 4 bytes from the data + 12 offset without checking if the size of the data buffer is sufficient. If the buffer is too small, the function reads beyond its bounds. This vulnerability may result in reading 4 bytes out of the boundaries of the data buffer. This vulnerability is fixed in 1.24.10.(CVE-2024-47777)
 GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been found in the parse_ds64 function within gstwavparse.c. The parse_ds64 function does not check that the buffer buf contains sufficient data before attempting to read from it, doing multiple GST_READ_UINT32_LE operations without performing boundary checks. This can lead to an OOB-read when buf is smaller than expected. This vulnerability allows reading beyond the bounds of the data buffer, potentially leading to a crash (denial of service) or the leak of sensitive data. This vulnerability is fixed in 1.24.10.(CVE-2024-47775)
 GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_avi_subtitle_parse_gab2_chunk function within gstavisubtitle.c. The function reads the name_length value directly from the input file without checking it properly. Then, the a condition, does not properly handle cases where name_length is greater than 0xFFFFFFFF - 17, causing an integer overflow. In such scenario, the function attempts to access memory beyond the buffer leading to an OOB-read. This vulnerability is fixed in 1.24.10.(CVE-2024-47774)
 GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in qtdemux_parse_container function within qtdemux.c. In the parent function qtdemux_parse_node, the value of length is not well checked. So, if length is big enough, it causes the pointer end to point beyond the boundaries of buffer. Subsequently, in the qtdemux_parse_container function, the while loop can trigger an OOB-read, accessing memory beyond the bounds of buf. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.(CVE-2024-47543)
 GStreamer is a library for constructing graphs of media-handling components. An out-of-bounds write vulnerability was identified in the convert_to_s334_1a function in isomp4/qtdemux.c. The vulnerability arises due to a discrepancy between the size of memory allocated to the storage array and the loop condition i * 2 &lt; ccpair_size. Specifically, when ccpair_size is even, the allocated size in storage does not match the loop's expected bounds, resulting in an out-of-bounds write. This bug allows for the overwriting of up to 3 bytes beyond the allocated bounds of the storage array. This vulnerability is fixed in 1.24.10.(CVE-2024-47539)
 GStreamer is a library for constructing graphs of media-handling components. An Use-After-Free read vulnerability has been discovered affecting the processing of CodecPrivate elements in Matroska streams. In the GST_MATROSKA_ID_CODECPRIVATE case within the gst_matroska_demux_parse_stream function, a data chunk is allocated using gst_ebml_read_binary. Later, the allocated memory is freed in the gst_matroska_track_free function, by the call to g_free (track-&gt;codec_priv). Finally, the freed memory is accessed in the caps_serialize function through gst_value_serialize_buffer. The freed memory will be accessed in the gst_value_serialize_buffer function. This results in a UAF read vulnerability, as the function tries to process memory that has already been freed. This vulnerability is fixed in 1.24.10.(CVE-2024-47834)
 GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in gst_wavparse_adtl_chunk within gstwavparse.c. This vulnerability arises due to insufficient validation of the size parameter, which can exceed the bounds of the data buffer. As a result, an OOB read occurs in the following while loop. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.(CVE-2024-47778)
 GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been discovered in gst_wavparse_cue_chunk within gstwavparse.c. The vulnerability happens due to a discrepancy between the size of the data buffer and the size value provided to the function. This mismatch causes the comparison  if (size &lt; 4 + ncues * 24) to fail in some cases, allowing the subsequent loop to access beyond the bounds of the data buffer. The root cause of this discrepancy stems from a miscalculation when clipping the chunk size based on upstream data size. This vulnerability allows reading beyond the bounds of the data buffer, potentially leading to a crash (denial of service) or the leak of sensitive data. This vulnerability is fixed in 1.24.10.(CVE-2024-47776)
 GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been identified in `gst_gdk_pixbuf_dec_flush` within `gstgdkpixbufdec.c`. This function invokes `memcpy`, using `out_pix` as the destination address. `out_pix` is expected to point to the frame 0 from the frame structure, which is read from the input file. However, in certain situations, it can points to a NULL frame, causing the subsequent call to `memcpy` to attempt writing to the null address (0x00), leading to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.(CVE-2024-47613)
 GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_parse_blockgroup_or_simpleblock function within matroska-demux.c. This function does not properly check the validity of the GstBuffer *sub pointer before performing dereferences. As a result, null pointer dereferences may occur. This vulnerability is fixed in 1.24.10.(CVE-2024-47601)
 GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in extract_cc_from_data function within qtdemux.c. In the FOURCC_c708 case, the subtraction atom_length - 8 may result in an underflow if atom_length is less than 8. When that subtraction underflows, *cclen ends up being a large number, and then cclen is passed to g_memdup2 leading to an out-of-bounds (OOB) read. This vulnerability is fixed in 1.24.10.(CVE-2024-47546)
 GStreamer is a library for constructing graphs of media-handling components. An uninitialized stack variable vulnerability has been identified in the gst_matroska_demux_add_wvpk_header function within matroska-demux.c. When size &lt; 4, the program calls gst_buffer_unmap with an uninitialized map variable. Then, in the gst_memory_unmap function, the program will attempt to unmap the buffer using the uninitialized map variable, causing a function pointer hijack, as it will jump to mem-&gt;allocator-&gt;mem_unmap_full or mem-&gt;allocator-&gt;mem_unmap. This vulnerability could allow an attacker to hijack the execution flow, potentially leading to code execution. This vulnerability is fixed in 1.24.10.(CVE-2024-47540)
 GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in the function qtdemux_parse_theora_extension within qtdemux.c. The vulnerability occurs due to an underflow of the gint size variable, which causes size to hold a large unintended value when cast to an unsigned integer. This 32-bit negative value is then cast to a 64-bit unsigned integer (0xfffffffffffffffa) in a subsequent call to gst_buffer_new_and_alloc. The function gst_buffer_new_allocate then attempts to allocate memory, eventually calling _sysmem_new_block. The function _sysmem_new_block adds alignment and header size to the (unsigned) size, causing the overflow of the 'slice_size' variable. As a result, only 0x89 bytes are allocated, despite the large input size. When the following memcpy call occurs in gst_buffer_fill, the data from the input file will overwrite the content of the GstMapInfo info structure. Finally, during the call to gst_memory_unmap, the overwritten memory may cause a function pointer hijack, as the mem-&gt;allocator-&gt;mem_unmap_full function is called with a corrupted pointer. This function pointer overwrite could allow an attacker to alter the execution flow of the program, leading to arbitrary code execution. This vulnerability is fixed in 1.24.10.(CVE-2024-47606)
 GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_add_wvpk_header function within matroska-demux.c. This function does not properly check the validity of the stream-&gt;codec_priv pointer in the following code. If stream-&gt;codec_priv is NULL, the call to GST_READ_UINT16_LE will attempt to dereference a null pointer, leading to a crash of the application. This vulnerability is fixed in 1.24.10.(CVE-2024-47602)
 GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been detected in the function qtdemux_parse_samples within qtdemux.c. This issue arises when the function qtdemux_parse_samples reads data beyond the boundaries of the stream-&gt;stco buffer. The following code snippet shows the call to qt_atom_parser_get_offset_unchecked, which leads to the OOB-read when parsing the provided GHSL-2024-245_crash1.mp4 file. This issue may lead to read up to 8 bytes out-of-bounds. This vulnerability is fixed in 1.24.10.(CVE-2024-47597)
 GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been discovered in the qtdemux_parse_svq3_stsd_data function within qtdemux.c. In the FOURCC_SMI_ case, seqh_size is read from the input file without proper validation. If seqh_size is greater than the remaining size of the data buffer, it can lead to an OOB-read in the following call to gst_buffer_fill, which internally uses memcpy. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.(CVE-2024-47596)
 GStreamer is a library for constructing graphs of media-handling components. The program attempts to reallocate the memory pointed to by stream-&gt;samples to accommodate stream-&gt;n_samples + samples_count elements of type QtDemuxSample. The problem is that samples_count is read from the input file. And if this value is big enough, this can lead to an integer overflow during the addition. As a consequence, g_try_renew might allocate memory for a significantly smaller number of elements than intended. Following this, the program iterates through samples_count elements and attempts to write samples_count number of elements, potentially exceeding the actual allocated memory size and causing an OOB-write. This vulnerability is fixed in 1.24.10.(CVE-2024-47537)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47777" type="cve" title="fix CVE-2024-47777" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47775" type="cve" title="fix CVE-2024-47775" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47774" type="cve" title="fix CVE-2024-47774" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47543" type="cve" title="fix CVE-2024-47543" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47539" type="cve" title="fix CVE-2024-47539" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47834" type="cve" title="fix CVE-2024-47834" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47778" type="cve" title="fix CVE-2024-47778" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47776" type="cve" title="fix CVE-2024-47776" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47613" type="cve" title="fix CVE-2024-47613" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47601" type="cve" title="fix CVE-2024-47601" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47546" type="cve" title="fix CVE-2024-47546" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47540" type="cve" title="fix CVE-2024-47540" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47606" type="cve" title="fix CVE-2024-47606" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47602" type="cve" title="fix CVE-2024-47602" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47597" type="cve" title="fix CVE-2024-47597" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47596" type="cve" title="fix CVE-2024-47596" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47537" type="cve" title="fix CVE-2024-47537" />
    </references>
    <pkglist>
      <collection>
        <package name="gstreamer1-plugins-good" version="1.16.2" release="7.uel20" epoch="0" arch="x86_64" src="gstreamer1-plugins-good-1.16.2-7.uel20.src.rpm">
          <filename>gstreamer1-plugins-good-1.16.2-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="gstreamer1-plugins-good-gtk" version="1.16.2" release="7.uel20" epoch="0" arch="x86_64" src="gstreamer1-plugins-good-1.16.2-7.uel20.src.rpm">
          <filename>gstreamer1-plugins-good-gtk-1.16.2-7.uel20.x86_64.rpm</filename>
        </package>
        <package name="gstreamer1-plugins-good" version="1.16.2" release="7.uel20" epoch="0" arch="aarch64" src="gstreamer1-plugins-good-1.16.2-7.uel20.src.rpm">
          <filename>gstreamer1-plugins-good-1.16.2-7.uel20.aarch64.rpm</filename>
        </package>
        <package name="gstreamer1-plugins-good-help" version="1.16.2" release="7.uel20" epoch="0" arch="noarch" src="gstreamer1-plugins-good-1.16.2-7.uel20.src.rpm">
          <filename>gstreamer1-plugins-good-help-1.16.2-7.uel20.noarch.rpm</filename>
        </package>
        <package name="gstreamer1-plugins-good-gtk" version="1.16.2" release="7.uel20" epoch="0" arch="aarch64" src="gstreamer1-plugins-good-1.16.2-7.uel20.src.rpm">
          <filename>gstreamer1-plugins-good-gtk-1.16.2-7.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20008</id>
    <title>Important: gstreamer1-plugins-base security update</title>
    <updated date="2024-12-23 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: gstreamer1-plugins-base security update</summary>
    <description> GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference has been discovered in the id3v2_read_synch_uint function, located in id3v2.c. If id3v2_read_synch_uint is called with a null work-&gt;hdr.frame_data, the pointer guint8 *data is accessed without validation, resulting in a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.(CVE-2024-47542)
 GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been detected in the parse_lrc function within gstsubparse.c. The parse_lrc function calls strchr() to find the character ']' in the string line. The pointer returned by this call is then passed to g_strdup(). However, if the string line does not contain the character ']', strchr() returns NULL, and a call to g_strdup(start + 1) leads to a null pointer dereference. This vulnerability is fixed in 1.24.10.(CVE-2024-47835)
 GStreamer is a library for constructing graphs of media-handling components.  stack-buffer overflow has been detected in the gst_opus_dec_parse_header function within `gstopusdec.c'. The pos array is a stack-allocated buffer of size 64. If n_channels exceeds 64, the for loop will write beyond the boundaries of the pos array. The value written will always be GST_AUDIO_CHANNEL_POSITION_NONE. This bug allows to overwrite the EIP address allocated in the stack. This vulnerability is fixed in 1.24.10.(CVE-2024-47607)
 GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been detected in the format_channel_mask function in gst-discoverer.c. The vulnerability affects the local array position, which is defined with a fixed size of 64 elements. However, the function gst_discoverer_audio_info_get_channels may return a guint channels value greater than 64. This causes the for loop to attempt access beyond the bounds of the position array, resulting in an OOB-read when an index greater than 63 is used. This vulnerability can result in reading unintended bytes from the stack. Additionally, the dereference of value-&gt;value_nick after the OOB-read can lead to further memory corruption or undefined behavior. This vulnerability is fixed in 1.24.10.(CVE-2024-47600)
 GStreamer is a library for constructing graphs of media-handling components. An OOB-Write has been detected in the function gst_parse_vorbis_setup_packet within vorbis_parse.c. The integer size is read from the input file without proper validation. As a result, size can exceed the fixed size of the pad-&gt;vorbis_mode_sizes array (which size is 256). When this happens, the for loop overwrites the entire pad structure with 0s and 1s, affecting adjacent memory as well. This OOB-write can overwrite up to 380 bytes of memory beyond the boundaries of the pad-&gt;vorbis_mode_sizes array. This vulnerability is fixed in 1.24.10.(CVE-2024-47615)
 GStreamer is a library for constructing graphs of media-handling components. An OOB-write vulnerability has been identified in the gst_ssa_parse_remove_override_codes function of the gstssaparse.c file. This function is responsible for parsing and removing SSA (SubStation Alpha) style override codes, which are enclosed in curly brackets ({}). The issue arises when a closing curly bracket "}" appears before an opening curly bracket "{" in the input string. In this case, memmove() incorrectly duplicates a substring. With each successive loop iteration, the size passed to memmove() becomes progressively larger (strlen(end+1)), leading to a write beyond the allocated memory bounds. This vulnerability is fixed in 1.24.10.(CVE-2024-47541)
 GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the `vorbis_handle_identification_packet` function within `gstvorbisdec.c`. The position array is a stack-allocated buffer of size 64. If vd-&gt;vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array. The value written will always be `GST_AUDIO_CHANNEL_POSITION_NONE`. This vulnerability allows someone to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the `GstAudioInfo` info structure. This vulnerability is fixed in 1.24.10.(CVE-2024-47538)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47542" type="cve" title="fix CVE-2024-47542" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47835" type="cve" title="fix CVE-2024-47835" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47607" type="cve" title="fix CVE-2024-47607" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47600" type="cve" title="fix CVE-2024-47600" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47615" type="cve" title="fix CVE-2024-47615" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47541" type="cve" title="fix CVE-2024-47541" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47538" type="cve" title="fix CVE-2024-47538" />
    </references>
    <pkglist>
      <collection>
        <package name="gstreamer1-plugins-base" version="1.16.2" release="6.uel20" epoch="0" arch="x86_64" src="gstreamer1-plugins-base-1.16.2-6.uel20.src.rpm">
          <filename>gstreamer1-plugins-base-1.16.2-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="gstreamer1-plugins-base-devel" version="1.16.2" release="6.uel20" epoch="0" arch="x86_64" src="gstreamer1-plugins-base-1.16.2-6.uel20.src.rpm">
          <filename>gstreamer1-plugins-base-devel-1.16.2-6.uel20.x86_64.rpm</filename>
        </package>
        <package name="gstreamer1-plugins-base-help" version="1.16.2" release="6.uel20" epoch="0" arch="noarch" src="gstreamer1-plugins-base-1.16.2-6.uel20.src.rpm">
          <filename>gstreamer1-plugins-base-help-1.16.2-6.uel20.noarch.rpm</filename>
        </package>
        <package name="gstreamer1-plugins-base" version="1.16.2" release="6.uel20" epoch="0" arch="aarch64" src="gstreamer1-plugins-base-1.16.2-6.uel20.src.rpm">
          <filename>gstreamer1-plugins-base-1.16.2-6.uel20.aarch64.rpm</filename>
        </package>
        <package name="gstreamer1-plugins-base-devel" version="1.16.2" release="6.uel20" epoch="0" arch="aarch64" src="gstreamer1-plugins-base-1.16.2-6.uel20.src.rpm">
          <filename>gstreamer1-plugins-base-devel-1.16.2-6.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20009</id>
    <title>Important: xstream security update</title>
    <updated date="2024-11-13 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: xstream security update</summary>
    <description> XStream is a simple library to serialize objects to XML and back again. This vulnerability may allow a remote attacker to terminate the application with a stack overflow error resulting in a denial of service only by manipulating the processed input stream when XStream is configured to use the BinaryStreamDriver. XStream 1.4.21 has been patched to detect the manipulation in the binary input stream causing the the stack overflow and raises an InputManipulationException instead. Users are advised to upgrade. Users unable to upgrade may catch the StackOverflowError in the client code calling XStream if XStream is configured to use the BinaryStreamDriver.(CVE-2024-47072)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47072" type="cve" title="fix CVE-2024-47072" />
    </references>
    <pkglist>
      <collection>
        <package name="xstream" version="1.4.20" release="2.uel20" epoch="0" arch="noarch" src="xstream-1.4.20-2.uel20.src.rpm">
          <filename>xstream-1.4.20-2.uel20.noarch.rpm</filename>
        </package>
        <package name="xstream-hibernate" version="1.4.20" release="2.uel20" epoch="0" arch="noarch" src="xstream-1.4.20-2.uel20.src.rpm">
          <filename>xstream-hibernate-1.4.20-2.uel20.noarch.rpm</filename>
        </package>
        <package name="xstream-javadoc" version="1.4.20" release="2.uel20" epoch="0" arch="noarch" src="xstream-1.4.20-2.uel20.src.rpm">
          <filename>xstream-javadoc-1.4.20-2.uel20.noarch.rpm</filename>
        </package>
        <package name="xstream-benchmark" version="1.4.20" release="2.uel20" epoch="0" arch="noarch" src="xstream-1.4.20-2.uel20.src.rpm">
          <filename>xstream-benchmark-1.4.20-2.uel20.noarch.rpm</filename>
        </package>
        <package name="xstream-parent" version="1.4.20" release="2.uel20" epoch="0" arch="noarch" src="xstream-1.4.20-2.uel20.src.rpm">
          <filename>xstream-parent-1.4.20-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20010</id>
    <title>Important: ghostscript security update</title>
    <updated date="2024-11-15 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: ghostscript security update</summary>
    <description> An issue was discovered in base/gsdevice.c in Artifex Ghostscript before 10.04.0. An integer overflow when parsing the filename format string (for the output filename) results in path truncation, and possible path traversal and code execution.(CVE-2024-46953)
 An issue was discovered in psi/zfile.c in Artifex Ghostscript before 10.04.0. Out-of-bounds data access in filenameforall can lead to arbitrary code execution.(CVE-2024-46956)
 An issue was discovered in psi/zcolor.c in Artifex Ghostscript before 10.04.0. There is an out-of-bounds read when reading color in Indexed color space.(CVE-2024-46955)
 An issue was discovered in psi/zcolor.c in Artifex Ghostscript before 10.04.0. An unchecked Implementation pointer in Pattern color space could lead to arbitrary code execution.(CVE-2024-46951)
 An issue was discovered in Artifex Ghostscript before 10.03.1. contrib/opvp/gdevopvp.c allows arbitrary code execution via a custom Driver library, exploitable via a crafted PostScript document. This occurs because the Driver parameter for opvp (and oprp) devices can have an arbitrary name for a dynamic library; this library is then loaded.(CVE-2024-33871)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-46953" type="cve" title="fix CVE-2024-46953" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-46956" type="cve" title="fix CVE-2024-46956" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-46955" type="cve" title="fix CVE-2024-46955" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-46951" type="cve" title="fix CVE-2024-46951" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-33871" type="cve" title="fix CVE-2024-33871" />
    </references>
    <pkglist>
      <collection>
        <package name="ghostscript" version="9.52" release="20.uel20.01" epoch="0" arch="x86_64" src="ghostscript-9.52-20.uel20.01.src.rpm">
          <filename>ghostscript-9.52-20.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="ghostscript-devel" version="9.52" release="20.uel20.01" epoch="0" arch="x86_64" src="ghostscript-9.52-20.uel20.01.src.rpm">
          <filename>ghostscript-devel-9.52-20.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="ghostscript-tools-dvipdf" version="9.52" release="20.uel20.01" epoch="0" arch="x86_64" src="ghostscript-9.52-20.uel20.01.src.rpm">
          <filename>ghostscript-tools-dvipdf-9.52-20.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="ghostscript" version="9.52" release="20.uel20.01" epoch="0" arch="aarch64" src="ghostscript-9.52-20.uel20.01.src.rpm">
          <filename>ghostscript-9.52-20.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="ghostscript-devel" version="9.52" release="20.uel20.01" epoch="0" arch="aarch64" src="ghostscript-9.52-20.uel20.01.src.rpm">
          <filename>ghostscript-devel-9.52-20.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="ghostscript-help" version="9.52" release="20.uel20.01" epoch="0" arch="noarch" src="ghostscript-9.52-20.uel20.01.src.rpm">
          <filename>ghostscript-help-9.52-20.uel20.01.noarch.rpm</filename>
        </package>
        <package name="ghostscript-tools-dvipdf" version="9.52" release="20.uel20.01" epoch="0" arch="aarch64" src="ghostscript-9.52-20.uel20.01.src.rpm">
          <filename>ghostscript-tools-dvipdf-9.52-20.uel20.01.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20011</id>
    <title>Critical: ffmpeg security update</title>
    <updated date="2024-12-17 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: ffmpeg security update</summary>
    <description> FFmpeg n7.0 is affected by a Double Free via the rkmpp_retrieve_frame function within libavcodec/rkmppdec.c.(CVE-2024-35368)
 An integer overflow in the component /libavformat/westwood_vqa.c of FFmpeg n6.1.1 allows attackers to cause a denial of service in the application via a crafted VQA file.(CVE-2024-36616)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-35368" type="cve" title="fix CVE-2024-35368" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-36616" type="cve" title="fix CVE-2024-36616" />
    </references>
    <pkglist>
      <collection>
        <package name="ffmpeg-libs" version="4.2.4" release="19.uel20.02" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-19.uel20.02.src.rpm">
          <filename>ffmpeg-libs-4.2.4-19.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg" version="4.2.4" release="19.uel20.02" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-19.uel20.02.src.rpm">
          <filename>ffmpeg-4.2.4-19.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg-devel" version="4.2.4" release="19.uel20.02" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-19.uel20.02.src.rpm">
          <filename>ffmpeg-devel-4.2.4-19.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="libavdevice" version="4.2.4" release="19.uel20.02" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-19.uel20.02.src.rpm">
          <filename>libavdevice-4.2.4-19.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg-libs" version="4.2.4" release="19.uel20.02" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-19.uel20.02.src.rpm">
          <filename>ffmpeg-libs-4.2.4-19.uel20.02.aarch64.rpm</filename>
        </package>
        <package name="ffmpeg-devel" version="4.2.4" release="19.uel20.02" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-19.uel20.02.src.rpm">
          <filename>ffmpeg-devel-4.2.4-19.uel20.02.aarch64.rpm</filename>
        </package>
        <package name="ffmpeg" version="4.2.4" release="19.uel20.02" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-19.uel20.02.src.rpm">
          <filename>ffmpeg-4.2.4-19.uel20.02.aarch64.rpm</filename>
        </package>
        <package name="libavdevice" version="4.2.4" release="19.uel20.02" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-19.uel20.02.src.rpm">
          <filename>libavdevice-4.2.4-19.uel20.02.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20012</id>
    <title>Critical: ffmpeg security update</title>
    <updated date="2024-12-05 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: ffmpeg security update</summary>
    <description> FFmpeg n6.1.1 has an Out-of-bounds Read via libavcodec/ppc/vp8dsp_altivec.c, static const vec_s8 h_subpel_filters_outer(CVE-2024-35367)
 FFmpeg n6.1.1 is Integer Overflow. The vulnerability exists in the parse_options function of sbgdec.c within the libavformat module. When parsing certain options, the software does not adequately validate the input. This allows for negative duration values to be accepted without proper bounds checking.(CVE-2024-35366)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-35367" type="cve" title="fix CVE-2024-35367" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-35366" type="cve" title="fix CVE-2024-35366" />
    </references>
    <pkglist>
      <collection>
        <package name="ffmpeg-libs" version="4.2.4" release="19.uel20.01" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-19.uel20.01.src.rpm">
          <filename>ffmpeg-libs-4.2.4-19.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg-devel" version="4.2.4" release="19.uel20.01" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-19.uel20.01.src.rpm">
          <filename>ffmpeg-devel-4.2.4-19.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg" version="4.2.4" release="19.uel20.01" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-19.uel20.01.src.rpm">
          <filename>ffmpeg-4.2.4-19.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="libavdevice" version="4.2.4" release="19.uel20.01" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-19.uel20.01.src.rpm">
          <filename>libavdevice-4.2.4-19.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg" version="4.2.4" release="19.uel20.01" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-19.uel20.01.src.rpm">
          <filename>ffmpeg-4.2.4-19.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="ffmpeg-devel" version="4.2.4" release="19.uel20.01" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-19.uel20.01.src.rpm">
          <filename>ffmpeg-devel-4.2.4-19.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="ffmpeg-libs" version="4.2.4" release="19.uel20.01" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-19.uel20.01.src.rpm">
          <filename>ffmpeg-libs-4.2.4-19.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="libavdevice" version="4.2.4" release="19.uel20.01" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-19.uel20.01.src.rpm">
          <filename>libavdevice-4.2.4-19.uel20.01.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20013</id>
    <title>Important: redis6 security update</title>
    <updated date="2024-11-05 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: redis6 security update</summary>
    <description> Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.(CVE-2024-31449)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-31449" type="cve" title="fix CVE-2024-31449" />
    </references>
    <pkglist>
      <collection>
        <package name="redis6" version="6.2.7" release="2.uel20.01" epoch="0" arch="x86_64" src="redis6-6.2.7-2.uel20.01.src.rpm">
          <filename>redis6-6.2.7-2.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="redis6-devel" version="6.2.7" release="2.uel20.01" epoch="0" arch="x86_64" src="redis6-6.2.7-2.uel20.01.src.rpm">
          <filename>redis6-devel-6.2.7-2.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="redis6" version="6.2.7" release="2.uel20.01" epoch="0" arch="aarch64" src="redis6-6.2.7-2.uel20.01.src.rpm">
          <filename>redis6-6.2.7-2.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="redis6-doc" version="6.2.7" release="2.uel20.01" epoch="0" arch="noarch" src="redis6-6.2.7-2.uel20.01.src.rpm">
          <filename>redis6-doc-6.2.7-2.uel20.01.noarch.rpm</filename>
        </package>
        <package name="redis6-devel" version="6.2.7" release="2.uel20.01" epoch="0" arch="aarch64" src="redis6-6.2.7-2.uel20.01.src.rpm">
          <filename>redis6-devel-6.2.7-2.uel20.01.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20014</id>
    <title>Important: microcode_ctl security update</title>
    <updated date="2024-11-22 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: microcode_ctl security update</summary>
    <description> Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2024-23918)
 Incorrect default permissions in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2024-21820)
 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2024-24968)
 ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2024-23984)
 Improper finite state machines (FSMs) in the hardware logic in some 4th and 5th Generation Intel(R) Xeon(R) Processors may allow an authorized user to potentially enable denial of service via local access.(CVE-2024-21853)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-23918" type="cve" title="fix CVE-2024-23918" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21820" type="cve" title="fix CVE-2024-21820" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-24968" type="cve" title="fix CVE-2024-24968" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-23984" type="cve" title="fix CVE-2024-23984" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21853" type="cve" title="fix CVE-2024-21853" />
    </references>
    <pkglist>
      <collection>
        <package name="microcode_ctl" version="20241112" release="1.uel20.01" epoch="4" arch="x86_64" src="microcode_ctl-20241112-1.uel20.01.src.rpm">
          <filename>microcode_ctl-20241112-1.uel20.01.x86_64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20015</id>
    <title>Moderate: unbound security update</title>
    <updated date="2024-10-17 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: unbound security update</summary>
    <description> NLnet Labs Unbound up to and including version 1.21.0 contains a vulnerability when handling replies with very large RRsets that it needs to perform name compression for. Malicious upstreams responses with very large RRsets can cause Unbound to spend a considerable time applying name compression to downstream replies. This can lead to degraded performance and eventually denial of service in well orchestrated attacks. The vulnerability can be exploited by a malicious actor querying Unbound for the specially crafted contents of a malicious zone with very large RRsets. Before Unbound replies to the query it will try to apply name compression which was an unbounded operation that could lock the CPU until the whole packet was complete. Unbound version 1.21.1 introduces a hard limit on the number of name compression calculations it is willing to do per packet. Packets that need more compression will result in semi-compressed packets or truncated packets, even on TCP for huge messages, to avoid locking the CPU for long. This change should not affect normal DNS traffic.(CVE-2024-8508)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-8508" type="cve" title="fix CVE-2024-8508" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-unbound" version="1.16.2" release="5.uel20.07" epoch="0" arch="x86_64" src="unbound-1.16.2-5.uel20.07.src.rpm">
          <filename>python3-unbound-1.16.2-5.uel20.07.x86_64.rpm</filename>
        </package>
        <package name="unbound-libs" version="1.16.2" release="5.uel20.07" epoch="0" arch="x86_64" src="unbound-1.16.2-5.uel20.07.src.rpm">
          <filename>unbound-libs-1.16.2-5.uel20.07.x86_64.rpm</filename>
        </package>
        <package name="unbound-devel" version="1.16.2" release="5.uel20.07" epoch="0" arch="x86_64" src="unbound-1.16.2-5.uel20.07.src.rpm">
          <filename>unbound-devel-1.16.2-5.uel20.07.x86_64.rpm</filename>
        </package>
        <package name="unbound-anchor" version="1.16.2" release="5.uel20.07" epoch="0" arch="x86_64" src="unbound-1.16.2-5.uel20.07.src.rpm">
          <filename>unbound-anchor-1.16.2-5.uel20.07.x86_64.rpm</filename>
        </package>
        <package name="unbound-help" version="1.16.2" release="5.uel20.07" epoch="0" arch="x86_64" src="unbound-1.16.2-5.uel20.07.src.rpm">
          <filename>unbound-help-1.16.2-5.uel20.07.x86_64.rpm</filename>
        </package>
        <package name="unbound" version="1.16.2" release="5.uel20.07" epoch="0" arch="x86_64" src="unbound-1.16.2-5.uel20.07.src.rpm">
          <filename>unbound-1.16.2-5.uel20.07.x86_64.rpm</filename>
        </package>
        <package name="python3-unbound" version="1.16.2" release="5.uel20.07" epoch="0" arch="aarch64" src="unbound-1.16.2-5.uel20.07.src.rpm">
          <filename>python3-unbound-1.16.2-5.uel20.07.aarch64.rpm</filename>
        </package>
        <package name="unbound-anchor" version="1.16.2" release="5.uel20.07" epoch="0" arch="aarch64" src="unbound-1.16.2-5.uel20.07.src.rpm">
          <filename>unbound-anchor-1.16.2-5.uel20.07.aarch64.rpm</filename>
        </package>
        <package name="unbound-help" version="1.16.2" release="5.uel20.07" epoch="0" arch="aarch64" src="unbound-1.16.2-5.uel20.07.src.rpm">
          <filename>unbound-help-1.16.2-5.uel20.07.aarch64.rpm</filename>
        </package>
        <package name="unbound" version="1.16.2" release="5.uel20.07" epoch="0" arch="aarch64" src="unbound-1.16.2-5.uel20.07.src.rpm">
          <filename>unbound-1.16.2-5.uel20.07.aarch64.rpm</filename>
        </package>
        <package name="unbound-libs" version="1.16.2" release="5.uel20.07" epoch="0" arch="aarch64" src="unbound-1.16.2-5.uel20.07.src.rpm">
          <filename>unbound-libs-1.16.2-5.uel20.07.aarch64.rpm</filename>
        </package>
        <package name="unbound-devel" version="1.16.2" release="5.uel20.07" epoch="0" arch="aarch64" src="unbound-1.16.2-5.uel20.07.src.rpm">
          <filename>unbound-devel-1.16.2-5.uel20.07.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20016</id>
    <title>Critical: tomcat security update</title>
    <updated date="2024-12-21 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: tomcat security update</summary>
    <description> Uncontrolled Resource Consumption vulnerability in the examples web application provided with Apache Tomcat leads to denial of service.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.9.97.

Users are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.(CVE-2024-54677)
 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration).

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.

Users are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.(CVE-2024-50379)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-54677" type="cve" title="fix CVE-2024-54677" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-50379" type="cve" title="fix CVE-2024-50379" />
    </references>
    <pkglist>
      <collection>
        <package name="tomcat" version="9.0.96" release="4.up1.uel20" epoch="1" arch="noarch" src="tomcat-9.0.96-4.up1.uel20.src.rpm">
          <filename>tomcat-9.0.96-4.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="tomcat-jsvc" version="9.0.96" release="4.up1.uel20" epoch="1" arch="noarch" src="tomcat-9.0.96-4.up1.uel20.src.rpm">
          <filename>tomcat-jsvc-9.0.96-4.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="tomcat-embed" version="9.0.96" release="4.up1.uel20" epoch="1" arch="noarch" src="tomcat-9.0.96-4.up1.uel20.src.rpm">
          <filename>tomcat-embed-9.0.96-4.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="tomcat-help" version="9.0.96" release="4.up1.uel20" epoch="1" arch="noarch" src="tomcat-9.0.96-4.up1.uel20.src.rpm">
          <filename>tomcat-help-9.0.96-4.up1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20017</id>
    <title>Moderate: tomcat security update</title>
    <updated date="2024-11-29 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: tomcat security update</summary>
    <description> Incorrect object recycling and reuse vulnerability in Apache Tomcat.

This issue affects Apache Tomcat: 11.0.0, 10.1.31, 9.0.96.

Users are recommended to upgrade to version 11.0.1, 10.1.32 or 9.0.97, which fixes the issue.(CVE-2024-52318)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-52318" type="cve" title="fix CVE-2024-52318" />
    </references>
    <pkglist>
      <collection>
        <package name="tomcat-jsvc" version="9.0.96" release="2.up1.uel20" epoch="1" arch="noarch" src="tomcat-9.0.96-2.up1.uel20.src.rpm">
          <filename>tomcat-jsvc-9.0.96-2.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="tomcat-embed" version="9.0.96" release="2.up1.uel20" epoch="1" arch="noarch" src="tomcat-9.0.96-2.up1.uel20.src.rpm">
          <filename>tomcat-embed-9.0.96-2.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="tomcat-help" version="9.0.96" release="2.up1.uel20" epoch="1" arch="noarch" src="tomcat-9.0.96-2.up1.uel20.src.rpm">
          <filename>tomcat-help-9.0.96-2.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="tomcat" version="9.0.96" release="2.up1.uel20" epoch="1" arch="noarch" src="tomcat-9.0.96-2.up1.uel20.src.rpm">
          <filename>tomcat-9.0.96-2.up1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20018</id>
    <title>Critical: apache-mina security update</title>
    <updated date="2025-01-02 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: apache-mina security update</summary>
    <description> The ObjectSerializationDecoder in Apache MINA uses Java’s native deserialization protocol to process
incoming serialized data but lacks the necessary security checks and defenses. This vulnerability allows
attackers to exploit the deserialization process by sending specially crafted malicious serialized data,
potentially leading to remote code execution (RCE) attacks.



					


				


			


		


	
This issue affects MINA core versions 2.0.X, 2.1.X and 2.2.X, and will be fixed by the releases 2.0.27, 2.1.10 and 2.2.4.





It's also important to note that an application using MINA core library will only be affected if the IoBuffer#getObject() method is called, and this specific method is potentially called when adding a ProtocolCodecFilter instance using the ObjectSerializationCodecFactory class in the filter chain. If your application is specifically using those classes, you have to upgrade to the latest version of MINA core library.




Upgrading will  not be enough: you also need to explicitly allow the classes the decoder will accept in the ObjectSerializationDecoder instance, using one of the three new methods:




    /**

     * Accept class names where the supplied ClassNameMatcher matches for

     * deserialization, unless they are otherwise rejected.

     *

     * @param classNameMatcher the matcher to use

     */

    public void accept(ClassNameMatcher classNameMatcher)




    /**

     * Accept class names that match the supplied pattern for

     * deserialization, unless they are otherwise rejected.

     *

     * @param pattern standard Java regexp

     */

    public void accept(Pattern pattern) 





    /**

     * Accept the wildcard specified classes for deserialization,

     * unless they are otherwise rejected.

     *

     * @param patterns Wildcard file name patterns as defined by

     *                  {@link org.apache.commons.io.FilenameUtils#wildcardMatch(String, String) FilenameUtils.wildcardMatch}

     */

    public void accept(String... patterns)







By default, the decoder will reject *all* classes that will be present in the incoming data.







Note: The FtpServer, SSHd and Vysper sub-project are not affected by this issue.(CVE-2024-52046)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-52046" type="cve" title="fix CVE-2024-52046" />
    </references>
    <pkglist>
      <collection>
        <package name="apache-mina-javadoc" version="2.0.27" release="1.uel20" epoch="0" arch="noarch" src="apache-mina-2.0.27-1.uel20.src.rpm">
          <filename>apache-mina-javadoc-2.0.27-1.uel20.noarch.rpm</filename>
        </package>
        <package name="apache-mina-mina-http" version="2.0.27" release="1.uel20" epoch="0" arch="noarch" src="apache-mina-2.0.27-1.uel20.src.rpm">
          <filename>apache-mina-mina-http-2.0.27-1.uel20.noarch.rpm</filename>
        </package>
        <package name="apache-mina" version="2.0.27" release="1.uel20" epoch="0" arch="noarch" src="apache-mina-2.0.27-1.uel20.src.rpm">
          <filename>apache-mina-2.0.27-1.uel20.noarch.rpm</filename>
        </package>
        <package name="apache-mina-mina-filter-compression" version="2.0.27" release="1.uel20" epoch="0" arch="noarch" src="apache-mina-2.0.27-1.uel20.src.rpm">
          <filename>apache-mina-mina-filter-compression-2.0.27-1.uel20.noarch.rpm</filename>
        </package>
        <package name="apache-mina-mina-core" version="2.0.27" release="1.uel20" epoch="0" arch="noarch" src="apache-mina-2.0.27-1.uel20.src.rpm">
          <filename>apache-mina-mina-core-2.0.27-1.uel20.noarch.rpm</filename>
        </package>
        <package name="apache-mina-mina-statemachine" version="2.0.27" release="1.uel20" epoch="0" arch="noarch" src="apache-mina-2.0.27-1.uel20.src.rpm">
          <filename>apache-mina-mina-statemachine-2.0.27-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20019</id>
    <title>Moderate: expat security update</title>
    <updated date="2024-11-01 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: expat security update</summary>
    <description> An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.(CVE-2024-50602)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-50602" type="cve" title="fix CVE-2024-50602" />
    </references>
    <pkglist>
      <collection>
        <package name="expat" version="2.2.9" release="15.uel20" epoch="0" arch="x86_64" src="expat-2.2.9-15.uel20.src.rpm">
          <filename>expat-2.2.9-15.uel20.x86_64.rpm</filename>
        </package>
        <package name="expat-devel" version="2.2.9" release="15.uel20" epoch="0" arch="x86_64" src="expat-2.2.9-15.uel20.src.rpm">
          <filename>expat-devel-2.2.9-15.uel20.x86_64.rpm</filename>
        </package>
        <package name="expat-help" version="2.2.9" release="15.uel20" epoch="0" arch="noarch" src="expat-2.2.9-15.uel20.src.rpm">
          <filename>expat-help-2.2.9-15.uel20.noarch.rpm</filename>
        </package>
        <package name="expat-devel" version="2.2.9" release="15.uel20" epoch="0" arch="aarch64" src="expat-2.2.9-15.uel20.src.rpm">
          <filename>expat-devel-2.2.9-15.uel20.aarch64.rpm</filename>
        </package>
        <package name="expat" version="2.2.9" release="15.uel20" epoch="0" arch="aarch64" src="expat-2.2.9-15.uel20.src.rpm">
          <filename>expat-2.2.9-15.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20020</id>
    <title>Moderate: ruby security update</title>
    <updated date="2024-11-01 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: ruby security update</summary>
    <description> REXML is an XML toolkit for Ruby. The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between &amp;# and x...; in a hex numeric character reference (&amp;#x...;). This does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. The REXML gem 3.3.9 or later include the patch to fix the vulnerability.(CVE-2024-49761)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-49761" type="cve" title="fix CVE-2024-49761" />
    </references>
    <pkglist>
      <collection>
        <package name="ruby" version="2.5.8" release="131.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>ruby-2.5.8-131.uel20.x86_64.rpm</filename>
        </package>
        <package name="ruby-devel" version="2.5.8" release="131.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>ruby-devel-2.5.8-131.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-bigdecimal" version="1.3.4" release="131.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>rubygem-bigdecimal-1.3.4-131.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-openssl" version="2.1.2" release="131.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>rubygem-openssl-2.1.2-131.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-json" version="2.1.0" release="131.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>rubygem-json-2.1.0-131.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-psych" version="3.0.2" release="131.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>rubygem-psych-3.0.2-131.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-io-console" version="0.4.6" release="131.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>rubygem-io-console-0.4.6-131.uel20.x86_64.rpm</filename>
        </package>
        <package name="ruby-help" version="2.5.8" release="131.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>ruby-help-2.5.8-131.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygems" version="2.7.6" release="131.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>rubygems-2.7.6-131.uel20.noarch.rpm</filename>
        </package>
        <package name="ruby" version="2.5.8" release="131.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>ruby-2.5.8-131.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-json" version="2.1.0" release="131.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>rubygem-json-2.1.0-131.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-io-console" version="0.4.6" release="131.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>rubygem-io-console-0.4.6-131.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-rake" version="12.3.0" release="131.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>rubygem-rake-12.3.0-131.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-power_assert" version="1.1.1" release="131.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>rubygem-power_assert-1.1.1-131.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-minitest" version="5.10.3" release="131.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>rubygem-minitest-5.10.3-131.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-test-unit" version="3.2.7" release="131.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>rubygem-test-unit-3.2.7-131.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-rdoc" version="6.0.1.1" release="131.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>rubygem-rdoc-6.0.1.1-131.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-did_you_mean" version="1.2.0" release="131.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>rubygem-did_you_mean-1.2.0-131.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-openssl" version="2.1.2" release="131.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>rubygem-openssl-2.1.2-131.uel20.aarch64.rpm</filename>
        </package>
        <package name="ruby-irb" version="2.5.8" release="131.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>ruby-irb-2.5.8-131.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-psych" version="3.0.2" release="131.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>rubygem-psych-3.0.2-131.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-xmlrpc" version="0.3.0" release="131.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>rubygem-xmlrpc-0.3.0-131.uel20.noarch.rpm</filename>
        </package>
        <package name="ruby-devel" version="2.5.8" release="131.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>ruby-devel-2.5.8-131.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-net-telnet" version="0.1.1" release="131.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>rubygem-net-telnet-0.1.1-131.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygems-devel" version="2.7.6" release="131.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>rubygems-devel-2.7.6-131.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-bigdecimal" version="1.3.4" release="131.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-131.uel20.src.rpm">
          <filename>rubygem-bigdecimal-1.3.4-131.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20021</id>
    <title>Moderate: rubygem-actionpack security update</title>
    <updated date="2024-10-22 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: rubygem-actionpack security update</summary>
    <description> Action Pack is a framework for handling and responding to web requests. Starting in version 4.0.0 and prior to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, and 7.2.1.1, there is a possible ReDoS vulnerability in Action Controller's HTTP Token authentication. For applications using HTTP Token authentication via `authenticate_or_request_with_http_token` or similar, a carefully crafted header may cause header parsing to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, or 7.2.1.1 or apply the relevant patch immediately. One may choose to use Ruby 3.2 as a workaround.Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected.(CVE-2024-47887)
 Action Pack is a framework for handling and responding to web requests. Starting in version 3.1.0 and prior to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, and 7.2.1.1, there is a possible ReDoS vulnerability in the query parameter filtering routines of Action Dispatch. Carefully crafted query parameters can cause query parameter filtering to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade to version 6.1.7.9, 7.0.8.5, 7.1.4.1, or 7.2.1.1 or apply the relevant patch immediately. One may use Ruby 3.2 as a workaround. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected.(CVE-2024-41128)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47887" type="cve" title="fix CVE-2024-47887" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-41128" type="cve" title="fix CVE-2024-41128" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-actionpack" version="5.2.4.4" release="6.uel20" epoch="1" arch="noarch" src="rubygem-actionpack-5.2.4.4-6.uel20.src.rpm">
          <filename>rubygem-actionpack-5.2.4.4-6.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-actionpack-doc" version="5.2.4.4" release="6.uel20" epoch="1" arch="noarch" src="rubygem-actionpack-5.2.4.4-6.uel20.src.rpm">
          <filename>rubygem-actionpack-doc-5.2.4.4-6.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20022</id>
    <title>Important: pam security update</title>
    <updated date="2024-12-05 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: pam security update</summary>
    <description> A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.(CVE-2024-10963)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-10963" type="cve" title="fix CVE-2024-10963" />
    </references>
    <pkglist>
      <collection>
        <package name="pam" version="1.4.0" release="12.up1.uel20" epoch="0" arch="x86_64" src="pam-1.4.0-12.up1.uel20.src.rpm">
          <filename>pam-1.4.0-12.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="pam-devel" version="1.4.0" release="12.up1.uel20" epoch="0" arch="x86_64" src="pam-1.4.0-12.up1.uel20.src.rpm">
          <filename>pam-devel-1.4.0-12.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="pam-devel" version="1.4.0" release="12.up1.uel20" epoch="0" arch="aarch64" src="pam-1.4.0-12.up1.uel20.src.rpm">
          <filename>pam-devel-1.4.0-12.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="pam" version="1.4.0" release="12.up1.uel20" epoch="0" arch="aarch64" src="pam-1.4.0-12.up1.uel20.src.rpm">
          <filename>pam-1.4.0-12.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="pam-help" version="1.4.0" release="12.up1.uel20" epoch="0" arch="noarch" src="pam-1.4.0-12.up1.uel20.src.rpm">
          <filename>pam-help-1.4.0-12.up1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20023</id>
    <title>Moderate: wget security update</title>
    <updated date="2024-12-10 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: wget security update</summary>
    <description> Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host.(CVE-2024-10524)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-10524" type="cve" title="fix CVE-2024-10524" />
    </references>
    <pkglist>
      <collection>
        <package name="wget-help" version="1.20.3" release="4.up3.uel20" epoch="0" arch="x86_64" src="wget-1.20.3-4.up3.uel20.src.rpm">
          <filename>wget-help-1.20.3-4.up3.uel20.x86_64.rpm</filename>
        </package>
        <package name="wget" version="1.20.3" release="4.up3.uel20" epoch="0" arch="x86_64" src="wget-1.20.3-4.up3.uel20.src.rpm">
          <filename>wget-1.20.3-4.up3.uel20.x86_64.rpm</filename>
        </package>
        <package name="wget" version="1.20.3" release="4.up3.uel20" epoch="0" arch="aarch64" src="wget-1.20.3-4.up3.uel20.src.rpm">
          <filename>wget-1.20.3-4.up3.uel20.aarch64.rpm</filename>
        </package>
        <package name="wget-help" version="1.20.3" release="4.up3.uel20" epoch="0" arch="aarch64" src="wget-1.20.3-4.up3.uel20.src.rpm">
          <filename>wget-help-1.20.3-4.up3.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20024</id>
    <title>Important: deepin-log-viewer security update</title>
    <updated date="2024-11-25 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: deepin-log-viewer security update</summary>
    <description>fix cve/bug or enhancement</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="UT-2024-0036" type="cve" title="fix UT-2024-0036" />
    </references>
    <pkglist>
      <collection>
        <package name="deepin-log-viewer" version="6.1.18" release="1.uel20.05" epoch="0" arch="aarch64" src="deepin-log-viewer-6.1.18-1.uel20.05.src.rpm">
          <filename>deepin-log-viewer-6.1.18-1.uel20.05.aarch64.rpm</filename>
        </package>
        <package name="deepin-log-viewer-plugin-devel" version="6.1.18" release="1.uel20.05" epoch="0" arch="aarch64" src="deepin-log-viewer-6.1.18-1.uel20.05.src.rpm">
          <filename>deepin-log-viewer-plugin-devel-6.1.18-1.uel20.05.aarch64.rpm</filename>
        </package>
        <package name="deepin-log-viewer-plugin" version="6.1.18" release="1.uel20.05" epoch="0" arch="aarch64" src="deepin-log-viewer-6.1.18-1.uel20.05.src.rpm">
          <filename>deepin-log-viewer-plugin-6.1.18-1.uel20.05.aarch64.rpm</filename>
        </package>
        <package name="deepin-log-viewer" version="6.1.18" release="1.uel20.05" epoch="0" arch="x86_64" src="deepin-log-viewer-6.1.18-1.uel20.05.src.rpm">
          <filename>deepin-log-viewer-6.1.18-1.uel20.05.x86_64.rpm</filename>
        </package>
        <package name="deepin-log-viewer-plugin" version="6.1.18" release="1.uel20.05" epoch="0" arch="x86_64" src="deepin-log-viewer-6.1.18-1.uel20.05.src.rpm">
          <filename>deepin-log-viewer-plugin-6.1.18-1.uel20.05.x86_64.rpm</filename>
        </package>
        <package name="deepin-log-viewer-plugin-devel" version="6.1.18" release="1.uel20.05" epoch="0" arch="x86_64" src="deepin-log-viewer-6.1.18-1.uel20.05.src.rpm">
          <filename>deepin-log-viewer-plugin-devel-6.1.18-1.uel20.05.x86_64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20025</id>
    <title>Important: efl security update</title>
    <updated date="2024-11-26 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: efl security update</summary>
    <description>fix cve/bug or enhancement</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="UT-2024-0035" type="cve" title="fix UT-2024-0035" />
    </references>
    <pkglist>
      <collection>
        <package name="efl-devel" version="1.23.3" release="1.up2.uel20" epoch="0" arch="x86_64" src="efl-1.23.3-1.up2.uel20.src.rpm">
          <filename>efl-devel-1.23.3-1.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="efl" version="1.23.3" release="1.up2.uel20" epoch="0" arch="x86_64" src="efl-1.23.3-1.up2.uel20.src.rpm">
          <filename>efl-1.23.3-1.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="efl-devel" version="1.23.3" release="1.up2.uel20" epoch="0" arch="aarch64" src="efl-1.23.3-1.up2.uel20.src.rpm">
          <filename>efl-devel-1.23.3-1.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="efl" version="1.23.3" release="1.up2.uel20" epoch="0" arch="aarch64" src="efl-1.23.3-1.up2.uel20.src.rpm">
          <filename>efl-1.23.3-1.up2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20026</id>
    <title>Important: deepin-log-viewer security update</title>
    <updated date="2024-10-21 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: deepin-log-viewer security update</summary>
    <description>fix cve/bug or enhancement</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="UT-2024-0028" type="cve" title="fix UT-2024-0028" />
    </references>
    <pkglist>
      <collection>
        <package name="deepin-log-viewer-plugin-devel" version="6.1.18" release="1.uel20.03" epoch="0" arch="aarch64" src="deepin-log-viewer-6.1.18-1.uel20.03.src.rpm">
          <filename>deepin-log-viewer-plugin-devel-6.1.18-1.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="deepin-log-viewer-plugin" version="6.1.18" release="1.uel20.03" epoch="0" arch="aarch64" src="deepin-log-viewer-6.1.18-1.uel20.03.src.rpm">
          <filename>deepin-log-viewer-plugin-6.1.18-1.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="deepin-log-viewer" version="6.1.18" release="1.uel20.03" epoch="0" arch="aarch64" src="deepin-log-viewer-6.1.18-1.uel20.03.src.rpm">
          <filename>deepin-log-viewer-6.1.18-1.uel20.03.aarch64.rpm</filename>
        </package>
        <package name="deepin-log-viewer-plugin" version="6.1.18" release="1.uel20.03" epoch="0" arch="x86_64" src="deepin-log-viewer-6.1.18-1.uel20.03.src.rpm">
          <filename>deepin-log-viewer-plugin-6.1.18-1.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="deepin-log-viewer-plugin-devel" version="6.1.18" release="1.uel20.03" epoch="0" arch="x86_64" src="deepin-log-viewer-6.1.18-1.uel20.03.src.rpm">
          <filename>deepin-log-viewer-plugin-devel-6.1.18-1.uel20.03.x86_64.rpm</filename>
        </package>
        <package name="deepin-log-viewer" version="6.1.18" release="1.uel20.03" epoch="0" arch="x86_64" src="deepin-log-viewer-6.1.18-1.uel20.03.src.rpm">
          <filename>deepin-log-viewer-6.1.18-1.uel20.03.x86_64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20027</id>
    <title>Moderate: wireshark security update</title>
    <updated date="2024-10-11 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: wireshark security update</summary>
    <description> SPRT dissector crash in Wireshark 4.2.0 to 4.0.5 and 4.0.0 to 4.0.15 allows denial of service via packet injection or crafted capture file(CVE-2024-8645)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-8645" type="cve" title="fix CVE-2024-8645" />
    </references>
    <pkglist>
      <collection>
        <package name="wireshark-devel" version="3.6.14" release="11.uel20" epoch="1" arch="x86_64" src="wireshark-3.6.14-11.uel20.src.rpm">
          <filename>wireshark-devel-3.6.14-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="wireshark" version="3.6.14" release="11.uel20" epoch="1" arch="x86_64" src="wireshark-3.6.14-11.uel20.src.rpm">
          <filename>wireshark-3.6.14-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="wireshark-help" version="3.6.14" release="11.uel20" epoch="1" arch="x86_64" src="wireshark-3.6.14-11.uel20.src.rpm">
          <filename>wireshark-help-3.6.14-11.uel20.x86_64.rpm</filename>
        </package>
        <package name="wireshark" version="3.6.14" release="11.uel20" epoch="1" arch="aarch64" src="wireshark-3.6.14-11.uel20.src.rpm">
          <filename>wireshark-3.6.14-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="wireshark-devel" version="3.6.14" release="11.uel20" epoch="1" arch="aarch64" src="wireshark-3.6.14-11.uel20.src.rpm">
          <filename>wireshark-devel-3.6.14-11.uel20.aarch64.rpm</filename>
        </package>
        <package name="wireshark-help" version="3.6.14" release="11.uel20" epoch="1" arch="aarch64" src="wireshark-3.6.14-11.uel20.src.rpm">
          <filename>wireshark-help-3.6.14-11.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20028</id>
    <title>Moderate: opensc security update</title>
    <updated date="2024-10-10 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: opensc security update</summary>
    <description> A heap-based buffer overflow vulnerability was found in the libopensc OpenPGP driver. A crafted USB device or smart card with malicious responses to the APDUs during the card enrollment process using the `pkcs15-init` tool may lead to out-of-bound rights, possibly resulting in arbitrary code execution.(CVE-2024-8443)
 A vulnerability was found in the pkcs15-init tool in OpenSC. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed.(CVE-2024-45620)
 A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed.(CVE-2024-45619)
 A vulnerability was found in pkcs15-init in OpenSC. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. 

Insufficient or missing checking of return values of functions leads to unexpected work with variables that have not been initialized.(CVE-2024-45618)
 A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. 

Insufficient or missing checking of return values of functions leads to unexpected work with variables that have not been initialized.(CVE-2024-45617)
 A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. 

The following problems were caused by insufficient control of the response APDU buffer and its length when communicating with the card.(CVE-2024-45616)
 A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. 
The problem is missing  initialization of variables expected to be initialized (as arguments to other functions, etc.).(CVE-2024-45615)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-8443" type="cve" title="fix CVE-2024-8443" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-45620" type="cve" title="fix CVE-2024-45620" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-45619" type="cve" title="fix CVE-2024-45619" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-45618" type="cve" title="fix CVE-2024-45618" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-45617" type="cve" title="fix CVE-2024-45617" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-45616" type="cve" title="fix CVE-2024-45616" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-45615" type="cve" title="fix CVE-2024-45615" />
    </references>
    <pkglist>
      <collection>
        <package name="opensc" version="0.20.0" release="15.uel20" epoch="0" arch="x86_64" src="opensc-0.20.0-15.uel20.src.rpm">
          <filename>opensc-0.20.0-15.uel20.x86_64.rpm</filename>
        </package>
        <package name="opensc" version="0.20.0" release="15.uel20" epoch="0" arch="aarch64" src="opensc-0.20.0-15.uel20.src.rpm">
          <filename>opensc-0.20.0-15.uel20.aarch64.rpm</filename>
        </package>
        <package name="opensc-help" version="0.20.0" release="15.uel20" epoch="0" arch="noarch" src="opensc-0.20.0-15.uel20.src.rpm">
          <filename>opensc-help-0.20.0-15.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20029</id>
    <title>Moderate: libpcap security update</title>
    <updated date="2024-10-14 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: libpcap security update</summary>
    <description> Remote packet capture support is disabled by default in libpcap.  When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcap_findalldevs_ex().  One of the function arguments can be a filesystem path, which normally means a directory with input data files.  When the specified path cannot be used as a directory, the function receives NULL from opendir(), but does not check the return value and passes the NULL value to readdir(), which causes a NULL pointer derefence.(CVE-2024-8006)
 In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remains to be called after the function returns.  This makes it possible in some scenarios that both the function and its caller call freeaddrinfo() for the same allocated memory block.  A similar problem was reported in Apple libpcap, to which Apple assigned CVE-2023-40400.(CVE-2023-7256)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-8006" type="cve" title="fix CVE-2024-8006" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-7256" type="cve" title="fix CVE-2023-7256" />
    </references>
    <pkglist>
      <collection>
        <package name="libpcap-devel" version="1.9.1" release="7.uel20.01" epoch="14" arch="x86_64" src="libpcap-1.9.1-7.uel20.01.src.rpm">
          <filename>libpcap-devel-1.9.1-7.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="libpcap" version="1.9.1" release="7.uel20.01" epoch="14" arch="x86_64" src="libpcap-1.9.1-7.uel20.01.src.rpm">
          <filename>libpcap-1.9.1-7.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="libpcap-help" version="1.9.1" release="7.uel20.01" epoch="14" arch="noarch" src="libpcap-1.9.1-7.uel20.01.src.rpm">
          <filename>libpcap-help-1.9.1-7.uel20.01.noarch.rpm</filename>
        </package>
        <package name="libpcap-devel" version="1.9.1" release="7.uel20.01" epoch="14" arch="aarch64" src="libpcap-1.9.1-7.uel20.01.src.rpm">
          <filename>libpcap-devel-1.9.1-7.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="libpcap" version="1.9.1" release="7.uel20.01" epoch="14" arch="aarch64" src="libpcap-1.9.1-7.uel20.01.src.rpm">
          <filename>libpcap-1.9.1-7.uel20.01.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20030</id>
    <title>Moderate: nginx security update</title>
    <updated date="2024-09-26 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: nginx security update</summary>
    <description> NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.(CVE-2024-7347)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-7347" type="cve" title="fix CVE-2024-7347" />
    </references>
    <pkglist>
      <collection>
        <package name="nginx-mod-devel" version="1.21.5" release="5.uel20" epoch="1" arch="x86_64" src="nginx-1.21.5-5.uel20.src.rpm">
          <filename>nginx-mod-devel-1.21.5-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="nginx" version="1.21.5" release="5.uel20" epoch="1" arch="x86_64" src="nginx-1.21.5-5.uel20.src.rpm">
          <filename>nginx-1.21.5-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="nginx-mod-mail" version="1.21.5" release="5.uel20" epoch="1" arch="x86_64" src="nginx-1.21.5-5.uel20.src.rpm">
          <filename>nginx-mod-mail-1.21.5-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="nginx-mod-http-perl" version="1.21.5" release="5.uel20" epoch="1" arch="x86_64" src="nginx-1.21.5-5.uel20.src.rpm">
          <filename>nginx-mod-http-perl-1.21.5-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="nginx-mod-stream" version="1.21.5" release="5.uel20" epoch="1" arch="x86_64" src="nginx-1.21.5-5.uel20.src.rpm">
          <filename>nginx-mod-stream-1.21.5-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="nginx-mod-http-image-filter" version="1.21.5" release="5.uel20" epoch="1" arch="x86_64" src="nginx-1.21.5-5.uel20.src.rpm">
          <filename>nginx-mod-http-image-filter-1.21.5-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="nginx-mod-http-xslt-filter" version="1.21.5" release="5.uel20" epoch="1" arch="x86_64" src="nginx-1.21.5-5.uel20.src.rpm">
          <filename>nginx-mod-http-xslt-filter-1.21.5-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="nginx-mod-devel" version="1.21.5" release="5.uel20" epoch="1" arch="aarch64" src="nginx-1.21.5-5.uel20.src.rpm">
          <filename>nginx-mod-devel-1.21.5-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="nginx" version="1.21.5" release="5.uel20" epoch="1" arch="aarch64" src="nginx-1.21.5-5.uel20.src.rpm">
          <filename>nginx-1.21.5-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="nginx-filesystem" version="1.21.5" release="5.uel20" epoch="1" arch="noarch" src="nginx-1.21.5-5.uel20.src.rpm">
          <filename>nginx-filesystem-1.21.5-5.uel20.noarch.rpm</filename>
        </package>
        <package name="nginx-mod-stream" version="1.21.5" release="5.uel20" epoch="1" arch="aarch64" src="nginx-1.21.5-5.uel20.src.rpm">
          <filename>nginx-mod-stream-1.21.5-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="nginx-mod-mail" version="1.21.5" release="5.uel20" epoch="1" arch="aarch64" src="nginx-1.21.5-5.uel20.src.rpm">
          <filename>nginx-mod-mail-1.21.5-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="nginx-mod-http-image-filter" version="1.21.5" release="5.uel20" epoch="1" arch="aarch64" src="nginx-1.21.5-5.uel20.src.rpm">
          <filename>nginx-mod-http-image-filter-1.21.5-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="nginx-mod-http-xslt-filter" version="1.21.5" release="5.uel20" epoch="1" arch="aarch64" src="nginx-1.21.5-5.uel20.src.rpm">
          <filename>nginx-mod-http-xslt-filter-1.21.5-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="nginx-mod-http-perl" version="1.21.5" release="5.uel20" epoch="1" arch="aarch64" src="nginx-1.21.5-5.uel20.src.rpm">
          <filename>nginx-mod-http-perl-1.21.5-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="nginx-all-modules" version="1.21.5" release="5.uel20" epoch="1" arch="noarch" src="nginx-1.21.5-5.uel20.src.rpm">
          <filename>nginx-all-modules-1.21.5-5.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20031</id>
    <title>Moderate: jetty security update</title>
    <updated date="2024-11-11 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: jetty security update</summary>
    <description> Jetty PushSessionCacheFilter can be exploited by unauthenticated users 
to launch remote DoS attacks by exhausting the server’s memory.(CVE-2024-6762)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-6762" type="cve" title="fix CVE-2024-6762" />
    </references>
    <pkglist>
      <collection>
        <package name="jetty-fcgi-server" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-fcgi-server-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-jaas" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-jaas-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-javax-websocket-server-impl" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-javax-websocket-server-impl-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-continuation" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-continuation-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-alpn-client" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-alpn-client-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-util-ajax" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-util-ajax-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-unixsocket" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-unixsocket-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-http-spi" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-http-spi-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-http2-client" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-http2-client-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-osgi-boot-warurl" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-osgi-boot-warurl-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-infinispan" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-infinispan-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-jspc-maven-plugin" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-jspc-maven-plugin-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-http2-hpack" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-http2-hpack-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-nosql" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-nosql-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-jsp" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-jsp-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-rewrite" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-rewrite-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-osgi-boot-jsp" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-osgi-boot-jsp-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-websocket-client" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-websocket-client-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-websocket-server" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-websocket-server-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-spring" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-spring-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-httpservice" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-httpservice-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-http2-http-client-transport" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-http2-http-client-transport-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-jstl" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-jstl-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-jaspi" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-jaspi-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-websocket-servlet" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-websocket-servlet-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-osgi-alpn" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-osgi-alpn-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-cdi" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-cdi-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-alpn-server" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-alpn-server-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-jmx" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-jmx-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-ant" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-ant-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-websocket-api" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-websocket-api-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-http2-common" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-http2-common-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-xml" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-xml-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-deploy" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-deploy-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-quickstart" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-quickstart-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-proxy" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-proxy-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-http2-server" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-http2-server-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-http" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-http-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-osgi-boot" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-osgi-boot-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-fcgi-client" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-fcgi-client-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-annotations" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-annotations-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-javadoc" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-javadoc-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-jndi" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-jndi-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-project" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-project-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-plus" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-plus-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-servlet" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-servlet-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-security" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-security-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-websocket-common" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-websocket-common-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-javax-websocket-client-impl" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-javax-websocket-client-impl-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-client" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-client-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-servlets" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-servlets-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-webapp" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-webapp-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-maven-plugin" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-maven-plugin-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-util" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-util-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-start" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-start-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-server" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-server-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="jetty-io" version="9.4.16" release="8.up1.uel20" epoch="0" arch="noarch" src="jetty-9.4.16-8.up1.uel20.src.rpm">
          <filename>jetty-io-9.4.16-8.up1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20032</id>
    <title>Critical: socat security update</title>
    <updated date="2024-12-17 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: socat security update</summary>
    <description> readline.sh in socat before1.8.0.2 relies on the /tmp/$USER/stderr2 file.(CVE-2024-54661)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-54661" type="cve" title="fix CVE-2024-54661" />
    </references>
    <pkglist>
      <collection>
        <package name="socat" version="1.7.3.2" release="8.up2.uel20" epoch="0" arch="x86_64" src="socat-1.7.3.2-8.up2.uel20.src.rpm">
          <filename>socat-1.7.3.2-8.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="socat" version="1.7.3.2" release="8.up2.uel20" epoch="0" arch="aarch64" src="socat-1.7.3.2-8.up2.uel20.src.rpm">
          <filename>socat-1.7.3.2-8.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="socat-help" version="1.7.3.2" release="8.up2.uel20" epoch="0" arch="noarch" src="socat-1.7.3.2-8.up2.uel20.src.rpm">
          <filename>socat-help-1.7.3.2-8.up2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20033</id>
    <title>Moderate: assimp security update</title>
    <updated date="2024-11-05 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: assimp security update</summary>
    <description> A segmentation fault (SEGV) was detected in the Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode function within the Assimp library during fuzz testing using AddressSanitizer. The crash occurs due to a read access violation at address 0x000000000460, which points to the zero page, indicating a null or invalid pointer dereference.(CVE-2024-48425)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-48425" type="cve" title="fix CVE-2024-48425" />
    </references>
    <pkglist>
      <collection>
        <package name="assimp-devel" version="3.3.1" release="21.uel20" epoch="0" arch="x86_64" src="assimp-3.3.1-21.uel20.src.rpm">
          <filename>assimp-devel-3.3.1-21.uel20.x86_64.rpm</filename>
        </package>
        <package name="assimp" version="3.3.1" release="21.uel20" epoch="0" arch="x86_64" src="assimp-3.3.1-21.uel20.src.rpm">
          <filename>assimp-3.3.1-21.uel20.x86_64.rpm</filename>
        </package>
        <package name="python2-assimp" version="3.3.1" release="21.uel20" epoch="0" arch="noarch" src="assimp-3.3.1-21.uel20.src.rpm">
          <filename>python2-assimp-3.3.1-21.uel20.noarch.rpm</filename>
        </package>
        <package name="assimp-help" version="3.3.1" release="21.uel20" epoch="0" arch="noarch" src="assimp-3.3.1-21.uel20.src.rpm">
          <filename>assimp-help-3.3.1-21.uel20.noarch.rpm</filename>
        </package>
        <package name="python3-assimp" version="3.3.1" release="21.uel20" epoch="0" arch="noarch" src="assimp-3.3.1-21.uel20.src.rpm">
          <filename>python3-assimp-3.3.1-21.uel20.noarch.rpm</filename>
        </package>
        <package name="assimp" version="3.3.1" release="21.uel20" epoch="0" arch="aarch64" src="assimp-3.3.1-21.uel20.src.rpm">
          <filename>assimp-3.3.1-21.uel20.aarch64.rpm</filename>
        </package>
        <package name="assimp-devel" version="3.3.1" release="21.uel20" epoch="0" arch="aarch64" src="assimp-3.3.1-21.uel20.src.rpm">
          <filename>assimp-devel-3.3.1-21.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20034</id>
    <title>Moderate: rubygem-actionmailer security update</title>
    <updated date="2024-10-22 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: rubygem-actionmailer security update</summary>
    <description> Action Mailer is a framework for designing email service layers. Starting in version 3.0.0 and prior to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, and 7.2.1.1, there is a possible ReDoS vulnerability in the block_format helper in Action Mailer. Carefully crafted text can cause the block_format helper to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, or 7.2.1.1 or apply the relevant patch immediately. As a workaround, users can avoid calling the `block_format` helper or upgrade to Ruby 3.2. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 requires Ruby 3.2 or greater so is unaffected.(CVE-2024-47889)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47889" type="cve" title="fix CVE-2024-47889" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-actionmailer-doc" version="5.2.4.4" release="2.uel20" epoch="1" arch="noarch" src="rubygem-actionmailer-5.2.4.4-2.uel20.src.rpm">
          <filename>rubygem-actionmailer-doc-5.2.4.4-2.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-actionmailer" version="5.2.4.4" release="2.uel20" epoch="1" arch="noarch" src="rubygem-actionmailer-5.2.4.4-2.uel20.src.rpm">
          <filename>rubygem-actionmailer-5.2.4.4-2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20035</id>
    <title>Moderate: json-lib security update</title>
    <updated date="2024-10-10 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: json-lib security update</summary>
    <description> util/JSONTokener.java in JSON-lib before 3.1.0 mishandles an unbalanced comment string.(CVE-2024-47855)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47855" type="cve" title="fix CVE-2024-47855" />
    </references>
    <pkglist>
      <collection>
        <package name="json-lib" version="2.4" release="21.uel20" epoch="0" arch="noarch" src="json-lib-2.4-21.uel20.src.rpm">
          <filename>json-lib-2.4-21.uel20.noarch.rpm</filename>
        </package>
        <package name="jenkins-json-lib" version="2.4" release="21.uel20" epoch="0" arch="noarch" src="json-lib-2.4-21.uel20.src.rpm">
          <filename>jenkins-json-lib-2.4-21.uel20.noarch.rpm</filename>
        </package>
        <package name="json-lib-help" version="2.4" release="21.uel20" epoch="0" arch="noarch" src="json-lib-2.4-21.uel20.src.rpm">
          <filename>json-lib-help-2.4-21.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20036</id>
    <title>Important: cups-filters security update</title>
    <updated date="2024-09-29 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: cups-filters security update</summary>
    <description> CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.(CVE-2024-47175)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47175" type="cve" title="fix CVE-2024-47175" />
    </references>
    <pkglist>
      <collection>
        <package name="cups-filters" version="1.26.1" release="4.uel20.04" epoch="0" arch="x86_64" src="cups-filters-1.26.1-4.uel20.04.src.rpm">
          <filename>cups-filters-1.26.1-4.uel20.04.x86_64.rpm</filename>
        </package>
        <package name="cups-filters-devel" version="1.26.1" release="4.uel20.04" epoch="0" arch="x86_64" src="cups-filters-1.26.1-4.uel20.04.src.rpm">
          <filename>cups-filters-devel-1.26.1-4.uel20.04.x86_64.rpm</filename>
        </package>
        <package name="cups-filters" version="1.26.1" release="4.uel20.04" epoch="0" arch="aarch64" src="cups-filters-1.26.1-4.uel20.04.src.rpm">
          <filename>cups-filters-1.26.1-4.uel20.04.aarch64.rpm</filename>
        </package>
        <package name="cups-filters-help" version="1.26.1" release="4.uel20.04" epoch="0" arch="noarch" src="cups-filters-1.26.1-4.uel20.04.src.rpm">
          <filename>cups-filters-help-1.26.1-4.uel20.04.noarch.rpm</filename>
        </package>
        <package name="cups-filters-devel" version="1.26.1" release="4.uel20.04" epoch="0" arch="aarch64" src="cups-filters-1.26.1-4.uel20.04.src.rpm">
          <filename>cups-filters-devel-1.26.1-4.uel20.04.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20037</id>
    <title>Important: squid security update</title>
    <updated date="2024-11-01 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: squid security update</summary>
    <description> Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to Input Validation, Premature Release of Resource During Expected Lifetime, and Missing Release of Resource after Effective Lifetime bugs, Squid is vulnerable to Denial of Service attacks by a trusted server against all clients using the proxy. This bug is fixed in the default build configuration of Squid version 6.10.(CVE-2024-45802)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-45802" type="cve" title="fix CVE-2024-45802" />
    </references>
    <pkglist>
      <collection>
        <package name="squid" version="4.9" release="23.uel20" epoch="7" arch="x86_64" src="squid-4.9-23.uel20.src.rpm">
          <filename>squid-4.9-23.uel20.x86_64.rpm</filename>
        </package>
        <package name="squid" version="4.9" release="23.uel20" epoch="7" arch="aarch64" src="squid-4.9-23.uel20.src.rpm">
          <filename>squid-4.9-23.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20038</id>
    <title>Moderate: scsi-target-utils security update</title>
    <updated date="2024-10-11 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: scsi-target-utils security update</summary>
    <description> tgt (aka Linux target framework) before 1.0.93 attempts to achieve entropy by calling rand without srand. The PRNG seed is always 1, and thus the sequence of challenges is always identical.(CVE-2024-45751)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-45751" type="cve" title="fix CVE-2024-45751" />
    </references>
    <pkglist>
      <collection>
        <package name="scsi-target-utils" version="1.0.79" release="5.uel20" epoch="0" arch="x86_64" src="scsi-target-utils-1.0.79-5.uel20.src.rpm">
          <filename>scsi-target-utils-1.0.79-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="scsi-target-utils-rbd" version="1.0.79" release="5.uel20" epoch="0" arch="x86_64" src="scsi-target-utils-1.0.79-5.uel20.src.rpm">
          <filename>scsi-target-utils-rbd-1.0.79-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="scsi-target-utils-gluster" version="1.0.79" release="5.uel20" epoch="0" arch="x86_64" src="scsi-target-utils-1.0.79-5.uel20.src.rpm">
          <filename>scsi-target-utils-gluster-1.0.79-5.uel20.x86_64.rpm</filename>
        </package>
        <package name="scsi-target-utils" version="1.0.79" release="5.uel20" epoch="0" arch="aarch64" src="scsi-target-utils-1.0.79-5.uel20.src.rpm">
          <filename>scsi-target-utils-1.0.79-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="scsi-target-utils-rbd" version="1.0.79" release="5.uel20" epoch="0" arch="aarch64" src="scsi-target-utils-1.0.79-5.uel20.src.rpm">
          <filename>scsi-target-utils-rbd-1.0.79-5.uel20.aarch64.rpm</filename>
        </package>
        <package name="scsi-target-utils-help" version="1.0.79" release="5.uel20" epoch="0" arch="noarch" src="scsi-target-utils-1.0.79-5.uel20.src.rpm">
          <filename>scsi-target-utils-help-1.0.79-5.uel20.noarch.rpm</filename>
        </package>
        <package name="scsi-target-utils-gluster" version="1.0.79" release="5.uel20" epoch="0" arch="aarch64" src="scsi-target-utils-1.0.79-5.uel20.src.rpm">
          <filename>scsi-target-utils-gluster-1.0.79-5.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20039</id>
    <title>Moderate: rubygem-puma security update</title>
    <updated date="2024-10-10 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: rubygem-puma security update</summary>
    <description> Puma is a Ruby/Rack web server built for parallelism. In affected versions clients could clobber values set by intermediate proxies (such as X-Forwarded-For) by providing a underscore version of the same header (X-Forwarded_For). Any users relying on proxy set variables is affected. v6.4.3/v5.6.9 now discards any headers using underscores if the non-underscore version also exists. Effectively, allowing the proxy defined headers to always win. Users are advised to upgrade. Nginx has a underscores_in_headers configuration variable to discard these headers at the proxy level as a mitigation. Any users that are implicitly trusting the proxy defined headers for security should immediately cease doing so until upgraded to the fixed versions.(CVE-2024-45614)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-45614" type="cve" title="fix CVE-2024-45614" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-puma" version="3.12.6" release="4.uel20" epoch="0" arch="x86_64" src="rubygem-puma-3.12.6-4.uel20.src.rpm">
          <filename>rubygem-puma-3.12.6-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-puma-doc" version="3.12.6" release="4.uel20" epoch="0" arch="noarch" src="rubygem-puma-3.12.6-4.uel20.src.rpm">
          <filename>rubygem-puma-doc-3.12.6-4.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-puma" version="3.12.6" release="4.uel20" epoch="0" arch="aarch64" src="rubygem-puma-3.12.6-4.uel20.src.rpm">
          <filename>rubygem-puma-3.12.6-4.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20040</id>
    <title>Moderate: python-webob security update</title>
    <updated date="2024-10-11 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: python-webob security update</summary>
    <description> WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Location header to include the request hostname, it does so by parsing the URL that the user is to be redirected to with Python's urlparse, and joining it to the base URL. `urlparse` however treats a `//` at the start of a string as a URI without a scheme, and then treats the next part as the hostname. `urljoin` will then use that hostname from the second part as the hostname replacing the original one from the request. This vulnerability is patched in WebOb version 1.8.8.(CVE-2024-42353)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-42353" type="cve" title="fix CVE-2024-42353" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-webob" version="1.8.2" release="4.uel20" epoch="0" arch="noarch" src="python-webob-1.8.2-4.uel20.src.rpm">
          <filename>python3-webob-1.8.2-4.uel20.noarch.rpm</filename>
        </package>
        <package name="python2-webob" version="1.8.2" release="4.uel20" epoch="0" arch="noarch" src="python-webob-1.8.2-4.uel20.src.rpm">
          <filename>python2-webob-1.8.2-4.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20041</id>
    <title>Important: undertow security update</title>
    <updated date="2024-12-19 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: undertow security update</summary>
    <description> A flaw was found in Undertow. An HTTP request header value from a previous stream may be incorrectly reused for a request associated with a subsequent stream on the same HTTP/2 connection. This issue can potentially lead to information leakage between requests.(CVE-2024-4109)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-4109" type="cve" title="fix CVE-2024-4109" />
    </references>
    <pkglist>
      <collection>
        <package name="undertow-javadoc" version="1.4.0" release="8.uel20" epoch="1" arch="noarch" src="undertow-1.4.0-8.uel20.src.rpm">
          <filename>undertow-javadoc-1.4.0-8.uel20.noarch.rpm</filename>
        </package>
        <package name="undertow" version="1.4.0" release="8.uel20" epoch="1" arch="noarch" src="undertow-1.4.0-8.uel20.src.rpm">
          <filename>undertow-1.4.0-8.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20042</id>
    <title>Important: redis5 security update</title>
    <updated date="2024-10-24 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: redis5 security update</summary>
    <description> Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.(CVE-2024-31449)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-31449" type="cve" title="fix CVE-2024-31449" />
    </references>
    <pkglist>
      <collection>
        <package name="redis5" version="5.0.14" release="3.uel20" epoch="0" arch="x86_64" src="redis5-5.0.14-3.uel20.src.rpm">
          <filename>redis5-5.0.14-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="redis5-devel" version="5.0.14" release="3.uel20" epoch="0" arch="x86_64" src="redis5-5.0.14-3.uel20.src.rpm">
          <filename>redis5-devel-5.0.14-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="redis5-doc" version="5.0.14" release="3.uel20" epoch="0" arch="noarch" src="redis5-5.0.14-3.uel20.src.rpm">
          <filename>redis5-doc-5.0.14-3.uel20.noarch.rpm</filename>
        </package>
        <package name="redis5" version="5.0.14" release="3.uel20" epoch="0" arch="aarch64" src="redis5-5.0.14-3.uel20.src.rpm">
          <filename>redis5-5.0.14-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="redis5-devel" version="5.0.14" release="3.uel20" epoch="0" arch="aarch64" src="redis5-5.0.14-3.uel20.src.rpm">
          <filename>redis5-devel-5.0.14-3.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20043</id>
    <title>Important: clamav security update</title>
    <updated date="2024-10-09 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: clamav security update</summary>
    <description> A vulnerability in the ClamD service module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an authenticated, local attacker to corrupt critical system files.

The vulnerability is due to allowing the ClamD process to write to its log file while privileged without checking if the logfile has been replaced with a symbolic link. An attacker could exploit this vulnerability if they replace the ClamD log file with a symlink to a critical system file and then find a way to restart the ClamD process. An exploit could allow the attacker to corrupt a critical system file by appending ClamD log messages after restart.(CVE-2024-20506)
 A vulnerability in the PDF parsing module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

The vulnerability is due to an out of bounds read. An attacker could exploit this vulnerability by submitting a crafted PDF file to be scanned by ClamAV on an affected device. An exploit could allow the attacker to terminate the scanning process.(CVE-2024-20505)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20506" type="cve" title="fix CVE-2024-20506" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20505" type="cve" title="fix CVE-2024-20505" />
    </references>
    <pkglist>
      <collection>
        <package name="clamav-milter" version="0.103.12" release="1.uel20" epoch="0" arch="x86_64" src="clamav-0.103.12-1.uel20.src.rpm">
          <filename>clamav-milter-0.103.12-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="clamav-update" version="0.103.12" release="1.uel20" epoch="0" arch="x86_64" src="clamav-0.103.12-1.uel20.src.rpm">
          <filename>clamav-update-0.103.12-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="clamav" version="0.103.12" release="1.uel20" epoch="0" arch="x86_64" src="clamav-0.103.12-1.uel20.src.rpm">
          <filename>clamav-0.103.12-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="clamav-devel" version="0.103.12" release="1.uel20" epoch="0" arch="x86_64" src="clamav-0.103.12-1.uel20.src.rpm">
          <filename>clamav-devel-0.103.12-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="clamd" version="0.103.12" release="1.uel20" epoch="0" arch="x86_64" src="clamav-0.103.12-1.uel20.src.rpm">
          <filename>clamd-0.103.12-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="clamav" version="0.103.12" release="1.uel20" epoch="0" arch="aarch64" src="clamav-0.103.12-1.uel20.src.rpm">
          <filename>clamav-0.103.12-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="clamd" version="0.103.12" release="1.uel20" epoch="0" arch="aarch64" src="clamav-0.103.12-1.uel20.src.rpm">
          <filename>clamd-0.103.12-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="clamav-update" version="0.103.12" release="1.uel20" epoch="0" arch="aarch64" src="clamav-0.103.12-1.uel20.src.rpm">
          <filename>clamav-update-0.103.12-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="clamav-milter" version="0.103.12" release="1.uel20" epoch="0" arch="aarch64" src="clamav-0.103.12-1.uel20.src.rpm">
          <filename>clamav-milter-0.103.12-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="clamav-filesystem" version="0.103.12" release="1.uel20" epoch="0" arch="noarch" src="clamav-0.103.12-1.uel20.src.rpm">
          <filename>clamav-filesystem-0.103.12-1.uel20.noarch.rpm</filename>
        </package>
        <package name="clamav-devel" version="0.103.12" release="1.uel20" epoch="0" arch="aarch64" src="clamav-0.103.12-1.uel20.src.rpm">
          <filename>clamav-devel-0.103.12-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="clamav-help" version="0.103.12" release="1.uel20" epoch="0" arch="noarch" src="clamav-0.103.12-1.uel20.src.rpm">
          <filename>clamav-help-0.103.12-1.uel20.noarch.rpm</filename>
        </package>
        <package name="clamav-data" version="0.103.12" release="1.uel20" epoch="0" arch="noarch" src="clamav-0.103.12-1.uel20.src.rpm">
          <filename>clamav-data-0.103.12-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20044</id>
    <title>Important: dhcp security update</title>
    <updated date="2024-11-22 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: dhcp security update</summary>
    <description> If a server hosts a zone containing a "KEY" Resource Record, or a resolver DNSSEC-validates a "KEY" Resource Record from a DNSSEC-signed domain in cache, a client can exhaust resolver CPU resources by sending a stream of SIG(0) signed requests.
This issue affects BIND 9 versions 9.0.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.49-S1, and 9.18.11-S1 through 9.18.27-S1.(CVE-2024-1975)
 Resolver caches and authoritative zone databases that hold significant numbers of RRs for the same hostname (of any RTYPE) can suffer from degraded performance as content is being added or updated, and also when handling client queries for this name.
This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.4-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.(CVE-2024-1737)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-1975" type="cve" title="fix CVE-2024-1975" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-1737" type="cve" title="fix CVE-2024-1737" />
    </references>
    <pkglist>
      <collection>
        <package name="dhcp-devel" version="4.4.2" release="9.uel20.02" epoch="12" arch="x86_64" src="dhcp-4.4.2-9.uel20.02.src.rpm">
          <filename>dhcp-devel-4.4.2-9.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="dhcp" version="4.4.2" release="9.uel20.02" epoch="12" arch="x86_64" src="dhcp-4.4.2-9.uel20.02.src.rpm">
          <filename>dhcp-4.4.2-9.uel20.02.x86_64.rpm</filename>
        </package>
        <package name="dhcp-help" version="4.4.2" release="9.uel20.02" epoch="12" arch="noarch" src="dhcp-4.4.2-9.uel20.02.src.rpm">
          <filename>dhcp-help-4.4.2-9.uel20.02.noarch.rpm</filename>
        </package>
        <package name="dhcp" version="4.4.2" release="9.uel20.02" epoch="12" arch="aarch64" src="dhcp-4.4.2-9.uel20.02.src.rpm">
          <filename>dhcp-4.4.2-9.uel20.02.aarch64.rpm</filename>
        </package>
        <package name="dhcp-devel" version="4.4.2" release="9.uel20.02" epoch="12" arch="aarch64" src="dhcp-4.4.2-9.uel20.02.src.rpm">
          <filename>dhcp-devel-4.4.2-9.uel20.02.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20045</id>
    <title>Critical: openvpn security update</title>
    <updated date="2024-10-11 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: openvpn security update</summary>
    <description> OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which attackers can use to inject unexpected arbitrary data into third-party executables or plug-ins.(CVE-2024-5594)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-5594" type="cve" title="fix CVE-2024-5594" />
    </references>
    <pkglist>
      <collection>
        <package name="openvpn" version="2.4.8" release="10.uel20" epoch="0" arch="x86_64" src="openvpn-2.4.8-10.uel20.src.rpm">
          <filename>openvpn-2.4.8-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="openvpn-devel" version="2.4.8" release="10.uel20" epoch="0" arch="x86_64" src="openvpn-2.4.8-10.uel20.src.rpm">
          <filename>openvpn-devel-2.4.8-10.uel20.x86_64.rpm</filename>
        </package>
        <package name="openvpn" version="2.4.8" release="10.uel20" epoch="0" arch="aarch64" src="openvpn-2.4.8-10.uel20.src.rpm">
          <filename>openvpn-2.4.8-10.uel20.aarch64.rpm</filename>
        </package>
        <package name="openvpn-help" version="2.4.8" release="10.uel20" epoch="0" arch="noarch" src="openvpn-2.4.8-10.uel20.src.rpm">
          <filename>openvpn-help-2.4.8-10.uel20.noarch.rpm</filename>
        </package>
        <package name="openvpn-devel" version="2.4.8" release="10.uel20" epoch="0" arch="aarch64" src="openvpn-2.4.8-10.uel20.src.rpm">
          <filename>openvpn-devel-2.4.8-10.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20046</id>
    <title>Critical: python-django security update</title>
    <updated date="2024-10-16 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: python-django security update</summary>
    <description> An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. QuerySet.values() and values_list() methods on models with a JSONField are subject to SQL injection in column aliases via a crafted JSON object key as a passed *arg.(CVE-2024-42005)
 An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize and urlizetrunc template filters, and the AdminURLFieldWidget widget, are subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters.(CVE-2024-41991)
 An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.(CVE-2024-41990)
 An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The floatformat template filter is subject to significant memory consumption when given a string representation of a number in scientific notation with a large exponent.(CVE-2024-41989)
 An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. get_supported_language_variant() was subject to a potential denial-of-service attack when used with very long strings containing specific characters.(CVE-2024-39614)
 An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. Derived classes of the django.core.files.storage.Storage base class, when they override generate_filename() without replicating the file-path validations from the parent class, potentially allow directory traversal via certain inputs during a save() call. (Built-in Storage sub-classes are unaffected.)(CVE-2024-39330)
 An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. The django.contrib.auth.backends.ModelBackend.authenticate() method allows remote attackers to enumerate users via a timing attack involving login requests for users with an unusable password.(CVE-2024-39329)
 An issue was discovered in Django 4.2 before 4.2.14 and 5.0 before 5.0.7. urlize and urlizetrunc were subject to a potential denial of service attack via certain inputs with a very large number of brackets.(CVE-2024-38875)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-42005" type="cve" title="fix CVE-2024-42005" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-41991" type="cve" title="fix CVE-2024-41991" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-41990" type="cve" title="fix CVE-2024-41990" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-41989" type="cve" title="fix CVE-2024-41989" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-39614" type="cve" title="fix CVE-2024-39614" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-39330" type="cve" title="fix CVE-2024-39330" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-39329" type="cve" title="fix CVE-2024-39329" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-38875" type="cve" title="fix CVE-2024-38875" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-Django" version="2.2.27" release="12.uel20" epoch="0" arch="noarch" src="python-django-2.2.27-12.uel20.src.rpm">
          <filename>python3-Django-2.2.27-12.uel20.noarch.rpm</filename>
        </package>
        <package name="python-django-help" version="2.2.27" release="12.uel20" epoch="0" arch="noarch" src="python-django-2.2.27-12.uel20.src.rpm">
          <filename>python-django-help-2.2.27-12.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20047</id>
    <title>Important: tomcat security update</title>
    <updated date="2024-11-19 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: tomcat security update</summary>
    <description> Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89.

Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue.

(CVE-2024-34750)
 Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98.

Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.

(CVE-2024-24549)
 Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98.

Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.

(CVE-2024-23672)
 Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 through 9.0.82 and from 8.5.0 through 8.5.95 did not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single 
request as multiple requests leading to the possibility of request 
smuggling when behind a reverse proxy.

Users are recommended to upgrade to version 11.0.0-M11 onwards, 10.1.16 onwards, 9.0.83 onwards or 8.5.96 onwards, which fix the issue.

(CVE-2023-46589)
 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.(CVE-2023-44487)
 The simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing (but extremely hard to trigger) concurrency bug in Apache Tomcat 10.1.0 to 10.1.0-M12, 10.0.0-M1 to 10.0.18, 9.0.0-M1 to 9.0.60 and 8.5.0 to 8.5.77 that could cause client connections to share an Http11Processor instance resulting in responses, or part responses, to be received by the wrong client.(CVE-2021-43980)
 If a web application sends a WebSocket message concurrently with the WebSocket connection closing when running on Apache Tomcat 8.5.0 to 8.5.75 or Apache Tomcat 9.0.0.M1 to 9.0.20, it is possible that the application will continue to use the socket after it has been closed. The error handling triggered in this case could cause the a pooled object to be placed in the pool twice. This could result in subsequent connections using the same object concurrently which could result in data being returned to the wrong use and/or other errors.(CVE-2022-25762)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-34750" type="cve" title="fix CVE-2024-34750" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-24549" type="cve" title="fix CVE-2024-24549" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-23672" type="cve" title="fix CVE-2024-23672" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-46589" type="cve" title="fix CVE-2023-46589" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-44487" type="cve" title="fix CVE-2023-44487" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-43980" type="cve" title="fix CVE-2021-43980" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-25762" type="cve" title="fix CVE-2022-25762" />
    </references>
    <pkglist>
      <collection>
        <package name="tomcat" version="9.0.96" release="1.up1.uel20" epoch="1" arch="noarch" src="tomcat-9.0.96-1.up1.uel20.src.rpm">
          <filename>tomcat-9.0.96-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="tomcat-help" version="9.0.96" release="1.up1.uel20" epoch="1" arch="noarch" src="tomcat-9.0.96-1.up1.uel20.src.rpm">
          <filename>tomcat-help-9.0.96-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="tomcat-embed" version="9.0.96" release="1.up1.uel20" epoch="1" arch="noarch" src="tomcat-9.0.96-1.up1.uel20.src.rpm">
          <filename>tomcat-embed-9.0.96-1.up1.uel20.noarch.rpm</filename>
        </package>
        <package name="tomcat-jsvc" version="9.0.96" release="1.up1.uel20" epoch="1" arch="noarch" src="tomcat-9.0.96-1.up1.uel20.src.rpm">
          <filename>tomcat-jsvc-9.0.96-1.up1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20048</id>
    <title>Critical: mysql security update</title>
    <updated date="2024-10-11 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: mysql security update</summary>
    <description> Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.37 and prior and  8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21179)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.37 and prior and  8.4.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21177)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.37 and prior and  8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21173)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.37 and prior and  8.4.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21171)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.36 and prior and  8.3.0 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H).(CVE-2024-21166)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Pluggable Auth).  Supported versions that are affected are 8.0.37 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21165)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.37 and prior and  8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).(CVE-2024-21163)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.37 and prior and  8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21162)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.36 and prior and  8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21160)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.36 and prior and  8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21159)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.36 and prior and  8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21157)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges).  Supported versions that are affected are 8.0.37 and prior and  8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21142)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.35 and prior and  8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21137)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.36 and prior and  8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21135)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Connection Handling).  Supported versions that are affected are 8.0.37 and prior and  8.4.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 4.3 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).(CVE-2024-21134)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.37 and prior and  8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21130)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL).  Supported versions that are affected are 8.0.37 and prior and  8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21129)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL).  Supported versions that are affected are 8.0.37 and prior and  8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21127)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS).  Supported versions that are affected are 8.0.37 and prior and  8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21125)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling).  Supported versions that are affected are 8.0.36 and prior and  8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21102)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Client: mysqldump).  Supported versions that are affected are 8.0.36 and prior and  8.3.0 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of MySQL Server accessible data as well as  unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).(CVE-2024-21096)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin).  Supported versions that are affected are 8.0.36 and prior and  8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21087)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL).  Supported versions that are affected are 8.0.36 and prior and  8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21069)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.36 and prior and  8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21062)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Audit Plug-in).  Supported versions that are affected are 8.0.35 and prior and  8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21061)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Data Dictionary).  Supported versions that are affected are 8.0.36 and prior and  8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21060)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.35 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21057)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML).  Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21056)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.35 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21055)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.36 and prior and  8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21054)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML).  Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21053)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML).  Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21052)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML).  Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21051)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML).  Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21050)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML).  Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21049)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.36 and prior and  8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21047)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML).  Supported versions that are affected are 8.0.34 and prior and  8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).(CVE-2024-21015)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.36 and prior and  8.3.0 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21013)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.36 and prior and  8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21009)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.36 and prior and  8.3.0 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-21008)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges).  Supported versions that are affected are 8.0.36 and prior and  8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of MySQL Server accessible data as well as  unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 3.8 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N).(CVE-2024-21000)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.36 and prior and  8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20998)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.37 and prior and  8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20996)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema).  Supported versions that are affected are 8.0.36 and prior and  8.3.0 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20994)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.35 and prior and  8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20993)
 Issue summary: The POLY1305 MAC (message authentication code) implementation
contains a bug that might corrupt the internal state of applications running
on PowerPC CPU based platforms if the CPU provides vector instructions.

Impact summary: If an attacker can influence whether the POLY1305 MAC
algorithm is used, the application state might be corrupted with various
application dependent consequences.

The POLY1305 MAC (message authentication code) implementation in OpenSSL for
PowerPC CPUs restores the contents of vector registers in a different order
than they are saved. Thus the contents of some of these vector registers
are corrupted when returning to the caller. The vulnerable code is used only
on newer PowerPC processors supporting the PowerISA 2.07 instructions.

The consequences of this kind of internal application state corruption can
be various - from no consequences, if the calling application does not
depend on the contents of non-volatile XMM registers at all, to the worst
consequences, where the attacker could get complete control of the application
process. However unless the compiler uses the vector registers for storing
pointers, the most likely consequence, if any, would be an incorrect result
of some application dependent calculations or a crash leading to a denial of
service.

The POLY1305 MAC algorithm is most frequently used as part of the
CHACHA20-POLY1305 AEAD (authenticated encryption with associated data)
algorithm. The most common usage of this AEAD cipher is with TLS protocol
versions 1.2 and 1.3. If this cipher is enabled on the server a malicious
client can influence whether this AEAD cipher is used. This implies that
TLS server applications using OpenSSL can be potentially impacted. However
we are currently not aware of any concrete application that would be affected
by this issue therefore we consider this a Low severity security issue.(CVE-2023-6129)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21607)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Data Dictionary). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21605)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: UDF).  Supported versions that are affected are 8.0.35 and prior and  8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20985)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server : Security : Firewall).  Supported versions that are affected are 8.0.35 and prior and  8.2.0 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20984)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML).  Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20983)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.35 and prior and  8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20982)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL).  Supported versions that are affected are 8.0.35 and prior and  8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20981)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.35 and prior and  8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20978)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.35 and prior and  8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20977)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.35 and prior and  8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20976)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.35 and prior and  8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20974)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.35 and prior and  8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20973)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.35 and prior and  8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20972)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.35 and prior and  8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20971)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.35 and prior and  8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20970)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL).  Supported versions that are affected are 8.0.35 and prior and  8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).(CVE-2024-20969)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options).  Supported versions that are affected are 8.0.34 and prior and  8.1.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20968)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication).  Supported versions that are affected are 8.0.35 and prior and  8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).(CVE-2024-20967)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.35 and prior and  8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20966)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.35 and prior and  8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20965)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges).  Supported versions that are affected are 8.0.35 and prior and  8.2.0 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20964)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption).  Supported versions that are affected are 8.0.35 and prior and  8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20963)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.35 and prior and  8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20962)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.35 and prior and  8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20961)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: RAPID).  Supported versions that are affected are 8.0.35 and prior and  8.2.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).(CVE-2024-20960)
 This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy
handshake.

When curl is asked to pass along the host name to the SOCKS5 proxy to allow
that to resolve the address instead of it getting done by curl itself, the
maximum length that host name can be is 255 bytes.

If the host name is detected to be longer, curl switches to local name
resolving and instead passes on the resolved address only. Due to this bug,
the local variable that means "let the host resolve the name" could get the
wrong value during a slow SOCKS5 handshake, and contrary to the intention,
copy the too long host name to the target buffer instead of copying just the
resolved address there.

The target buffer being a heap based buffer, and the host name coming from the
URL that curl has been told to operate with.
(CVE-2023-38545)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.34 and prior and  8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22114)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption).  Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).(CVE-2023-22113)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22112)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: UDF).  Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22111)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22110)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22104)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.34 and prior and  8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22103)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.34 and prior and  8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22097)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22092)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 5.7.43 and prior, 8.0.34 and prior and  8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22084)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22079)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.34 and prior and  8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22078)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.34 and prior and  8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22068)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.34 and prior and  8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22066)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22065)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22064)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 5.7.43 and prior and  8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22028)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 5.7.42 and prior and  8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22026)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML).  Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22115)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.34 and prior and  8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22070)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.34 and prior and  8.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22059)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL).  Supported versions that are affected are 8.0.33 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22058)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication).  Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22057)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22056)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22054)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs).  Supported versions that are affected are 5.7.42 and prior and  8.0.33 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server and  unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H).(CVE-2023-22053)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Pluggable Auth).  Supported versions that are affected are 8.0.33 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 3.1 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).(CVE-2023-22048)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22046)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges).  Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).(CVE-2023-22038)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.33 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22033)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.34 and prior and  8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22032)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 5.7.42 and prior and  8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22015)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22008)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication).  Supported versions that are affected are 5.7.41 and prior and  8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22007)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication).  Supported versions that are affected are 8.0.33 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-22005)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21982)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs).  Supported versions that are affected are 5.7.41 and prior and  8.0.32 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.1 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H).(CVE-2023-21980)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21977)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21976)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21972)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: JSON).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21966)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Connection Handling).  Supported versions that are affected are 5.7.40 and prior and  8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).(CVE-2023-21963)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21962)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Partition).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21955)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Partition).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21953)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services).  Supported versions that are affected are 8.0.32 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21947)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21946)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21945)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services).  Supported versions that are affected are 8.0.32 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21940)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21935)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21933)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).(CVE-2023-21929)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21920)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21919)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21917)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21913)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges).  Supported versions that are affected are 5.7.41 and prior and  8.0.30 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21912)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21911)
 The public API function BIO_new_NDEF is a helper function used for streaming
ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the
SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by
end user applications.

The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter
BIO onto the front of it to form a BIO chain, and then returns the new head of
the BIO chain to the caller. Under certain conditions, for example if a CMS
recipient public key is invalid, the new filter BIO is freed and the function
returns a NULL result indicating a failure. However, in this case, the BIO chain
is not properly cleaned up and the BIO passed by the caller still retains
internal pointers to the previously freed filter BIO. If the caller then goes on
to call BIO_pop() on the BIO then a use-after-free will occur. This will most
likely result in a crash.



This scenario occurs directly in the internal function B64_write_ASN1() which
may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on
the BIO. This internal function is in turn called by the public API functions
PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream,
SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7.

Other public API functions that may be impacted by this include
i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and
i2d_PKCS7_bio_stream.

The OpenSSL cms and smime command line applications are similarly affected.



(CVE-2023-0215)
 A vulnerability exists in curl &lt;7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) `.`. Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded.(CVE-2022-43551)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: GIS).  Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21887)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21883)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).(CVE-2023-21882)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21881)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).(CVE-2023-21880)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21879)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21878)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).(CVE-2023-21877)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21876)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption).  Supported versions that are affected are 8.0.31 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H).(CVE-2023-21875)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling).  Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).(CVE-2023-21874)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21873)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).(CVE-2023-21872)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21871)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21870)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).(CVE-2023-21869)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21868)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21867)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21866)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21865)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21864)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21863)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML).  Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2023-21836)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-39410)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-39408)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-39400)
 When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.(CVE-2022-32221)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21641)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21640)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21638)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21637)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H).(CVE-2022-21635)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21633)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21632)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21625)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Connection Handling). Supported versions that are affected are 5.7.39 and prior and 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21617)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.30 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21611)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.39 and prior and 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21608)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21604)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21599)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21594)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 5.7.39 and prior and 8.0.29 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).(CVE-2022-21592)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21569)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H).(CVE-2022-21556)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Federated). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21547)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 5.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L).(CVE-2022-21539)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L).(CVE-2022-21538)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21537)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21534)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21531)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21530)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21529)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).(CVE-2022-21528)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).(CVE-2022-21527)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21526)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21525)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21517)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 5.7.38 and prior and 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21515)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).(CVE-2022-21509)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PAM Auth Plugin). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N).(CVE-2022-21455)
 Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.(CVE-2021-22570)
 Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.35 and prior, 7.5.25 and prior, 7.6.21 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).(CVE-2022-21490)
 Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.35 and prior, 7.5.25 and prior, 7.6.21 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).(CVE-2022-21489)
 Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.35 and prior, 7.5.25 and prior, 7.6.21 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L).(CVE-2022-21486)
 Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.35 and prior, 7.5.25 and prior, 7.6.21 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L).(CVE-2022-21485)
 Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.35 and prior, 7.5.25 and prior, 7.6.21 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L).(CVE-2022-21484)
 Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.35 and prior, 7.5.25 and prior, 7.6.21 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).(CVE-2022-21483)
 Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).(CVE-2022-21482)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server and unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H).(CVE-2022-21479)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).(CVE-2022-21478)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21462)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).(CVE-2022-21459)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PAM Auth Plugin). Supported versions that are affected are 8.0.28 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).(CVE-2022-21457)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21454)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21451)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21444)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).(CVE-2022-21440)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21438)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21437)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21435)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21427)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).(CVE-2022-21425)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).(CVE-2022-21423)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H).(CVE-2022-21418)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21417)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21414)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21413)
 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).(CVE-2022-21412)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21179" type="cve" title="fix CVE-2024-21179" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21177" type="cve" title="fix CVE-2024-21177" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21173" type="cve" title="fix CVE-2024-21173" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21171" type="cve" title="fix CVE-2024-21171" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21166" type="cve" title="fix CVE-2024-21166" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21165" type="cve" title="fix CVE-2024-21165" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21163" type="cve" title="fix CVE-2024-21163" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21162" type="cve" title="fix CVE-2024-21162" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21160" type="cve" title="fix CVE-2024-21160" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21159" type="cve" title="fix CVE-2024-21159" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21157" type="cve" title="fix CVE-2024-21157" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21142" type="cve" title="fix CVE-2024-21142" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21137" type="cve" title="fix CVE-2024-21137" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21135" type="cve" title="fix CVE-2024-21135" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21134" type="cve" title="fix CVE-2024-21134" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21130" type="cve" title="fix CVE-2024-21130" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21129" type="cve" title="fix CVE-2024-21129" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21127" type="cve" title="fix CVE-2024-21127" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21125" type="cve" title="fix CVE-2024-21125" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21102" type="cve" title="fix CVE-2024-21102" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21096" type="cve" title="fix CVE-2024-21096" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21087" type="cve" title="fix CVE-2024-21087" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21069" type="cve" title="fix CVE-2024-21069" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21062" type="cve" title="fix CVE-2024-21062" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21061" type="cve" title="fix CVE-2024-21061" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21060" type="cve" title="fix CVE-2024-21060" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21057" type="cve" title="fix CVE-2024-21057" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21056" type="cve" title="fix CVE-2024-21056" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21055" type="cve" title="fix CVE-2024-21055" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21054" type="cve" title="fix CVE-2024-21054" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21053" type="cve" title="fix CVE-2024-21053" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21052" type="cve" title="fix CVE-2024-21052" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21051" type="cve" title="fix CVE-2024-21051" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21050" type="cve" title="fix CVE-2024-21050" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21049" type="cve" title="fix CVE-2024-21049" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21047" type="cve" title="fix CVE-2024-21047" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21015" type="cve" title="fix CVE-2024-21015" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21013" type="cve" title="fix CVE-2024-21013" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21009" type="cve" title="fix CVE-2024-21009" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21008" type="cve" title="fix CVE-2024-21008" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-21000" type="cve" title="fix CVE-2024-21000" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20998" type="cve" title="fix CVE-2024-20998" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20996" type="cve" title="fix CVE-2024-20996" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20994" type="cve" title="fix CVE-2024-20994" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20993" type="cve" title="fix CVE-2024-20993" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-6129" type="cve" title="fix CVE-2023-6129" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21607" type="cve" title="fix CVE-2022-21607" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21605" type="cve" title="fix CVE-2022-21605" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20985" type="cve" title="fix CVE-2024-20985" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20984" type="cve" title="fix CVE-2024-20984" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20983" type="cve" title="fix CVE-2024-20983" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20982" type="cve" title="fix CVE-2024-20982" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20981" type="cve" title="fix CVE-2024-20981" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20978" type="cve" title="fix CVE-2024-20978" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20977" type="cve" title="fix CVE-2024-20977" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20976" type="cve" title="fix CVE-2024-20976" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20974" type="cve" title="fix CVE-2024-20974" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20973" type="cve" title="fix CVE-2024-20973" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20972" type="cve" title="fix CVE-2024-20972" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20971" type="cve" title="fix CVE-2024-20971" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20970" type="cve" title="fix CVE-2024-20970" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20969" type="cve" title="fix CVE-2024-20969" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20968" type="cve" title="fix CVE-2024-20968" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20967" type="cve" title="fix CVE-2024-20967" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20966" type="cve" title="fix CVE-2024-20966" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20965" type="cve" title="fix CVE-2024-20965" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20964" type="cve" title="fix CVE-2024-20964" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20963" type="cve" title="fix CVE-2024-20963" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20962" type="cve" title="fix CVE-2024-20962" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20961" type="cve" title="fix CVE-2024-20961" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-20960" type="cve" title="fix CVE-2024-20960" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-38545" type="cve" title="fix CVE-2023-38545" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22114" type="cve" title="fix CVE-2023-22114" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22113" type="cve" title="fix CVE-2023-22113" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22112" type="cve" title="fix CVE-2023-22112" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22111" type="cve" title="fix CVE-2023-22111" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22110" type="cve" title="fix CVE-2023-22110" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22104" type="cve" title="fix CVE-2023-22104" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22103" type="cve" title="fix CVE-2023-22103" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22097" type="cve" title="fix CVE-2023-22097" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22092" type="cve" title="fix CVE-2023-22092" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22084" type="cve" title="fix CVE-2023-22084" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22079" type="cve" title="fix CVE-2023-22079" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22078" type="cve" title="fix CVE-2023-22078" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22068" type="cve" title="fix CVE-2023-22068" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22066" type="cve" title="fix CVE-2023-22066" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22065" type="cve" title="fix CVE-2023-22065" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22064" type="cve" title="fix CVE-2023-22064" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22028" type="cve" title="fix CVE-2023-22028" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22026" type="cve" title="fix CVE-2023-22026" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22115" type="cve" title="fix CVE-2023-22115" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22070" type="cve" title="fix CVE-2023-22070" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22059" type="cve" title="fix CVE-2023-22059" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22058" type="cve" title="fix CVE-2023-22058" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22057" type="cve" title="fix CVE-2023-22057" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22056" type="cve" title="fix CVE-2023-22056" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22054" type="cve" title="fix CVE-2023-22054" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22053" type="cve" title="fix CVE-2023-22053" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22048" type="cve" title="fix CVE-2023-22048" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22046" type="cve" title="fix CVE-2023-22046" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22038" type="cve" title="fix CVE-2023-22038" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22033" type="cve" title="fix CVE-2023-22033" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22032" type="cve" title="fix CVE-2023-22032" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22015" type="cve" title="fix CVE-2023-22015" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22008" type="cve" title="fix CVE-2023-22008" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22007" type="cve" title="fix CVE-2023-22007" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-22005" type="cve" title="fix CVE-2023-22005" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21982" type="cve" title="fix CVE-2023-21982" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21980" type="cve" title="fix CVE-2023-21980" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21977" type="cve" title="fix CVE-2023-21977" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21976" type="cve" title="fix CVE-2023-21976" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21972" type="cve" title="fix CVE-2023-21972" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21966" type="cve" title="fix CVE-2023-21966" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21963" type="cve" title="fix CVE-2023-21963" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21962" type="cve" title="fix CVE-2023-21962" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21955" type="cve" title="fix CVE-2023-21955" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21953" type="cve" title="fix CVE-2023-21953" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21947" type="cve" title="fix CVE-2023-21947" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21946" type="cve" title="fix CVE-2023-21946" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21945" type="cve" title="fix CVE-2023-21945" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21940" type="cve" title="fix CVE-2023-21940" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21935" type="cve" title="fix CVE-2023-21935" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21933" type="cve" title="fix CVE-2023-21933" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21929" type="cve" title="fix CVE-2023-21929" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21920" type="cve" title="fix CVE-2023-21920" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21919" type="cve" title="fix CVE-2023-21919" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21917" type="cve" title="fix CVE-2023-21917" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21913" type="cve" title="fix CVE-2023-21913" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21912" type="cve" title="fix CVE-2023-21912" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21911" type="cve" title="fix CVE-2023-21911" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-0215" type="cve" title="fix CVE-2023-0215" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-43551" type="cve" title="fix CVE-2022-43551" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21887" type="cve" title="fix CVE-2023-21887" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21883" type="cve" title="fix CVE-2023-21883" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21882" type="cve" title="fix CVE-2023-21882" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21881" type="cve" title="fix CVE-2023-21881" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21880" type="cve" title="fix CVE-2023-21880" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21879" type="cve" title="fix CVE-2023-21879" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21878" type="cve" title="fix CVE-2023-21878" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21877" type="cve" title="fix CVE-2023-21877" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21876" type="cve" title="fix CVE-2023-21876" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21875" type="cve" title="fix CVE-2023-21875" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21874" type="cve" title="fix CVE-2023-21874" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21873" type="cve" title="fix CVE-2023-21873" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21872" type="cve" title="fix CVE-2023-21872" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21871" type="cve" title="fix CVE-2023-21871" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21870" type="cve" title="fix CVE-2023-21870" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21869" type="cve" title="fix CVE-2023-21869" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21868" type="cve" title="fix CVE-2023-21868" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21867" type="cve" title="fix CVE-2023-21867" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21866" type="cve" title="fix CVE-2023-21866" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21865" type="cve" title="fix CVE-2023-21865" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21864" type="cve" title="fix CVE-2023-21864" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21863" type="cve" title="fix CVE-2023-21863" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-21836" type="cve" title="fix CVE-2023-21836" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-39410" type="cve" title="fix CVE-2022-39410" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-39408" type="cve" title="fix CVE-2022-39408" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-39400" type="cve" title="fix CVE-2022-39400" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-32221" type="cve" title="fix CVE-2022-32221" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21641" type="cve" title="fix CVE-2022-21641" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21640" type="cve" title="fix CVE-2022-21640" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21638" type="cve" title="fix CVE-2022-21638" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21637" type="cve" title="fix CVE-2022-21637" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21635" type="cve" title="fix CVE-2022-21635" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21633" type="cve" title="fix CVE-2022-21633" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21632" type="cve" title="fix CVE-2022-21632" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21625" type="cve" title="fix CVE-2022-21625" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21617" type="cve" title="fix CVE-2022-21617" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21611" type="cve" title="fix CVE-2022-21611" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21608" type="cve" title="fix CVE-2022-21608" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21604" type="cve" title="fix CVE-2022-21604" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21599" type="cve" title="fix CVE-2022-21599" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21594" type="cve" title="fix CVE-2022-21594" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21592" type="cve" title="fix CVE-2022-21592" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21569" type="cve" title="fix CVE-2022-21569" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21556" type="cve" title="fix CVE-2022-21556" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21547" type="cve" title="fix CVE-2022-21547" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21539" type="cve" title="fix CVE-2022-21539" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21538" type="cve" title="fix CVE-2022-21538" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21537" type="cve" title="fix CVE-2022-21537" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21534" type="cve" title="fix CVE-2022-21534" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21531" type="cve" title="fix CVE-2022-21531" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21530" type="cve" title="fix CVE-2022-21530" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21529" type="cve" title="fix CVE-2022-21529" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21528" type="cve" title="fix CVE-2022-21528" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21527" type="cve" title="fix CVE-2022-21527" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21526" type="cve" title="fix CVE-2022-21526" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21525" type="cve" title="fix CVE-2022-21525" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21517" type="cve" title="fix CVE-2022-21517" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21515" type="cve" title="fix CVE-2022-21515" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21509" type="cve" title="fix CVE-2022-21509" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21455" type="cve" title="fix CVE-2022-21455" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-22570" type="cve" title="fix CVE-2021-22570" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21490" type="cve" title="fix CVE-2022-21490" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21489" type="cve" title="fix CVE-2022-21489" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21486" type="cve" title="fix CVE-2022-21486" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21485" type="cve" title="fix CVE-2022-21485" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21484" type="cve" title="fix CVE-2022-21484" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21483" type="cve" title="fix CVE-2022-21483" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21482" type="cve" title="fix CVE-2022-21482" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21479" type="cve" title="fix CVE-2022-21479" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21478" type="cve" title="fix CVE-2022-21478" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21462" type="cve" title="fix CVE-2022-21462" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21459" type="cve" title="fix CVE-2022-21459" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21457" type="cve" title="fix CVE-2022-21457" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21454" type="cve" title="fix CVE-2022-21454" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21451" type="cve" title="fix CVE-2022-21451" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21444" type="cve" title="fix CVE-2022-21444" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21440" type="cve" title="fix CVE-2022-21440" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21438" type="cve" title="fix CVE-2022-21438" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21437" type="cve" title="fix CVE-2022-21437" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21435" type="cve" title="fix CVE-2022-21435" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21427" type="cve" title="fix CVE-2022-21427" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21425" type="cve" title="fix CVE-2022-21425" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21423" type="cve" title="fix CVE-2022-21423" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21418" type="cve" title="fix CVE-2022-21418" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21417" type="cve" title="fix CVE-2022-21417" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21414" type="cve" title="fix CVE-2022-21414" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21413" type="cve" title="fix CVE-2022-21413" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-21412" type="cve" title="fix CVE-2022-21412" />
    </references>
    <pkglist>
      <collection>
        <package name="mysql-test" version="8.0.38" release="1.uel20" epoch="0" arch="x86_64" src="mysql-8.0.38-1.uel20.src.rpm">
          <filename>mysql-test-8.0.38-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mysql-server" version="8.0.38" release="1.uel20" epoch="0" arch="x86_64" src="mysql-8.0.38-1.uel20.src.rpm">
          <filename>mysql-server-8.0.38-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mysql-libs" version="8.0.38" release="1.uel20" epoch="0" arch="x86_64" src="mysql-8.0.38-1.uel20.src.rpm">
          <filename>mysql-libs-8.0.38-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mysql" version="8.0.38" release="1.uel20" epoch="0" arch="x86_64" src="mysql-8.0.38-1.uel20.src.rpm">
          <filename>mysql-8.0.38-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mysql-errmsg" version="8.0.38" release="1.uel20" epoch="0" arch="x86_64" src="mysql-8.0.38-1.uel20.src.rpm">
          <filename>mysql-errmsg-8.0.38-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mysql-config" version="8.0.38" release="1.uel20" epoch="0" arch="x86_64" src="mysql-8.0.38-1.uel20.src.rpm">
          <filename>mysql-config-8.0.38-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mysql-help" version="8.0.38" release="1.uel20" epoch="0" arch="x86_64" src="mysql-8.0.38-1.uel20.src.rpm">
          <filename>mysql-help-8.0.38-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mysql-devel" version="8.0.38" release="1.uel20" epoch="0" arch="x86_64" src="mysql-8.0.38-1.uel20.src.rpm">
          <filename>mysql-devel-8.0.38-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mysql-common" version="8.0.38" release="1.uel20" epoch="0" arch="x86_64" src="mysql-8.0.38-1.uel20.src.rpm">
          <filename>mysql-common-8.0.38-1.uel20.x86_64.rpm</filename>
        </package>
        <package name="mysql-test" version="8.0.38" release="1.uel20" epoch="0" arch="aarch64" src="mysql-8.0.38-1.uel20.src.rpm">
          <filename>mysql-test-8.0.38-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mysql-server" version="8.0.38" release="1.uel20" epoch="0" arch="aarch64" src="mysql-8.0.38-1.uel20.src.rpm">
          <filename>mysql-server-8.0.38-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mysql" version="8.0.38" release="1.uel20" epoch="0" arch="aarch64" src="mysql-8.0.38-1.uel20.src.rpm">
          <filename>mysql-8.0.38-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mysql-libs" version="8.0.38" release="1.uel20" epoch="0" arch="aarch64" src="mysql-8.0.38-1.uel20.src.rpm">
          <filename>mysql-libs-8.0.38-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mysql-devel" version="8.0.38" release="1.uel20" epoch="0" arch="aarch64" src="mysql-8.0.38-1.uel20.src.rpm">
          <filename>mysql-devel-8.0.38-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mysql-errmsg" version="8.0.38" release="1.uel20" epoch="0" arch="aarch64" src="mysql-8.0.38-1.uel20.src.rpm">
          <filename>mysql-errmsg-8.0.38-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mysql-help" version="8.0.38" release="1.uel20" epoch="0" arch="aarch64" src="mysql-8.0.38-1.uel20.src.rpm">
          <filename>mysql-help-8.0.38-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mysql-config" version="8.0.38" release="1.uel20" epoch="0" arch="aarch64" src="mysql-8.0.38-1.uel20.src.rpm">
          <filename>mysql-config-8.0.38-1.uel20.aarch64.rpm</filename>
        </package>
        <package name="mysql-common" version="8.0.38" release="1.uel20" epoch="0" arch="aarch64" src="mysql-8.0.38-1.uel20.src.rpm">
          <filename>mysql-common-8.0.38-1.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="enhancement" version="2.0">
    <id>UTFA-2025:20086</id>
    <title>kernel-4.19 enhancement</title>
    <updated date="2024-07-12 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>kernel-4.19 enhancement</summary>
    <description>fix cve/bug or enhancement</description>
    <references />
    <pkglist>
      <collection>
        <package name="bpftool" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>bpftool-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="kernel" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="kernel-btf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-btf-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="kernel-tools" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-tools-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="perf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>perf-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="python2-perf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>python2-perf-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="kernel-tools-devel" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-tools-devel-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="bpftool-debuginfo" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>bpftool-debuginfo-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="kernel-devel" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-devel-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-perf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>python3-perf-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="kernel-tools-devel" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-tools-devel-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="bpftool-debuginfo" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>bpftool-debuginfo-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="python2-perf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>python2-perf-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-perf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>python3-perf-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="kernel-tools" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-tools-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="kernel-devel" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-devel-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="perf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>perf-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="kernel" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="kernel-btf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-btf-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="bpftool" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>bpftool-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20049</id>
    <title>Moderate: netty3 security update</title>
    <updated date="2024-11-13 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: netty3 security update</summary>
    <description> Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers &amp; clients. The `HttpPostRequestDecoder` can be tricked to accumulate data. While the decoder can store items on the disk if configured so, there are no limits to the number of fields the form can have, an attacher can send a chunked post consisting of many small fields that will be accumulated in the `bodyListHttpData` list. The decoder cumulates bytes in the `undecodedChunk` buffer until it can decode a field, this field can cumulate data without limits. This vulnerability is fixed in 4.1.108.Final.(CVE-2024-29025)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-29025" type="cve" title="fix CVE-2024-29025" />
    </references>
    <pkglist>
      <collection>
        <package name="netty3" version="3.10.6" release="9.uel20" epoch="0" arch="noarch" src="netty3-3.10.6-9.uel20.src.rpm">
          <filename>netty3-3.10.6-9.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20050</id>
    <title>Moderate: netty security update</title>
    <updated date="2024-11-14 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: netty security update</summary>
    <description> Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers &amp; clients. The `HttpPostRequestDecoder` can be tricked to accumulate data. While the decoder can store items on the disk if configured so, there are no limits to the number of fields the form can have, an attacher can send a chunked post consisting of many small fields that will be accumulated in the `bodyListHttpData` list. The decoder cumulates bytes in the `undecodedChunk` buffer until it can decode a field, this field can cumulate data without limits. This vulnerability is fixed in 4.1.108.Final.(CVE-2024-29025)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-29025" type="cve" title="fix CVE-2024-29025" />
    </references>
    <pkglist>
      <collection>
        <package name="netty" version="4.1.13" release="19.uel20" epoch="0" arch="x86_64" src="netty-4.1.13-19.uel20.src.rpm">
          <filename>netty-4.1.13-19.uel20.x86_64.rpm</filename>
        </package>
        <package name="netty" version="4.1.13" release="19.uel20" epoch="0" arch="aarch64" src="netty-4.1.13-19.uel20.src.rpm">
          <filename>netty-4.1.13-19.uel20.aarch64.rpm</filename>
        </package>
        <package name="netty-help" version="4.1.13" release="19.uel20" epoch="0" arch="noarch" src="netty-4.1.13-19.uel20.src.rpm">
          <filename>netty-help-4.1.13-19.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20051</id>
    <title>Important: nodejs security update</title>
    <updated date="2024-10-10 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: nodejs security update</summary>
    <description> An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the server and then a TCP connection is abruptly closed by the client triggering the Http2Session destructor while header frames are still being processed (and stored in memory) causing a race condition.(CVE-2024-27983)
 The team has identified a critical vulnerability in the http server of the most recent version of Node, where malformed headers can lead to HTTP request smuggling. Specifically, if a space is placed before a content-length header, it is not interpreted correctly, enabling attackers to smuggle in a second request within the body of the first.(CVE-2024-27982)
 A vulnerability in Node.js has been identified, allowing for a Denial of Service (DoS) attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL.
The vulnerability stems from the fact that the fetch() function in Node.js always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL.
An attacker controlling the URL passed into fetch() can exploit this vulnerability to exhaust memory, potentially leading to process termination, depending on the system configuration.(CVE-2024-22025)
 A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connection, exploiting the lack of limitations on chunk extension bytes. The issue can cause CPU and network bandwidth exhaustion, bypassing standard safeguards like timeouts and body size limits.(CVE-2024-22019)
 Node.js versions which bundle an unpatched version of OpenSSL or run against a dynamically linked version of OpenSSL which are unpatched are vulnerable to the Marvin Attack - https://people.redhat.com/~hkario/marvin/, if PCKS #1 v1.5 padding is allowed when performing RSA descryption using a private key.(CVE-2023-46809)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-27983" type="cve" title="fix CVE-2024-27983" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-27982" type="cve" title="fix CVE-2024-27982" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-22025" type="cve" title="fix CVE-2024-22025" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-22019" type="cve" title="fix CVE-2024-22019" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-46809" type="cve" title="fix CVE-2023-46809" />
    </references>
    <pkglist>
      <collection>
        <package name="npm" version="6.14.16" release="1.12.22.11.8.04.uel20" epoch="1" arch="x86_64" src="nodejs-12.22.11-8.04.uel20.src.rpm">
          <filename>npm-6.14.16-1.12.22.11.8.04.uel20.x86_64.rpm</filename>
        </package>
        <package name="nodejs-libs" version="12.22.11" release="8.04.uel20" epoch="1" arch="x86_64" src="nodejs-12.22.11-8.04.uel20.src.rpm">
          <filename>nodejs-libs-12.22.11-8.04.uel20.x86_64.rpm</filename>
        </package>
        <package name="nodejs-devel" version="12.22.11" release="8.04.uel20" epoch="1" arch="x86_64" src="nodejs-12.22.11-8.04.uel20.src.rpm">
          <filename>nodejs-devel-12.22.11-8.04.uel20.x86_64.rpm</filename>
        </package>
        <package name="v8-devel" version="7.8.279.23" release="1.12.22.11.8.04.uel20" epoch="2" arch="x86_64" src="nodejs-12.22.11-8.04.uel20.src.rpm">
          <filename>v8-devel-7.8.279.23-1.12.22.11.8.04.uel20.x86_64.rpm</filename>
        </package>
        <package name="nodejs" version="12.22.11" release="8.04.uel20" epoch="1" arch="x86_64" src="nodejs-12.22.11-8.04.uel20.src.rpm">
          <filename>nodejs-12.22.11-8.04.uel20.x86_64.rpm</filename>
        </package>
        <package name="nodejs-full-i18n" version="12.22.11" release="8.04.uel20" epoch="1" arch="x86_64" src="nodejs-12.22.11-8.04.uel20.src.rpm">
          <filename>nodejs-full-i18n-12.22.11-8.04.uel20.x86_64.rpm</filename>
        </package>
        <package name="npm" version="6.14.16" release="1.12.22.11.8.04.uel20" epoch="1" arch="aarch64" src="nodejs-12.22.11-8.04.uel20.src.rpm">
          <filename>npm-6.14.16-1.12.22.11.8.04.uel20.aarch64.rpm</filename>
        </package>
        <package name="nodejs-docs" version="12.22.11" release="8.04.uel20" epoch="1" arch="noarch" src="nodejs-12.22.11-8.04.uel20.src.rpm">
          <filename>nodejs-docs-12.22.11-8.04.uel20.noarch.rpm</filename>
        </package>
        <package name="nodejs" version="12.22.11" release="8.04.uel20" epoch="1" arch="aarch64" src="nodejs-12.22.11-8.04.uel20.src.rpm">
          <filename>nodejs-12.22.11-8.04.uel20.aarch64.rpm</filename>
        </package>
        <package name="v8-devel" version="7.8.279.23" release="1.12.22.11.8.04.uel20" epoch="2" arch="aarch64" src="nodejs-12.22.11-8.04.uel20.src.rpm">
          <filename>v8-devel-7.8.279.23-1.12.22.11.8.04.uel20.aarch64.rpm</filename>
        </package>
        <package name="nodejs-full-i18n" version="12.22.11" release="8.04.uel20" epoch="1" arch="aarch64" src="nodejs-12.22.11-8.04.uel20.src.rpm">
          <filename>nodejs-full-i18n-12.22.11-8.04.uel20.aarch64.rpm</filename>
        </package>
        <package name="nodejs-libs" version="12.22.11" release="8.04.uel20" epoch="1" arch="aarch64" src="nodejs-12.22.11-8.04.uel20.src.rpm">
          <filename>nodejs-libs-12.22.11-8.04.uel20.aarch64.rpm</filename>
        </package>
        <package name="nodejs-devel" version="12.22.11" release="8.04.uel20" epoch="1" arch="aarch64" src="nodejs-12.22.11-8.04.uel20.src.rpm">
          <filename>nodejs-devel-12.22.11-8.04.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20052</id>
    <title>Moderate: texlive-base security update</title>
    <updated date="2024-09-23 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: texlive-base security update</summary>
    <description> Tex Live 944e257 has a NULL pointer dereference in texk/web2c/pdftexdir/writet1.c. NOTE: this is disputed because it should be categorized as a usability problem.(CVE-2023-46048)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-46048" type="cve" title="fix CVE-2023-46048" />
    </references>
    <pkglist>
      <collection>
        <package name="texlive-ctie" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-ctie-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-tie" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-tie-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-dvidvi" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-dvidvi-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-patgen" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-patgen-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-synctex" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-synctex-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-gsftopk" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-gsftopk-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-dvipos" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-dvipos-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-detex" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-detex-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-pstools" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-pstools-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-dvicopy" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-dvicopy-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-texware" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-texware-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-lacheck" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-lacheck-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-dtl" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-dtl-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-dvi2tty" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-dvi2tty-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-afm2pl" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-afm2pl-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-ps2pk" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-ps2pk-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-web" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-web-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-musixtnt" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-musixtnt-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-seetexk" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-seetexk-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-dviljk" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-dviljk-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-cjkutils" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-cjkutils-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-mfware" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-mfware-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-bibtexu" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-bibtexu-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-xetex" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-xetex-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-aleph" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-aleph-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-fontware" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-fontware-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-vlna" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-vlna-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-bibtex" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-bibtex-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-m-tx" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-m-tx-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-autosp" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-autosp-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-dvipng" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-dvipng-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-bibtex8" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-bibtex8-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-tex" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-tex-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-lib-devel" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-lib-devel-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-chktex" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-chktex-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-pdftex" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-pdftex-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-axodraw2" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-axodraw2-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-omegaware" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-omegaware-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-base" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-base-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-mflua" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-mflua-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-ttfutils" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-ttfutils-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-metafont" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-metafont-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-kpathsea" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-kpathsea-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-lib" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-lib-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-pdftools" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-pdftools-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-tex4ht" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-tex4ht-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-xdvi" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-xdvi-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-cweb" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-cweb-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-uptex" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-uptex-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-luatex" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-luatex-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-pmx" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-pmx-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-dvips" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-dvips-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-gregoriotex" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-gregoriotex-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-ptex" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-ptex-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-metapost" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-metapost-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-makeindex" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-makeindex-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-lcdftypetools" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-lcdftypetools-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-dvipdfmx" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-dvipdfmx-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-dvisvgm" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-dvisvgm-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-velthuis" version="20180414" release="33.uel20.up1" epoch="7" arch="x86_64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-velthuis-20180414-33.uel20.up1.x86_64.rpm</filename>
        </package>
        <package name="texlive-typeoutfileinfo" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-typeoutfileinfo-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-latexfileversion" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-latexfileversion-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-wordcount" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-wordcount-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-latex-papersize" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-latex-papersize-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-texloganalyser" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-texloganalyser-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-dviinfox" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-dviinfox-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-convbkmk" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-convbkmk-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-texdirflatten" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-texdirflatten-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pdfbook2" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-pdfbook2-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-texliveonfly" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-texliveonfly-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-epstopdf" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-epstopdf-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-findhyph" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-findhyph-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-latexpand" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-latexpand-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-texfot" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-texfot-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pdfxup" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-pdfxup-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-purifyeps" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-purifyeps-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-exceltex" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-exceltex-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pkfix" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-pkfix-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-texdiff" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-texdiff-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-yplan" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-yplan-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-ctan-o-mat" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-ctan-o-mat-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pax" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-pax-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-texlive-scripts" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-texlive-scripts-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-dviasm" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-dviasm-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-vpe" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-vpe-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-adhocfilelist" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-adhocfilelist-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-texconfig" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-texconfig-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-ptex2pdf" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-ptex2pdf-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-tie" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-tie-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-pdfcrop" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-pdfcrop-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-mltex" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-mltex-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-dvipos" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-dvipos-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-ltxfileinfo" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-ltxfileinfo-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-bundledoc" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-bundledoc-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-ctie" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-ctie-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-detex" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-detex-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-dtxgen" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-dtxgen-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-match_parens" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-match_parens-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-lacheck" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-lacheck-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-dvidvi" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-dvidvi-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-patgen" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-patgen-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-chktex" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-chktex-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-mathspic" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-mathspic-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-synctex" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-synctex-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-latex2nemeth" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-latex2nemeth-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-ps2pk" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-ps2pk-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-jfmutil" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-jfmutil-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-texsis" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-texsis-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-dtl" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-dtl-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-urlbst" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-urlbst-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-musixtex" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-musixtex-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-mex" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-mex-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pdfjam" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-pdfjam-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-accfonts" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-accfonts-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-cachepic" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-cachepic-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-ptex-fontmaps" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-ptex-fontmaps-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-web" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-web-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-ctanupload" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-ctanupload-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-ulqda" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-ulqda-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-makedtx" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-makedtx-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-xmltex" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-xmltex-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-tex4ebook" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-tex4ebook-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-metapost" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-metapost-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-mkjobtexmf" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-mkjobtexmf-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-svn-multi" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-svn-multi-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-mfware" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-mfware-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-listbib" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-listbib-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-texware" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-texware-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-pstools" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-pstools-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-ctanify" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-ctanify-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-gsftopk" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-gsftopk-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-dosepsbin" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-dosepsbin-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-cslatex" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-cslatex-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-tpic2pdftex" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-tpic2pdftex-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-glyphlist" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-glyphlist-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-de-macro" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-de-macro-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-thumbpdf" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-thumbpdf-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-installfont" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-installfont-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-texdoctk" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-texdoctk-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-fig4latex" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-fig4latex-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-latex-git-log" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-latex-git-log-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-ebong" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-ebong-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-a2ping" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-a2ping-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-dvips" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-dvips-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-listings-ext" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-listings-ext-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-luaotfload" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-luaotfload-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-dvipng" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-dvipng-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-mkgrkindex" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-mkgrkindex-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-splitindex" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-splitindex-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-mf2pt1" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-mf2pt1-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-mptopdf" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-mptopdf-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-sty2dtx" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-sty2dtx-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-seetexk" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-seetexk-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-lib-devel" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-lib-devel-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-fragmaster" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-fragmaster-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-fontools" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-fontools-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-musixtnt" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-musixtnt-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-mkpic" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-mkpic-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-texdef" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-texdef-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-authorindex" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-authorindex-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-make4ht" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-make4ht-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-texdoc" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-texdoc-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-crossrefware" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-crossrefware-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-bibtexu" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-bibtexu-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-vlna" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-vlna-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-bibexport" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-bibexport-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-ltximg" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-ltximg-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-checkcites" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-checkcites-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-autosp" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-autosp-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-petri-nets" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-petri-nets-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-dviljk" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-dviljk-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-jadetex" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-jadetex-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-epspdf" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-epspdf-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-afm2pl" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-afm2pl-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-cjkutils" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-cjkutils-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-pfarrei" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-pfarrei-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-latex2man" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-latex2man-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-makeindex" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-makeindex-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-dvicopy" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-dvicopy-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-pst2pdf" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-pst2pdf-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-multibibliography" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-multibibliography-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-kpathsea" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-kpathsea-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-texlive.infra" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-texlive.infra-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-diadia" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-diadia-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-csplain" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-csplain-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-cweb" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-cweb-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-mflua" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-mflua-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-lollipop" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-lollipop-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pmxchords" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-pmxchords-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-m-tx" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-m-tx-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-pygmentex" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-pygmentex-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-tetex" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-tetex-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-srcredact" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-srcredact-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pkfix-helper" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-pkfix-helper-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-context" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-context-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-l3build" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-l3build-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-texosquery" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-texosquery-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-axodraw2" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-axodraw2-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-lib" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-lib-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-tex4ht" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-tex4ht-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-omegaware" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-omegaware-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-bibtex" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-bibtex-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-texcount" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-texcount-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-xdvi" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-xdvi-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-amstex" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-amstex-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-kotex-utils" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-kotex-utils-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-metafont" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-metafont-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-ttfutils" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-ttfutils-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-lua2dox" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-lua2dox-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pst-pdf" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-pst-pdf-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-latex" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-latex-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pmx" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-pmx-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-uptex" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-uptex-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-pdftools" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-pdftools-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-glossaries" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-glossaries-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-xetex" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-xetex-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-eplain" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-eplain-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pedigree-perl" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-pedigree-perl-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-latexdiff" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-latexdiff-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-cyrillic" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-cyrillic-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-ptex" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-ptex-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-fontinst" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-fontinst-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-lyluatex" version="svn47584" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-lyluatex-svn47584-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-rubik" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-rubik-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pdftex" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-pdftex-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-lcdftypetools" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-lcdftypetools-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-dvisvgm" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-dvisvgm-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-luatex" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-luatex-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-getmap" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-getmap-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-pythontex" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-pythontex-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-lwarp" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-lwarp-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-velthuis" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-velthuis-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-pdflatexpicscale" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-pdflatexpicscale-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-arara" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-arara-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-dvi2tty" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-dvi2tty-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-bibtex8" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-bibtex8-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-dvipdfmx" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-dvipdfmx-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-fontware" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-fontware-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-texlive-en" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-texlive-en-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-tex" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-tex-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-latexindent" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-latexindent-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-perltex" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-perltex-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-bib2gls" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-bib2gls-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-checklistings" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-checklistings-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-base" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-base-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-oberdiek" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-oberdiek-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-lilyglyphs" version="20180414" release="33.uel20.up1" epoch="7" arch="noarch" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-lilyglyphs-20180414-33.uel20.up1.noarch.rpm</filename>
        </package>
        <package name="texlive-aleph" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-aleph-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        <package name="texlive-gregoriotex" version="20180414" release="33.uel20.up1" epoch="7" arch="aarch64" src="texlive-base-20180414-33.uel20.up1.src.rpm">
          <filename>texlive-gregoriotex-20180414-33.uel20.up1.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20053</id>
    <title>Important: motif security update</title>
    <updated date="2024-10-30 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: motif security update</summary>
    <description> A flaw was found in libXpm. This issue occurs when parsing a file with a comment not closed; the end-of-file condition will not be detected, leading to an infinite loop and resulting in a Denial of Service in the application linked to the library.(CVE-2022-46285)
 A flaw was found in libXpm. When processing a file with width of 0 and a very large height, some parser functions will be called repeatedly and can lead to an infinite loop, resulting in a Denial of Service in the application linked to the library.(CVE-2022-44617)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-46285" type="cve" title="fix CVE-2022-46285" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-44617" type="cve" title="fix CVE-2022-44617" />
    </references>
    <pkglist>
      <collection>
        <package name="motif-devel" version="2.3.4" release="21.uel20" epoch="0" arch="x86_64" src="motif-2.3.4-21.uel20.src.rpm">
          <filename>motif-devel-2.3.4-21.uel20.x86_64.rpm</filename>
        </package>
        <package name="motif" version="2.3.4" release="21.uel20" epoch="0" arch="x86_64" src="motif-2.3.4-21.uel20.src.rpm">
          <filename>motif-2.3.4-21.uel20.x86_64.rpm</filename>
        </package>
        <package name="motif-help" version="2.3.4" release="21.uel20" epoch="0" arch="x86_64" src="motif-2.3.4-21.uel20.src.rpm">
          <filename>motif-help-2.3.4-21.uel20.x86_64.rpm</filename>
        </package>
        <package name="motif-help" version="2.3.4" release="21.uel20" epoch="0" arch="aarch64" src="motif-2.3.4-21.uel20.src.rpm">
          <filename>motif-help-2.3.4-21.uel20.aarch64.rpm</filename>
        </package>
        <package name="motif-devel" version="2.3.4" release="21.uel20" epoch="0" arch="aarch64" src="motif-2.3.4-21.uel20.src.rpm">
          <filename>motif-devel-2.3.4-21.uel20.aarch64.rpm</filename>
        </package>
        <package name="motif" version="2.3.4" release="21.uel20" epoch="0" arch="aarch64" src="motif-2.3.4-21.uel20.src.rpm">
          <filename>motif-2.3.4-21.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20054</id>
    <title>Critical: ca-certificates security update</title>
    <updated date="2024-10-25 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Critical</severity>
    <summary>Critical: ca-certificates security update</summary>
    <description> Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes "e-Tugra" root certificates. e-Tugra's root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from "e-Tugra" from the root store.(CVE-2023-37920)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-37920" type="cve" title="fix CVE-2023-37920" />
    </references>
    <pkglist>
      <collection>
        <package name="ca-certificates" version="2024.2.69_v8.0.303" release="80.0.uel20" epoch="0" arch="noarch" src="ca-certificates-2024.2.69_v8.0.303-80.0.uel20.src.rpm">
          <filename>ca-certificates-2024.2.69_v8.0.303-80.0.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20055</id>
    <title>Important: krb5 security update</title>
    <updated date="2024-11-19 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: krb5 security update</summary>
    <description> Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.(CVE-2024-26461)
 Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.(CVE-2024-26458)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-26461" type="cve" title="fix CVE-2024-26461" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-26458" type="cve" title="fix CVE-2024-26458" />
    </references>
    <pkglist>
      <collection>
        <package name="krb5-devel" version="1.18.2" release="13.uel20" epoch="0" arch="x86_64" src="krb5-1.18.2-13.uel20.src.rpm">
          <filename>krb5-devel-1.18.2-13.uel20.x86_64.rpm</filename>
        </package>
        <package name="krb5-libs" version="1.18.2" release="13.uel20" epoch="0" arch="x86_64" src="krb5-1.18.2-13.uel20.src.rpm">
          <filename>krb5-libs-1.18.2-13.uel20.x86_64.rpm</filename>
        </package>
        <package name="krb5-server" version="1.18.2" release="13.uel20" epoch="0" arch="x86_64" src="krb5-1.18.2-13.uel20.src.rpm">
          <filename>krb5-server-1.18.2-13.uel20.x86_64.rpm</filename>
        </package>
        <package name="krb5" version="1.18.2" release="13.uel20" epoch="0" arch="x86_64" src="krb5-1.18.2-13.uel20.src.rpm">
          <filename>krb5-1.18.2-13.uel20.x86_64.rpm</filename>
        </package>
        <package name="krb5-client" version="1.18.2" release="13.uel20" epoch="0" arch="x86_64" src="krb5-1.18.2-13.uel20.src.rpm">
          <filename>krb5-client-1.18.2-13.uel20.x86_64.rpm</filename>
        </package>
        <package name="krb5-devel" version="1.18.2" release="13.uel20" epoch="0" arch="aarch64" src="krb5-1.18.2-13.uel20.src.rpm">
          <filename>krb5-devel-1.18.2-13.uel20.aarch64.rpm</filename>
        </package>
        <package name="krb5-help" version="1.18.2" release="13.uel20" epoch="0" arch="noarch" src="krb5-1.18.2-13.uel20.src.rpm">
          <filename>krb5-help-1.18.2-13.uel20.noarch.rpm</filename>
        </package>
        <package name="krb5-server" version="1.18.2" release="13.uel20" epoch="0" arch="aarch64" src="krb5-1.18.2-13.uel20.src.rpm">
          <filename>krb5-server-1.18.2-13.uel20.aarch64.rpm</filename>
        </package>
        <package name="krb5" version="1.18.2" release="13.uel20" epoch="0" arch="aarch64" src="krb5-1.18.2-13.uel20.src.rpm">
          <filename>krb5-1.18.2-13.uel20.aarch64.rpm</filename>
        </package>
        <package name="krb5-client" version="1.18.2" release="13.uel20" epoch="0" arch="aarch64" src="krb5-1.18.2-13.uel20.src.rpm">
          <filename>krb5-client-1.18.2-13.uel20.aarch64.rpm</filename>
        </package>
        <package name="krb5-libs" version="1.18.2" release="13.uel20" epoch="0" arch="aarch64" src="krb5-1.18.2-13.uel20.src.rpm">
          <filename>krb5-libs-1.18.2-13.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20056</id>
    <title>Important: xorg-x11-server security update</title>
    <updated date="2024-10-30 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: xorg-x11-server security update</summary>
    <description> A use-after-free flaw was found in xorg-x11-server-Xvfb. This issue occurs in Xvfb with a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode). If the pointer is warped from a screen 1 to a screen 0, a use-after-free issue may be triggered during shutdown or reset of the Xvfb server, allowing for possible escalation of privileges or denial of service.(CVE-2023-5574)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-5574" type="cve" title="fix CVE-2023-5574" />
    </references>
    <pkglist>
      <collection>
        <package name="xorg-x11-server" version="1.20.8" release="26.up13.uel20" epoch="0" arch="x86_64" src="xorg-x11-server-1.20.8-26.up13.uel20.src.rpm">
          <filename>xorg-x11-server-1.20.8-26.up13.uel20.x86_64.rpm</filename>
        </package>
        <package name="xorg-x11-server-Xephyr" version="1.20.8" release="26.up13.uel20" epoch="0" arch="x86_64" src="xorg-x11-server-1.20.8-26.up13.uel20.src.rpm">
          <filename>xorg-x11-server-Xephyr-1.20.8-26.up13.uel20.x86_64.rpm</filename>
        </package>
        <package name="xorg-x11-server-devel" version="1.20.8" release="26.up13.uel20" epoch="0" arch="x86_64" src="xorg-x11-server-1.20.8-26.up13.uel20.src.rpm">
          <filename>xorg-x11-server-devel-1.20.8-26.up13.uel20.x86_64.rpm</filename>
        </package>
        <package name="xorg-x11-server" version="1.20.8" release="26.up13.uel20" epoch="0" arch="aarch64" src="xorg-x11-server-1.20.8-26.up13.uel20.src.rpm">
          <filename>xorg-x11-server-1.20.8-26.up13.uel20.aarch64.rpm</filename>
        </package>
        <package name="xorg-x11-server-help" version="1.20.8" release="26.up13.uel20" epoch="0" arch="noarch" src="xorg-x11-server-1.20.8-26.up13.uel20.src.rpm">
          <filename>xorg-x11-server-help-1.20.8-26.up13.uel20.noarch.rpm</filename>
        </package>
        <package name="xorg-x11-server-Xephyr" version="1.20.8" release="26.up13.uel20" epoch="0" arch="aarch64" src="xorg-x11-server-1.20.8-26.up13.uel20.src.rpm">
          <filename>xorg-x11-server-Xephyr-1.20.8-26.up13.uel20.aarch64.rpm</filename>
        </package>
        <package name="xorg-x11-server-devel" version="1.20.8" release="26.up13.uel20" epoch="0" arch="aarch64" src="xorg-x11-server-1.20.8-26.up13.uel20.src.rpm">
          <filename>xorg-x11-server-devel-1.20.8-26.up13.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20057</id>
    <title>Important: ruby security update</title>
    <updated date="2024-12-24 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: ruby security update</summary>
    <description> Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service) via a long string. The fixed versions are 3.2.1, 3.1.2, 3.0.2, and 2.0.1.(CVE-2021-41817)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2021-41817" type="cve" title="fix CVE-2021-41817" />
    </references>
    <pkglist>
      <collection>
        <package name="rubygem-openssl" version="2.1.2" release="132.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>rubygem-openssl-2.1.2-132.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-json" version="2.1.0" release="132.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>rubygem-json-2.1.0-132.uel20.x86_64.rpm</filename>
        </package>
        <package name="ruby-devel" version="2.5.8" release="132.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>ruby-devel-2.5.8-132.uel20.x86_64.rpm</filename>
        </package>
        <package name="ruby" version="2.5.8" release="132.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>ruby-2.5.8-132.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-io-console" version="0.4.6" release="132.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>rubygem-io-console-0.4.6-132.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-bigdecimal" version="1.3.4" release="132.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>rubygem-bigdecimal-1.3.4-132.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-psych" version="3.0.2" release="132.uel20" epoch="0" arch="x86_64" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>rubygem-psych-3.0.2-132.uel20.x86_64.rpm</filename>
        </package>
        <package name="rubygem-openssl" version="2.1.2" release="132.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>rubygem-openssl-2.1.2-132.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-test-unit" version="3.2.7" release="132.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>rubygem-test-unit-3.2.7-132.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-rake" version="12.3.0" release="132.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>rubygem-rake-12.3.0-132.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-io-console" version="0.4.6" release="132.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>rubygem-io-console-0.4.6-132.uel20.aarch64.rpm</filename>
        </package>
        <package name="ruby-devel" version="2.5.8" release="132.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>ruby-devel-2.5.8-132.uel20.aarch64.rpm</filename>
        </package>
        <package name="ruby-help" version="2.5.8" release="132.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>ruby-help-2.5.8-132.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-rdoc" version="6.0.1.1" release="132.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>rubygem-rdoc-6.0.1.1-132.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-net-telnet" version="0.1.1" release="132.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>rubygem-net-telnet-0.1.1-132.uel20.noarch.rpm</filename>
        </package>
        <package name="ruby-irb" version="2.5.8" release="132.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>ruby-irb-2.5.8-132.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygems" version="2.7.6" release="132.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>rubygems-2.7.6-132.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-psych" version="3.0.2" release="132.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>rubygem-psych-3.0.2-132.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-minitest" version="5.10.3" release="132.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>rubygem-minitest-5.10.3-132.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-xmlrpc" version="0.3.0" release="132.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>rubygem-xmlrpc-0.3.0-132.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-json" version="2.1.0" release="132.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>rubygem-json-2.1.0-132.uel20.aarch64.rpm</filename>
        </package>
        <package name="ruby" version="2.5.8" release="132.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>ruby-2.5.8-132.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-bigdecimal" version="1.3.4" release="132.uel20" epoch="0" arch="aarch64" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>rubygem-bigdecimal-1.3.4-132.uel20.aarch64.rpm</filename>
        </package>
        <package name="rubygem-did_you_mean" version="1.2.0" release="132.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>rubygem-did_you_mean-1.2.0-132.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygem-power_assert" version="1.1.1" release="132.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>rubygem-power_assert-1.1.1-132.uel20.noarch.rpm</filename>
        </package>
        <package name="rubygems-devel" version="2.7.6" release="132.uel20" epoch="0" arch="noarch" src="ruby-2.5.8-132.uel20.src.rpm">
          <filename>rubygems-devel-2.7.6-132.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20058</id>
    <title>Important: vorbis-tools security update</title>
    <updated date="2024-10-30 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: vorbis-tools security update</summary>
    <description> Buffer Overflow vulnerability in Vorbis-tools v.1.4.2 allows a local attacker to execute arbitrary code and cause a denial of service during the conversion of wav files to ogg files.(CVE-2023-43361)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-43361" type="cve" title="fix CVE-2023-43361" />
    </references>
    <pkglist>
      <collection>
        <package name="vorbis-tools" version="1.4.0" release="33.uel20" epoch="1" arch="x86_64" src="vorbis-tools-1.4.0-33.uel20.src.rpm">
          <filename>vorbis-tools-1.4.0-33.uel20.x86_64.rpm</filename>
        </package>
        <package name="vorbis-tools" version="1.4.0" release="33.uel20" epoch="1" arch="aarch64" src="vorbis-tools-1.4.0-33.uel20.src.rpm">
          <filename>vorbis-tools-1.4.0-33.uel20.aarch64.rpm</filename>
        </package>
        <package name="vorbis-tools-help" version="1.4.0" release="33.uel20" epoch="1" arch="noarch" src="vorbis-tools-1.4.0-33.uel20.src.rpm">
          <filename>vorbis-tools-help-1.4.0-33.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20059</id>
    <title>Moderate: python3 security update</title>
    <updated date="2024-11-12 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: python3 security update</summary>
    <description> Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.(CVE-2007-4559)
 The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.(CVE-2023-27043)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2007-4559" type="cve" title="fix CVE-2007-4559" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-27043" type="cve" title="fix CVE-2023-27043" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-devel" version="3.7.9" release="41.up1.uel20" epoch="0" arch="x86_64" src="python3-3.7.9-41.up1.uel20.src.rpm">
          <filename>python3-devel-3.7.9-41.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3" version="3.7.9" release="41.up1.uel20" epoch="0" arch="x86_64" src="python3-3.7.9-41.up1.uel20.src.rpm">
          <filename>python3-3.7.9-41.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-debug" version="3.7.9" release="41.up1.uel20" epoch="0" arch="x86_64" src="python3-3.7.9-41.up1.uel20.src.rpm">
          <filename>python3-debug-3.7.9-41.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-devel" version="3.7.9" release="41.up1.uel20" epoch="0" arch="aarch64" src="python3-3.7.9-41.up1.uel20.src.rpm">
          <filename>python3-devel-3.7.9-41.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3" version="3.7.9" release="41.up1.uel20" epoch="0" arch="aarch64" src="python3-3.7.9-41.up1.uel20.src.rpm">
          <filename>python3-3.7.9-41.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-debug" version="3.7.9" release="41.up1.uel20" epoch="0" arch="aarch64" src="python3-3.7.9-41.up1.uel20.src.rpm">
          <filename>python3-debug-3.7.9-41.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-help" version="3.7.9" release="41.up1.uel20" epoch="0" arch="noarch" src="python3-3.7.9-41.up1.uel20.src.rpm">
          <filename>python3-help-3.7.9-41.up1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20060</id>
    <title>Moderate: wavpack security update</title>
    <updated date="2024-12-05 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: wavpack security update</summary>
    <description> A null pointer dereference bug was found in wavpack-5.4.0 The results from the ASAN log: AddressSanitizer:DEADLYSIGNAL ===================================================================84257==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x561b47a970c6 bp 0x7fff13952fb0 sp 0x7fff1394fca0 T0) ==84257==The signal is caused by a WRITE memory access. ==84257==Hint: address points to the zero page. #0 0x561b47a970c5 in main cli/wvunpack.c:834 #1 0x7efc4f5c0082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) #2 0x561b47a945ed in _start (/usr/local/bin/wvunpack+0xa5ed) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV cli/wvunpack.c:834 in main ==84257==ABORTING(CVE-2022-2476)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-2476" type="cve" title="fix CVE-2022-2476" />
    </references>
    <pkglist>
      <collection>
        <package name="wavpack" version="5.3.0" release="3.uel20" epoch="0" arch="x86_64" src="wavpack-5.3.0-3.uel20.src.rpm">
          <filename>wavpack-5.3.0-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="wavpack-devel" version="5.3.0" release="3.uel20" epoch="0" arch="x86_64" src="wavpack-5.3.0-3.uel20.src.rpm">
          <filename>wavpack-devel-5.3.0-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="wavpack-help" version="5.3.0" release="3.uel20" epoch="0" arch="noarch" src="wavpack-5.3.0-3.uel20.src.rpm">
          <filename>wavpack-help-5.3.0-3.uel20.noarch.rpm</filename>
        </package>
        <package name="wavpack" version="5.3.0" release="3.uel20" epoch="0" arch="aarch64" src="wavpack-5.3.0-3.uel20.src.rpm">
          <filename>wavpack-5.3.0-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="wavpack-devel" version="5.3.0" release="3.uel20" epoch="0" arch="aarch64" src="wavpack-5.3.0-3.uel20.src.rpm">
          <filename>wavpack-devel-5.3.0-3.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20061</id>
    <title>Moderate: lua security update</title>
    <updated date="2024-10-16 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: lua security update</summary>
    <description> ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31).(CVE-2020-24370)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-24370" type="cve" title="fix CVE-2020-24370" />
    </references>
    <pkglist>
      <collection>
        <package name="lua-devel" version="5.3.5" release="4.up2.uel20" epoch="0" arch="x86_64" src="lua-5.3.5-4.up2.uel20.src.rpm">
          <filename>lua-devel-5.3.5-4.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="lua" version="5.3.5" release="4.up2.uel20" epoch="0" arch="x86_64" src="lua-5.3.5-4.up2.uel20.src.rpm">
          <filename>lua-5.3.5-4.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="lua" version="5.3.5" release="4.up2.uel20" epoch="0" arch="aarch64" src="lua-5.3.5-4.up2.uel20.src.rpm">
          <filename>lua-5.3.5-4.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="lua-devel" version="5.3.5" release="4.up2.uel20" epoch="0" arch="aarch64" src="lua-5.3.5-4.up2.uel20.src.rpm">
          <filename>lua-devel-5.3.5-4.up2.uel20.aarch64.rpm</filename>
        </package>
        <package name="lua-help" version="5.3.5" release="4.up2.uel20" epoch="0" arch="noarch" src="lua-5.3.5-4.up2.uel20.src.rpm">
          <filename>lua-help-5.3.5-4.up2.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20062</id>
    <title>Moderate: iniparser security update</title>
    <updated date="2024-12-10 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: iniparser security update</summary>
    <description> iniparser v4.1 is vulnerable to NULL Pointer Dereference in function iniparser_getlongint which misses check NULL for function iniparser_getstring's return.(CVE-2023-33461)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-33461" type="cve" title="fix CVE-2023-33461" />
    </references>
    <pkglist>
      <collection>
        <package name="iniparser" version="4.1" release="4.uel20" epoch="0" arch="x86_64" src="iniparser-4.1-4.uel20.src.rpm">
          <filename>iniparser-4.1-4.uel20.x86_64.rpm</filename>
        </package>
        <package name="iniparser" version="4.1" release="4.uel20" epoch="0" arch="aarch64" src="iniparser-4.1-4.uel20.src.rpm">
          <filename>iniparser-4.1-4.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20063</id>
    <title>Moderate: python-configobj security update</title>
    <updated date="2024-10-11 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: python-configobj security update</summary>
    <description> All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\).

**Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.

(CVE-2023-26112)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-26112" type="cve" title="fix CVE-2023-26112" />
    </references>
    <pkglist>
      <collection>
        <package name="python3-configobj" version="5.0.6" release="18.uel20" epoch="0" arch="noarch" src="python-configobj-5.0.6-18.uel20.src.rpm">
          <filename>python3-configobj-5.0.6-18.uel20.noarch.rpm</filename>
        </package>
        <package name="python2-configobj" version="5.0.6" release="18.uel20" epoch="0" arch="noarch" src="python-configobj-5.0.6-18.uel20.src.rpm">
          <filename>python2-configobj-5.0.6-18.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20064</id>
    <title>Moderate: grafana security update</title>
    <updated date="2024-10-25 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: grafana security update</summary>
    <description> Grafana is an open source data visualization platform for metrics, logs, and traces. Versions prior to 9.1.8 and 8.5.14 allow one user to block another user's login attempt by registering someone else'e email address as a username. A Grafana user’s username and email address are unique fields, that means no other user can have the same username or email address as another user. A user can have an email address as a username. However, the login system allows users to log in with either username or email address. Since Grafana allows a user to log in with either their username or email address, this creates an usual behavior where `user_1` can register with one email address and `user_2` can register their username as `user_1`’s email address. This prevents `user_1` logging into the application since `user_1`'s password won’t match with `user_2`'s email address. Versions 9.1.8 and 8.5.14 contain a patch. There are no workarounds for this issue.(CVE-2022-39229)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2022-39229" type="cve" title="fix CVE-2022-39229" />
    </references>
    <pkglist>
      <collection>
        <package name="grafana" version="7.5.15" release="5.up2.uel20" epoch="0" arch="x86_64" src="grafana-7.5.15-5.up2.uel20.src.rpm">
          <filename>grafana-7.5.15-5.up2.uel20.x86_64.rpm</filename>
        </package>
        <package name="grafana" version="7.5.15" release="5.up2.uel20" epoch="0" arch="aarch64" src="grafana-7.5.15-5.up2.uel20.src.rpm">
          <filename>grafana-7.5.15-5.up2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20065</id>
    <title>Moderate: poppler security update</title>
    <updated date="2025-01-02 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: poppler security update</summary>
    <description> libpoppler.so in Poppler through 24.12.0 has an out-of-bounds read vulnerability within the JBIG2Bitmap::combine function in JBIG2Stream.cc.(CVE-2024-56378)
 Out-of-bounds array write in Xpdf 4.05 and earlier, triggered by an invalid character code in a Type 1 font. The root problem was a bounds check that was being optimized away by modern compilers.
(CVE-2024-4141)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-56378" type="cve" title="fix CVE-2024-56378" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-4141" type="cve" title="fix CVE-2024-4141" />
    </references>
    <pkglist>
      <collection>
        <package name="poppler-qt5" version="0.90.0" release="10.uel20.01" epoch="0" arch="x86_64" src="poppler-0.90.0-10.uel20.01.src.rpm">
          <filename>poppler-qt5-0.90.0-10.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="poppler-utils" version="0.90.0" release="10.uel20.01" epoch="0" arch="x86_64" src="poppler-0.90.0-10.uel20.01.src.rpm">
          <filename>poppler-utils-0.90.0-10.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="poppler-glib" version="0.90.0" release="10.uel20.01" epoch="0" arch="x86_64" src="poppler-0.90.0-10.uel20.01.src.rpm">
          <filename>poppler-glib-0.90.0-10.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="poppler-glib-devel" version="0.90.0" release="10.uel20.01" epoch="0" arch="x86_64" src="poppler-0.90.0-10.uel20.01.src.rpm">
          <filename>poppler-glib-devel-0.90.0-10.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="poppler-qt5-devel" version="0.90.0" release="10.uel20.01" epoch="0" arch="x86_64" src="poppler-0.90.0-10.uel20.01.src.rpm">
          <filename>poppler-qt5-devel-0.90.0-10.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="poppler" version="0.90.0" release="10.uel20.01" epoch="0" arch="x86_64" src="poppler-0.90.0-10.uel20.01.src.rpm">
          <filename>poppler-0.90.0-10.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="poppler-cpp-devel" version="0.90.0" release="10.uel20.01" epoch="0" arch="x86_64" src="poppler-0.90.0-10.uel20.01.src.rpm">
          <filename>poppler-cpp-devel-0.90.0-10.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="poppler-cpp" version="0.90.0" release="10.uel20.01" epoch="0" arch="x86_64" src="poppler-0.90.0-10.uel20.01.src.rpm">
          <filename>poppler-cpp-0.90.0-10.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="poppler-devel" version="0.90.0" release="10.uel20.01" epoch="0" arch="x86_64" src="poppler-0.90.0-10.uel20.01.src.rpm">
          <filename>poppler-devel-0.90.0-10.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="poppler-cpp" version="0.90.0" release="10.uel20.01" epoch="0" arch="aarch64" src="poppler-0.90.0-10.uel20.01.src.rpm">
          <filename>poppler-cpp-0.90.0-10.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="poppler-utils" version="0.90.0" release="10.uel20.01" epoch="0" arch="aarch64" src="poppler-0.90.0-10.uel20.01.src.rpm">
          <filename>poppler-utils-0.90.0-10.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="poppler-qt5-devel" version="0.90.0" release="10.uel20.01" epoch="0" arch="aarch64" src="poppler-0.90.0-10.uel20.01.src.rpm">
          <filename>poppler-qt5-devel-0.90.0-10.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="poppler-cpp-devel" version="0.90.0" release="10.uel20.01" epoch="0" arch="aarch64" src="poppler-0.90.0-10.uel20.01.src.rpm">
          <filename>poppler-cpp-devel-0.90.0-10.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="poppler-glib-devel" version="0.90.0" release="10.uel20.01" epoch="0" arch="aarch64" src="poppler-0.90.0-10.uel20.01.src.rpm">
          <filename>poppler-glib-devel-0.90.0-10.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="poppler" version="0.90.0" release="10.uel20.01" epoch="0" arch="aarch64" src="poppler-0.90.0-10.uel20.01.src.rpm">
          <filename>poppler-0.90.0-10.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="poppler-qt5" version="0.90.0" release="10.uel20.01" epoch="0" arch="aarch64" src="poppler-0.90.0-10.uel20.01.src.rpm">
          <filename>poppler-qt5-0.90.0-10.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="poppler-help" version="0.90.0" release="10.uel20.01" epoch="0" arch="noarch" src="poppler-0.90.0-10.uel20.01.src.rpm">
          <filename>poppler-help-0.90.0-10.uel20.01.noarch.rpm</filename>
        </package>
        <package name="poppler-devel" version="0.90.0" release="10.uel20.01" epoch="0" arch="aarch64" src="poppler-0.90.0-10.uel20.01.src.rpm">
          <filename>poppler-devel-0.90.0-10.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="poppler-glib" version="0.90.0" release="10.uel20.01" epoch="0" arch="aarch64" src="poppler-0.90.0-10.uel20.01.src.rpm">
          <filename>poppler-glib-0.90.0-10.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="poppler-glib-doc" version="0.90.0" release="10.uel20.01" epoch="0" arch="noarch" src="poppler-0.90.0-10.uel20.01.src.rpm">
          <filename>poppler-glib-doc-0.90.0-10.uel20.01.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20066</id>
    <title>Moderate: gstreamer1-plugins-good security update</title>
    <updated date="2024-12-24 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: gstreamer1-plugins-good security update</summary>
    <description> GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_update_tracks function within matroska-demux.c. The vulnerability occurs when the gst_caps_is_equal function is called with invalid caps values. If this happen, then in the function gst_buffer_get_size the call to GST_BUFFER_MEM_PTR can return a null pointer. Attempting to dereference the size field of this null pointer results in a null pointer dereference. This vulnerability is fixed in 1.24.10.(CVE-2024-47603)
 GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_jpeg_dec_negotiate function in gstjpegdec.c. This function does not check for a NULL return value from gst_video_decoder_set_output_state. When this happens, dereferences of the outstate pointer will lead to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.(CVE-2024-47599)
 GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in qtdemux_parse_trak function within qtdemux.c. During the strf parsing case, the subtraction size -= 40 can lead to a negative integer overflow if it is less than 40. If this happens, the subsequent call to gst_buffer_fill will invoke memcpy with a large tocopy size, resulting in an OOB-read. This vulnerability is fixed in 1.24.10.(CVE-2024-47545)
 GStreamer is a library for constructing graphs of media-handling components. The function qtdemux_parse_sbgp in qtdemux.c is affected by a null dereference vulnerability. This vulnerability is fixed in 1.24.10.(CVE-2024-47544)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47603" type="cve" title="fix CVE-2024-47603" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47599" type="cve" title="fix CVE-2024-47599" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47545" type="cve" title="fix CVE-2024-47545" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-47544" type="cve" title="fix CVE-2024-47544" />
    </references>
    <pkglist>
      <collection>
        <package name="gstreamer1-plugins-good" version="1.16.2" release="8.uel20" epoch="0" arch="x86_64" src="gstreamer1-plugins-good-1.16.2-8.uel20.src.rpm">
          <filename>gstreamer1-plugins-good-1.16.2-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="gstreamer1-plugins-good-gtk" version="1.16.2" release="8.uel20" epoch="0" arch="x86_64" src="gstreamer1-plugins-good-1.16.2-8.uel20.src.rpm">
          <filename>gstreamer1-plugins-good-gtk-1.16.2-8.uel20.x86_64.rpm</filename>
        </package>
        <package name="gstreamer1-plugins-good" version="1.16.2" release="8.uel20" epoch="0" arch="aarch64" src="gstreamer1-plugins-good-1.16.2-8.uel20.src.rpm">
          <filename>gstreamer1-plugins-good-1.16.2-8.uel20.aarch64.rpm</filename>
        </package>
        <package name="gstreamer1-plugins-good-help" version="1.16.2" release="8.uel20" epoch="0" arch="noarch" src="gstreamer1-plugins-good-1.16.2-8.uel20.src.rpm">
          <filename>gstreamer1-plugins-good-help-1.16.2-8.uel20.noarch.rpm</filename>
        </package>
        <package name="gstreamer1-plugins-good-gtk" version="1.16.2" release="8.uel20" epoch="0" arch="aarch64" src="gstreamer1-plugins-good-1.16.2-8.uel20.src.rpm">
          <filename>gstreamer1-plugins-good-gtk-1.16.2-8.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20067</id>
    <title>Moderate: ffmpeg security update</title>
    <updated date="2025-01-02 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: ffmpeg security update</summary>
    <description> FFmpeg n6.1.1 has a vulnerability in the AVI demuxer of the libavformat library which allows for an integer overflow, potentially resulting in a denial-of-service (DoS) condition.(CVE-2024-36618)
 FFmpeg n6.1.1 has an integer overflow vulnerability in the FFmpeg CAF decoder.(CVE-2024-36617)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-36618" type="cve" title="fix CVE-2024-36618" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-36617" type="cve" title="fix CVE-2024-36617" />
    </references>
    <pkglist>
      <collection>
        <package name="libavdevice" version="4.2.4" release="21.uel20.01" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-21.uel20.01.src.rpm">
          <filename>libavdevice-4.2.4-21.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg-devel" version="4.2.4" release="21.uel20.01" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-21.uel20.01.src.rpm">
          <filename>ffmpeg-devel-4.2.4-21.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg" version="4.2.4" release="21.uel20.01" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-21.uel20.01.src.rpm">
          <filename>ffmpeg-4.2.4-21.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg-libs" version="4.2.4" release="21.uel20.01" epoch="0" arch="x86_64" src="ffmpeg-4.2.4-21.uel20.01.src.rpm">
          <filename>ffmpeg-libs-4.2.4-21.uel20.01.x86_64.rpm</filename>
        </package>
        <package name="ffmpeg-libs" version="4.2.4" release="21.uel20.01" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-21.uel20.01.src.rpm">
          <filename>ffmpeg-libs-4.2.4-21.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="ffmpeg" version="4.2.4" release="21.uel20.01" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-21.uel20.01.src.rpm">
          <filename>ffmpeg-4.2.4-21.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="ffmpeg-devel" version="4.2.4" release="21.uel20.01" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-21.uel20.01.src.rpm">
          <filename>ffmpeg-devel-4.2.4-21.uel20.01.aarch64.rpm</filename>
        </package>
        <package name="libavdevice" version="4.2.4" release="21.uel20.01" epoch="0" arch="aarch64" src="ffmpeg-4.2.4-21.uel20.01.src.rpm">
          <filename>libavdevice-4.2.4-21.uel20.01.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20068</id>
    <title>Moderate: openjpeg2 security update</title>
    <updated date="2025-01-13 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: openjpeg2 security update</summary>
    <description> A flaw was found in the OpenJPEG project. A heap buffer overflow condition may be triggered when certain options are specified while using the opj_decompress utility.  This can lead to an application crash or other undefined behavior.(CVE-2024-56827)
 A flaw was found in the OpenJPEG project. A heap buffer overflow condition may be triggered when certain options are specified while using the opj_decompress utility.  This can lead to an application crash or other undefined behavior.(CVE-2024-56826)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-56827" type="cve" title="fix CVE-2024-56827" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-56826" type="cve" title="fix CVE-2024-56826" />
    </references>
    <pkglist>
      <collection>
        <package name="openjpeg2" version="2.3.1" release="12.up3.uel20" epoch="0" arch="x86_64" src="openjpeg2-2.3.1-12.up3.uel20.src.rpm">
          <filename>openjpeg2-2.3.1-12.up3.uel20.x86_64.rpm</filename>
        </package>
        <package name="openjpeg2-help" version="2.3.1" release="12.up3.uel20" epoch="0" arch="x86_64" src="openjpeg2-2.3.1-12.up3.uel20.src.rpm">
          <filename>openjpeg2-help-2.3.1-12.up3.uel20.x86_64.rpm</filename>
        </package>
        <package name="openjpeg2-devel" version="2.3.1" release="12.up3.uel20" epoch="0" arch="x86_64" src="openjpeg2-2.3.1-12.up3.uel20.src.rpm">
          <filename>openjpeg2-devel-2.3.1-12.up3.uel20.x86_64.rpm</filename>
        </package>
        <package name="openjpeg2" version="2.3.1" release="12.up3.uel20" epoch="0" arch="aarch64" src="openjpeg2-2.3.1-12.up3.uel20.src.rpm">
          <filename>openjpeg2-2.3.1-12.up3.uel20.aarch64.rpm</filename>
        </package>
        <package name="openjpeg2-help" version="2.3.1" release="12.up3.uel20" epoch="0" arch="aarch64" src="openjpeg2-2.3.1-12.up3.uel20.src.rpm">
          <filename>openjpeg2-help-2.3.1-12.up3.uel20.aarch64.rpm</filename>
        </package>
        <package name="openjpeg2-devel" version="2.3.1" release="12.up3.uel20" epoch="0" arch="aarch64" src="openjpeg2-2.3.1-12.up3.uel20.src.rpm">
          <filename>openjpeg2-devel-2.3.1-12.up3.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20069</id>
    <title>Moderate: pam security update</title>
    <updated date="2024-12-26 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: pam security update</summary>
    <description> A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.(CVE-2024-10041)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-10041" type="cve" title="fix CVE-2024-10041" />
    </references>
    <pkglist>
      <collection>
        <package name="pam" version="1.4.0" release="13.up1.uel20" epoch="0" arch="x86_64" src="pam-1.4.0-13.up1.uel20.src.rpm">
          <filename>pam-1.4.0-13.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="pam-devel" version="1.4.0" release="13.up1.uel20" epoch="0" arch="x86_64" src="pam-1.4.0-13.up1.uel20.src.rpm">
          <filename>pam-devel-1.4.0-13.up1.uel20.x86_64.rpm</filename>
        </package>
        <package name="pam" version="1.4.0" release="13.up1.uel20" epoch="0" arch="aarch64" src="pam-1.4.0-13.up1.uel20.src.rpm">
          <filename>pam-1.4.0-13.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="pam-devel" version="1.4.0" release="13.up1.uel20" epoch="0" arch="aarch64" src="pam-1.4.0-13.up1.uel20.src.rpm">
          <filename>pam-devel-1.4.0-13.up1.uel20.aarch64.rpm</filename>
        </package>
        <package name="pam-help" version="1.4.0" release="13.up1.uel20" epoch="0" arch="noarch" src="pam-1.4.0-13.up1.uel20.src.rpm">
          <filename>pam-help-1.4.0-13.up1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20070</id>
    <title>Moderate: linux-firmware security update</title>
    <updated date="2025-01-07 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: linux-firmware security update</summary>
    <description> Incomplete system memory cleanup in SEV firmware could
allow a privileged attacker to corrupt guest private memory, potentially
resulting in a loss of data integrity.(CVE-2023-31356)
 IOMMU improperly handles certain special address
ranges with invalid device table entries (DTEs), which may allow an attacker
with privileges and a compromised Hypervisor to
induce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a
loss of guest integrity.(CVE-2023-20584)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-31356" type="cve" title="fix CVE-2023-31356" />
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-20584" type="cve" title="fix CVE-2023-20584" />
    </references>
    <pkglist>
      <collection>
        <package name="linux-firmware" version="20241017" release="1.uel20" epoch="0" arch="noarch" src="linux-firmware-20241017-1.uel20.src.rpm">
          <filename>linux-firmware-20241017-1.uel20.noarch.rpm</filename>
        </package>
        <package name="linux-firmware-iwlwifi" version="20241017" release="1.uel20" epoch="0" arch="noarch" src="linux-firmware-20241017-1.uel20.src.rpm">
          <filename>linux-firmware-iwlwifi-20241017-1.uel20.noarch.rpm</filename>
        </package>
        <package name="linux-firmware-ath" version="20241017" release="1.uel20" epoch="0" arch="noarch" src="linux-firmware-20241017-1.uel20.src.rpm">
          <filename>linux-firmware-ath-20241017-1.uel20.noarch.rpm</filename>
        </package>
        <package name="linux-firmware-libertas" version="20241017" release="1.uel20" epoch="0" arch="noarch" src="linux-firmware-20241017-1.uel20.src.rpm">
          <filename>linux-firmware-libertas-20241017-1.uel20.noarch.rpm</filename>
        </package>
        <package name="linux-firmware-cypress" version="20241017" release="1.uel20" epoch="0" arch="noarch" src="linux-firmware-20241017-1.uel20.src.rpm">
          <filename>linux-firmware-cypress-20241017-1.uel20.noarch.rpm</filename>
        </package>
        <package name="linux-firmware-mediatek" version="20241017" release="1.uel20" epoch="0" arch="noarch" src="linux-firmware-20241017-1.uel20.src.rpm">
          <filename>linux-firmware-mediatek-20241017-1.uel20.noarch.rpm</filename>
        </package>
        <package name="linux-firmware-ti-connectivity" version="20241017" release="1.uel20" epoch="0" arch="noarch" src="linux-firmware-20241017-1.uel20.src.rpm">
          <filename>linux-firmware-ti-connectivity-20241017-1.uel20.noarch.rpm</filename>
        </package>
        <package name="linux-firmware-mrvl" version="20241017" release="1.uel20" epoch="0" arch="noarch" src="linux-firmware-20241017-1.uel20.src.rpm">
          <filename>linux-firmware-mrvl-20241017-1.uel20.noarch.rpm</filename>
        </package>
        <package name="linux-firmware-netronome" version="20241017" release="1.uel20" epoch="0" arch="noarch" src="linux-firmware-20241017-1.uel20.src.rpm">
          <filename>linux-firmware-netronome-20241017-1.uel20.noarch.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20071</id>
    <title>Moderate: hplip security update</title>
    <updated date="2025-01-02 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>Moderate: hplip security update</summary>
    <description> The HP Linux Imaging and Printing (HPLIP) software may potentially be affected by memory buffer overflow.(CVE-2020-6923)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2020-6923" type="cve" title="fix CVE-2020-6923" />
    </references>
    <pkglist>
      <collection>
        <package name="hplip" version="3.23.8" release="2.uel20" epoch="0" arch="x86_64" src="hplip-3.23.8-2.uel20.src.rpm">
          <filename>hplip-3.23.8-2.uel20.x86_64.rpm</filename>
        </package>
        <package name="hplip" version="3.23.8" release="2.uel20" epoch="0" arch="aarch64" src="hplip-3.23.8-2.uel20.src.rpm">
          <filename>hplip-3.23.8-2.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20072</id>
    <title>None: iperf3 security update</title>
    <updated date="2025-01-03 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>None</severity>
    <summary>None: iperf3 security update</summary>
    <description> iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.(CVE-2024-26306)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2024-26306" type="cve" title="fix CVE-2024-26306" />
    </references>
    <pkglist>
      <collection>
        <package name="iperf3-devel" version="3.16" release="3.uel20" epoch="0" arch="x86_64" src="iperf3-3.16-3.uel20.src.rpm">
          <filename>iperf3-devel-3.16-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="iperf3" version="3.16" release="3.uel20" epoch="0" arch="x86_64" src="iperf3-3.16-3.uel20.src.rpm">
          <filename>iperf3-3.16-3.uel20.x86_64.rpm</filename>
        </package>
        <package name="iperf3" version="3.16" release="3.uel20" epoch="0" arch="aarch64" src="iperf3-3.16-3.uel20.src.rpm">
          <filename>iperf3-3.16-3.uel20.aarch64.rpm</filename>
        </package>
        <package name="iperf3-help" version="3.16" release="3.uel20" epoch="0" arch="noarch" src="iperf3-3.16-3.uel20.src.rpm">
          <filename>iperf3-help-3.16-3.uel20.noarch.rpm</filename>
        </package>
        <package name="iperf3-devel" version="3.16" release="3.uel20" epoch="0" arch="aarch64" src="iperf3-3.16-3.uel20.src.rpm">
          <filename>iperf3-devel-3.16-3.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="enhancement" version="2.0">
    <id>UTFA-2025:20102</id>
    <title>kernel-4.19 enhancement</title>
    <updated date="2024-07-12 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Moderate</severity>
    <summary>kernel-4.19 enhancement</summary>
    <description>fix cve/bug or enhancement</description>
    <references />
    <pkglist>
      <collection>
        <package name="bpftool" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>bpftool-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="kernel" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="kernel-btf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-btf-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="kernel-tools" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-tools-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="perf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>perf-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="python2-perf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>python2-perf-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="kernel-tools-devel" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-tools-devel-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="bpftool-debuginfo" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>bpftool-debuginfo-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="kernel-devel" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-devel-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="python3-perf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="aarch64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>python3-perf-4.19.90-2403.3.0.0270.87.uel20.aarch64.rpm</filename>
        </package>
        <package name="kernel-tools-devel" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-tools-devel-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="bpftool-debuginfo" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>bpftool-debuginfo-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="python2-perf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>python2-perf-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="python3-perf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>python3-perf-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="kernel-tools" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-tools-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="kernel-devel" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-devel-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="perf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>perf-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="kernel" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="kernel-btf" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>kernel-btf-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        <package name="bpftool" version="4.19.90" release="2403.3.0.0270.87.uel20" epoch="0" arch="x86_64" src="kernel-4.19.90-2403.3.0.0270.87.uel20.src.rpm">
          <filename>bpftool-4.19.90-2403.3.0.0270.87.uel20.x86_64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  <update status="stable" type="security" version="2.0">
    <id>UTSA-2025:20073</id>
    <title>Important: tinyxml security update</title>
    <updated date="2025-01-14 00:00:00" />
    <rights>Copyright (C) 2022 UnionTech Software Technology Co., Ltd</rights>
    <release>UnionTech OS Server 20</release>
    <severity>Important</severity>
    <summary>Important: tinyxml security update</summary>
    <description> StringEqual in TiXmlDeclaration::Parse in tinyxmlparser.cpp in TinyXML through 2.6.2 has a reachable assertion (and application exit) via a crafted XML document with a '\0' located after whitespace.(CVE-2023-34194)</description>
    <references>
      <reference href="https://usafe.uniontech.com/" id="CVE-2023-34194" type="cve" title="fix CVE-2023-34194" />
    </references>
    <pkglist>
      <collection>
        <package name="tinyxml" version="2.6.2" release="25.uel20" epoch="0" arch="x86_64" src="tinyxml-2.6.2-25.uel20.src.rpm">
          <filename>tinyxml-2.6.2-25.uel20.x86_64.rpm</filename>
        </package>
        <package name="tinyxml-devel" version="2.6.2" release="25.uel20" epoch="0" arch="x86_64" src="tinyxml-2.6.2-25.uel20.src.rpm">
          <filename>tinyxml-devel-2.6.2-25.uel20.x86_64.rpm</filename>
        </package>
        <package name="tinyxml" version="2.6.2" release="25.uel20" epoch="0" arch="aarch64" src="tinyxml-2.6.2-25.uel20.src.rpm">
          <filename>tinyxml-2.6.2-25.uel20.aarch64.rpm</filename>
        </package>
        <package name="tinyxml-devel" version="2.6.2" release="25.uel20" epoch="0" arch="aarch64" src="tinyxml-2.6.2-25.uel20.src.rpm">
          <filename>tinyxml-devel-2.6.2-25.uel20.aarch64.rpm</filename>
        </package>
        </collection>
    </pkglist>
  </update>
  </updates>