RLSA-2022:4872 Important: firefox security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for firefox is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:4872 Rocky Linux 8 firefox-91.10.0-1.el8_6.x86_64.rpm 83ca19a3bf653a517ff937b296a7d4e17d358404197b04bece23a5ce6c0b49ed thunderbird-91.10.0-1.el8_6.x86_64.rpm a92648dc77a00808a20131b3e34bb85062873ec22fc154746c61159cc4d6dd01 firefox-91.10.0-1.el8_6.x86_64.rpm 83ca19a3bf653a517ff937b296a7d4e17d358404197b04bece23a5ce6c0b49ed thunderbird-91.10.0-1.el8_6.x86_64.rpm a92648dc77a00808a20131b3e34bb85062873ec22fc154746c61159cc4d6dd01 RLSA-2022:2013 Moderate: openssh security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for openssh is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:2013 Rocky Linux 8 openssh-askpass-8.0p1-13.el8.x86_64.rpm fbec26a84dd6c8009a4a0e321218af39d545eff4d315defebbe241cb50fb3e7b RLSA-2021:1979 Important: squid:4 security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for the squid:4 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:1979 Rocky Linux 8 libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 RLSA-2022:5046 Moderate: .NET 6.0 security and bugfix update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for .NET 6.0 is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:5046 Rocky Linux 8 aspnetcore-runtime-3.1-3.1.26-1.el8_6.x86_64.rpm 5f70101f414acb836e44a8c3273c6e762909ebaed7154d6474fc9f519379979c aspnetcore-runtime-6.0-6.0.6-1.el8_6.x86_64.rpm 8fbc1f5d39dc387f2754fed1e8f137d152d1774d18fdbe0d533cadde19ef7b99 aspnetcore-targeting-pack-3.1-3.1.26-1.el8_6.x86_64.rpm 81c818ce04e533a5d58de33c5a47b98bc32bf1dedd4460846581ee2f103649c3 aspnetcore-targeting-pack-6.0-6.0.6-1.el8_6.x86_64.rpm f0bbf90b2b5707ed1b872bdd9e07553acdf421961b685af26abbade140dd35b0 dotnet-6.0.106-1.el8_6.x86_64.rpm 402095f22050d69b5f3b1a9a038143499bb8ef59af3f57b2bb3780465c9988bc dotnet-apphost-pack-3.1-3.1.26-1.el8_6.x86_64.rpm 66d23783d31e5d669012e923f46f19ca177fcb95336b0eacb01d322756868b40 dotnet-apphost-pack-6.0-6.0.6-1.el8_6.x86_64.rpm d71d564d823a03a521a65cc6faad530af339a69a52f00162559f0ef378fd90be dotnet-host-6.0.6-1.el8_6.x86_64.rpm 419c61820d5c984c8c21fc1983913e19e33f09522b13921aecca073eee5ec6ce dotnet-hostfxr-3.1-3.1.26-1.el8_6.x86_64.rpm 35ceeea7ce9b41876e74e476c70d45eb44974aaa9edf83d691d8ddf1b1a48afa dotnet-hostfxr-6.0-6.0.6-1.el8_6.x86_64.rpm 3362f41d6a76ff523877e76cd3fb94937efd6b039d3c4114ad572d1587fe5585 dotnet-runtime-3.1-3.1.26-1.el8_6.x86_64.rpm 1b1f4f112b2e2d1c3b07da0f99d15cd4f2a666761e86dad4a73d3ca5eddedb95 dotnet-runtime-6.0-6.0.6-1.el8_6.x86_64.rpm 24b4d011116436143e939fb1d0c44feda09d19bd8dcc7793396736d738070390 dotnet-sdk-3.1-3.1.420-1.el8_6.x86_64.rpm c248a3770ab3a277a4a393e69f1cfd99c5caa6e241a524f16ccca6a48d35ddd1 dotnet-sdk-6.0-6.0.106-1.el8_6.x86_64.rpm 2c4cb325a5baaa4e203f023773d34b11b867736978684e0e8355af77b24808af dotnet-targeting-pack-3.1-3.1.26-1.el8_6.x86_64.rpm 04e5137270decb5d50d1dd744e3b913878137630d3f6833f5a4cd95a9ecf71c8 dotnet-targeting-pack-6.0-6.0.6-1.el8_6.x86_64.rpm d0b7e683a10ca5dccf0711264b44d1ed86c7527e4cac0a737ee02607d72736b5 dotnet-templates-3.1-3.1.420-1.el8_6.x86_64.rpm d91e762014e9bc06b4886bb0d6713d3a8b7bcff25c7d65919965234ac4bda016 dotnet-templates-6.0-6.0.106-1.el8_6.x86_64.rpm ea9c7a7e9ccea413ceadd7e49b4c3b16002fec7a30c0f03e82b6ea2ad22e98b2 netstandard-targeting-pack-2.1-6.0.106-1.el8_6.x86_64.rpm 59a0238855763584f8c2a2a74918a118a98c8cd4f62d52fd519ea0c50ce21901 aspnetcore-runtime-3.1-3.1.26-1.el8_6.x86_64.rpm 5f70101f414acb836e44a8c3273c6e762909ebaed7154d6474fc9f519379979c aspnetcore-runtime-6.0-6.0.6-1.el8_6.x86_64.rpm 8fbc1f5d39dc387f2754fed1e8f137d152d1774d18fdbe0d533cadde19ef7b99 aspnetcore-targeting-pack-3.1-3.1.26-1.el8_6.x86_64.rpm 81c818ce04e533a5d58de33c5a47b98bc32bf1dedd4460846581ee2f103649c3 aspnetcore-targeting-pack-6.0-6.0.6-1.el8_6.x86_64.rpm f0bbf90b2b5707ed1b872bdd9e07553acdf421961b685af26abbade140dd35b0 dotnet-6.0.106-1.el8_6.x86_64.rpm 402095f22050d69b5f3b1a9a038143499bb8ef59af3f57b2bb3780465c9988bc dotnet-apphost-pack-3.1-3.1.26-1.el8_6.x86_64.rpm 66d23783d31e5d669012e923f46f19ca177fcb95336b0eacb01d322756868b40 dotnet-apphost-pack-6.0-6.0.6-1.el8_6.x86_64.rpm d71d564d823a03a521a65cc6faad530af339a69a52f00162559f0ef378fd90be dotnet-host-6.0.6-1.el8_6.x86_64.rpm 419c61820d5c984c8c21fc1983913e19e33f09522b13921aecca073eee5ec6ce dotnet-hostfxr-3.1-3.1.26-1.el8_6.x86_64.rpm 35ceeea7ce9b41876e74e476c70d45eb44974aaa9edf83d691d8ddf1b1a48afa dotnet-hostfxr-6.0-6.0.6-1.el8_6.x86_64.rpm 3362f41d6a76ff523877e76cd3fb94937efd6b039d3c4114ad572d1587fe5585 dotnet-runtime-3.1-3.1.26-1.el8_6.x86_64.rpm 1b1f4f112b2e2d1c3b07da0f99d15cd4f2a666761e86dad4a73d3ca5eddedb95 dotnet-runtime-6.0-6.0.6-1.el8_6.x86_64.rpm 24b4d011116436143e939fb1d0c44feda09d19bd8dcc7793396736d738070390 dotnet-sdk-3.1-3.1.420-1.el8_6.x86_64.rpm c248a3770ab3a277a4a393e69f1cfd99c5caa6e241a524f16ccca6a48d35ddd1 dotnet-sdk-6.0-6.0.106-1.el8_6.x86_64.rpm 2c4cb325a5baaa4e203f023773d34b11b867736978684e0e8355af77b24808af dotnet-targeting-pack-3.1-3.1.26-1.el8_6.x86_64.rpm 04e5137270decb5d50d1dd744e3b913878137630d3f6833f5a4cd95a9ecf71c8 dotnet-targeting-pack-6.0-6.0.6-1.el8_6.x86_64.rpm d0b7e683a10ca5dccf0711264b44d1ed86c7527e4cac0a737ee02607d72736b5 dotnet-templates-3.1-3.1.420-1.el8_6.x86_64.rpm d91e762014e9bc06b4886bb0d6713d3a8b7bcff25c7d65919965234ac4bda016 dotnet-templates-6.0-6.0.106-1.el8_6.x86_64.rpm ea9c7a7e9ccea413ceadd7e49b4c3b16002fec7a30c0f03e82b6ea2ad22e98b2 netstandard-targeting-pack-2.1-6.0.106-1.el8_6.x86_64.rpm 59a0238855763584f8c2a2a74918a118a98c8cd4f62d52fd519ea0c50ce21901 RLSA-2022:1777 Moderate: webkit2gtk3 security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for webkit2gtk3 is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1777 Rocky Linux 8 webkit2gtk3-2.34.6-1.el8.i686.rpm 1763e4cd8cb39b3134dfb1579d8ff090cb794978970d3f692abd922afc8fc404 webkit2gtk3-2.34.6-1.el8.x86_64.rpm d74c016528055ff3a12ee190dda714df7255ca92065f70b0fd275f3d61204974 webkit2gtk3-devel-2.34.6-1.el8.i686.rpm b73465b6e1775ee5615d32be46cf0aa81d093ac52647d15c27acc6b22729055a webkit2gtk3-devel-2.34.6-1.el8.x86_64.rpm 1dee55b448206d8acdda5aea1cb4c0e8cd7ffb20bcd1d642377d3b96ac1d09aa webkit2gtk3-jsc-2.34.6-1.el8.i686.rpm 600a932fc8e6df7e83144b6f246a01d7993e397f9fed6c92f99564b11310cc4e webkit2gtk3-jsc-2.34.6-1.el8.x86_64.rpm a611bddb1e3d46f45f8170cdfc64a8cab8383fefb7b1d95f884424a2b3b401ef webkit2gtk3-jsc-devel-2.34.6-1.el8.i686.rpm 71a209d3ce40f120fac580a9a87b02fa35f3ffad06dca4ac2439ac70dca7ca2d webkit2gtk3-jsc-devel-2.34.6-1.el8.x86_64.rpm 21d9fc119349e0906576b1af8beb6cb23b9081f507b73621963a0433c8f39372 RLSA-2022:1930 Moderate: keepalived security and bug fix update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for keepalived is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1930 Rocky Linux 8 keepalived-2.1.5-8.el8.x86_64.rpm 41e700d02b5f6c77b75a1fa66d487d80006360bdbcb94297ac291221ed5d319c RLSA-2021:4381 Moderate: GNOME security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for GNOME is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:4381 Rocky Linux 8 gnome-autoar-0.2.3-2.el8.i686.rpm 7df0767dcf8e4e1f791a56142199e265d9d2ddc7b3919b7aba93402e82802db1 gnome-autoar-0.2.3-2.el8.x86_64.rpm ec104b742f1ee24ed3b790f8bcf2e9c3624d835c37d4f046226737569af9c0b5 gnome-calculator-3.28.2-2.el8.x86_64.rpm bfc480d1f9e922cdeebbd6056672a2a349776204c6be7a6240a5eea1a623de39 gnome-online-accounts-3.28.2-3.el8.i686.rpm c62c2f20e4765b4ee9a4cb86fdc3676f07ee1bf88c6e6f787989f7f3201dc539 gnome-online-accounts-3.28.2-3.el8.x86_64.rpm 128fe18ab8bfd55fcf3d048764c08baa784e475c43e05bee007663ed65266f64 gnome-online-accounts-devel-3.28.2-3.el8.i686.rpm 83eba37218a17c873e8339da654bd7fdf30542e309fe541d8fbb22e9e114077f gnome-online-accounts-devel-3.28.2-3.el8.x86_64.rpm 2424a681b21ec3cc257eb8117d833e143b766ced3bb3f0d80fc6580ebe78b52d gnome-settings-daemon-3.32.0-16.el8.x86_64.rpm 1f0b302fe6d536520fa78ee670b4a02602f305c8e04833ad4e0297a07118cc25 gnome-software-3.36.1-10.el8.x86_64.rpm 2a9f077aa8113e2a4c4c3788d5258918fd7aaa4a97a3b5696d604e849fd23c5d gsettings-desktop-schemas-3.32.0-6.el8.i686.rpm 9e3de8ab0df91a21383d9784b9ef2889a54058eea2c18c31142a4eb99b055039 gsettings-desktop-schemas-devel-3.32.0-6.el8.i686.rpm 6a8b085c3076824a5080c1bad4047d4c0177387ca5018fe0e82293d9ac621037 gsettings-desktop-schemas-devel-3.32.0-6.el8.x86_64.rpm 440c33ca267b2f26215df09174ce6574a2bb5113fe6d7c740eba3f1133c93af8 LibRaw-0.19.5-3.el8.i686.rpm ca62265ca6516b645dcb52d822cd12b25d42ebb51c998fa008f218596d254b7a LibRaw-0.19.5-3.el8.x86_64.rpm df151c39f20ea9815d46aff810e74f2c837a34fb755909c23d2e159714999d90 vino-3.22.0-11.el8.x86_64.rpm 3ba0c279a775b11f29b6dbeb5daa462d4bbe721a3bc0f541dcaa8b0c25555ec1 RLSA-2021:1983 Important: idm:DL1 security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for the idm:DL1 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:1983 Rocky Linux 8 python3-jwcrypto-0.5.0-1.module+el8.4.0+430+1dcf16bb.noarch.rpm 8f52e2bf2531bf764f3d698863ec27fb18d7457493ff72fe91d5cf871eea4f02 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-pyusb-1.0.0-9.module+el8.4.0+430+1dcf16bb.noarch.rpm c1461c922fe67180fdd438b037b2452f88b934f2438c0d77aefd23bc8d5a620e python3-yubico-1.3.2-9.module+el8.4.0+430+1dcf16bb.noarch.rpm 57ba1a75366409cb10214266d4ff5512a4e27e9a804f1668862e80d6dc0eecd4 python3-jwcrypto-0.5.0-1.module+el8.4.0+430+1dcf16bb.noarch.rpm 8f52e2bf2531bf764f3d698863ec27fb18d7457493ff72fe91d5cf871eea4f02 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-pyusb-1.0.0-9.module+el8.4.0+430+1dcf16bb.noarch.rpm c1461c922fe67180fdd438b037b2452f88b934f2438c0d77aefd23bc8d5a620e python3-yubico-1.3.2-9.module+el8.4.0+430+1dcf16bb.noarch.rpm 57ba1a75366409cb10214266d4ff5512a4e27e9a804f1668862e80d6dc0eecd4 python3-jwcrypto-0.5.0-1.module+el8.4.0+430+1dcf16bb.noarch.rpm 8f52e2bf2531bf764f3d698863ec27fb18d7457493ff72fe91d5cf871eea4f02 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-pyusb-1.0.0-9.module+el8.4.0+430+1dcf16bb.noarch.rpm c1461c922fe67180fdd438b037b2452f88b934f2438c0d77aefd23bc8d5a620e python3-yubico-1.3.2-9.module+el8.4.0+430+1dcf16bb.noarch.rpm 57ba1a75366409cb10214266d4ff5512a4e27e9a804f1668862e80d6dc0eecd4 RLBA-2021:3594 libdb bug fix and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update for libdb is now available for Rocky Linux 8. For more information visit https://errata.rockylinux.org/RLBA-2021:3594 Rocky Linux 8 libdb-devel-5.3.28-42.el8_4.i686.rpm 0c8d56ff99ebbef82cda32cad3a77de5c01a5a735c0d9e0463e3969142728d51 libdb-devel-5.3.28-42.el8_4.x86_64.rpm 4038cac5a947df780f43ad543f735f1c0307a106ae02b1ac518fba0349d5bdc9 RLSA-2021:2259 Important: nginx:1.18 security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for the nginx:1.18 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:2259 Rocky Linux 8 nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm a7e8f12bcadbfb850ced0c9f7c738dd34bce16d491e5145b3cdd7f3ad6e5e6ee nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm bf37394530514e4f89d360aa6c4ea22c049dd243a88a84dcb83209895c5168c7 nginx-all-modules-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm 3b0073666d96b7699491be25e37ada5e61fb5fcffdb5605bc6c757d2f22098de nginx-all-modules-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm 7fb26e744e26ed89e749ac1a22dbf72e28fa553724839a76dfcbceb3ed840d90 nginx-filesystem-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm 51ffdebca045cd896d1166a62b73ccec82c034bf133f6fb3ffbeb10719924991 nginx-filesystem-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm 43fa77fc74095e53b63439cb405f6a8a9617913fa085beacb4d740d4fe316c37 nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 5d100dcfd14470e027fd70954a37040a03c5ac42b28d06f353788d7800d33a20 nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 03d6fe221bb98ed1b023d3513435e18887c7818bae8c4d71f6c2f983417eb7e7 nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm e73f87b0fe704a434776fbb00e5b0c15259070dd098fbf73c8e26f0492013e55 nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 771754953dbb211e3464a1e9f14561ec5f8b7742de5e6677e294fe4e3bf3d334 nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 980d5cd6502bc54e842f0ec78820541adc7e4ed15e213756a0426c1431fbb904 nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 1aaf30cd71829f8482f1d7bfd73b17c6356cfa9b881da79a6928108890e22ddc nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 29ab92d9f77c68de5b9f91c600b0bef4b3b2afbb1cc01891f200d26883010a4f nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 4c9c4c5d0ee6e2d0e774a37dc131d64267485d95033ca486b157f37b86b39449 nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 12a16e26088f86d84e6a0b8295960956284b6588f87ede147e1347b24ad31462 nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 9d1bafbf400e3d4432337f9651a87c8b4b3f7e696a10910232c9c4d0ae0f719e nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm a7e8f12bcadbfb850ced0c9f7c738dd34bce16d491e5145b3cdd7f3ad6e5e6ee nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm bf37394530514e4f89d360aa6c4ea22c049dd243a88a84dcb83209895c5168c7 nginx-all-modules-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm 3b0073666d96b7699491be25e37ada5e61fb5fcffdb5605bc6c757d2f22098de nginx-all-modules-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm 7fb26e744e26ed89e749ac1a22dbf72e28fa553724839a76dfcbceb3ed840d90 nginx-filesystem-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm 51ffdebca045cd896d1166a62b73ccec82c034bf133f6fb3ffbeb10719924991 nginx-filesystem-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm 43fa77fc74095e53b63439cb405f6a8a9617913fa085beacb4d740d4fe316c37 nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 5d100dcfd14470e027fd70954a37040a03c5ac42b28d06f353788d7800d33a20 nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 03d6fe221bb98ed1b023d3513435e18887c7818bae8c4d71f6c2f983417eb7e7 nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm e73f87b0fe704a434776fbb00e5b0c15259070dd098fbf73c8e26f0492013e55 nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 771754953dbb211e3464a1e9f14561ec5f8b7742de5e6677e294fe4e3bf3d334 nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 980d5cd6502bc54e842f0ec78820541adc7e4ed15e213756a0426c1431fbb904 nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 1aaf30cd71829f8482f1d7bfd73b17c6356cfa9b881da79a6928108890e22ddc nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 29ab92d9f77c68de5b9f91c600b0bef4b3b2afbb1cc01891f200d26883010a4f nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 4c9c4c5d0ee6e2d0e774a37dc131d64267485d95033ca486b157f37b86b39449 nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 12a16e26088f86d84e6a0b8295960956284b6588f87ede147e1347b24ad31462 nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 9d1bafbf400e3d4432337f9651a87c8b4b3f7e696a10910232c9c4d0ae0f719e RLSA-2021:3623 Important: nodejs:12 security and bug fix update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for the nodejs:12 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:3623 Rocky Linux 8 nodejs-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm 6eda5b4e2f92a536468d0e044f8c6dceaf5abd6f3ef01ccc23a4274350682524 nodejs-devel-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm 50c090640fb144376fa6f27305ba9f617a224971cae68d49f5d8ab4bdd7e0b9a nodejs-docs-12.22.5-1.module+el8.4.0+647+e905fa21.noarch.rpm 8bb738d9c8410f662b3c2f32aed10130e9f6887e873754199bb435970d32470f nodejs-full-i18n-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm c5ae64d1ca085036e507b540533798726e90180d8fe6a69416f13c3551351278 nodejs-packaging-23-3.module+el8.5.0+733+de4fee6c.noarch.rpm de384459a7bf627a23b2dc78c14c6b94ae7402e3185305950a7a1e86cb1e823a npm-6.14.14-1.12.22.5.1.module+el8.4.0+647+e905fa21.x86_64.rpm ecdf41ce219c3afc89f36ee75da98797809ff753994f1c699477de2bf265062a nodejs-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm 6eda5b4e2f92a536468d0e044f8c6dceaf5abd6f3ef01ccc23a4274350682524 nodejs-devel-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm 50c090640fb144376fa6f27305ba9f617a224971cae68d49f5d8ab4bdd7e0b9a nodejs-docs-12.22.5-1.module+el8.4.0+647+e905fa21.noarch.rpm 8bb738d9c8410f662b3c2f32aed10130e9f6887e873754199bb435970d32470f nodejs-full-i18n-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm c5ae64d1ca085036e507b540533798726e90180d8fe6a69416f13c3551351278 nodejs-packaging-23-3.module+el8.5.0+733+de4fee6c.noarch.rpm de384459a7bf627a23b2dc78c14c6b94ae7402e3185305950a7a1e86cb1e823a npm-6.14.14-1.12.22.5.1.module+el8.4.0+647+e905fa21.x86_64.rpm ecdf41ce219c3afc89f36ee75da98797809ff753994f1c699477de2bf265062a nodejs-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm 6eda5b4e2f92a536468d0e044f8c6dceaf5abd6f3ef01ccc23a4274350682524 nodejs-devel-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm 50c090640fb144376fa6f27305ba9f617a224971cae68d49f5d8ab4bdd7e0b9a nodejs-docs-12.22.5-1.module+el8.4.0+647+e905fa21.noarch.rpm 8bb738d9c8410f662b3c2f32aed10130e9f6887e873754199bb435970d32470f nodejs-full-i18n-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm c5ae64d1ca085036e507b540533798726e90180d8fe6a69416f13c3551351278 nodejs-packaging-23-3.module+el8.5.0+733+de4fee6c.noarch.rpm de384459a7bf627a23b2dc78c14c6b94ae7402e3185305950a7a1e86cb1e823a npm-6.14.14-1.12.22.5.1.module+el8.4.0+647+e905fa21.x86_64.rpm ecdf41ce219c3afc89f36ee75da98797809ff753994f1c699477de2bf265062a RLSA-2021:4325 Moderate: lasso security and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for lasso is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:4325 Rocky Linux 8 lasso-2.6.0-12.el8.i686.rpm b05640c5b0eaa54e4f0ac2d7d44f100d047489dbb1f5912fb611bbbe69261fdb lasso-2.6.0-12.el8.x86_64.rpm 5cdb83a6ef598be1d8f63872ba0bcbf32cf19b0f16fd9e323ed80348e953a6df RLSA-2022:5683 Important: java-11-openjdk security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for java-11-openjdk is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:5683 Rocky Linux 8 java-11-openjdk-11.0.16.0.8-1.el8_6.x86_64.rpm 4e85d484fafe5874fa0ed7cc42fe4ac5f7e52c108c01970a5c643844bb41207d java-11-openjdk-demo-11.0.16.0.8-1.el8_6.x86_64.rpm 23038fae72b756614597b26cf3db86ec88e12ce3737f8d144538144c7a383b94 java-11-openjdk-devel-11.0.16.0.8-1.el8_6.x86_64.rpm 00647d87101a9c59234ab4a4b9bad8e05799666a8c0575691c121e5c63c5fc51 java-11-openjdk-headless-11.0.16.0.8-1.el8_6.x86_64.rpm 9513fd5811b05493a59f576c956b085f6278e91d5dc27df8ecb7b7ca6b011402 java-11-openjdk-javadoc-11.0.16.0.8-1.el8_6.x86_64.rpm 8265a90c9718cb276a30df2f1676bf807499de5aff79ac0f6db7d9e1f9172e4c java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el8_6.x86_64.rpm 5ac1904b9332a63a159e69ac1595f01205cb19e680c3ea382866a1af12a91930 java-11-openjdk-jmods-11.0.16.0.8-1.el8_6.x86_64.rpm e0af5f26eb6e28ce0f4b1252e95467217d7f7fe1a7102fc645712f6985d9ce84 java-11-openjdk-src-11.0.16.0.8-1.el8_6.x86_64.rpm e43a9e193dd1b6e55c303fb37fad0d7685b30173b43dcfbc31a966f06bf209a2 java-11-openjdk-static-libs-11.0.16.0.8-1.el8_6.x86_64.rpm f9e5e46f0a0d7ef8e0d3dd8d365dd8bbd0898716f972f7279553f70cacf6e84d java-17-openjdk-17.0.4.0.8-2.el8_6.x86_64.rpm 94f11bbf192ccd164c16d071cc53c708d320899704e2184070897da87768e083 java-17-openjdk-demo-17.0.4.0.8-2.el8_6.x86_64.rpm 29d1affae63306a31f9ed47cbd7289bec4b6822826f75253b9e2663e6309f0b4 java-17-openjdk-devel-17.0.4.0.8-2.el8_6.x86_64.rpm 78c428ba13d7fe544272bd84d3045c0fcfb9adb6b5360215302407dd51cce413 java-17-openjdk-headless-17.0.4.0.8-2.el8_6.x86_64.rpm ebd40aa5c968c6f3a96954fc05c59b3cfc7fe31807901d63915ed9a775c42f87 java-17-openjdk-javadoc-17.0.4.0.8-2.el8_6.x86_64.rpm a2754643644ec0c88c945c0d80e57325e1ef9be77b7c649346b3254764f712f1 java-17-openjdk-javadoc-zip-17.0.4.0.8-2.el8_6.x86_64.rpm 0184c7c142c3574465a3f8c14fb4ce67a3a63262ad0e850fc1b2b50248e88165 java-17-openjdk-jmods-17.0.4.0.8-2.el8_6.x86_64.rpm 9a382e3beff52f05ce80a23692976096bdc5fe74b5311ed082e190c5553293ff java-17-openjdk-src-17.0.4.0.8-2.el8_6.x86_64.rpm ba3e0a6d61a2fed0c7e673b3d0bb2cb3f8994e38148a61928171daccaaeb8cf6 java-17-openjdk-static-libs-17.0.4.0.8-2.el8_6.x86_64.rpm 604755ed2baa5eafeabb4845c5b0e9870b0b521b35f9cbbf4e706aff56844335 java-1.8.0-openjdk-1.8.0.342.b07-2.el8_6.x86_64.rpm 2d573a5b5d9fa4c3e5f8bf654b1717c5b77b00d13822a9e577a9a9f27cca8afe java-1.8.0-openjdk-accessibility-1.8.0.342.b07-2.el8_6.x86_64.rpm 50b25dff3d5dc13d538656a91ea81f7203aafa7abbb636a8e966996190e7c67b java-1.8.0-openjdk-demo-1.8.0.342.b07-2.el8_6.x86_64.rpm 309ea9cc9199096a5ecb9f76a60456e2791eb2ed0e06c3c816198735d31b4ffb java-1.8.0-openjdk-devel-1.8.0.342.b07-2.el8_6.x86_64.rpm 5c479f22f25ab550e94dce89b3e5a27507b4c251e39ed9926ca9037e24f83601 java-1.8.0-openjdk-headless-1.8.0.342.b07-2.el8_6.x86_64.rpm 550cec82f3361c29e37a2f2192a1ccf30ff47700349e9eb49770f049d0c3cc03 java-1.8.0-openjdk-javadoc-1.8.0.342.b07-2.el8_6.noarch.rpm 1483d672f536f1de53450dc5a8cab9e07e13601c7f5d2c16633f133a1e88a1dd java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-2.el8_6.noarch.rpm 278f74e142b40303d9eaf58fc3f327c42bb543f02200af6e5e0bdd80a6593228 java-1.8.0-openjdk-src-1.8.0.342.b07-2.el8_6.x86_64.rpm ac1895f75442f0f13ff932b420affe822c4185432492263240177ea7a8a863bc java-11-openjdk-11.0.16.0.8-1.el8_6.x86_64.rpm 4e85d484fafe5874fa0ed7cc42fe4ac5f7e52c108c01970a5c643844bb41207d java-11-openjdk-demo-11.0.16.0.8-1.el8_6.x86_64.rpm 23038fae72b756614597b26cf3db86ec88e12ce3737f8d144538144c7a383b94 java-11-openjdk-devel-11.0.16.0.8-1.el8_6.x86_64.rpm 00647d87101a9c59234ab4a4b9bad8e05799666a8c0575691c121e5c63c5fc51 java-11-openjdk-headless-11.0.16.0.8-1.el8_6.x86_64.rpm 9513fd5811b05493a59f576c956b085f6278e91d5dc27df8ecb7b7ca6b011402 java-11-openjdk-javadoc-11.0.16.0.8-1.el8_6.x86_64.rpm 8265a90c9718cb276a30df2f1676bf807499de5aff79ac0f6db7d9e1f9172e4c java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el8_6.x86_64.rpm 5ac1904b9332a63a159e69ac1595f01205cb19e680c3ea382866a1af12a91930 java-11-openjdk-jmods-11.0.16.0.8-1.el8_6.x86_64.rpm e0af5f26eb6e28ce0f4b1252e95467217d7f7fe1a7102fc645712f6985d9ce84 java-11-openjdk-src-11.0.16.0.8-1.el8_6.x86_64.rpm e43a9e193dd1b6e55c303fb37fad0d7685b30173b43dcfbc31a966f06bf209a2 java-11-openjdk-static-libs-11.0.16.0.8-1.el8_6.x86_64.rpm f9e5e46f0a0d7ef8e0d3dd8d365dd8bbd0898716f972f7279553f70cacf6e84d java-17-openjdk-17.0.4.0.8-2.el8_6.x86_64.rpm 94f11bbf192ccd164c16d071cc53c708d320899704e2184070897da87768e083 java-17-openjdk-demo-17.0.4.0.8-2.el8_6.x86_64.rpm 29d1affae63306a31f9ed47cbd7289bec4b6822826f75253b9e2663e6309f0b4 java-17-openjdk-devel-17.0.4.0.8-2.el8_6.x86_64.rpm 78c428ba13d7fe544272bd84d3045c0fcfb9adb6b5360215302407dd51cce413 java-17-openjdk-headless-17.0.4.0.8-2.el8_6.x86_64.rpm ebd40aa5c968c6f3a96954fc05c59b3cfc7fe31807901d63915ed9a775c42f87 java-17-openjdk-javadoc-17.0.4.0.8-2.el8_6.x86_64.rpm a2754643644ec0c88c945c0d80e57325e1ef9be77b7c649346b3254764f712f1 java-17-openjdk-javadoc-zip-17.0.4.0.8-2.el8_6.x86_64.rpm 0184c7c142c3574465a3f8c14fb4ce67a3a63262ad0e850fc1b2b50248e88165 java-17-openjdk-jmods-17.0.4.0.8-2.el8_6.x86_64.rpm 9a382e3beff52f05ce80a23692976096bdc5fe74b5311ed082e190c5553293ff java-17-openjdk-src-17.0.4.0.8-2.el8_6.x86_64.rpm ba3e0a6d61a2fed0c7e673b3d0bb2cb3f8994e38148a61928171daccaaeb8cf6 java-17-openjdk-static-libs-17.0.4.0.8-2.el8_6.x86_64.rpm 604755ed2baa5eafeabb4845c5b0e9870b0b521b35f9cbbf4e706aff56844335 java-1.8.0-openjdk-1.8.0.342.b07-2.el8_6.x86_64.rpm 2d573a5b5d9fa4c3e5f8bf654b1717c5b77b00d13822a9e577a9a9f27cca8afe java-1.8.0-openjdk-accessibility-1.8.0.342.b07-2.el8_6.x86_64.rpm 50b25dff3d5dc13d538656a91ea81f7203aafa7abbb636a8e966996190e7c67b java-1.8.0-openjdk-demo-1.8.0.342.b07-2.el8_6.x86_64.rpm 309ea9cc9199096a5ecb9f76a60456e2791eb2ed0e06c3c816198735d31b4ffb java-1.8.0-openjdk-devel-1.8.0.342.b07-2.el8_6.x86_64.rpm 5c479f22f25ab550e94dce89b3e5a27507b4c251e39ed9926ca9037e24f83601 java-1.8.0-openjdk-headless-1.8.0.342.b07-2.el8_6.x86_64.rpm 550cec82f3361c29e37a2f2192a1ccf30ff47700349e9eb49770f049d0c3cc03 java-1.8.0-openjdk-javadoc-1.8.0.342.b07-2.el8_6.noarch.rpm 1483d672f536f1de53450dc5a8cab9e07e13601c7f5d2c16633f133a1e88a1dd java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-2.el8_6.noarch.rpm 278f74e142b40303d9eaf58fc3f327c42bb543f02200af6e5e0bdd80a6593228 java-1.8.0-openjdk-src-1.8.0.342.b07-2.el8_6.x86_64.rpm ac1895f75442f0f13ff932b420affe822c4185432492263240177ea7a8a863bc java-11-openjdk-11.0.16.0.8-1.el8_6.x86_64.rpm 4e85d484fafe5874fa0ed7cc42fe4ac5f7e52c108c01970a5c643844bb41207d java-11-openjdk-demo-11.0.16.0.8-1.el8_6.x86_64.rpm 23038fae72b756614597b26cf3db86ec88e12ce3737f8d144538144c7a383b94 java-11-openjdk-devel-11.0.16.0.8-1.el8_6.x86_64.rpm 00647d87101a9c59234ab4a4b9bad8e05799666a8c0575691c121e5c63c5fc51 java-11-openjdk-headless-11.0.16.0.8-1.el8_6.x86_64.rpm 9513fd5811b05493a59f576c956b085f6278e91d5dc27df8ecb7b7ca6b011402 java-11-openjdk-javadoc-11.0.16.0.8-1.el8_6.x86_64.rpm 8265a90c9718cb276a30df2f1676bf807499de5aff79ac0f6db7d9e1f9172e4c java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el8_6.x86_64.rpm 5ac1904b9332a63a159e69ac1595f01205cb19e680c3ea382866a1af12a91930 java-11-openjdk-jmods-11.0.16.0.8-1.el8_6.x86_64.rpm e0af5f26eb6e28ce0f4b1252e95467217d7f7fe1a7102fc645712f6985d9ce84 java-11-openjdk-src-11.0.16.0.8-1.el8_6.x86_64.rpm e43a9e193dd1b6e55c303fb37fad0d7685b30173b43dcfbc31a966f06bf209a2 java-11-openjdk-static-libs-11.0.16.0.8-1.el8_6.x86_64.rpm f9e5e46f0a0d7ef8e0d3dd8d365dd8bbd0898716f972f7279553f70cacf6e84d java-17-openjdk-17.0.4.0.8-2.el8_6.x86_64.rpm 94f11bbf192ccd164c16d071cc53c708d320899704e2184070897da87768e083 java-17-openjdk-demo-17.0.4.0.8-2.el8_6.x86_64.rpm 29d1affae63306a31f9ed47cbd7289bec4b6822826f75253b9e2663e6309f0b4 java-17-openjdk-devel-17.0.4.0.8-2.el8_6.x86_64.rpm 78c428ba13d7fe544272bd84d3045c0fcfb9adb6b5360215302407dd51cce413 java-17-openjdk-headless-17.0.4.0.8-2.el8_6.x86_64.rpm ebd40aa5c968c6f3a96954fc05c59b3cfc7fe31807901d63915ed9a775c42f87 java-17-openjdk-javadoc-17.0.4.0.8-2.el8_6.x86_64.rpm a2754643644ec0c88c945c0d80e57325e1ef9be77b7c649346b3254764f712f1 java-17-openjdk-javadoc-zip-17.0.4.0.8-2.el8_6.x86_64.rpm 0184c7c142c3574465a3f8c14fb4ce67a3a63262ad0e850fc1b2b50248e88165 java-17-openjdk-jmods-17.0.4.0.8-2.el8_6.x86_64.rpm 9a382e3beff52f05ce80a23692976096bdc5fe74b5311ed082e190c5553293ff java-17-openjdk-src-17.0.4.0.8-2.el8_6.x86_64.rpm ba3e0a6d61a2fed0c7e673b3d0bb2cb3f8994e38148a61928171daccaaeb8cf6 java-17-openjdk-static-libs-17.0.4.0.8-2.el8_6.x86_64.rpm 604755ed2baa5eafeabb4845c5b0e9870b0b521b35f9cbbf4e706aff56844335 java-1.8.0-openjdk-1.8.0.342.b07-2.el8_6.x86_64.rpm 2d573a5b5d9fa4c3e5f8bf654b1717c5b77b00d13822a9e577a9a9f27cca8afe java-1.8.0-openjdk-accessibility-1.8.0.342.b07-2.el8_6.x86_64.rpm 50b25dff3d5dc13d538656a91ea81f7203aafa7abbb636a8e966996190e7c67b java-1.8.0-openjdk-demo-1.8.0.342.b07-2.el8_6.x86_64.rpm 309ea9cc9199096a5ecb9f76a60456e2791eb2ed0e06c3c816198735d31b4ffb java-1.8.0-openjdk-devel-1.8.0.342.b07-2.el8_6.x86_64.rpm 5c479f22f25ab550e94dce89b3e5a27507b4c251e39ed9926ca9037e24f83601 java-1.8.0-openjdk-headless-1.8.0.342.b07-2.el8_6.x86_64.rpm 550cec82f3361c29e37a2f2192a1ccf30ff47700349e9eb49770f049d0c3cc03 java-1.8.0-openjdk-javadoc-1.8.0.342.b07-2.el8_6.noarch.rpm 1483d672f536f1de53450dc5a8cab9e07e13601c7f5d2c16633f133a1e88a1dd java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-2.el8_6.noarch.rpm 278f74e142b40303d9eaf58fc3f327c42bb543f02200af6e5e0bdd80a6593228 java-1.8.0-openjdk-src-1.8.0.342.b07-2.el8_6.x86_64.rpm ac1895f75442f0f13ff932b420affe822c4185432492263240177ea7a8a863bc RLSA-2022:5163 Low: httpd:2.4 security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update for the httpd:2.4 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:5163 Rocky Linux 8 httpd-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm 2ff10cfc3e3f3a717a6402ba7ad98d9afa5b88c178d653481ba90104e066d093 httpd-devel-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm 9af273600fbaa5ddf2edc2dd0b3ddbafbc77c6cf72fc4f5cab88b95c591e5325 httpd-filesystem-2.4.37-47.module+el8.6.0+985+b8ff6398.2.noarch.rpm 4a3e8996c1ac45467499555f8626731f59228c0efbbb36003d9a364a8b7d082e httpd-manual-2.4.37-47.module+el8.6.0+985+b8ff6398.2.noarch.rpm 7a062f3fe19623f5189be392bf870275bd9e7de0b082441ac60e925aef7aa9b2 httpd-tools-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm a0a124a51496534bfde1f69fba84b6d97e9e1ba3b56a7c6b4d35af80e99a4f3b mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm 4c38731a882c46a2a227c602054bc420cc132713bc60608912a5462181585ac5 mod_ldap-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm cedc735a81b123c864c97d7bf6cfe707d643e8b164c65f692c36b6cfce2c78c9 mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 mod_proxy_html-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm 0fe237bf434610661cb76bf2a735e3b49a908100094aa69e6b63c19141d352a0 mod_session-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm ce05c3d83cd4f2b9c156046c056a57d9b62a3eeb08bdbcb45a553bcf7ba5cf1b mod_ssl-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm f2c075771ffc5534432913468f667e6ea7a6dce0a0f1eb184a24f03e1aecb8ee RLSA-2022:2199 Important: .NET 6.0 security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for .NET 6.0 is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:2199 Rocky Linux 8 aspnetcore-runtime-3.1-3.1.25-1.el8_6.x86_64.rpm 3ab054d83fdef0b7e8ad7d0e9ea190d056223a2cba120191bddd06512ae556e5 aspnetcore-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm d486dec30aa390f81e1f9b88d74223c6f82438c6f61d784d9418c1fbcb43ec1a aspnetcore-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm 044191f102db47baafc1478922ddd2ec8a57132da7a63fcb4217e5c8ce532572 aspnetcore-targeting-pack-3.1-3.1.25-1.el8_6.x86_64.rpm 1bfe32ec9815519733767e40c1f3d7fbafe25994c22a73f9450f230e3cd2c607 aspnetcore-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm 25ea9a4ee9219c905c60a2fb6c1d0980790c0fc18bbb095a68c1841667a80ad5 aspnetcore-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm 78cb5230f4dd8d0af104d30a175f0bd4dc48266ff4d844255c7a12de0ca92863 dotnet-6.0.105-1.el8_6.x86_64.rpm 80c33981bb9bfd293a75f6953155c4950c40949b466bb7aaf0c7a530eae021eb dotnet-apphost-pack-3.1-3.1.25-1.el8_6.x86_64.rpm 7c157f825b5ce5811a9d4bf3dabd4f093ecbc9e49e6b5b8bd82c13fabfdbd540 dotnet-apphost-pack-5.0-5.0.17-1.el8_6.x86_64.rpm d796e4163087da226589f147642c803920504ffbb7f14ebd7dd77d63069371e7 dotnet-apphost-pack-6.0-6.0.5-1.el8_6.x86_64.rpm 1a7f2653de383eb098b609f65685bcc7e79e20753b2856fbfefeb8ffdd140644 dotnet-host-6.0.5-1.el8_6.x86_64.rpm 6f5fd968b6afcae67cf7a675c29bf1132f22d07ac6a0485d4e9a3946c24ad8ec dotnet-hostfxr-3.1-3.1.25-1.el8_6.x86_64.rpm 262fefa7902f53fb17cd03a722bce57a045228e9edd9fa9208a9ea0b0ba445af dotnet-hostfxr-5.0-5.0.17-1.el8_6.x86_64.rpm 7c90bf6baddc73ce33607cbe4a3dd8ce09e4924bd71cfeec24ca034ae75c715b dotnet-hostfxr-6.0-6.0.5-1.el8_6.x86_64.rpm 300faa33609d3d855a3f3bccdc829deade5f7eb062a38fbd19696da8b5a66c42 dotnet-runtime-3.1-3.1.25-1.el8_6.x86_64.rpm a89e9e77423da793ed6a383f1265cdf7ebffc6a99cdc2060b5864fa2c97a2336 dotnet-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm 4b94310a8e8c720fcfb381249798db29d48530ecf929e416952823ff2e0c8d85 dotnet-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm ae1c22f5b6f35c7733e019c53e1a25ddfc3ff36b174b863be945cad1efa8d47f dotnet-sdk-3.1-3.1.419-1.el8_6.x86_64.rpm e193f8bff7bd1809e62193cffcb7fa2334d3ab154cb64bcb27e5faad82dfa874 dotnet-sdk-5.0-5.0.214-1.el8_6.x86_64.rpm b09467d0681cdf6529562e270694a024f25a0b925c9084269141502fa9c46420 dotnet-sdk-6.0-6.0.105-1.el8_6.x86_64.rpm 7c0005651e8718bba891fba51d563d0718345306c6d44b3740b66a77c2fcf6a9 dotnet-targeting-pack-3.1-3.1.25-1.el8_6.x86_64.rpm d5880f077a71534b12d3b19332c65eb1d740662eedcb347a60df9fbe2a457069 dotnet-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm e9caa16fc3a9a967eaddcc7b7dd4dccdc929c7dbedeb58c0243c0870492af325 dotnet-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm 109537126216cb649f1835c1a7759d665a383b7f5046205e7b01c1eeaf127e70 dotnet-templates-3.1-3.1.419-1.el8_6.x86_64.rpm 4728a16a4ab8ca0bf6edb8208179aaf86852632ec652cc8302e8bb6b2e9fcb92 dotnet-templates-5.0-5.0.214-1.el8_6.x86_64.rpm 2f603a86303818a50b579bc999d12d8e8ed69db10575ea3ce048cdc021c7f969 dotnet-templates-6.0-6.0.105-1.el8_6.x86_64.rpm b05606f5a00cbcde5c17a88d32ac4b7746ca04ed45f8df6417d0b1c34e6e6f73 netstandard-targeting-pack-2.1-6.0.105-1.el8_6.x86_64.rpm 1bb145c46608f933ebea4b268ca0922ff5ad7e9d769b4b71833222ce84740d24 aspnetcore-runtime-3.1-3.1.25-1.el8_6.x86_64.rpm 3ab054d83fdef0b7e8ad7d0e9ea190d056223a2cba120191bddd06512ae556e5 aspnetcore-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm d486dec30aa390f81e1f9b88d74223c6f82438c6f61d784d9418c1fbcb43ec1a aspnetcore-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm 044191f102db47baafc1478922ddd2ec8a57132da7a63fcb4217e5c8ce532572 aspnetcore-targeting-pack-3.1-3.1.25-1.el8_6.x86_64.rpm 1bfe32ec9815519733767e40c1f3d7fbafe25994c22a73f9450f230e3cd2c607 aspnetcore-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm 25ea9a4ee9219c905c60a2fb6c1d0980790c0fc18bbb095a68c1841667a80ad5 aspnetcore-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm 78cb5230f4dd8d0af104d30a175f0bd4dc48266ff4d844255c7a12de0ca92863 dotnet-6.0.105-1.el8_6.x86_64.rpm 80c33981bb9bfd293a75f6953155c4950c40949b466bb7aaf0c7a530eae021eb dotnet-apphost-pack-3.1-3.1.25-1.el8_6.x86_64.rpm 7c157f825b5ce5811a9d4bf3dabd4f093ecbc9e49e6b5b8bd82c13fabfdbd540 dotnet-apphost-pack-5.0-5.0.17-1.el8_6.x86_64.rpm d796e4163087da226589f147642c803920504ffbb7f14ebd7dd77d63069371e7 dotnet-apphost-pack-6.0-6.0.5-1.el8_6.x86_64.rpm 1a7f2653de383eb098b609f65685bcc7e79e20753b2856fbfefeb8ffdd140644 dotnet-host-6.0.5-1.el8_6.x86_64.rpm 6f5fd968b6afcae67cf7a675c29bf1132f22d07ac6a0485d4e9a3946c24ad8ec dotnet-hostfxr-3.1-3.1.25-1.el8_6.x86_64.rpm 262fefa7902f53fb17cd03a722bce57a045228e9edd9fa9208a9ea0b0ba445af dotnet-hostfxr-5.0-5.0.17-1.el8_6.x86_64.rpm 7c90bf6baddc73ce33607cbe4a3dd8ce09e4924bd71cfeec24ca034ae75c715b dotnet-hostfxr-6.0-6.0.5-1.el8_6.x86_64.rpm 300faa33609d3d855a3f3bccdc829deade5f7eb062a38fbd19696da8b5a66c42 dotnet-runtime-3.1-3.1.25-1.el8_6.x86_64.rpm a89e9e77423da793ed6a383f1265cdf7ebffc6a99cdc2060b5864fa2c97a2336 dotnet-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm 4b94310a8e8c720fcfb381249798db29d48530ecf929e416952823ff2e0c8d85 dotnet-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm ae1c22f5b6f35c7733e019c53e1a25ddfc3ff36b174b863be945cad1efa8d47f dotnet-sdk-3.1-3.1.419-1.el8_6.x86_64.rpm e193f8bff7bd1809e62193cffcb7fa2334d3ab154cb64bcb27e5faad82dfa874 dotnet-sdk-5.0-5.0.214-1.el8_6.x86_64.rpm b09467d0681cdf6529562e270694a024f25a0b925c9084269141502fa9c46420 dotnet-sdk-6.0-6.0.105-1.el8_6.x86_64.rpm 7c0005651e8718bba891fba51d563d0718345306c6d44b3740b66a77c2fcf6a9 dotnet-targeting-pack-3.1-3.1.25-1.el8_6.x86_64.rpm d5880f077a71534b12d3b19332c65eb1d740662eedcb347a60df9fbe2a457069 dotnet-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm e9caa16fc3a9a967eaddcc7b7dd4dccdc929c7dbedeb58c0243c0870492af325 dotnet-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm 109537126216cb649f1835c1a7759d665a383b7f5046205e7b01c1eeaf127e70 dotnet-templates-3.1-3.1.419-1.el8_6.x86_64.rpm 4728a16a4ab8ca0bf6edb8208179aaf86852632ec652cc8302e8bb6b2e9fcb92 dotnet-templates-5.0-5.0.214-1.el8_6.x86_64.rpm 2f603a86303818a50b579bc999d12d8e8ed69db10575ea3ce048cdc021c7f969 dotnet-templates-6.0-6.0.105-1.el8_6.x86_64.rpm b05606f5a00cbcde5c17a88d32ac4b7746ca04ed45f8df6417d0b1c34e6e6f73 netstandard-targeting-pack-2.1-6.0.105-1.el8_6.x86_64.rpm 1bb145c46608f933ebea4b268ca0922ff5ad7e9d769b4b71833222ce84740d24 aspnetcore-runtime-3.1-3.1.25-1.el8_6.x86_64.rpm 3ab054d83fdef0b7e8ad7d0e9ea190d056223a2cba120191bddd06512ae556e5 aspnetcore-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm d486dec30aa390f81e1f9b88d74223c6f82438c6f61d784d9418c1fbcb43ec1a aspnetcore-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm 044191f102db47baafc1478922ddd2ec8a57132da7a63fcb4217e5c8ce532572 aspnetcore-targeting-pack-3.1-3.1.25-1.el8_6.x86_64.rpm 1bfe32ec9815519733767e40c1f3d7fbafe25994c22a73f9450f230e3cd2c607 aspnetcore-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm 25ea9a4ee9219c905c60a2fb6c1d0980790c0fc18bbb095a68c1841667a80ad5 aspnetcore-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm 78cb5230f4dd8d0af104d30a175f0bd4dc48266ff4d844255c7a12de0ca92863 dotnet-6.0.105-1.el8_6.x86_64.rpm 80c33981bb9bfd293a75f6953155c4950c40949b466bb7aaf0c7a530eae021eb dotnet-apphost-pack-3.1-3.1.25-1.el8_6.x86_64.rpm 7c157f825b5ce5811a9d4bf3dabd4f093ecbc9e49e6b5b8bd82c13fabfdbd540 dotnet-apphost-pack-5.0-5.0.17-1.el8_6.x86_64.rpm d796e4163087da226589f147642c803920504ffbb7f14ebd7dd77d63069371e7 dotnet-apphost-pack-6.0-6.0.5-1.el8_6.x86_64.rpm 1a7f2653de383eb098b609f65685bcc7e79e20753b2856fbfefeb8ffdd140644 dotnet-host-6.0.5-1.el8_6.x86_64.rpm 6f5fd968b6afcae67cf7a675c29bf1132f22d07ac6a0485d4e9a3946c24ad8ec dotnet-hostfxr-3.1-3.1.25-1.el8_6.x86_64.rpm 262fefa7902f53fb17cd03a722bce57a045228e9edd9fa9208a9ea0b0ba445af dotnet-hostfxr-5.0-5.0.17-1.el8_6.x86_64.rpm 7c90bf6baddc73ce33607cbe4a3dd8ce09e4924bd71cfeec24ca034ae75c715b dotnet-hostfxr-6.0-6.0.5-1.el8_6.x86_64.rpm 300faa33609d3d855a3f3bccdc829deade5f7eb062a38fbd19696da8b5a66c42 dotnet-runtime-3.1-3.1.25-1.el8_6.x86_64.rpm a89e9e77423da793ed6a383f1265cdf7ebffc6a99cdc2060b5864fa2c97a2336 dotnet-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm 4b94310a8e8c720fcfb381249798db29d48530ecf929e416952823ff2e0c8d85 dotnet-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm ae1c22f5b6f35c7733e019c53e1a25ddfc3ff36b174b863be945cad1efa8d47f dotnet-sdk-3.1-3.1.419-1.el8_6.x86_64.rpm e193f8bff7bd1809e62193cffcb7fa2334d3ab154cb64bcb27e5faad82dfa874 dotnet-sdk-5.0-5.0.214-1.el8_6.x86_64.rpm b09467d0681cdf6529562e270694a024f25a0b925c9084269141502fa9c46420 dotnet-sdk-6.0-6.0.105-1.el8_6.x86_64.rpm 7c0005651e8718bba891fba51d563d0718345306c6d44b3740b66a77c2fcf6a9 dotnet-targeting-pack-3.1-3.1.25-1.el8_6.x86_64.rpm d5880f077a71534b12d3b19332c65eb1d740662eedcb347a60df9fbe2a457069 dotnet-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm e9caa16fc3a9a967eaddcc7b7dd4dccdc929c7dbedeb58c0243c0870492af325 dotnet-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm 109537126216cb649f1835c1a7759d665a383b7f5046205e7b01c1eeaf127e70 dotnet-templates-3.1-3.1.419-1.el8_6.x86_64.rpm 4728a16a4ab8ca0bf6edb8208179aaf86852632ec652cc8302e8bb6b2e9fcb92 dotnet-templates-5.0-5.0.214-1.el8_6.x86_64.rpm 2f603a86303818a50b579bc999d12d8e8ed69db10575ea3ce048cdc021c7f969 dotnet-templates-6.0-6.0.105-1.el8_6.x86_64.rpm b05606f5a00cbcde5c17a88d32ac4b7746ca04ed45f8df6417d0b1c34e6e6f73 netstandard-targeting-pack-2.1-6.0.105-1.el8_6.x86_64.rpm 1bb145c46608f933ebea4b268ca0922ff5ad7e9d769b4b71833222ce84740d24 RLSA-2021:3073 Moderate: nodejs:12 security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for the nodejs:12 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:3073 Rocky Linux 8 nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2021:3590 Moderate: mysql:8.0 security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for the mysql:8.0 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:3590 Rocky Linux 8 mecab-0.996-1.module+el8.3.0+242+87d3366a.9.x86_64.rpm 14952996574de43eec381be174d1a4dd572e04536682e0ac26946c6cb5c707ba mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm 19b0e3eeea327b2ce021e978337b84189ad9a488f0e82a4dfd1602436c1d0549 mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm 490449bfec869b5947ac0da58a4f56ca9369e2b6a04c22dbc0eef1cd5306c96f mysql-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm 5835ef2fafa38168bfe18ed1a6f91e345c1bbe3ce8803c4c812cae7d1554f702 mysql-common-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm 98597b5e26add557d0687defca496399a59eb64a443d08bba55f5772d7d6ef13 mysql-devel-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm 6804ebf957f76275b7237d7d4042d45be95d2ae292da9060bef4e0b34acff53b mysql-errmsg-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm 05cb72589e13e1181c621fe309f071d28bddc74848977baf93e085faffcf84aa mysql-libs-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm 50d42c4c557faae38d755dfa690df2020be414c0aedd1d338be4e04a84891615 mysql-server-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm 246223ae9c8ef779ac1ecd1b544ddbc38f3df620cff78f634e311817a82baa69 mysql-test-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm 834328ec93539879520f5dbea5989df2c1aae47575d243226dc3973a0f0704d1 RLSA-2021:2363 Important: gupnp security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for gupnp is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:2363 Rocky Linux 8 gupnp-1.0.6-2.el8_4.i686.rpm 9b8dddbfbdc089e8168175fa66c8f695977c2720f6f4bd441196cb9b5e701662 gupnp-1.0.6-2.el8_4.x86_64.rpm 99156c05f5915a79b954b5a4e6d5d38b65d7c455f9a66af27e036a35635570cc RLBA-2021:3083 gcc-toolset-10-valgrind bug fix and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update for gcc-toolset-10-valgrind is now available for Rocky Linux 8. For more information visit https://errata.rockylinux.org/RLBA-2021:3083 Rocky Linux 8 gcc-toolset-10-valgrind-3.16.0-6.el8_4.i686.rpm e1ce0850349148b3ab3aba7bf21cfffe7cc26f8e78a7b63c07601ce5c349b101 gcc-toolset-10-valgrind-3.16.0-6.el8_4.x86_64.rpm eaee7045eb86911441e2ca185719dac4846cf6761b34b1cd4503e66276f0b650 gcc-toolset-10-valgrind-devel-3.16.0-6.el8_4.i686.rpm 5fbac89725917a18834c3d4e7450065437144dcf0a0efa3f85d56666a6290a36 gcc-toolset-10-valgrind-devel-3.16.0-6.el8_4.x86_64.rpm 4b0fc0732a44b410281e4ebb01b853a5ae5b49173e876bfba3064ea2a42410d3 RLSA-2021:4451 Moderate: gnutls and nettle security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for gnutls and nettle is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:4451 Rocky Linux 8 gnutls-c++-3.6.16-4.el8.i686.rpm 16e4e7457d33f3a9c5ac13a78f56dbfea5094f1e9e159a49d3c0794b60c5625e gnutls-c++-3.6.16-4.el8.x86_64.rpm f5cace4997962dceaeb0129f34a9f357e1b3045880753c59186ee157950dc6f4 gnutls-dane-3.6.16-4.el8.i686.rpm d390052fbab34c8e35ce145437f9cdc717ba2d7c5935369fefa8931b781ce2b7 gnutls-dane-3.6.16-4.el8.x86_64.rpm ea8253bb4e2cfafa089b3fd0cea3bab872085c191e7709866a1339bdcbd9234b gnutls-devel-3.6.16-4.el8.i686.rpm 4b19d22990727cfa53992baa68db928a1de40433addee44fb3d524193670ba8f gnutls-devel-3.6.16-4.el8.x86_64.rpm b76969461713ad0198127c08e708dd796dc59c0eb638ad0c3f920fccd73110ab gnutls-utils-3.6.16-4.el8.x86_64.rpm 286f9b40d0a059b5733dd733bfc82e4e84909595e8da1cfc88f22d68f43524cf nettle-devel-3.4.1-7.el8.i686.rpm eb98378a434c3c7b684688debf50dfc820f24ed391abafcd4bf3e45fac268fc2 nettle-devel-3.4.1-7.el8.x86_64.rpm e139494f5eaa94ff5410adc22013d4c5b3888d875e78089bb1c3a35be09c2933 RLSA-2022:5813 Moderate: vim security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for vim is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:5813 Rocky Linux 8 vim-common-8.0.1763-19.el8_6.4.x86_64.rpm 58fb2fd64740f3dddd0465d725779b9a92382096a451b38a3d13e598fb537a65 vim-enhanced-8.0.1763-19.el8_6.4.x86_64.rpm 555bf2c9cb7a631f91195a2c477713668210b2dfcb82c5dc5258fe411bfb7e4c vim-filesystem-8.0.1763-19.el8_6.4.noarch.rpm 37b57ef90a9d794c1f1ef30ca31a1a26a8651d05b752f582dc91f3112a8fb124 vim-X11-8.0.1763-19.el8_6.4.x86_64.rpm 138b57307d0b6d219d4739841ec0d118256c885f6357c4052400276513f5dc63 RLSA-2022:5056 Important: cups security and bug fix update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for cups is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:5056 Rocky Linux 8 cups-2.2.6-45.el8_6.2.x86_64.rpm 1def7e8edea64aa177797768bdf95859d478e4f45243ea93898b392276ff3cdf cups-client-2.2.6-45.el8_6.2.x86_64.rpm f0f8351929d603b7b76e4bfa77c54b25b78788d98a4d102de3fc364f1cbfe77e cups-devel-2.2.6-45.el8_6.2.i686.rpm 3c109dae8bbf159eb43ef6d115c968acae1d7448a9b12ce0efcee142cb6f2a9e cups-devel-2.2.6-45.el8_6.2.x86_64.rpm ed791ac2eb00541534468618fcb033892a304fa33326fc3a52766114b5a7c8c1 cups-filesystem-2.2.6-45.el8_6.2.noarch.rpm 35e4b12c7ccdd9bfb176d3146f295e332e3c9e20659b55f3b5907d0b3a3c882a cups-ipptool-2.2.6-45.el8_6.2.x86_64.rpm 30b7c2814c74654cc5b6f78d1087a070fdf523a1d0245b29cfb724b3b6a4b757 cups-lpd-2.2.6-45.el8_6.2.x86_64.rpm 7714f35ba101a2bb0dc1f40e174b7f7bc06cbfb8785d383de4899b824ec8de4f RLSA-2022:1820 Low: udisks2 security and bug fix update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update for udisks2 is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1820 Rocky Linux 8 libudisks2-2.9.0-9.el8.i686.rpm b6a3891bb289e01826b1bc4e26397e5f12718f44e2dc6413f4f5e626fde70061 libudisks2-2.9.0-9.el8.x86_64.rpm 13a2d984b5d4a21f35ab57ddd95914c27ccc916993620b4dab9bbd697ee2911a udisks2-2.9.0-9.el8.x86_64.rpm 5d4821126edacaebbe000dd9896ebb8dc63993f6f5da7e689e9968f946738a22 udisks2-iscsi-2.9.0-9.el8.x86_64.rpm 56eaaef8707e7c62a15fb4ce052a398cca4de48677e8ef3b7b9d10e96184cce2 udisks2-lsm-2.9.0-9.el8.x86_64.rpm 375eeb6adab3d131e8d96cbc816da721444799bcbf8f60c6b45d7b0f23016578 udisks2-lvm2-2.9.0-9.el8.x86_64.rpm b9ad578c257ddfc2788078ef33be243cde33c0a9f6793529b334c2ebaa860412 RLSA-2022:2074 Moderate: samba security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for samba is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:2074 Rocky Linux 8 samba-vfs-iouring-4.15.5-5.el8.x86_64.rpm 7dc183ab343b29b58bf43d6a71281fc74f01963813f50f70eb91d105d382bb9b RLSA-2022:1730 Important: thunderbird security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for thunderbird is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1730 Rocky Linux 8 thunderbird-91.9.0-3.el8_5.x86_64.rpm 5382b81916e6a938f30afcf2ae8f7861ea22543e665b56fe0807571691f10daf RLSA-2021:4622 Important: freerdp security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for freerdp is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:4622 Rocky Linux 8 freerdp-2.2.0-7.el8_5.x86_64.rpm acf21c1eeed45c522a4dd8f44b30779ab83b1a3c648b53ba9a43951f4e56bf1c freerdp-libs-2.2.0-7.el8_5.i686.rpm 8bde65f2d37f4a0832cc276b52c0dec889feb2ef19680f938c80677c2be8f633 freerdp-libs-2.2.0-7.el8_5.x86_64.rpm 0302055f4b4c6738477eb15068598026a5425954c72905c949181ef848364f63 libwinpr-2.2.0-7.el8_5.i686.rpm 595048be37744b36d5480ffdb9b6c08ef5817109da3ff5e6416466e6369a1072 libwinpr-2.2.0-7.el8_5.x86_64.rpm 90abb5fd442565640cc5e9fbeac05901e398fdb97838c1ab87d7b0ef51931d36 libwinpr-devel-2.2.0-7.el8_5.i686.rpm 1e9bfc11aeb8012ec3d75b33a6cab3b78ab4d822b01cc185c7f591c88e011f1c libwinpr-devel-2.2.0-7.el8_5.x86_64.rpm 1cfe282e82a7ca1b9e2ee3f52d5d16a0ac13c6889c201dc2c36d551854893fa1 RLSA-2021:2583 Moderate: python38:3.8 and python38-devel:3.8 security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for the python38:3.8 and python38-devel:3.8 modules is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:2583 Rocky Linux 8 python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm 6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm 12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33 python38-mod_wsgi-4.6.8-3.module+el8.4.0+570+c2eaf144.x86_64.rpm c504193195a97b1802c950a753237b34bc16b4673c232c25bb589dab51255f41 python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm 21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm 5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1 python38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm 693b174f895dd685857753ad75f07f4fdb95e82a88e4c3f8618392b5d4b81b5e python39-chardet-3.0.4-19.module+el8.4.0+574+843c4898.noarch.rpm 9a21825b6b2a472ec12024574f4d39e2b516dec4a8bf1514572f05bed2915afd python39-ply-3.11-10.module+el8.4.0+574+843c4898.noarch.rpm 964120ccea403bb0c770c16065565fb671e85f9c8f3d5807544259f183ac23ac python39-pysocks-1.7.1-4.module+el8.4.0+574+843c4898.noarch.rpm 6d48f8fb19e1cce6f8d808cd72005c6c87cf0569a296bd22c509b0c27f020660 RLSA-2022:4769 Critical: thunderbird security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Critical An update for thunderbird is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:4769 Rocky Linux 8 firefox-91.9.1-1.el8_6.x86_64.rpm a622ecb5bdd7309923b929740e63371d8d1b64f93b4107eda1098bda35dba50f thunderbird-91.9.1-1.el8_6.x86_64.rpm 54aa39e85079e1a573a5c95c5415bc0997fb5a42e0e40f526af19770de3d2d88 firefox-91.9.1-1.el8_6.x86_64.rpm a622ecb5bdd7309923b929740e63371d8d1b64f93b4107eda1098bda35dba50f thunderbird-91.9.1-1.el8_6.x86_64.rpm 54aa39e85079e1a573a5c95c5415bc0997fb5a42e0e40f526af19770de3d2d88 RLSA-2022:1808 Moderate: aspell security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for aspell is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1808 Rocky Linux 8 aspell-0.60.6.1-22.el8.i686.rpm c141d22dd8a85ff028f54a89e35260ff3a0d930558eaa041c33a9a55339b7d89 aspell-0.60.6.1-22.el8.x86_64.rpm 35a21a9a576b4ce6f4b34851a880ece09a2baaf51d16df49edbcd76b8e19f243 RLSA-2022:2031 Low: libssh security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update for libssh is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:2031 Rocky Linux 8 libssh-devel-0.9.6-3.el8.i686.rpm 4a9b1c9d0bfc6a5346035675fa96793e173fbe235e8f7dba6f0e1a043cbbb877 libssh-devel-0.9.6-3.el8.x86_64.rpm 7cb2b675798815b1a1bf842d17c69edf8dfc941ece898b2d471e235161e0cccc RLSA-2022:1810 Moderate: libtiff security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for libtiff is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1810 Rocky Linux 8 libtiff-4.0.9-21.el8.i686.rpm ca86985eb62d17f49004acab002b99dd6d8c30eff36a246e3fb66c802169f8a9 libtiff-4.0.9-21.el8.x86_64.rpm 1393a72113f12a5a28273defb7e4da56888066ea67bb5100630d0e13f263c68c libtiff-devel-4.0.9-21.el8.i686.rpm 16e6b5ce489a597e2f36b50fe4fc59b5ae63b1d865a873d961685da8efd5a216 libtiff-devel-4.0.9-21.el8.x86_64.rpm 9d0e1fa160af29ee4cf5be9cf345e0ab6f40a33134f96ef3490799f60c108fe1 RLSA-2021:4903 Critical: nss security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Critical An update for nss is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:4903 Rocky Linux 8 nss-3.67.0-7.el8_5.i686.rpm aa2d297d55a4bc7d2c5fcfd3f26cd8604f8e759f471d1531d527c5840301b3c4 nss-3.67.0-7.el8_5.x86_64.rpm b050e18bf644e6c217a0bf4f5a91f458424bc7597d4a7be38ee9ba6bc450a79d nss-devel-3.67.0-7.el8_5.i686.rpm a92a8b9c2120b6a0ce006da294d933c058961b665d3a54b4164c7bf57b2026c7 nss-devel-3.67.0-7.el8_5.x86_64.rpm d9eaaf9754d53e21416fc5045830f62cec67aa386b57078e4157bcc30ea0f346 nss-softokn-3.67.0-7.el8_5.i686.rpm 289a2f903f28fb675d515b64322e17656317909f0effcbcec13c31b195512a5e nss-softokn-3.67.0-7.el8_5.x86_64.rpm 1821044e946375b14a39f0d73f3a1bc8669df601c61076ee8932a18ecede2341 nss-softokn-devel-3.67.0-7.el8_5.i686.rpm 4cc44aac64b44913774eb4b0f9f0b6876e74f5068c0954f9350192e61f5f5347 nss-softokn-devel-3.67.0-7.el8_5.x86_64.rpm acf1a833eece9d866dd96612ec902e541138f1487e72dbc77058888175568f77 nss-softokn-freebl-3.67.0-7.el8_5.i686.rpm b1e4758ee17e0e062096d4a7dc42d1130e1ccc224885b5663eab4e9f01c377aa nss-softokn-freebl-3.67.0-7.el8_5.x86_64.rpm cddb83d15260e2bfd151633963092ad239a416b37478add83eee0bb69c35472b nss-softokn-freebl-devel-3.67.0-7.el8_5.i686.rpm dd265aca1c251fdb2a5fe8974d34010ab95ff2cee1f7d9f74837e84b51847681 nss-softokn-freebl-devel-3.67.0-7.el8_5.x86_64.rpm 3c82897ae2d43abe2842ec6738de4e2e158eba476a66bd38b4716bc51a6a8055 nss-sysinit-3.67.0-7.el8_5.x86_64.rpm c278b5bf6e1ebb927ee71d3748ddc657fdaba8ff6eeefd4d9b86ec665bbcd398 nss-tools-3.67.0-7.el8_5.x86_64.rpm b99a319b024c11d4bb3735040acf17813ec40e40cf770bb78c507f900574bc20 nss-util-3.67.0-7.el8_5.i686.rpm 35f59e0b907027a693a391fcb4a7df7ca79f03e53ff27ee5769c64d42752b3a1 nss-util-3.67.0-7.el8_5.x86_64.rpm 1b1e28f5988c5af06559c8e8898373a99837b1cc7a1a58450bce001f063ba8c2 nss-util-devel-3.67.0-7.el8_5.i686.rpm 2441423b11a67f6a12a0e594e6648dd4dc553f0e78343631a41d25e13bd5c7a4 nss-util-devel-3.67.0-7.el8_5.x86_64.rpm d76484b976f6e1868076da9ae8a92104153b272ea4faec1532ae42a1185403ac RLBA-2021:3240 .NET Core 2.1 bugfix update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update for .NET Core 2.1 is now available for Rocky Linux. For more information visit https://errata.rockylinux.org/RLBA-2021:3240 Rocky Linux 8 dotnet-host-fxr-2.1-2.1.30-1.el8_4.rocky.x86_64.rpm a4d8e71402fc6bd36ccae8ba4395eb873b0f3c784db09d3084e6ca440cda925d dotnet-runtime-2.1-2.1.30-1.el8_4.rocky.x86_64.rpm cbfff6de30501753f7e3e22633e6bb2b79f127fe1aa3852be5f49569a0197f4c dotnet-sdk-2.1-2.1.526-1.el8_4.rocky.x86_64.rpm b01ae5a57232950f63cd3847d35e22abbbb6ed9546f798908e4f2c4f5e491649 dotnet-sdk-2.1.5xx-2.1.526-1.el8_4.rocky.x86_64.rpm c366fad3118e4a8e74178c05148f40faaf4f058e720a4bf78926f6713b259deb RLSA-2021:2588 Moderate: ruby:2.6 security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for the ruby:2.6 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:2588 Rocky Linux 8 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm 1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505 rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm 0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 rubygem-abrt-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm 0db38261694321b3fe358091a3b00b487152713cd0b2075c79c2a695f039602e rubygem-abrt-doc-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm 88c0b4efaf57ff92de9214032eead69fd4e8cbbe9fb31aa2869e626e9d91de28 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm 1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505 rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm 7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm 861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498 rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm 0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac rubygem-mysql2-0.5.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm a7b94f06c62bf6f720d4e22dd40ec7c86beffb871418fd41761eade4c94320ac rubygem-mysql2-doc-0.5.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 6e0d3c34c3e32ae39c98ef6a7ced21bfc9d98ed97a60f0cd250e25f340ed03b0 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 rubygem-pg-1.2.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm 49ab41e4cac5db1b5c138740ebf80c32ba208b24fac3dc1505b15b93513d7fba rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 rubygem-pg-doc-1.2.3-1.module+el8.4.0+594+11b6673a.noarch.rpm c09ae194775cac6c4c6b26052d23abb727f170cf8a3d26de38f9963cb23db7c9 rubygem-abrt-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm 0db38261694321b3fe358091a3b00b487152713cd0b2075c79c2a695f039602e rubygem-abrt-doc-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm 88c0b4efaf57ff92de9214032eead69fd4e8cbbe9fb31aa2869e626e9d91de28 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm 1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505 rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm 7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm 861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498 rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm 0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac rubygem-mysql2-0.5.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm a7b94f06c62bf6f720d4e22dd40ec7c86beffb871418fd41761eade4c94320ac rubygem-mysql2-doc-0.5.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 6e0d3c34c3e32ae39c98ef6a7ced21bfc9d98ed97a60f0cd250e25f340ed03b0 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 rubygem-pg-1.2.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm 49ab41e4cac5db1b5c138740ebf80c32ba208b24fac3dc1505b15b93513d7fba rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 rubygem-pg-doc-1.2.3-1.module+el8.4.0+594+11b6673a.noarch.rpm c09ae194775cac6c4c6b26052d23abb727f170cf8a3d26de38f9963cb23db7c9 rubygem-abrt-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm 0db38261694321b3fe358091a3b00b487152713cd0b2075c79c2a695f039602e rubygem-abrt-doc-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm 88c0b4efaf57ff92de9214032eead69fd4e8cbbe9fb31aa2869e626e9d91de28 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm 1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505 rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm 7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm 861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498 rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm 0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac rubygem-mysql2-0.5.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm a7b94f06c62bf6f720d4e22dd40ec7c86beffb871418fd41761eade4c94320ac rubygem-mysql2-doc-0.5.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 6e0d3c34c3e32ae39c98ef6a7ced21bfc9d98ed97a60f0cd250e25f340ed03b0 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 rubygem-pg-1.2.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm 49ab41e4cac5db1b5c138740ebf80c32ba208b24fac3dc1505b15b93513d7fba rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 rubygem-pg-doc-1.2.3-1.module+el8.4.0+594+11b6673a.noarch.rpm c09ae194775cac6c4c6b26052d23abb727f170cf8a3d26de38f9963cb23db7c9 RLSA-2022:5467 Important: php:7.4 security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for the php:7.4 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:5467 Rocky Linux 8 apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe apcu-panel-5.1.20-1.module+el8.6.0+790+fc63e43f.noarch.rpm 0e9d74cc0eba28463f32c2fcd7da6b7959146b32f959df3c9c876cfe4b743680 libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14 libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 996d397031508e9101b6e9a0094a6cba118da93efb4f1b1bd224769d65008d91 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 6f832b96a25a454bc576303745f9cb041a65531528a90437ab6936505abc7177 libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77 libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm e4f4ace1b7cc21f2018213138a4ee06fe6150056f4170206a595de2e6f581b77 php-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm a4febeee8d494a1f555ad1a58dcbfdef89784d2cbab135d2e216a8b68be6f66b php-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 33de3488d56e32629eb3368ce59728a33b544fa06a40ae916349f4a71e28a2a7 php-bcmath-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 879a7eb3d80872fee5de77d61ca6c7f7f49df3b8e779620a37004414f76ef727 php-bcmath-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 798f10d3178811c7bae17164a81e77cf649c14804ba508c4041f2c47354d3394 php-cli-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm a9ab838793b51975b92249702949aecb79da70d43a087d000e9a97dacb67d4e9 php-cli-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 07349dab9274a1839c56d43dc06b6775ce923f33359825c7ef17222aa2dfedd2 php-common-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 69816897883913231826a258c3bbbf30c1ae8f2be20df44e6720ef8c2751070b php-common-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 850e33e3462faef73ad8b30af20bbf5b1bb6a66fcdaf2d6405737b251ae3f9c3 php-dba-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 7ffcfa425e7dae756d19ce98dfe3c20f34f2de4d33a9b72261bd31e48e9672b7 php-dba-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 6d79bfc8eaaf0e35b43b3d53e8b5d883d5e361eac6e2789f0c737b0d3d9f06d2 php-dbg-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm ea341a2f2434ceefd6f92eb0b52f7ede51062dce9a1e16330460908ac5f1a382 php-dbg-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 5b05d2069bcd096fb5aaf5b04558b48aacc42bf24a811578970ff06f74e78faa php-devel-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 920d8611e9febdcdcf46edac659925abafa44ec3f8c4df0239542635725af267 php-devel-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 874eae7c08de8a21759f50b253d8a9b96a44dd08513809d9cb50f7b86c7a73f7 php-embedded-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 3f079b1038fa1ccb19d40ea47db95cf7bef447785c25b6fc1973dd8e4ce42ca9 php-embedded-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm d41a98c9648d37ea6f29237ceafed762e05eb7896981288a24521bbffb831cb6 php-enchant-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm d58d0c6645d6a20bf29c7d82d3dffc563a2e3d2c50ffc37725c094cee74f4100 php-enchant-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm a950daacfed3adbbcc94483613af957439ce45dfbdb5906c5a11a15a2aaafd89 php-ffi-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 6dcacdc50af9e95b5e24729afd45e0cb1a3d58c66377d59186f274bb893c404a php-ffi-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 7a860213ae839720bae6cc17ece06208800ded15262b05e7174f425b40e42512 php-fpm-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 6648f40551c961d7571afce832afd751a2b4593323c0033c1d217ef81f23e794 php-fpm-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 0c43099c25e4ef8e62ec8bf4e233823c218f842a58cffed28da21bb1bec4a890 php-gd-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm f272c584386ebf720aef1782a19656c97ab5a6c1b06ebeb1e052659c7b3ba12b php-gd-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 46cd4c338ab54d3125e5639f3064927fe6468a7d91da91c513258e2c76f2cbda php-gmp-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 1639ccbe241713b621b94177fd408774d80b3976f188cf01e4a2b9b61e13d929 php-gmp-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm fe7e418b3c518c179596815d686f5e8dd9210410107b2122dbc4b74d8e96ed2d php-intl-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 74ddf34cb98a75dd06a42d20d2cace47a0203597f515522bb4151a93c9bd58f2 php-intl-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm b69a46d9df293a5849e9999b4f3bdb4497373e7f85bbaf2876a0d5c515941124 php-json-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 7d89c9f38a08b904aef57e80ba9e296a3d5697542827ba72ecdca733fe06cb80 php-ldap-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 7319fa42d561d7460d4fdb8c7015ebac308ae1b71b87126dda3e78dd22e5b582 php-ldap-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 151035812290a32b2432659cba2170a7c587c5b43a41c14ce76763d5ce9e6bcd php-mbstring-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 809f869011a3c9e9a12d78e1dfe88e056f785fdba1306c94547348af7a142411 php-mbstring-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 3c92d15293eeceb5e75aab4837eb4c9d3eb65f8edabdcb37b2486fb81c178392 php-mysqlnd-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm bb69d6a16c610c1724b37493632a50e6130f1c90d7d83e57f17419347a8da346 php-mysqlnd-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm e58267502219f1ee82c808cb1f3c0d00e9d10562ad9f856fccaa82cbdcc17ba6 php-odbc-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 175124bf994ee7855293b56ef035b7842695fff5abd3a2d554721079abb936d3 php-odbc-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 1ceb0b036200e46be99257ae081afe3cce11b5ca7e3c5e35116392510c8b25f2 php-opcache-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm d093e827e814775c56ab89e76aeb86bff8a89dc46012af7dd9f75cce1565ec25 php-opcache-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 9cb46f15b80f01b9143bea8baf59850b1007a4a741f0e1c6b0dcfd5e748791e3 php-pdo-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 491b1be9633ef3462f08e57af0d7e1a92cb412688fa143772d5c36828a438a49 php-pdo-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 463e761391433286e77b9acb2d159aa7fa51a4b0137bd6e24c41243831f95ea3 php-pear-1.10.12-1.module+el8.6.0+789+2130c178.noarch.rpm c20c31a8cafb68671583a79c3a85b7a87668132557e1adb08b2ff7ce6a9c4058 php-pear-1.10.13-1.module+el8.6.0+790+fc63e43f.noarch.rpm e46b2f905e5a36adba35af3f70884467592cb7ba32cecfaee3d1192127eb04e5 php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm f1572b2afbf482909317a87e31242e42931f5d4da5084ad048e349a6cbf16e74 php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm 6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4 php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 8912da51f22348d378782eaa3188d977be4ecf0f2b59ab80aee4e18b01ef35d6 php-pecl-rrd-2.0.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 0715edabc98e62f4980b4485417182bc7e39b3dddbfd94a41a2eb53bc9201135 php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 2678c55e406ed194b50e9eb58d1caa05bb088bfb1744af92db94f4cf86fc0cff php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm 2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30 php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm a34ecbe5457a2820ef2959811e2ed8512a48561f9c9d02588ff4a0d086df308f php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm 04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657 php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 74648336246a6f9ccd0520eb157ee3237bb3553bb7a1810f49cf1e3bfcf5ba60 php-pgsql-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm fe48b9201336ee70beeaeae6dd39f293f463a2216306f497b58237839cc929dd php-pgsql-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 3983d0b71fc33e34f57f6efc4162f06fd14181a44f03987412fe1c808a6c73d8 php-process-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 09c20637c652a99e109b591ce13575466f6fbaef30d5ac1ef382c2306628b4cd php-process-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 2337c39530e88dbc004d6d967bed426f3c5137ac8b734acfc242bee8fec36ac7 php-snmp-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm dfd9436a32cbd22422d71dc345a4c56434727236ff01edae23e3b52a04ea427e php-snmp-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 66e846d00c10931b080c132dcbc1125f385475acb10f50450576591dfa29471b php-soap-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 6446c04f3bcbeb687005662b18fc6e1a4e073d333591aeef80a3c4352a780e83 php-soap-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 728e4d7e83730ea963a83f492c52670485ff0dc9670166045ed210c713ec8886 php-xml-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 984b7604c5e952c676c902f0ecebecace5b0cc3577043137de58cac56396e037 php-xml-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 1635eab26e5fc55dd48f2ff06106168d1ec0a556e75691f48ad2c7f82fbd867a php-xmlrpc-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 833d09983f38255e7e7bb014df4478dcaa988654ac003375025c3ed8375ca677 apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe apcu-panel-5.1.20-1.module+el8.6.0+790+fc63e43f.noarch.rpm 0e9d74cc0eba28463f32c2fcd7da6b7959146b32f959df3c9c876cfe4b743680 libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14 libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 996d397031508e9101b6e9a0094a6cba118da93efb4f1b1bd224769d65008d91 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 6f832b96a25a454bc576303745f9cb041a65531528a90437ab6936505abc7177 libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77 libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm e4f4ace1b7cc21f2018213138a4ee06fe6150056f4170206a595de2e6f581b77 php-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm a4febeee8d494a1f555ad1a58dcbfdef89784d2cbab135d2e216a8b68be6f66b php-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 33de3488d56e32629eb3368ce59728a33b544fa06a40ae916349f4a71e28a2a7 php-bcmath-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 879a7eb3d80872fee5de77d61ca6c7f7f49df3b8e779620a37004414f76ef727 php-bcmath-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 798f10d3178811c7bae17164a81e77cf649c14804ba508c4041f2c47354d3394 php-cli-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm a9ab838793b51975b92249702949aecb79da70d43a087d000e9a97dacb67d4e9 php-cli-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 07349dab9274a1839c56d43dc06b6775ce923f33359825c7ef17222aa2dfedd2 php-common-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 69816897883913231826a258c3bbbf30c1ae8f2be20df44e6720ef8c2751070b php-common-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 850e33e3462faef73ad8b30af20bbf5b1bb6a66fcdaf2d6405737b251ae3f9c3 php-dba-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 7ffcfa425e7dae756d19ce98dfe3c20f34f2de4d33a9b72261bd31e48e9672b7 php-dba-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 6d79bfc8eaaf0e35b43b3d53e8b5d883d5e361eac6e2789f0c737b0d3d9f06d2 php-dbg-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm ea341a2f2434ceefd6f92eb0b52f7ede51062dce9a1e16330460908ac5f1a382 php-dbg-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 5b05d2069bcd096fb5aaf5b04558b48aacc42bf24a811578970ff06f74e78faa php-devel-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 920d8611e9febdcdcf46edac659925abafa44ec3f8c4df0239542635725af267 php-devel-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 874eae7c08de8a21759f50b253d8a9b96a44dd08513809d9cb50f7b86c7a73f7 php-embedded-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 3f079b1038fa1ccb19d40ea47db95cf7bef447785c25b6fc1973dd8e4ce42ca9 php-embedded-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm d41a98c9648d37ea6f29237ceafed762e05eb7896981288a24521bbffb831cb6 php-enchant-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm d58d0c6645d6a20bf29c7d82d3dffc563a2e3d2c50ffc37725c094cee74f4100 php-enchant-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm a950daacfed3adbbcc94483613af957439ce45dfbdb5906c5a11a15a2aaafd89 php-ffi-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 6dcacdc50af9e95b5e24729afd45e0cb1a3d58c66377d59186f274bb893c404a php-ffi-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 7a860213ae839720bae6cc17ece06208800ded15262b05e7174f425b40e42512 php-fpm-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 6648f40551c961d7571afce832afd751a2b4593323c0033c1d217ef81f23e794 php-fpm-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 0c43099c25e4ef8e62ec8bf4e233823c218f842a58cffed28da21bb1bec4a890 php-gd-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm f272c584386ebf720aef1782a19656c97ab5a6c1b06ebeb1e052659c7b3ba12b php-gd-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 46cd4c338ab54d3125e5639f3064927fe6468a7d91da91c513258e2c76f2cbda php-gmp-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 1639ccbe241713b621b94177fd408774d80b3976f188cf01e4a2b9b61e13d929 php-gmp-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm fe7e418b3c518c179596815d686f5e8dd9210410107b2122dbc4b74d8e96ed2d php-intl-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 74ddf34cb98a75dd06a42d20d2cace47a0203597f515522bb4151a93c9bd58f2 php-intl-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm b69a46d9df293a5849e9999b4f3bdb4497373e7f85bbaf2876a0d5c515941124 php-json-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 7d89c9f38a08b904aef57e80ba9e296a3d5697542827ba72ecdca733fe06cb80 php-ldap-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 7319fa42d561d7460d4fdb8c7015ebac308ae1b71b87126dda3e78dd22e5b582 php-ldap-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 151035812290a32b2432659cba2170a7c587c5b43a41c14ce76763d5ce9e6bcd php-mbstring-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 809f869011a3c9e9a12d78e1dfe88e056f785fdba1306c94547348af7a142411 php-mbstring-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 3c92d15293eeceb5e75aab4837eb4c9d3eb65f8edabdcb37b2486fb81c178392 php-mysqlnd-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm bb69d6a16c610c1724b37493632a50e6130f1c90d7d83e57f17419347a8da346 php-mysqlnd-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm e58267502219f1ee82c808cb1f3c0d00e9d10562ad9f856fccaa82cbdcc17ba6 php-odbc-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 175124bf994ee7855293b56ef035b7842695fff5abd3a2d554721079abb936d3 php-odbc-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 1ceb0b036200e46be99257ae081afe3cce11b5ca7e3c5e35116392510c8b25f2 php-opcache-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm d093e827e814775c56ab89e76aeb86bff8a89dc46012af7dd9f75cce1565ec25 php-opcache-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 9cb46f15b80f01b9143bea8baf59850b1007a4a741f0e1c6b0dcfd5e748791e3 php-pdo-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 491b1be9633ef3462f08e57af0d7e1a92cb412688fa143772d5c36828a438a49 php-pdo-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 463e761391433286e77b9acb2d159aa7fa51a4b0137bd6e24c41243831f95ea3 php-pear-1.10.12-1.module+el8.6.0+789+2130c178.noarch.rpm c20c31a8cafb68671583a79c3a85b7a87668132557e1adb08b2ff7ce6a9c4058 php-pear-1.10.13-1.module+el8.6.0+790+fc63e43f.noarch.rpm e46b2f905e5a36adba35af3f70884467592cb7ba32cecfaee3d1192127eb04e5 php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm f1572b2afbf482909317a87e31242e42931f5d4da5084ad048e349a6cbf16e74 php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm 6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4 php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 8912da51f22348d378782eaa3188d977be4ecf0f2b59ab80aee4e18b01ef35d6 php-pecl-rrd-2.0.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 0715edabc98e62f4980b4485417182bc7e39b3dddbfd94a41a2eb53bc9201135 php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 2678c55e406ed194b50e9eb58d1caa05bb088bfb1744af92db94f4cf86fc0cff php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm 2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30 php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm a34ecbe5457a2820ef2959811e2ed8512a48561f9c9d02588ff4a0d086df308f php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm 04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657 php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 74648336246a6f9ccd0520eb157ee3237bb3553bb7a1810f49cf1e3bfcf5ba60 php-pgsql-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm fe48b9201336ee70beeaeae6dd39f293f463a2216306f497b58237839cc929dd php-pgsql-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 3983d0b71fc33e34f57f6efc4162f06fd14181a44f03987412fe1c808a6c73d8 php-process-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 09c20637c652a99e109b591ce13575466f6fbaef30d5ac1ef382c2306628b4cd php-process-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 2337c39530e88dbc004d6d967bed426f3c5137ac8b734acfc242bee8fec36ac7 php-snmp-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm dfd9436a32cbd22422d71dc345a4c56434727236ff01edae23e3b52a04ea427e php-snmp-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 66e846d00c10931b080c132dcbc1125f385475acb10f50450576591dfa29471b php-soap-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 6446c04f3bcbeb687005662b18fc6e1a4e073d333591aeef80a3c4352a780e83 php-soap-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 728e4d7e83730ea963a83f492c52670485ff0dc9670166045ed210c713ec8886 php-xml-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 984b7604c5e952c676c902f0ecebecace5b0cc3577043137de58cac56396e037 php-xml-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm 1635eab26e5fc55dd48f2ff06106168d1ec0a556e75691f48ad2c7f82fbd867a php-xmlrpc-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm 833d09983f38255e7e7bb014df4478dcaa988654ac003375025c3ed8375ca677 RLSA-2022:5470 Important: thunderbird security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for thunderbird is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:5470 Rocky Linux 8 firefox-91.11.0-2.el8_6.x86_64.rpm 77026735c2b8087eca3fe70550e282411c33df5d1f00a86f157cebbafb822d77 thunderbird-91.11.0-2.el8_6.x86_64.rpm d592780374748ecf672c96024400bd51e4c7251d76c27b3d46cdca85f15d2799 firefox-91.11.0-2.el8_6.x86_64.rpm 77026735c2b8087eca3fe70550e282411c33df5d1f00a86f157cebbafb822d77 thunderbird-91.11.0-2.el8_6.x86_64.rpm d592780374748ecf672c96024400bd51e4c7251d76c27b3d46cdca85f15d2799 RLSA-2022:4799 Important: rsyslog security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for rsyslog is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:4799 Rocky Linux 8 rsyslog-8.2102.0-7.el8_6.1.x86_64.rpm ea07612c26bc3edfdd184dcf6a984b9397c4898eead7ff537d9fab37e5c01450 rsyslog-crypto-8.2102.0-7.el8_6.1.x86_64.rpm b0fbc486ec0b8aa580300cb889029ce3c8d99db145be81fc91fcbd21c6771094 rsyslog-doc-8.2102.0-7.el8_6.1.noarch.rpm f9dafefb3d37a6de75ed495ac4674add44c708bd07b0e254add7dfeddd11d132 rsyslog-elasticsearch-8.2102.0-7.el8_6.1.x86_64.rpm 57f0f73088d8760723bf88e9edb120db399c9124c0c8b792a05c3dcf9dc514a1 rsyslog-gnutls-8.2102.0-7.el8_6.1.x86_64.rpm 228fd14edd78c0d1e6ed9eec5bebfbdfb6314cf83259f73c050586ef93969514 rsyslog-gssapi-8.2102.0-7.el8_6.1.x86_64.rpm d262565b3cf9742398f7de307f76218cf27a4bc4a9feddcc2a606a8191d2580b rsyslog-kafka-8.2102.0-7.el8_6.1.x86_64.rpm 17de8174f4d0ccf2317fe3576f2637b45bd95539ab8ca05f05e6290d1fc6a278 rsyslog-mmaudit-8.2102.0-7.el8_6.1.x86_64.rpm 5f80d78631a22fcd386a8fbd7a9e077e81fafef0fa24be4089e2c811bfe958e9 rsyslog-mmfields-8.2102.0-7.el8_6.1.x86_64.rpm 19d7b2e3383dc6533c1c7d14546a527ecc66a817573b79b6f5a4e6100524c2cd rsyslog-mmjsonparse-8.2102.0-7.el8_6.1.x86_64.rpm d4563ef2fed753e5249331139a8b604be3d2310bd5b8baf683840d0ac82a9941 rsyslog-mmkubernetes-8.2102.0-7.el8_6.1.x86_64.rpm ec23ecdf3412ac5ada07608c99a606a65238bfdd8aa776d08b81711ae6380d93 rsyslog-mmnormalize-8.2102.0-7.el8_6.1.x86_64.rpm e241a56b556c9917c1d3314cd31296f295572048a5fd6d9c401bf578f2283b68 rsyslog-mmsnmptrapd-8.2102.0-7.el8_6.1.x86_64.rpm c71c5a98ea889def78474c169fc87422faca1cf262e952c754fdf41dcbf19aca rsyslog-mysql-8.2102.0-7.el8_6.1.x86_64.rpm 2fa8fae0b4c4afcf76698bac4acb6910ff511419e12669f243b269048436de8f rsyslog-omamqp1-8.2102.0-7.el8_6.1.x86_64.rpm 283fb7a1e80dd375f253bddfb3c062b916129e990a60afaddd6f9701c82cf9a2 rsyslog-openssl-8.2102.0-7.el8_6.1.x86_64.rpm 1bff451e19d60935f1088325025ab09efa46242a2f6c3cae6f25a6c46e9ce4bf rsyslog-pgsql-8.2102.0-7.el8_6.1.x86_64.rpm 3fdae136d67395bf194b264a75b3bf13d6544ddb33824d5ab0c1a2df6754a6b0 rsyslog-relp-8.2102.0-7.el8_6.1.x86_64.rpm b516a0ed920f0650ba482d10ae5fe7632eb1345e6866fe28c2925ff44fd392ed rsyslog-snmp-8.2102.0-7.el8_6.1.x86_64.rpm 16ba1f239f955a3443b59395ea521c8a69dce7fbc1328cb47d8a6eb6710036db rsyslog-udpspoof-8.2102.0-7.el8_6.1.x86_64.rpm ca30f551846bb493856021f6855000143feb2f2dacbfca61abcc14802156f78a RLSA-2022:1950 Moderate: dovecot security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for dovecot is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1950 Rocky Linux 8 dovecot-2.3.16-2.el8.x86_64.rpm 9a1ed964988493cc43f3675461d57fcfad0cd93a6186b07d3c03c62786e9fe20 dovecot-mysql-2.3.16-2.el8.x86_64.rpm dac798b094655507e03a94ec37e065e9117b3afdabf58e91544486ad1288c96d dovecot-pgsql-2.3.16-2.el8.x86_64.rpm b3cc3cc4d64ef877e5f1ffe1bb3deee45ad4559db309546064d0aa7f6cd122e2 dovecot-pigeonhole-2.3.16-2.el8.x86_64.rpm 538a64dafcb31dd1a45c423f5a2afcbcc65d5dfa891026e1938bcf31e34008f3 RLSA-2022:441 Important: aide security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for aide is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:441 Rocky Linux 8 aide-0.16-14.el8_5.1.x86_64.rpm cd5d83d0836f7ae2f5b59f914bf67cdee69e404f8b9864363f1d93d76747c6aa RLBA-2021:3593 gcc-toolset-10-elfutils bug fix update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update for gcc-toolset-10-elfutils is now available for Rocky Linux 8. For more information visit https://errata.rockylinux.org/RLBA-2021:3593 Rocky Linux 8 gcc-toolset-10-elfutils-0.182-6.el8_4.x86_64.rpm f64e85941a97279c482bbd079fbd153255a348556053cf6e40b7b1abea70c7bf gcc-toolset-10-elfutils-debuginfod-client-0.182-6.el8_4.i686.rpm dea4b32d33daaa5cf93dd48e6d736fbc8ae87f03626cc746f127f1b816be2593 gcc-toolset-10-elfutils-debuginfod-client-0.182-6.el8_4.x86_64.rpm fbf71de210a57662e2215e22fe634b8822b0533020a47c1f6615e0e50b9c2e66 gcc-toolset-10-elfutils-debuginfod-client-devel-0.182-6.el8_4.i686.rpm e923f2207f99247d9dfddc1cb2aed5b36fe36f1e441374b4b6a768ec6bd6a860 gcc-toolset-10-elfutils-debuginfod-client-devel-0.182-6.el8_4.x86_64.rpm 47103bfcc834e8d9585ea457e023013726ea8fd98bfb6cc9ab1003ac9df38925 gcc-toolset-10-elfutils-devel-0.182-6.el8_4.i686.rpm 589fcba6c71733265f0d4f18d6ec1200079f23eb3b475aa4b4622b8824153854 gcc-toolset-10-elfutils-devel-0.182-6.el8_4.x86_64.rpm 20d78a08fcad187ce1fe69bdb260016abe2cfc43d6fe882099adfc1c11cb4b55 gcc-toolset-10-elfutils-libelf-0.182-6.el8_4.i686.rpm 9aba44906c12278e4eea29af4495c11e3904fc6f3270932cba6d61b9dbb25869 gcc-toolset-10-elfutils-libelf-0.182-6.el8_4.x86_64.rpm b27fdaf713c099c491534f785cc4418944976ced9ace65c6a1b4cfdc64441000 gcc-toolset-10-elfutils-libelf-devel-0.182-6.el8_4.i686.rpm 63ec7c979c6905b8b59d61fb3c472846f7184fcbbfe29e72d8563da8ddf218fb gcc-toolset-10-elfutils-libelf-devel-0.182-6.el8_4.x86_64.rpm 06e63e0c75d6871db6259dca49854a356e43dfc658de0edfb41b193111939565 gcc-toolset-10-elfutils-libs-0.182-6.el8_4.i686.rpm 5145964b5e9afa734749f7d1fa9ee072d3959cd05d69efb670ac58c159364c09 gcc-toolset-10-elfutils-libs-0.182-6.el8_4.x86_64.rpm 769e4bb8af44477862465592d22f364ae865f1f7cd86bf005b0a2e304ce20765