RLSA-2021:2588 Moderate: ruby:2.6 security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for the ruby:2.6 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:2588 Rocky Linux 8 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.aarch64.rpm 50b93d95add799d8116134cfab27d8df15046156a48fa2ef2f596b8404e0b578 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.aarch64.rpm 1dc1a6f4bbaa63258c88e6a05bad8e097f240fee0d28b6d4d8d304a701bcb181 rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm 0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.aarch64.rpm 73f5398361219bafbcda56c29626db2c624c7ec2aa4e97425202f72482becd37 rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 rubygem-abrt-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm 0db38261694321b3fe358091a3b00b487152713cd0b2075c79c2a695f039602e rubygem-abrt-doc-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm 88c0b4efaf57ff92de9214032eead69fd4e8cbbe9fb31aa2869e626e9d91de28 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.aarch64.rpm 50b93d95add799d8116134cfab27d8df15046156a48fa2ef2f596b8404e0b578 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.aarch64.rpm 1dc1a6f4bbaa63258c88e6a05bad8e097f240fee0d28b6d4d8d304a701bcb181 rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.aarch64.rpm 796c11f0cc7e0d6bff9568c0c195c276755a3acf101e7c7bc95d5ffdfba8e112 rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm 861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498 rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm 0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac rubygem-mysql2-0.5.3-1.module+el8.4.0+594+11b6673a.aarch64.rpm 6de94bd82f42e0a7213685094222b97ed79f03e096e93cbfb13e552fb5e0d6be rubygem-mysql2-doc-0.5.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 6e0d3c34c3e32ae39c98ef6a7ced21bfc9d98ed97a60f0cd250e25f340ed03b0 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.aarch64.rpm 73f5398361219bafbcda56c29626db2c624c7ec2aa4e97425202f72482becd37 rubygem-pg-1.2.3-1.module+el8.4.0+594+11b6673a.aarch64.rpm 27aa4ff1266db166977992be97667f106056cd6efa04e504f4cf468d6d6e3d32 rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 rubygem-pg-doc-1.2.3-1.module+el8.4.0+594+11b6673a.noarch.rpm c09ae194775cac6c4c6b26052d23abb727f170cf8a3d26de38f9963cb23db7c9 rubygem-abrt-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm 0db38261694321b3fe358091a3b00b487152713cd0b2075c79c2a695f039602e rubygem-abrt-doc-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm 88c0b4efaf57ff92de9214032eead69fd4e8cbbe9fb31aa2869e626e9d91de28 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.aarch64.rpm 50b93d95add799d8116134cfab27d8df15046156a48fa2ef2f596b8404e0b578 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.aarch64.rpm 1dc1a6f4bbaa63258c88e6a05bad8e097f240fee0d28b6d4d8d304a701bcb181 rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.aarch64.rpm 796c11f0cc7e0d6bff9568c0c195c276755a3acf101e7c7bc95d5ffdfba8e112 rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm 861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498 rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm 0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac rubygem-mysql2-0.5.3-1.module+el8.4.0+594+11b6673a.aarch64.rpm 6de94bd82f42e0a7213685094222b97ed79f03e096e93cbfb13e552fb5e0d6be rubygem-mysql2-doc-0.5.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 6e0d3c34c3e32ae39c98ef6a7ced21bfc9d98ed97a60f0cd250e25f340ed03b0 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.aarch64.rpm 73f5398361219bafbcda56c29626db2c624c7ec2aa4e97425202f72482becd37 rubygem-pg-1.2.3-1.module+el8.4.0+594+11b6673a.aarch64.rpm 27aa4ff1266db166977992be97667f106056cd6efa04e504f4cf468d6d6e3d32 rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 rubygem-pg-doc-1.2.3-1.module+el8.4.0+594+11b6673a.noarch.rpm c09ae194775cac6c4c6b26052d23abb727f170cf8a3d26de38f9963cb23db7c9 rubygem-abrt-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm 0db38261694321b3fe358091a3b00b487152713cd0b2075c79c2a695f039602e rubygem-abrt-doc-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm 88c0b4efaf57ff92de9214032eead69fd4e8cbbe9fb31aa2869e626e9d91de28 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.aarch64.rpm 50b93d95add799d8116134cfab27d8df15046156a48fa2ef2f596b8404e0b578 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.aarch64.rpm 1dc1a6f4bbaa63258c88e6a05bad8e097f240fee0d28b6d4d8d304a701bcb181 rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.aarch64.rpm 796c11f0cc7e0d6bff9568c0c195c276755a3acf101e7c7bc95d5ffdfba8e112 rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm 861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498 rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm 0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac rubygem-mysql2-0.5.3-1.module+el8.4.0+594+11b6673a.aarch64.rpm 6de94bd82f42e0a7213685094222b97ed79f03e096e93cbfb13e552fb5e0d6be rubygem-mysql2-doc-0.5.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 6e0d3c34c3e32ae39c98ef6a7ced21bfc9d98ed97a60f0cd250e25f340ed03b0 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.aarch64.rpm 73f5398361219bafbcda56c29626db2c624c7ec2aa4e97425202f72482becd37 rubygem-pg-1.2.3-1.module+el8.4.0+594+11b6673a.aarch64.rpm 27aa4ff1266db166977992be97667f106056cd6efa04e504f4cf468d6d6e3d32 rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 rubygem-pg-doc-1.2.3-1.module+el8.4.0+594+11b6673a.noarch.rpm c09ae194775cac6c4c6b26052d23abb727f170cf8a3d26de38f9963cb23db7c9 RLSA-2021:2290 Important: nginx:1.16 security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for the nginx:1.16 module is now available for Rocky Linux 8, Rocky Linux 8.1 Extended Update Support, and Rocky Linux 8.2 Extended Update Support. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:2290 Rocky Linux 8 nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm d5b8f60a7ceb869b906e2d5cabf4e86735444a5e1d74ebd79c3621d82dffa294 nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm 69db35d92fa82bccbd2023a316e6a9c9b7bdb68f1d9eddb7637f71979d022619 nginx-all-modules-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm 3b0073666d96b7699491be25e37ada5e61fb5fcffdb5605bc6c757d2f22098de nginx-all-modules-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm 7fb26e744e26ed89e749ac1a22dbf72e28fa553724839a76dfcbceb3ed840d90 nginx-filesystem-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm 51ffdebca045cd896d1166a62b73ccec82c034bf133f6fb3ffbeb10719924991 nginx-filesystem-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm 43fa77fc74095e53b63439cb405f6a8a9617913fa085beacb4d740d4fe316c37 nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm f0f34567660426431b24e1827fa589e67eb2eb5fee8f4a3b1782d2aee2952f92 nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm 62c9304c6402e163c347c982f7c436e820c2bdf154e1ccff1909468c8af5af4e nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm 564a5d264140286c451f5014d232d1a87791c69151d3e874e404a442a5435765 nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm 805947cc2c134e3b666b29c4c9a4caaf9292e0aec3954a48c029ef227ea6b575 nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm 0519ea5c0c710d63fc77cdf54b038c53b05be69218ae71fb70a7663c2839f000 nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm a9f06a709a8281dad79ff9ba795253ad53147cc0ab3836cc51b949e839725ba9 nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm 57354dd995efa189edff9bbe576bac7070c408661ee0c62a3de77b6659874f06 nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm d08f2d0440651ce84d6f4a4ce5d5a778bd91e7e8d2986f7cb175febaf082b703 nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm b376e2a5ba009361cf77aaa15699b03b068a0fd1feb4cefdaee2f8f15632940b nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm 10d2571b634b6ab83a98dae04691b3099dacae2e3bf13e80822b2c9d1e596931 nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm d5b8f60a7ceb869b906e2d5cabf4e86735444a5e1d74ebd79c3621d82dffa294 nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm 69db35d92fa82bccbd2023a316e6a9c9b7bdb68f1d9eddb7637f71979d022619 nginx-all-modules-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm 3b0073666d96b7699491be25e37ada5e61fb5fcffdb5605bc6c757d2f22098de nginx-all-modules-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm 7fb26e744e26ed89e749ac1a22dbf72e28fa553724839a76dfcbceb3ed840d90 nginx-filesystem-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm 51ffdebca045cd896d1166a62b73ccec82c034bf133f6fb3ffbeb10719924991 nginx-filesystem-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm 43fa77fc74095e53b63439cb405f6a8a9617913fa085beacb4d740d4fe316c37 nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm f0f34567660426431b24e1827fa589e67eb2eb5fee8f4a3b1782d2aee2952f92 nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm 62c9304c6402e163c347c982f7c436e820c2bdf154e1ccff1909468c8af5af4e nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm 564a5d264140286c451f5014d232d1a87791c69151d3e874e404a442a5435765 nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm 805947cc2c134e3b666b29c4c9a4caaf9292e0aec3954a48c029ef227ea6b575 nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm 0519ea5c0c710d63fc77cdf54b038c53b05be69218ae71fb70a7663c2839f000 nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm a9f06a709a8281dad79ff9ba795253ad53147cc0ab3836cc51b949e839725ba9 nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm 57354dd995efa189edff9bbe576bac7070c408661ee0c62a3de77b6659874f06 nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm d08f2d0440651ce84d6f4a4ce5d5a778bd91e7e8d2986f7cb175febaf082b703 nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm b376e2a5ba009361cf77aaa15699b03b068a0fd1feb4cefdaee2f8f15632940b nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm 10d2571b634b6ab83a98dae04691b3099dacae2e3bf13e80822b2c9d1e596931 RLSA-2022:5813 Moderate: vim security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for vim is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:5813 Rocky Linux 8 vim-common-8.0.1763-19.el8_6.4.aarch64.rpm 777cad31f268d5c06298ceff7d4cae4f0986f83317f745abb40aff0a6b28c0b9 vim-enhanced-8.0.1763-19.el8_6.4.aarch64.rpm a564678cc0ff9ec5e8b7382aeac1979f859bdc65c91d86eb02d1a530fe61ed3a vim-filesystem-8.0.1763-19.el8_6.4.noarch.rpm 37b57ef90a9d794c1f1ef30ca31a1a26a8651d05b752f582dc91f3112a8fb124 vim-X11-8.0.1763-19.el8_6.4.aarch64.rpm 1614513445c6fcd58351fe174afd47daa45e2d16abc8a2f18a8fee5f5bc71dac RLSA-2022:4799 Important: rsyslog security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for rsyslog is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:4799 Rocky Linux 8 rsyslog-8.2102.0-7.el8_6.1.aarch64.rpm f0d77fb2f471d87aa4d67749eb56d3ce6067ce8c9450ae6293e6e5cb69071f27 rsyslog-crypto-8.2102.0-7.el8_6.1.aarch64.rpm dae4c824719b8c3da8b90c9dc86fe73193125674bdbbf72e782e9245781a9e62 rsyslog-doc-8.2102.0-7.el8_6.1.noarch.rpm f9dafefb3d37a6de75ed495ac4674add44c708bd07b0e254add7dfeddd11d132 rsyslog-elasticsearch-8.2102.0-7.el8_6.1.aarch64.rpm 0da257418ce531dc66707e457795502b08447c162048ca3c9349cf09b4d8d47c rsyslog-gnutls-8.2102.0-7.el8_6.1.aarch64.rpm f3c8bad613acae7d1e612b8ea89fb6a7a6bc82aaca3002c58cd99d91e6220d8f rsyslog-gssapi-8.2102.0-7.el8_6.1.aarch64.rpm 2aaf09f2ba8f36361cc034d14d9d99dc50dfd664401f2939ea1d9ff2242563dd rsyslog-kafka-8.2102.0-7.el8_6.1.aarch64.rpm d42370077f467ba2ac009dfa6ecc9be066ead113fc981bfbb466055407b2b9d9 rsyslog-mmaudit-8.2102.0-7.el8_6.1.aarch64.rpm ee14fc3888c6deebdcc8f139dfbb6d7a0de899e48ae91ca5b42c3f92f7b75f3b rsyslog-mmfields-8.2102.0-7.el8_6.1.aarch64.rpm 4a7e57840dff7acdef108106de43d91e1c3130687f1fb0e356fd03ffa24230ee rsyslog-mmjsonparse-8.2102.0-7.el8_6.1.aarch64.rpm dfd3a8e7225f0bb7fff34289e3fa7addde029dfcb7ef8a8ee5bd8d7bd3619717 rsyslog-mmkubernetes-8.2102.0-7.el8_6.1.aarch64.rpm 99aab2289fc437eb3c29f4189cccbcff8fdac1453d255ad4cbe86995c57a333e rsyslog-mmnormalize-8.2102.0-7.el8_6.1.aarch64.rpm 192c0568d006b8f87db733976ce16eabd927ee0f586293ed9f27251297875e85 rsyslog-mmsnmptrapd-8.2102.0-7.el8_6.1.aarch64.rpm 286fd763472f678c03c4d3b1669d201b0b4075c12ec5878d339234407cfafa07 rsyslog-mysql-8.2102.0-7.el8_6.1.aarch64.rpm 08132f249dd6f283ec906f32f9811a4a7769df662d3b9637062e284a0a222fc5 rsyslog-omamqp1-8.2102.0-7.el8_6.1.aarch64.rpm b297458cfa348daeba87e6d7448502b2f17df48ce340c5233b282f46b095af91 rsyslog-openssl-8.2102.0-7.el8_6.1.aarch64.rpm 636c81018b412963cf15d816233921c814b7ff5b572a084c3d3683b65b45ca5b rsyslog-pgsql-8.2102.0-7.el8_6.1.aarch64.rpm 4b65730164858f57fbb61d8ff0cbe211a80f557568507f161f4eace68b0c5a82 rsyslog-relp-8.2102.0-7.el8_6.1.aarch64.rpm 90df560aadbe31bb3beb9ae72d26ca8b8c136939e3af0f951ad6480778706754 rsyslog-snmp-8.2102.0-7.el8_6.1.aarch64.rpm 01441f3fe14e7366f35b5e8a28e5b48e4d8f709b79f03b1f8d825b0ff7520899 rsyslog-udpspoof-8.2102.0-7.el8_6.1.aarch64.rpm d360c14a652471d5fa88173fb2badd3b85f7ece54487ddafd598fcfb20a79de9 RLSA-2022:2200 Important: .NET 5.0 security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for .NET 5.0 is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:2200 Rocky Linux 8 aspnetcore-runtime-6.0-6.0.5-1.el8_6.aarch64.rpm 3503bb1ca83dc90efd08931e4736970b89c3ede88b1e10736578928408eabeb2 aspnetcore-targeting-pack-6.0-6.0.5-1.el8_6.aarch64.rpm 958369b29c0d1f18f27ada390d59b302d4241c472a151fb59bc1e8be5d2df8c7 dotnet-apphost-pack-6.0-6.0.5-1.el8_6.aarch64.rpm cd4aeca423bc9e3f6cfe2356ce15814e29cf742ba3536f2e6daa2c7df53303cb dotnet-host-6.0.5-1.el8_6.aarch64.rpm 9c3b95a69fdc2c9d0e7597cfe703ee8d4c5632e0b40c15d71d49ef603638d8cf dotnet-hostfxr-6.0-6.0.5-1.el8_6.aarch64.rpm 5659c5ab03612593558cdde5988ed06eb3f876a9ad5b6088d5ea3cfe6fabd5d0 dotnet-runtime-6.0-6.0.5-1.el8_6.aarch64.rpm 64629831286319becefbb1fefaef48578eef039fcba72ebbeeed3bcb5f205a03 dotnet-sdk-6.0-6.0.105-1.el8_6.aarch64.rpm c36cde00bc2a086d00649aa252b6e725311239e5a87861072a8d359b5d1b2a57 dotnet-targeting-pack-6.0-6.0.5-1.el8_6.aarch64.rpm 70746c225049a803a9f18aae264e24ec3a1111ea740ee7432ecec4eddc484537 dotnet-templates-6.0-6.0.105-1.el8_6.aarch64.rpm ec5fad31f178b4c1e4a018424eae4abf576e2c30e33e88079bae6193a161ca55 netstandard-targeting-pack-2.1-6.0.105-1.el8_6.aarch64.rpm 11fb8269256afb3ca87a47840d2f09660ab123bd09b630e619ab177e852a6ca7 aspnetcore-runtime-6.0-6.0.5-1.el8_6.aarch64.rpm 3503bb1ca83dc90efd08931e4736970b89c3ede88b1e10736578928408eabeb2 aspnetcore-targeting-pack-6.0-6.0.5-1.el8_6.aarch64.rpm 958369b29c0d1f18f27ada390d59b302d4241c472a151fb59bc1e8be5d2df8c7 dotnet-apphost-pack-6.0-6.0.5-1.el8_6.aarch64.rpm cd4aeca423bc9e3f6cfe2356ce15814e29cf742ba3536f2e6daa2c7df53303cb dotnet-host-6.0.5-1.el8_6.aarch64.rpm 9c3b95a69fdc2c9d0e7597cfe703ee8d4c5632e0b40c15d71d49ef603638d8cf dotnet-hostfxr-6.0-6.0.5-1.el8_6.aarch64.rpm 5659c5ab03612593558cdde5988ed06eb3f876a9ad5b6088d5ea3cfe6fabd5d0 dotnet-runtime-6.0-6.0.5-1.el8_6.aarch64.rpm 64629831286319becefbb1fefaef48578eef039fcba72ebbeeed3bcb5f205a03 dotnet-sdk-6.0-6.0.105-1.el8_6.aarch64.rpm c36cde00bc2a086d00649aa252b6e725311239e5a87861072a8d359b5d1b2a57 dotnet-targeting-pack-6.0-6.0.5-1.el8_6.aarch64.rpm 70746c225049a803a9f18aae264e24ec3a1111ea740ee7432ecec4eddc484537 dotnet-templates-6.0-6.0.105-1.el8_6.aarch64.rpm ec5fad31f178b4c1e4a018424eae4abf576e2c30e33e88079bae6193a161ca55 netstandard-targeting-pack-2.1-6.0.105-1.el8_6.aarch64.rpm 11fb8269256afb3ca87a47840d2f09660ab123bd09b630e619ab177e852a6ca7 aspnetcore-runtime-6.0-6.0.5-1.el8_6.aarch64.rpm 3503bb1ca83dc90efd08931e4736970b89c3ede88b1e10736578928408eabeb2 aspnetcore-targeting-pack-6.0-6.0.5-1.el8_6.aarch64.rpm 958369b29c0d1f18f27ada390d59b302d4241c472a151fb59bc1e8be5d2df8c7 dotnet-apphost-pack-6.0-6.0.5-1.el8_6.aarch64.rpm cd4aeca423bc9e3f6cfe2356ce15814e29cf742ba3536f2e6daa2c7df53303cb dotnet-host-6.0.5-1.el8_6.aarch64.rpm 9c3b95a69fdc2c9d0e7597cfe703ee8d4c5632e0b40c15d71d49ef603638d8cf dotnet-hostfxr-6.0-6.0.5-1.el8_6.aarch64.rpm 5659c5ab03612593558cdde5988ed06eb3f876a9ad5b6088d5ea3cfe6fabd5d0 dotnet-runtime-6.0-6.0.5-1.el8_6.aarch64.rpm 64629831286319becefbb1fefaef48578eef039fcba72ebbeeed3bcb5f205a03 dotnet-sdk-6.0-6.0.105-1.el8_6.aarch64.rpm c36cde00bc2a086d00649aa252b6e725311239e5a87861072a8d359b5d1b2a57 dotnet-targeting-pack-6.0-6.0.5-1.el8_6.aarch64.rpm 70746c225049a803a9f18aae264e24ec3a1111ea740ee7432ecec4eddc484537 dotnet-templates-6.0-6.0.105-1.el8_6.aarch64.rpm ec5fad31f178b4c1e4a018424eae4abf576e2c30e33e88079bae6193a161ca55 netstandard-targeting-pack-2.1-6.0.105-1.el8_6.aarch64.rpm 11fb8269256afb3ca87a47840d2f09660ab123bd09b630e619ab177e852a6ca7 RLSA-2022:1950 Moderate: dovecot security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for dovecot is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1950 Rocky Linux 8 dovecot-2.3.16-2.el8.aarch64.rpm b2425bafbefddca26eda8b564fd5631af95d765b154734f3bfa1823f487b5d29 dovecot-mysql-2.3.16-2.el8.aarch64.rpm cff145fa3506b86fa76df7ddf7d9495d8595bc6ae0c67c830be1ca0143a243d6 dovecot-pgsql-2.3.16-2.el8.aarch64.rpm 677a20067045a623c16672ee27546d5cce326cfeb5c904fb15a525904b47dde9 dovecot-pigeonhole-2.3.16-2.el8.aarch64.rpm 0ef5a914e6f49f2cd63662ecb7fa6e12c12031b6310c0794558e06cec522a19c RLBA-2021:3083 gcc-toolset-10-valgrind bug fix and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update for gcc-toolset-10-valgrind is now available for Rocky Linux 8. For more information visit https://errata.rockylinux.org/RLBA-2021:3083 Rocky Linux 8 gcc-toolset-10-valgrind-3.16.0-6.el8_4.aarch64.rpm b6df5202f25d365bd9b53a2cddeedd33521c93e65fe0d44de6288cb17e1b7e08 gcc-toolset-10-valgrind-devel-3.16.0-6.el8_4.aarch64.rpm 36427babf02e41f165a32da3ce173d9268bbbd2e15e8bc67297a443bef635462 RLSA-2022:1730 Important: thunderbird security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for thunderbird is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1730 Rocky Linux 8 thunderbird-91.9.0-3.el8_5.aarch64.rpm d97d1066c79c7728ce0c2800706ca695f77ec7f202c06c353f7cbeaea5c7b7cc RLSA-2021:1979 Important: squid:4 security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for the squid:4 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:1979 Rocky Linux 8 libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm 038b69730b54bab34f4621349a270e8cb4be10f54045d4e3498f299169c1e08f libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.aarch64.rpm 021e5ee6bb8d89b2affde760d176f56ee1e45b5ab0e5e7bd560acbe8fa770b10 RLSA-2021:2363 Important: gupnp security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for gupnp is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:2363 Rocky Linux 8 gupnp-1.0.6-2.el8_4.aarch64.rpm bc0c3473e05e6b45cd5c31cd6e29f61b94a0df669cd3025d229c85a2646a44b1 RLSA-2022:4872 Important: firefox security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for firefox is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:4872 Rocky Linux 8 firefox-91.10.0-1.el8_6.aarch64.rpm 2a6168e39ca7d0f8f66fb364ad87276790690b203165a6884980bf4ae366992b thunderbird-91.10.0-1.el8_6.aarch64.rpm 70f3323a3a6fef53d4f1eef1f597551f11c63fe7be0306367998856268624687 firefox-91.10.0-1.el8_6.aarch64.rpm 2a6168e39ca7d0f8f66fb364ad87276790690b203165a6884980bf4ae366992b thunderbird-91.10.0-1.el8_6.aarch64.rpm 70f3323a3a6fef53d4f1eef1f597551f11c63fe7be0306367998856268624687 RLSA-2022:1777 Moderate: webkit2gtk3 security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for webkit2gtk3 is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1777 Rocky Linux 8 webkit2gtk3-2.34.6-1.el8.aarch64.rpm b41ff73c2d7694c9c459e25d8b83a338a19508cef12bd22b3ca84d9561952529 webkit2gtk3-devel-2.34.6-1.el8.aarch64.rpm 4e5819df2bcf263929738b2b86d78a62c2a9568ab8acca845062ac304703c3b2 webkit2gtk3-jsc-2.34.6-1.el8.aarch64.rpm df04cacf246c561f9afc6e0b390a6a8748dfccb934558ba686f835f8d6f25d52 webkit2gtk3-jsc-devel-2.34.6-1.el8.aarch64.rpm c5642d0af1a23fe6d4a8840385238b53df9ae1a2f63e554e4a007e485e38f634 RLSA-2021:3623 Important: nodejs:12 security and bug fix update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for the nodejs:12 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:3623 Rocky Linux 8 nodejs-12.22.5-1.module+el8.4.0+647+e905fa21.aarch64.rpm 2805f2c7de5dcc7ea71580fe21373584c4b66e353858c208254699faddb7e06e nodejs-devel-12.22.5-1.module+el8.4.0+647+e905fa21.aarch64.rpm c255a92076b035812839409e1c618f26b28eeb7e8e39101443ead1a33400903a nodejs-docs-12.22.5-1.module+el8.4.0+647+e905fa21.noarch.rpm 8bb738d9c8410f662b3c2f32aed10130e9f6887e873754199bb435970d32470f nodejs-full-i18n-12.22.5-1.module+el8.4.0+647+e905fa21.aarch64.rpm 65268b2f87cec85abdd066e83df8b7c18b17eb2be26ab3b9d4c721d391b0fdd9 nodejs-packaging-23-3.module+el8.5.0+733+de4fee6c.noarch.rpm de384459a7bf627a23b2dc78c14c6b94ae7402e3185305950a7a1e86cb1e823a npm-6.14.14-1.12.22.5.1.module+el8.4.0+647+e905fa21.aarch64.rpm 91cbde772846c94e271385e0175a8930a9102980a327a64abc47b9ea05455f4a nodejs-12.22.5-1.module+el8.4.0+647+e905fa21.aarch64.rpm 2805f2c7de5dcc7ea71580fe21373584c4b66e353858c208254699faddb7e06e nodejs-devel-12.22.5-1.module+el8.4.0+647+e905fa21.aarch64.rpm c255a92076b035812839409e1c618f26b28eeb7e8e39101443ead1a33400903a nodejs-docs-12.22.5-1.module+el8.4.0+647+e905fa21.noarch.rpm 8bb738d9c8410f662b3c2f32aed10130e9f6887e873754199bb435970d32470f nodejs-full-i18n-12.22.5-1.module+el8.4.0+647+e905fa21.aarch64.rpm 65268b2f87cec85abdd066e83df8b7c18b17eb2be26ab3b9d4c721d391b0fdd9 nodejs-packaging-23-3.module+el8.5.0+733+de4fee6c.noarch.rpm de384459a7bf627a23b2dc78c14c6b94ae7402e3185305950a7a1e86cb1e823a npm-6.14.14-1.12.22.5.1.module+el8.4.0+647+e905fa21.aarch64.rpm 91cbde772846c94e271385e0175a8930a9102980a327a64abc47b9ea05455f4a nodejs-12.22.5-1.module+el8.4.0+647+e905fa21.aarch64.rpm 2805f2c7de5dcc7ea71580fe21373584c4b66e353858c208254699faddb7e06e nodejs-devel-12.22.5-1.module+el8.4.0+647+e905fa21.aarch64.rpm c255a92076b035812839409e1c618f26b28eeb7e8e39101443ead1a33400903a nodejs-docs-12.22.5-1.module+el8.4.0+647+e905fa21.noarch.rpm 8bb738d9c8410f662b3c2f32aed10130e9f6887e873754199bb435970d32470f nodejs-full-i18n-12.22.5-1.module+el8.4.0+647+e905fa21.aarch64.rpm 65268b2f87cec85abdd066e83df8b7c18b17eb2be26ab3b9d4c721d391b0fdd9 nodejs-packaging-23-3.module+el8.5.0+733+de4fee6c.noarch.rpm de384459a7bf627a23b2dc78c14c6b94ae7402e3185305950a7a1e86cb1e823a npm-6.14.14-1.12.22.5.1.module+el8.4.0+647+e905fa21.aarch64.rpm 91cbde772846c94e271385e0175a8930a9102980a327a64abc47b9ea05455f4a RLSA-2022:441 Important: aide security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for aide is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:441 Rocky Linux 8 aide-0.16-14.el8_5.1.aarch64.rpm a32c14e2ab712fb56883123a64e80081312bcd1a5f6a9d3f38f6fdcde658d43b RLBA-2021:3594 libdb bug fix and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update for libdb is now available for Rocky Linux 8. For more information visit https://errata.rockylinux.org/RLBA-2021:3594 Rocky Linux 8 libdb-devel-5.3.28-42.el8_4.aarch64.rpm 4b08c5f55c7114c27dcbd511ad3313fc7a4227cead74330c4c88a48cbe7eadfe RLSA-2021:3590 Moderate: mysql:8.0 security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for the mysql:8.0 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:3590 Rocky Linux 8 mecab-0.996-1.module+el8.3.0+242+87d3366a.9.aarch64.rpm 3e76731e94b879fa4ce83b8e3d33aad9a321b9e40e8f87483e9b165a8c178a54 mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.aarch64.rpm e7df893453d68958b2697ccbcb1752533f83e53f24a3d7126ed452d0bf645c6a mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.aarch64.rpm 0ac811884f2cc859f907f1c6272ee524ba31b137b1c05848e2ec91c2f65aefbf mysql-8.0.26-1.module+el8.4.0+652+6de068a7.aarch64.rpm e3f7c4ee221496dab277e2b0c40b824cea3c3cea6fdd0ad623d3172b672c47fc mysql-common-8.0.26-1.module+el8.4.0+652+6de068a7.aarch64.rpm b054b5fd6cdb29a763b2fbd83f16d25ef7444ab0d002381ac32418507a1a91cc mysql-devel-8.0.26-1.module+el8.4.0+652+6de068a7.aarch64.rpm 660854c1f382df32df69d587a4cb2a1796c8b9cf5cdea947b7c1d4b09d8241ec mysql-errmsg-8.0.26-1.module+el8.4.0+652+6de068a7.aarch64.rpm 8a7ce539692715851e0de3e593527947fcec5bf6ee4b8cfd00e33b15a88ae2bd mysql-libs-8.0.26-1.module+el8.4.0+652+6de068a7.aarch64.rpm 1887dca37fa6047dcb12a5108142a709ac1e0c239bca1ae6a8b8ba2bbd89eb55 mysql-server-8.0.26-1.module+el8.4.0+652+6de068a7.aarch64.rpm 0a14092118c28399101ef87b3f8d71b61c116fceb5a95890870b2b66715299f9 mysql-test-8.0.26-1.module+el8.4.0+652+6de068a7.aarch64.rpm a3ae8f263d9b3cd61695dd6f635bc5e4f2530adba8c9fc501b449c893f72bc11 RLSA-2022:4769 Critical: thunderbird security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Critical An update for thunderbird is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:4769 Rocky Linux 8 firefox-91.9.1-1.el8_6.aarch64.rpm c06d0fe84b0da3e3f8e994c6f5c7b617901212dea577ea3b0e4300475fc70dad thunderbird-91.9.1-1.el8_6.aarch64.rpm e8ab5796d34032c03feb8b58a54679ad447d4cef16d7a0333ad2a4b56c464700 firefox-91.9.1-1.el8_6.aarch64.rpm c06d0fe84b0da3e3f8e994c6f5c7b617901212dea577ea3b0e4300475fc70dad thunderbird-91.9.1-1.el8_6.aarch64.rpm e8ab5796d34032c03feb8b58a54679ad447d4cef16d7a0333ad2a4b56c464700 RLSA-2022:5046 Moderate: .NET 6.0 security and bugfix update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for .NET 6.0 is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:5046 Rocky Linux 8 aspnetcore-runtime-6.0-6.0.6-1.el8_6.aarch64.rpm 232efa792f2cf65e0cc26b205635162adb5add94f41b6852ed29ca15e66e92d5 aspnetcore-targeting-pack-6.0-6.0.6-1.el8_6.aarch64.rpm 47489eb005659fa79678bb1da53496d49894cc5831038c3cc0e4c24ff401bd78 dotnet-apphost-pack-6.0-6.0.6-1.el8_6.aarch64.rpm 320917c1fe741c3a7ee0ccbcd0b155f3387827ad90cc8eb40c9e53120bca6893 dotnet-host-6.0.6-1.el8_6.aarch64.rpm 0e88aed576594bfbb71ab472ee1fc70a968f287bdd3710887491a81e4eb88ddc dotnet-hostfxr-6.0-6.0.6-1.el8_6.aarch64.rpm 7dbfbfc5e738952114eb43064a47019a74dc57fe96b879de0733bf6732e82928 dotnet-runtime-6.0-6.0.6-1.el8_6.aarch64.rpm 0c5c724ed10dc02002daa7c82ad2d6c164a0a537fd62f6a17db73ce8af9500f6 dotnet-sdk-6.0-6.0.106-1.el8_6.aarch64.rpm b539f8865dd9f169734d4ed0a87f7449dd62f6092aa2078140424ba9719fab8e dotnet-targeting-pack-6.0-6.0.6-1.el8_6.aarch64.rpm f4e4d5d09dff773bea158564982aa2611aa4c34579b162fa1d7465d0a24eb7b6 dotnet-templates-6.0-6.0.106-1.el8_6.aarch64.rpm 5a61a29c07e60a03b5d5f5f7cb5bbb6d871310af8824c2c41d8ee802902c40eb netstandard-targeting-pack-2.1-6.0.106-1.el8_6.aarch64.rpm e77de27684b6d69097ecb685396b40e74d9b89b6e49b2d4b2be27bbfe29f5aad aspnetcore-runtime-6.0-6.0.6-1.el8_6.aarch64.rpm 232efa792f2cf65e0cc26b205635162adb5add94f41b6852ed29ca15e66e92d5 aspnetcore-targeting-pack-6.0-6.0.6-1.el8_6.aarch64.rpm 47489eb005659fa79678bb1da53496d49894cc5831038c3cc0e4c24ff401bd78 dotnet-apphost-pack-6.0-6.0.6-1.el8_6.aarch64.rpm 320917c1fe741c3a7ee0ccbcd0b155f3387827ad90cc8eb40c9e53120bca6893 dotnet-host-6.0.6-1.el8_6.aarch64.rpm 0e88aed576594bfbb71ab472ee1fc70a968f287bdd3710887491a81e4eb88ddc dotnet-hostfxr-6.0-6.0.6-1.el8_6.aarch64.rpm 7dbfbfc5e738952114eb43064a47019a74dc57fe96b879de0733bf6732e82928 dotnet-runtime-6.0-6.0.6-1.el8_6.aarch64.rpm 0c5c724ed10dc02002daa7c82ad2d6c164a0a537fd62f6a17db73ce8af9500f6 dotnet-sdk-6.0-6.0.106-1.el8_6.aarch64.rpm b539f8865dd9f169734d4ed0a87f7449dd62f6092aa2078140424ba9719fab8e dotnet-targeting-pack-6.0-6.0.6-1.el8_6.aarch64.rpm f4e4d5d09dff773bea158564982aa2611aa4c34579b162fa1d7465d0a24eb7b6 dotnet-templates-6.0-6.0.106-1.el8_6.aarch64.rpm 5a61a29c07e60a03b5d5f5f7cb5bbb6d871310af8824c2c41d8ee802902c40eb netstandard-targeting-pack-2.1-6.0.106-1.el8_6.aarch64.rpm e77de27684b6d69097ecb685396b40e74d9b89b6e49b2d4b2be27bbfe29f5aad RLSA-2022:5163 Low: httpd:2.4 security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update for the httpd:2.4 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:5163 Rocky Linux 8 httpd-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm a0024a9bd020ff6c30b3b7647ffabf61d64ee1ceacda6ec0be0199c77434ad52 httpd-devel-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm 69627be09b9ffec589c9f0e222872592063786544edc11e20bc4deb8ed52631f httpd-filesystem-2.4.37-47.module+el8.6.0+985+b8ff6398.2.noarch.rpm 4a3e8996c1ac45467499555f8626731f59228c0efbbb36003d9a364a8b7d082e httpd-manual-2.4.37-47.module+el8.6.0+985+b8ff6398.2.noarch.rpm 7a062f3fe19623f5189be392bf870275bd9e7de0b082441ac60e925aef7aa9b2 httpd-tools-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm 5f497133306830e9d3352ccc784296efde08f469065cc7119186ae586833c62c mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.aarch64.rpm 9e61f8a994beaff9e74f4d92034eadaaefdb3eddc6f4916a41f4158ed613d6bf mod_ldap-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm 9cd3b94b30ad51853ac0cc4deca12da0dec95c568636b8ae00c0de6866f284e5 mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.aarch64.rpm 6e6d7c230679ac5d122d621fdbb8e2d3594fcaec94b39a33613d865200568fcc mod_proxy_html-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm 82e34eb3d39ce4154b4bfeb476c1634bf0904497eb20129a928cb66ca08608ac mod_session-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm ae84a37ce86626ff4d45f5396df58e2996657fd20ba52ce0af623828ef95dbda mod_ssl-2.4.37-47.module+el8.6.0+985+b8ff6398.2.aarch64.rpm a84794d997d234bb9875cef4215c29e4805cc7aa92f49551d0a876a20614b21b RLSA-2022:1808 Moderate: aspell security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for aspell is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1808 Rocky Linux 8 aspell-0.60.6.1-22.el8.aarch64.rpm 853dce875186fe2f7df29a39925f0a6b4dd9f594dc8e237e7bae4c415d5ae3b2 RLSA-2021:4903 Critical: nss security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Critical An update for nss is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:4903 Rocky Linux 8 nss-3.67.0-7.el8_5.aarch64.rpm c63007da31be9c9747d3707d7280258a1074e0fcfa691853051cd6412eb8e786 nss-devel-3.67.0-7.el8_5.aarch64.rpm 196501919f7c5dc8865066e7a340439c36b183dc1d219406cbc83170e97a1a68 nss-softokn-3.67.0-7.el8_5.aarch64.rpm 841fa9e2a102997136050e3ed6a548f9926b6fd635f4578cfb61191fc31c6893 nss-softokn-devel-3.67.0-7.el8_5.aarch64.rpm 887a3239ec32c3bb898bd24dac41f44a7a5b9a09f611c3d912fbf37f529d32d0 nss-softokn-freebl-3.67.0-7.el8_5.aarch64.rpm 34f8835c21eec11f1b2713a1c81a35485964009d3f58038ed9fd1a151f711359 nss-softokn-freebl-devel-3.67.0-7.el8_5.aarch64.rpm 33496a3f5fa78eef213bb556f4c1dd1daa9e850a7d4bc4d95c19517ae0ed320b nss-sysinit-3.67.0-7.el8_5.aarch64.rpm 9ee1c8ebe1b678283d436dd3ae096a5a7c63067aee3bc0cb4c2613842d69f13f nss-tools-3.67.0-7.el8_5.aarch64.rpm af1c7d5b63c40c4ab7ae0f68be7ed0f98c7dcb7f0561e512422ac90ddb3823d8 nss-util-3.67.0-7.el8_5.aarch64.rpm cf0358d8006853e4e0ec75ff39defbfa31d78e3428af0e83aa627b59e57438f9 nss-util-devel-3.67.0-7.el8_5.aarch64.rpm 626f75c8913f0cbc4b17170c3eac96a5de4c9dbb6b52000979c38ed925e4306c RLSA-2021:2583 Moderate: python38:3.8 and python38-devel:3.8 security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for the python38:3.8 and python38-devel:3.8 modules is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:2583 Rocky Linux 8 python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.aarch64.rpm 8a53465041edb59504f20c0d1bc8b16c12051e9868077be7ae21aa166d69e5a1 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.aarch64.rpm 14d409a728502fcee13ab3106b8cbda2d7eceffef3a19c46b6137a8952c18f09 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm 6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.aarch64.rpm 24e1679463f6e6e0f13332a4886a91412e34e3aa3f6730db897961616e7094d7 python38-mod_wsgi-4.6.8-3.module+el8.4.0+570+c2eaf144.aarch64.rpm 0d60b59274c7597b37389022e59d3d8d14c7562be8dcf07947fa913056922dba python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm 21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm 5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1 python38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm 693b174f895dd685857753ad75f07f4fdb95e82a88e4c3f8618392b5d4b81b5e python39-chardet-3.0.4-19.module+el8.4.0+574+843c4898.noarch.rpm 9a21825b6b2a472ec12024574f4d39e2b516dec4a8bf1514572f05bed2915afd python39-ply-3.11-10.module+el8.4.0+574+843c4898.noarch.rpm 964120ccea403bb0c770c16065565fb671e85f9c8f3d5807544259f183ac23ac python39-pysocks-1.7.1-4.module+el8.4.0+574+843c4898.noarch.rpm 6d48f8fb19e1cce6f8d808cd72005c6c87cf0569a296bd22c509b0c27f020660 RLSA-2022:5467 Important: php:7.4 security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for the php:7.4 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:5467 Rocky Linux 8 apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe apcu-panel-5.1.20-1.module+el8.6.0+790+fc63e43f.noarch.rpm 0e9d74cc0eba28463f32c2fcd7da6b7959146b32f959df3c9c876cfe4b743680 libzip-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm 119dd22e4b2a6de6821ed481f034896ba067e5c15402d8965dc5762cb8b12225 libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.aarch64.rpm a05196d406c6018fdfbe6f70e2c016ddd81305ed02ec9966922cc91a01042fba libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm 1ad9ad4f2de9ae0b93861653f31ca8077b8c0a09d536849ea6a822af1c14ea2e libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.aarch64.rpm f157c5b6ed5f6b65b73a42bb7cb94e92cfda9ba190ea707addd1299220f60547 libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm bcb51e304c61416fb526acfaa664fbc96c3fb1ab6c38894a8f89536dff4a580c libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.aarch64.rpm 983d3df277f937fed5b4afecbfa329f8e8d127f28f279a061dfedd80c7b5cbaf php-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm e4d22c2e59d26d169d64e4e234dd04cd25ee1c471d69ac6ece30b274b5ccf3b8 php-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm b32108cfc457844e72e91e2d9a3b559b83e5800f0d0e1c18deef9c9c909432f8 php-bcmath-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 83871167bc8b1d50bef7ea8fe9c2540810e7ee437f8a01e28517aeea3056b9cf php-bcmath-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 7c0a333a27dbe573c37635916e95e78e52244439b21615df3316b1b5e91dd766 php-cli-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 4bb981cd68c54878a0babc62c863654862c2c22bf60b5628d805454fe221af45 php-cli-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm ea2e4e6cd94a3fa8f2d3cf6849e263d7a80064886cdcf5bbcbe480ee4e939972 php-common-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 90880ed6a73cd97a7167b8906224aec5f23c5b989878dd9fdd58d0b2797fc457 php-common-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 4f797dff105d9add215f5a8046ac1eb5f22e03cd43f7183d779de4e60244a628 php-dba-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 964a6aeb81eec978c6a76d5502095635faf6198e7579fc986959cc83d52dd16f php-dba-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 664966aceba959d6e7120c077cf828db99ab03d2749e2b5dfd01b92071371364 php-dbg-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 1e4362962d7afdd786646e4df6ac9d77fc1b4d0a112497363c537fd420ee1167 php-dbg-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 9321079ecbaf96a0046419c5bacaae2b86eee5b120fc7594b8ea9d7e52aef656 php-devel-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 3dbeffcaaba4d18ce8ccf4deeb1fe7b5561a98ce1ab72f4488b0f23d75d59027 php-devel-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 7ad8f04e6b06d10c1b2767bcc0fc4e5863a2e0dc4df20f6301f4e869d74330ba php-embedded-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 5bafdeffa3cdb1470131ff8590141187f8458ec1a413a3d7d4a5da88f1b0c7e3 php-embedded-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 79393379b8d95d5bf64251910d0177f2f496dfcb2ee7dd3e83a90f18a85c9f91 php-enchant-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 98a36672cfe83321cd2e942109b6d8ca9c88040512f55ed183ae478af5b18dff php-enchant-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 8f1cb83760905700f5b07157a150ba28e9b492723ba2b4fb58bf36321aa8a914 php-ffi-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm e66505a1698df742778c9b1bd2f69d9943b809eee1a3e151411bbe4471d115d9 php-ffi-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm e7e3e665e1b3ab4e962822fcc56ffbe96912ce15273e3a41a104bfd280d832a3 php-fpm-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 6148df6aa580e0d15e5b2987469f741c42674e3555e4d93d286d719b7247809a php-fpm-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm eac9ebc6939c775996afb1f9e0640327ac1aad312b9a1290938871f0c3591fb1 php-gd-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm f295e9d38adbbc0b437757033d5bf3ad5e6313ac3cc217c04d321d218ecf7e4e php-gd-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm bb083085f8b74c439f1f649ca2c2b2f1bcdcd5ea18741a16286a84ca3eb6ab71 php-gmp-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 0fdfb17d5429a0bfe6f4d22f388297503ac4bd55916878cb1043b788977e6481 php-gmp-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm bb048c178bfa16a2cb5237b9cf1376ed239134a97738787b9e0e8dc973ca04e3 php-intl-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 74d41709fec0d643d45bd1b32217148558ce4beb72a9fe1facf66fbbbc35dc17 php-intl-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 3e2718bb403d0ef05a0f8a332a5f1291f014462072c3c2307ceee1df0c40a5cd php-json-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 2514eac8a3f5025f5935829fe26016371ca427cb1f2a90109a5c6e52b044ceb2 php-ldap-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 7e522ffe091c695b27547dd34c2751738442513166f542e1c635c2b2d7282247 php-ldap-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm b8ae7571fa926ca43b0e52fda90a34df1c31d756eedbf433ba4486cc1e9fd20e php-mbstring-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm b4438576db5fdab2976b3174d6d98113d09125e67220745522a519b30ed73660 php-mbstring-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 29dd6634a539affd78fc64b16d69fe43c1d28ccb94e46ae73f8eb35103576ffb php-mysqlnd-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm b38d9aed370004c941bc605636a384934d1b79a1f48e15da029b6d6b320de98d php-mysqlnd-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 52c7773f0715eba8521c3c0bbb9f8319b6864565b9232e7a2411af30c91d613f php-odbc-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 58864393dec035a6cda4db249127eaf85523105a9ee5ab617c5b98ba72c0f555 php-odbc-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm f7398b7d15bd863435faef984551de1156262afb291dabd6b3afdbeffd3869b7 php-opcache-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 8a9e7f25b77a6fdcac027df71f481f30426e4070bcca0cc615d83827718cc631 php-opcache-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 5ecf79cf3bccf7937830005fb11663a705b8405a82effd4bfb2e1f84c46e2a50 php-pdo-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 6538de55570a75238238ef56ea4d6248e3fb762b8a30cca186620e851bc4d060 php-pdo-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 423671c21281be257cfe28894dbaacebd8efa28abb37dfcb5f0ccc6faaacb86a php-pear-1.10.12-1.module+el8.6.0+789+2130c178.noarch.rpm c20c31a8cafb68671583a79c3a85b7a87668132557e1adb08b2ff7ce6a9c4058 php-pear-1.10.13-1.module+el8.6.0+790+fc63e43f.noarch.rpm e46b2f905e5a36adba35af3f70884467592cb7ba32cecfaee3d1192127eb04e5 php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.aarch64.rpm 6555284e0cc3139ee72c0d13b7d93abacd468c1d6d63482af54dad3b391ef98f php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.aarch64.rpm dbc9d1a4dccce66ed75a1a3aa458dddc86d92baaba8cde6de288552accb7ede2 php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.aarch64.rpm dc4260a358d6148799ef4a1ce2e761397130bc523a7efa87df528e7dbbb0056a php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.aarch64.rpm 182ea4f209bee5fc3c099f0db4b68cf95083244cd7df9fb331be559a8ca6f0ad php-pecl-rrd-2.0.1-1.module+el8.6.0+789+2130c178.aarch64.rpm 478dde3cacf29afca05fe39e26a1ce417f8ea1d477cc41ca9281adefa02bf1d1 php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.aarch64.rpm f70c1c86d7980dce552fddefdb2d1139da17ebe2b40705d25c26827eb6dee241 php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.aarch64.rpm e94bd58c3e127c2610f90110c972bc80b29bad5e5cf3b567eab07f48c0c21f69 php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.aarch64.rpm 129f337de743773a02b9051d756f200659b1adf72890187215a6a69eea834ac6 php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.aarch64.rpm f8d184b53878f20feef8135398bd27b97150acc87922eb070cd90a9b070e7fac php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.aarch64.rpm e211ce74e31de0df200fd0a71f228f576092c564bda558fe8d5c951794ac60dc php-pgsql-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 18b0cb7f469e4ecff2e7aa88618655b722160c49a58249ae77556783962a9683 php-pgsql-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm cfa87dae63d0168eee13f4e853402ca2c97f3f7c4a997bf0285fdddf4091da4b php-process-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 310b373e90fc9eb0ebd23f39c260eeb40240fafd315a0f7ca13cde73a5bf14b9 php-process-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 0b75a0306ce40b7d44f0f03ea0d8784cc9a48d449aaa61ec8ae2ebc05242336f php-snmp-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 481ee290d157fdbc42da81c636f48e43159fd77a8c701d643a03d64effeb864f php-snmp-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 12cc4fed4eccd526da1a337a3105c18f88ced646d835359fa1167cae06941c63 php-soap-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm e13133aa38c57a1492e256dd3b0da2027ce03106e8786a9019a6cbb922730648 php-soap-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm d9662b01e0938263a955cf7a9e88091840ed7aa75bad378233ca9846da3eee52 php-xml-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 09f5f5c9d5a96da9aa415ab9845edf80cc18d38e9238392f0cf79353ed839bc5 php-xml-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm c4004a86e2976c90ba93d7be71be90e283d2698b54aeb0c85d72fb645ea5d469 php-xmlrpc-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 8a72211d804ecee42834e128be80814ba472991cbf5d889a67dbd740c0d29d9e apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe apcu-panel-5.1.20-1.module+el8.6.0+790+fc63e43f.noarch.rpm 0e9d74cc0eba28463f32c2fcd7da6b7959146b32f959df3c9c876cfe4b743680 libzip-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm 119dd22e4b2a6de6821ed481f034896ba067e5c15402d8965dc5762cb8b12225 libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.aarch64.rpm a05196d406c6018fdfbe6f70e2c016ddd81305ed02ec9966922cc91a01042fba libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm 1ad9ad4f2de9ae0b93861653f31ca8077b8c0a09d536849ea6a822af1c14ea2e libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.aarch64.rpm f157c5b6ed5f6b65b73a42bb7cb94e92cfda9ba190ea707addd1299220f60547 libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.aarch64.rpm bcb51e304c61416fb526acfaa664fbc96c3fb1ab6c38894a8f89536dff4a580c libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.aarch64.rpm 983d3df277f937fed5b4afecbfa329f8e8d127f28f279a061dfedd80c7b5cbaf php-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm e4d22c2e59d26d169d64e4e234dd04cd25ee1c471d69ac6ece30b274b5ccf3b8 php-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm b32108cfc457844e72e91e2d9a3b559b83e5800f0d0e1c18deef9c9c909432f8 php-bcmath-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 83871167bc8b1d50bef7ea8fe9c2540810e7ee437f8a01e28517aeea3056b9cf php-bcmath-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 7c0a333a27dbe573c37635916e95e78e52244439b21615df3316b1b5e91dd766 php-cli-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 4bb981cd68c54878a0babc62c863654862c2c22bf60b5628d805454fe221af45 php-cli-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm ea2e4e6cd94a3fa8f2d3cf6849e263d7a80064886cdcf5bbcbe480ee4e939972 php-common-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 90880ed6a73cd97a7167b8906224aec5f23c5b989878dd9fdd58d0b2797fc457 php-common-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 4f797dff105d9add215f5a8046ac1eb5f22e03cd43f7183d779de4e60244a628 php-dba-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 964a6aeb81eec978c6a76d5502095635faf6198e7579fc986959cc83d52dd16f php-dba-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 664966aceba959d6e7120c077cf828db99ab03d2749e2b5dfd01b92071371364 php-dbg-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 1e4362962d7afdd786646e4df6ac9d77fc1b4d0a112497363c537fd420ee1167 php-dbg-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 9321079ecbaf96a0046419c5bacaae2b86eee5b120fc7594b8ea9d7e52aef656 php-devel-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 3dbeffcaaba4d18ce8ccf4deeb1fe7b5561a98ce1ab72f4488b0f23d75d59027 php-devel-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 7ad8f04e6b06d10c1b2767bcc0fc4e5863a2e0dc4df20f6301f4e869d74330ba php-embedded-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 5bafdeffa3cdb1470131ff8590141187f8458ec1a413a3d7d4a5da88f1b0c7e3 php-embedded-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 79393379b8d95d5bf64251910d0177f2f496dfcb2ee7dd3e83a90f18a85c9f91 php-enchant-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 98a36672cfe83321cd2e942109b6d8ca9c88040512f55ed183ae478af5b18dff php-enchant-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 8f1cb83760905700f5b07157a150ba28e9b492723ba2b4fb58bf36321aa8a914 php-ffi-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm e66505a1698df742778c9b1bd2f69d9943b809eee1a3e151411bbe4471d115d9 php-ffi-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm e7e3e665e1b3ab4e962822fcc56ffbe96912ce15273e3a41a104bfd280d832a3 php-fpm-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 6148df6aa580e0d15e5b2987469f741c42674e3555e4d93d286d719b7247809a php-fpm-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm eac9ebc6939c775996afb1f9e0640327ac1aad312b9a1290938871f0c3591fb1 php-gd-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm f295e9d38adbbc0b437757033d5bf3ad5e6313ac3cc217c04d321d218ecf7e4e php-gd-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm bb083085f8b74c439f1f649ca2c2b2f1bcdcd5ea18741a16286a84ca3eb6ab71 php-gmp-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 0fdfb17d5429a0bfe6f4d22f388297503ac4bd55916878cb1043b788977e6481 php-gmp-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm bb048c178bfa16a2cb5237b9cf1376ed239134a97738787b9e0e8dc973ca04e3 php-intl-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 74d41709fec0d643d45bd1b32217148558ce4beb72a9fe1facf66fbbbc35dc17 php-intl-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 3e2718bb403d0ef05a0f8a332a5f1291f014462072c3c2307ceee1df0c40a5cd php-json-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 2514eac8a3f5025f5935829fe26016371ca427cb1f2a90109a5c6e52b044ceb2 php-ldap-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 7e522ffe091c695b27547dd34c2751738442513166f542e1c635c2b2d7282247 php-ldap-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm b8ae7571fa926ca43b0e52fda90a34df1c31d756eedbf433ba4486cc1e9fd20e php-mbstring-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm b4438576db5fdab2976b3174d6d98113d09125e67220745522a519b30ed73660 php-mbstring-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 29dd6634a539affd78fc64b16d69fe43c1d28ccb94e46ae73f8eb35103576ffb php-mysqlnd-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm b38d9aed370004c941bc605636a384934d1b79a1f48e15da029b6d6b320de98d php-mysqlnd-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 52c7773f0715eba8521c3c0bbb9f8319b6864565b9232e7a2411af30c91d613f php-odbc-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 58864393dec035a6cda4db249127eaf85523105a9ee5ab617c5b98ba72c0f555 php-odbc-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm f7398b7d15bd863435faef984551de1156262afb291dabd6b3afdbeffd3869b7 php-opcache-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 8a9e7f25b77a6fdcac027df71f481f30426e4070bcca0cc615d83827718cc631 php-opcache-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 5ecf79cf3bccf7937830005fb11663a705b8405a82effd4bfb2e1f84c46e2a50 php-pdo-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 6538de55570a75238238ef56ea4d6248e3fb762b8a30cca186620e851bc4d060 php-pdo-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 423671c21281be257cfe28894dbaacebd8efa28abb37dfcb5f0ccc6faaacb86a php-pear-1.10.12-1.module+el8.6.0+789+2130c178.noarch.rpm c20c31a8cafb68671583a79c3a85b7a87668132557e1adb08b2ff7ce6a9c4058 php-pear-1.10.13-1.module+el8.6.0+790+fc63e43f.noarch.rpm e46b2f905e5a36adba35af3f70884467592cb7ba32cecfaee3d1192127eb04e5 php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.aarch64.rpm 6555284e0cc3139ee72c0d13b7d93abacd468c1d6d63482af54dad3b391ef98f php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.aarch64.rpm dbc9d1a4dccce66ed75a1a3aa458dddc86d92baaba8cde6de288552accb7ede2 php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.aarch64.rpm dc4260a358d6148799ef4a1ce2e761397130bc523a7efa87df528e7dbbb0056a php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.aarch64.rpm 182ea4f209bee5fc3c099f0db4b68cf95083244cd7df9fb331be559a8ca6f0ad php-pecl-rrd-2.0.1-1.module+el8.6.0+789+2130c178.aarch64.rpm 478dde3cacf29afca05fe39e26a1ce417f8ea1d477cc41ca9281adefa02bf1d1 php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.aarch64.rpm f70c1c86d7980dce552fddefdb2d1139da17ebe2b40705d25c26827eb6dee241 php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.aarch64.rpm e94bd58c3e127c2610f90110c972bc80b29bad5e5cf3b567eab07f48c0c21f69 php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.aarch64.rpm 129f337de743773a02b9051d756f200659b1adf72890187215a6a69eea834ac6 php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.aarch64.rpm f8d184b53878f20feef8135398bd27b97150acc87922eb070cd90a9b070e7fac php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.aarch64.rpm e211ce74e31de0df200fd0a71f228f576092c564bda558fe8d5c951794ac60dc php-pgsql-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 18b0cb7f469e4ecff2e7aa88618655b722160c49a58249ae77556783962a9683 php-pgsql-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm cfa87dae63d0168eee13f4e853402ca2c97f3f7c4a997bf0285fdddf4091da4b php-process-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 310b373e90fc9eb0ebd23f39c260eeb40240fafd315a0f7ca13cde73a5bf14b9 php-process-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 0b75a0306ce40b7d44f0f03ea0d8784cc9a48d449aaa61ec8ae2ebc05242336f php-snmp-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 481ee290d157fdbc42da81c636f48e43159fd77a8c701d643a03d64effeb864f php-snmp-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm 12cc4fed4eccd526da1a337a3105c18f88ced646d835359fa1167cae06941c63 php-soap-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm e13133aa38c57a1492e256dd3b0da2027ce03106e8786a9019a6cbb922730648 php-soap-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm d9662b01e0938263a955cf7a9e88091840ed7aa75bad378233ca9846da3eee52 php-xml-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 09f5f5c9d5a96da9aa415ab9845edf80cc18d38e9238392f0cf79353ed839bc5 php-xml-8.0.13-3.module+el8.6.0+989+3fbff15c.aarch64.rpm c4004a86e2976c90ba93d7be71be90e283d2698b54aeb0c85d72fb645ea5d469 php-xmlrpc-7.4.19-3.module+el8.6.0+990+389ef54a.aarch64.rpm 8a72211d804ecee42834e128be80814ba472991cbf5d889a67dbd740c0d29d9e RLSA-2022:1810 Moderate: libtiff security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for libtiff is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1810 Rocky Linux 8 libtiff-4.0.9-21.el8.aarch64.rpm 81ae9c9bc84f19e31c39809b4c42ea327024dc86950c342eab4eca6d89cd07ec libtiff-devel-4.0.9-21.el8.aarch64.rpm f98bf664cdda8879dd99f61bee6c59580a258393f0dc3043cde04be6c0857c81 RLSA-2021:4381 Moderate: GNOME security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for GNOME is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:4381 Rocky Linux 8 gnome-autoar-0.2.3-2.el8.aarch64.rpm fbc3fe4286ccb668a28a5e77e81a5a6168b5102e62df938ae1e0ae0254211336 gnome-calculator-3.28.2-2.el8.aarch64.rpm d5be0d5f7a52a7d78efd9cd3479fcefd3b2066dd9cb0763879756c7daf7e87bd gnome-online-accounts-3.28.2-3.el8.aarch64.rpm 7f980408ee85f52bbe609f98ec0072d234b74ebaef7ff50ca365c39bb2b05556 gnome-online-accounts-devel-3.28.2-3.el8.aarch64.rpm b3abe2f8d470d01afef68ec64b32b4aac8d10983e48297aaa6d396763dbcd70f gnome-settings-daemon-3.32.0-16.el8.aarch64.rpm 2db9501dfb3d1a77c6cbfb0c63bcac1bd7d4907550edd5a8e6fda4b12731251b gnome-software-3.36.1-10.el8.aarch64.rpm ed8578b49a2436b9230097923f6e201f6204871f7dab5ab7deed937564827de2 gsettings-desktop-schemas-devel-3.32.0-6.el8.aarch64.rpm 300152cfdeae8511130d27b6d054c3c1a420e210fb68334cec75b58a9e5c1273 vino-3.22.0-11.el8.aarch64.rpm f7c480d9e635457e04b43d29b74e3774159d73b9b002272b9c83805987ae28f6 RLSA-2021:4622 Important: freerdp security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for freerdp is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:4622 Rocky Linux 8 freerdp-2.2.0-7.el8_5.aarch64.rpm 7fc3e04ddc9b6e8f67da35d51b66b23a9db483bbe3f128baaa0aa874148353c3 freerdp-libs-2.2.0-7.el8_5.aarch64.rpm 82ed82da474c9aab4ee732563f4bfcbbd3c9960093011349faa0559f62ec8d35 libwinpr-2.2.0-7.el8_5.aarch64.rpm 52e68faecd1fc67fe4f40efa851bb554e5a4a621c6384de7400b13a677586989 libwinpr-devel-2.2.0-7.el8_5.aarch64.rpm b6fef70f1f845bc8461d7d7550a6f8dad66b2c7690689886cf30c21f51fb5d59 RLBA-2021:3593 gcc-toolset-10-elfutils bug fix update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update for gcc-toolset-10-elfutils is now available for Rocky Linux 8. For more information visit https://errata.rockylinux.org/RLBA-2021:3593 Rocky Linux 8 gcc-toolset-10-elfutils-0.182-6.el8_4.aarch64.rpm 57c207f89888a063e88c6efbd8a2c3e79cdc950425f7f6a37abd8cccd9f49306 gcc-toolset-10-elfutils-debuginfod-client-0.182-6.el8_4.aarch64.rpm f9f41eab26c4e35de81dbdc15d1761263fecc552ee50c483dd2b1d0e30e7ded4 gcc-toolset-10-elfutils-debuginfod-client-devel-0.182-6.el8_4.aarch64.rpm c4e807587925a2b185b598e13df108b0e919e78c586dd33ea43f4a23f94ba918 gcc-toolset-10-elfutils-devel-0.182-6.el8_4.aarch64.rpm 399f025e2056bf42ab6d009995a3dffa977156eb17138635665806b4852fb2d0 gcc-toolset-10-elfutils-libelf-0.182-6.el8_4.aarch64.rpm 93681a96b96026d2921ccd71d87e4cf29c62abb3cdb88fe16e84f3317068466c gcc-toolset-10-elfutils-libelf-devel-0.182-6.el8_4.aarch64.rpm 5ee69a3bdc0e2734462dbabd8150d8aa674aa376b500358901bc6856bbc330c6 gcc-toolset-10-elfutils-libs-0.182-6.el8_4.aarch64.rpm ed9a2a3f889500c67adfe6545ae1eb43e2def3e6538c41e0d5c7c9a7a8972832 RLSA-2022:1930 Moderate: keepalived security and bug fix update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for keepalived is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1930 Rocky Linux 8 keepalived-2.1.5-8.el8.aarch64.rpm f82351ca56c756e228373a727b6b946c1e2bdeb68279d3e3bab85af1857c46b0 RLSA-2021:4325 Moderate: lasso security and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for lasso is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:4325 Rocky Linux 8 lasso-2.6.0-12.el8.aarch64.rpm 816c720c0ad82621816d2b994cde0c37e03e15f6d7620916849de0ecceac6b30 RLSA-2022:5470 Important: thunderbird security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for thunderbird is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:5470 Rocky Linux 8 firefox-91.11.0-2.el8_6.aarch64.rpm 57785f6fc01b3c77d1d0e8d8d9a3a5a17d1b0121d089e8fe896dfddf5a78ff21 thunderbird-91.11.0-2.el8_6.aarch64.rpm 597eba89e86a206eff53f8a076b358f090f0edfbb940dd0352625a7c155e67c0 firefox-91.11.0-2.el8_6.aarch64.rpm 57785f6fc01b3c77d1d0e8d8d9a3a5a17d1b0121d089e8fe896dfddf5a78ff21 thunderbird-91.11.0-2.el8_6.aarch64.rpm 597eba89e86a206eff53f8a076b358f090f0edfbb940dd0352625a7c155e67c0 RLSA-2022:2031 Low: libssh security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update for libssh is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:2031 Rocky Linux 8 libssh-devel-0.9.6-3.el8.aarch64.rpm a383836fcadad176e75c7f438f27f3973ca86aa3e9396e0d934aed31d79a9cdf RLSA-2022:2074 Moderate: samba security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for samba is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:2074 Rocky Linux 8 samba-vfs-iouring-4.15.5-5.el8.aarch64.rpm 198bad1ccd47677148efe44b526cc0e0d0232b27c22dc43303bed1e3d405a72f RLSA-2022:2013 Moderate: openssh security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for openssh is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:2013 Rocky Linux 8 openssh-askpass-8.0p1-13.el8.aarch64.rpm 0f40e68d38625a359cbabb99b170bbf7e7b566590723ca0a66e73fb9410087f2 RLSA-2021:3074 Moderate: nodejs:14 security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for the nodejs:14 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:3074 Rocky Linux 8 nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2022:5696 Important: java-1.8.0-openjdk security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for java-1.8.0-openjdk is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:5696 Rocky Linux 8 java-11-openjdk-11.0.16.0.8-1.el8_6.aarch64.rpm 6f550b09c1779e0a5d0e14731c0eaf751d13b995dc54a05ed134603c599c0091 java-11-openjdk-demo-11.0.16.0.8-1.el8_6.aarch64.rpm 6619d8e705efe559e5f4b20c5090c9ff183321f72340c9dad18f1529ccb7e823 java-11-openjdk-devel-11.0.16.0.8-1.el8_6.aarch64.rpm ca2d1bb53f58bc71fce53597e4dad9bd55a42d4c234f79e76830e6fd3609d4f1 java-11-openjdk-headless-11.0.16.0.8-1.el8_6.aarch64.rpm 00f33e7f2a0f6a6224486384b2b39344a29e576aaee06f659de7432fa7689711 java-11-openjdk-javadoc-11.0.16.0.8-1.el8_6.aarch64.rpm 42ef620b4450c1931930c32858e403fe3810a2578672aacfda547302cfd7ab8a java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el8_6.aarch64.rpm 6399d66116c3fc952598b258d756916f7126b2a55303350e57dc79879f0fd820 java-11-openjdk-jmods-11.0.16.0.8-1.el8_6.aarch64.rpm 9744c6667277189fffa64eac4c26848cd15acbc7c25b4c6e3aad3483356df17c java-11-openjdk-src-11.0.16.0.8-1.el8_6.aarch64.rpm 0ec65bf6c313c74a18328a40af7f3d8001e257dcdba84586fc7797c0dea4b55d java-11-openjdk-static-libs-11.0.16.0.8-1.el8_6.aarch64.rpm 25c9a00d059e736a78b334fba882590eb41760d5f598d227357c317d79b5c7cf java-17-openjdk-17.0.4.0.8-2.el8_6.aarch64.rpm d69724f709687edebde4506fb983d4639c56cdde1583a5305d78349126ffa48f java-17-openjdk-demo-17.0.4.0.8-2.el8_6.aarch64.rpm f7a183deeba0b64d886272a6c5b49da0c01048ae10d21cfe802adccf6737ec03 java-17-openjdk-devel-17.0.4.0.8-2.el8_6.aarch64.rpm 5fbe0467a0c17c9679fb3e194116f1651cbb6741dee79b99c643d7a0ca6035c9 java-17-openjdk-headless-17.0.4.0.8-2.el8_6.aarch64.rpm 03f78bd255eb19ec41d8c7a708eeb814c79d4d82cd80ce00b0be71d101621dbf java-17-openjdk-javadoc-17.0.4.0.8-2.el8_6.aarch64.rpm 2317cf2eb7ae8d96106e436821c597354d143acba5846b9cbdd576816b593ce3 java-17-openjdk-javadoc-zip-17.0.4.0.8-2.el8_6.aarch64.rpm a7fc19af2bee6de336faf47045900d235177c85d85ded299bac540290ad44d75 java-17-openjdk-jmods-17.0.4.0.8-2.el8_6.aarch64.rpm bbc7cc9bfab663df14ed85ae4938ba9f34f77bec196eaf19143e5891f276c602 java-17-openjdk-src-17.0.4.0.8-2.el8_6.aarch64.rpm 66de37d652d13b6916c304e25060b3100faf2d07db90ddf86ffe4cdfd29057a1 java-17-openjdk-static-libs-17.0.4.0.8-2.el8_6.aarch64.rpm 799074308663fdc7a47c36a8feaec44d1244906db657ebb4df30c2fb5806785a java-1.8.0-openjdk-1.8.0.342.b07-2.el8_6.aarch64.rpm d4a4940403c5226ff09f0820416264d9a4578b5f1964f80ff67ea37ae4346606 java-1.8.0-openjdk-accessibility-1.8.0.342.b07-2.el8_6.aarch64.rpm 8a91d00de06d6cf605c69499eb354d44c3cbf4f78b06ea02e86325d65ae04290 java-1.8.0-openjdk-demo-1.8.0.342.b07-2.el8_6.aarch64.rpm 3b79e2a1e908805c81990b7e8329ad8082e64127532ec1458a3530d3bd59342f java-1.8.0-openjdk-devel-1.8.0.342.b07-2.el8_6.aarch64.rpm b59ce38d502349edaa8209b4176e3594d8228edaeaac4c6682949db51ec917fa java-1.8.0-openjdk-headless-1.8.0.342.b07-2.el8_6.aarch64.rpm 6fe1d4a55cd32aa04827f9fd0f9d74bfb73436af002bedf2d87879bae3bfa61c java-1.8.0-openjdk-javadoc-1.8.0.342.b07-2.el8_6.noarch.rpm 1483d672f536f1de53450dc5a8cab9e07e13601c7f5d2c16633f133a1e88a1dd java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-2.el8_6.noarch.rpm 278f74e142b40303d9eaf58fc3f327c42bb543f02200af6e5e0bdd80a6593228 java-1.8.0-openjdk-src-1.8.0.342.b07-2.el8_6.aarch64.rpm 4e333b81dac7590f51b2dd8c555a88869fb1fdc65742bc0b9ead19f38cf97ba0 java-11-openjdk-11.0.16.0.8-1.el8_6.aarch64.rpm 6f550b09c1779e0a5d0e14731c0eaf751d13b995dc54a05ed134603c599c0091 java-11-openjdk-demo-11.0.16.0.8-1.el8_6.aarch64.rpm 6619d8e705efe559e5f4b20c5090c9ff183321f72340c9dad18f1529ccb7e823 java-11-openjdk-devel-11.0.16.0.8-1.el8_6.aarch64.rpm ca2d1bb53f58bc71fce53597e4dad9bd55a42d4c234f79e76830e6fd3609d4f1 java-11-openjdk-headless-11.0.16.0.8-1.el8_6.aarch64.rpm 00f33e7f2a0f6a6224486384b2b39344a29e576aaee06f659de7432fa7689711 java-11-openjdk-javadoc-11.0.16.0.8-1.el8_6.aarch64.rpm 42ef620b4450c1931930c32858e403fe3810a2578672aacfda547302cfd7ab8a java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el8_6.aarch64.rpm 6399d66116c3fc952598b258d756916f7126b2a55303350e57dc79879f0fd820 java-11-openjdk-jmods-11.0.16.0.8-1.el8_6.aarch64.rpm 9744c6667277189fffa64eac4c26848cd15acbc7c25b4c6e3aad3483356df17c java-11-openjdk-src-11.0.16.0.8-1.el8_6.aarch64.rpm 0ec65bf6c313c74a18328a40af7f3d8001e257dcdba84586fc7797c0dea4b55d java-11-openjdk-static-libs-11.0.16.0.8-1.el8_6.aarch64.rpm 25c9a00d059e736a78b334fba882590eb41760d5f598d227357c317d79b5c7cf java-17-openjdk-17.0.4.0.8-2.el8_6.aarch64.rpm d69724f709687edebde4506fb983d4639c56cdde1583a5305d78349126ffa48f java-17-openjdk-demo-17.0.4.0.8-2.el8_6.aarch64.rpm f7a183deeba0b64d886272a6c5b49da0c01048ae10d21cfe802adccf6737ec03 java-17-openjdk-devel-17.0.4.0.8-2.el8_6.aarch64.rpm 5fbe0467a0c17c9679fb3e194116f1651cbb6741dee79b99c643d7a0ca6035c9 java-17-openjdk-headless-17.0.4.0.8-2.el8_6.aarch64.rpm 03f78bd255eb19ec41d8c7a708eeb814c79d4d82cd80ce00b0be71d101621dbf java-17-openjdk-javadoc-17.0.4.0.8-2.el8_6.aarch64.rpm 2317cf2eb7ae8d96106e436821c597354d143acba5846b9cbdd576816b593ce3 java-17-openjdk-javadoc-zip-17.0.4.0.8-2.el8_6.aarch64.rpm a7fc19af2bee6de336faf47045900d235177c85d85ded299bac540290ad44d75 java-17-openjdk-jmods-17.0.4.0.8-2.el8_6.aarch64.rpm bbc7cc9bfab663df14ed85ae4938ba9f34f77bec196eaf19143e5891f276c602 java-17-openjdk-src-17.0.4.0.8-2.el8_6.aarch64.rpm 66de37d652d13b6916c304e25060b3100faf2d07db90ddf86ffe4cdfd29057a1 java-17-openjdk-static-libs-17.0.4.0.8-2.el8_6.aarch64.rpm 799074308663fdc7a47c36a8feaec44d1244906db657ebb4df30c2fb5806785a java-1.8.0-openjdk-1.8.0.342.b07-2.el8_6.aarch64.rpm d4a4940403c5226ff09f0820416264d9a4578b5f1964f80ff67ea37ae4346606 java-1.8.0-openjdk-accessibility-1.8.0.342.b07-2.el8_6.aarch64.rpm 8a91d00de06d6cf605c69499eb354d44c3cbf4f78b06ea02e86325d65ae04290 java-1.8.0-openjdk-demo-1.8.0.342.b07-2.el8_6.aarch64.rpm 3b79e2a1e908805c81990b7e8329ad8082e64127532ec1458a3530d3bd59342f java-1.8.0-openjdk-devel-1.8.0.342.b07-2.el8_6.aarch64.rpm b59ce38d502349edaa8209b4176e3594d8228edaeaac4c6682949db51ec917fa java-1.8.0-openjdk-headless-1.8.0.342.b07-2.el8_6.aarch64.rpm 6fe1d4a55cd32aa04827f9fd0f9d74bfb73436af002bedf2d87879bae3bfa61c java-1.8.0-openjdk-javadoc-1.8.0.342.b07-2.el8_6.noarch.rpm 1483d672f536f1de53450dc5a8cab9e07e13601c7f5d2c16633f133a1e88a1dd java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-2.el8_6.noarch.rpm 278f74e142b40303d9eaf58fc3f327c42bb543f02200af6e5e0bdd80a6593228 java-1.8.0-openjdk-src-1.8.0.342.b07-2.el8_6.aarch64.rpm 4e333b81dac7590f51b2dd8c555a88869fb1fdc65742bc0b9ead19f38cf97ba0 java-11-openjdk-11.0.16.0.8-1.el8_6.aarch64.rpm 6f550b09c1779e0a5d0e14731c0eaf751d13b995dc54a05ed134603c599c0091 java-11-openjdk-demo-11.0.16.0.8-1.el8_6.aarch64.rpm 6619d8e705efe559e5f4b20c5090c9ff183321f72340c9dad18f1529ccb7e823 java-11-openjdk-devel-11.0.16.0.8-1.el8_6.aarch64.rpm ca2d1bb53f58bc71fce53597e4dad9bd55a42d4c234f79e76830e6fd3609d4f1 java-11-openjdk-headless-11.0.16.0.8-1.el8_6.aarch64.rpm 00f33e7f2a0f6a6224486384b2b39344a29e576aaee06f659de7432fa7689711 java-11-openjdk-javadoc-11.0.16.0.8-1.el8_6.aarch64.rpm 42ef620b4450c1931930c32858e403fe3810a2578672aacfda547302cfd7ab8a java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el8_6.aarch64.rpm 6399d66116c3fc952598b258d756916f7126b2a55303350e57dc79879f0fd820 java-11-openjdk-jmods-11.0.16.0.8-1.el8_6.aarch64.rpm 9744c6667277189fffa64eac4c26848cd15acbc7c25b4c6e3aad3483356df17c java-11-openjdk-src-11.0.16.0.8-1.el8_6.aarch64.rpm 0ec65bf6c313c74a18328a40af7f3d8001e257dcdba84586fc7797c0dea4b55d java-11-openjdk-static-libs-11.0.16.0.8-1.el8_6.aarch64.rpm 25c9a00d059e736a78b334fba882590eb41760d5f598d227357c317d79b5c7cf java-17-openjdk-17.0.4.0.8-2.el8_6.aarch64.rpm d69724f709687edebde4506fb983d4639c56cdde1583a5305d78349126ffa48f java-17-openjdk-demo-17.0.4.0.8-2.el8_6.aarch64.rpm f7a183deeba0b64d886272a6c5b49da0c01048ae10d21cfe802adccf6737ec03 java-17-openjdk-devel-17.0.4.0.8-2.el8_6.aarch64.rpm 5fbe0467a0c17c9679fb3e194116f1651cbb6741dee79b99c643d7a0ca6035c9 java-17-openjdk-headless-17.0.4.0.8-2.el8_6.aarch64.rpm 03f78bd255eb19ec41d8c7a708eeb814c79d4d82cd80ce00b0be71d101621dbf java-17-openjdk-javadoc-17.0.4.0.8-2.el8_6.aarch64.rpm 2317cf2eb7ae8d96106e436821c597354d143acba5846b9cbdd576816b593ce3 java-17-openjdk-javadoc-zip-17.0.4.0.8-2.el8_6.aarch64.rpm a7fc19af2bee6de336faf47045900d235177c85d85ded299bac540290ad44d75 java-17-openjdk-jmods-17.0.4.0.8-2.el8_6.aarch64.rpm bbc7cc9bfab663df14ed85ae4938ba9f34f77bec196eaf19143e5891f276c602 java-17-openjdk-src-17.0.4.0.8-2.el8_6.aarch64.rpm 66de37d652d13b6916c304e25060b3100faf2d07db90ddf86ffe4cdfd29057a1 java-17-openjdk-static-libs-17.0.4.0.8-2.el8_6.aarch64.rpm 799074308663fdc7a47c36a8feaec44d1244906db657ebb4df30c2fb5806785a java-1.8.0-openjdk-1.8.0.342.b07-2.el8_6.aarch64.rpm d4a4940403c5226ff09f0820416264d9a4578b5f1964f80ff67ea37ae4346606 java-1.8.0-openjdk-accessibility-1.8.0.342.b07-2.el8_6.aarch64.rpm 8a91d00de06d6cf605c69499eb354d44c3cbf4f78b06ea02e86325d65ae04290 java-1.8.0-openjdk-demo-1.8.0.342.b07-2.el8_6.aarch64.rpm 3b79e2a1e908805c81990b7e8329ad8082e64127532ec1458a3530d3bd59342f java-1.8.0-openjdk-devel-1.8.0.342.b07-2.el8_6.aarch64.rpm b59ce38d502349edaa8209b4176e3594d8228edaeaac4c6682949db51ec917fa java-1.8.0-openjdk-headless-1.8.0.342.b07-2.el8_6.aarch64.rpm 6fe1d4a55cd32aa04827f9fd0f9d74bfb73436af002bedf2d87879bae3bfa61c java-1.8.0-openjdk-javadoc-1.8.0.342.b07-2.el8_6.noarch.rpm 1483d672f536f1de53450dc5a8cab9e07e13601c7f5d2c16633f133a1e88a1dd java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-2.el8_6.noarch.rpm 278f74e142b40303d9eaf58fc3f327c42bb543f02200af6e5e0bdd80a6593228 java-1.8.0-openjdk-src-1.8.0.342.b07-2.el8_6.aarch64.rpm 4e333b81dac7590f51b2dd8c555a88869fb1fdc65742bc0b9ead19f38cf97ba0 RLSA-2022:5056 Important: cups security and bug fix update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for cups is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:5056 Rocky Linux 8 cups-2.2.6-45.el8_6.2.aarch64.rpm c85a2f64a9b8597d3050014b4c706e1a8a652487a52439d467bde720e63663cd cups-client-2.2.6-45.el8_6.2.aarch64.rpm ecd78033c1323483ecaa69164562c34ea676403b8c42c8f6a8ec9543c82e47d1 cups-devel-2.2.6-45.el8_6.2.aarch64.rpm 141e09bd98923a72ff6e3e03fcf50672221305ebdb725a8805a8efb9ce2bfd88 cups-filesystem-2.2.6-45.el8_6.2.noarch.rpm 35e4b12c7ccdd9bfb176d3146f295e332e3c9e20659b55f3b5907d0b3a3c882a cups-ipptool-2.2.6-45.el8_6.2.aarch64.rpm fda98a2b8a8ba38e0ef76783130d81eb591b89e2028b496bc37a4cf43fb108c0 cups-lpd-2.2.6-45.el8_6.2.aarch64.rpm b6b2b9f0bf2f9703d86479e14ea1a078827132e2016bd174fb03bada8daa435d RLSA-2022:1820 Low: udisks2 security and bug fix update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update for udisks2 is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1820 Rocky Linux 8 libudisks2-2.9.0-9.el8.aarch64.rpm ff1f2339a9c5bd2481b730e75db84738a0569b8d784f0e470918f1411199c2b6 udisks2-2.9.0-9.el8.aarch64.rpm 86358fbed0a332a93116eb1916aa417e321c3bc66a2861aada39b74e6abd9d1d udisks2-iscsi-2.9.0-9.el8.aarch64.rpm e5cd3302dbf070bdcb5df744ebe718c835023ac68f4b1ea13b8647888ce116cb udisks2-lsm-2.9.0-9.el8.aarch64.rpm cd01b068d1e357c88617aa0ac8406b1b2e28959620f06b62213a19a79e7972ec udisks2-lvm2-2.9.0-9.el8.aarch64.rpm 9dc8445191f735eefa3591c2bff5ef44a8d0cb35b736e79cda6d767feb05aa0d RLSA-2021:1983 Important: idm:DL1 security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for the idm:DL1 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:1983 Rocky Linux 8 python3-jwcrypto-0.5.0-1.module+el8.4.0+430+1dcf16bb.noarch.rpm 8f52e2bf2531bf764f3d698863ec27fb18d7457493ff72fe91d5cf871eea4f02 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-pyusb-1.0.0-9.module+el8.4.0+430+1dcf16bb.noarch.rpm c1461c922fe67180fdd438b037b2452f88b934f2438c0d77aefd23bc8d5a620e python3-yubico-1.3.2-9.module+el8.4.0+430+1dcf16bb.noarch.rpm 57ba1a75366409cb10214266d4ff5512a4e27e9a804f1668862e80d6dc0eecd4 python3-jwcrypto-0.5.0-1.module+el8.4.0+430+1dcf16bb.noarch.rpm 8f52e2bf2531bf764f3d698863ec27fb18d7457493ff72fe91d5cf871eea4f02 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-pyusb-1.0.0-9.module+el8.4.0+430+1dcf16bb.noarch.rpm c1461c922fe67180fdd438b037b2452f88b934f2438c0d77aefd23bc8d5a620e python3-yubico-1.3.2-9.module+el8.4.0+430+1dcf16bb.noarch.rpm 57ba1a75366409cb10214266d4ff5512a4e27e9a804f1668862e80d6dc0eecd4 python3-jwcrypto-0.5.0-1.module+el8.4.0+430+1dcf16bb.noarch.rpm 8f52e2bf2531bf764f3d698863ec27fb18d7457493ff72fe91d5cf871eea4f02 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-pyusb-1.0.0-9.module+el8.4.0+430+1dcf16bb.noarch.rpm c1461c922fe67180fdd438b037b2452f88b934f2438c0d77aefd23bc8d5a620e python3-yubico-1.3.2-9.module+el8.4.0+430+1dcf16bb.noarch.rpm 57ba1a75366409cb10214266d4ff5512a4e27e9a804f1668862e80d6dc0eecd4