RLSA-2022:1810
Moderate: libtiff security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for libtiff is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:1810
Rocky Linux 8
libtiff-4.0.9-21.el8.i686.rpm
ca86985eb62d17f49004acab002b99dd6d8c30eff36a246e3fb66c802169f8a9
libtiff-4.0.9-21.el8.x86_64.rpm
1393a72113f12a5a28273defb7e4da56888066ea67bb5100630d0e13f263c68c
libtiff-devel-4.0.9-21.el8.i686.rpm
16e6b5ce489a597e2f36b50fe4fc59b5ae63b1d865a873d961685da8efd5a216
libtiff-devel-4.0.9-21.el8.x86_64.rpm
9d0e1fa160af29ee4cf5be9cf345e0ab6f40a33134f96ef3490799f60c108fe1
RLSA-2022:5683
Important: java-11-openjdk security, bug fix, and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update for java-11-openjdk is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:5683
Rocky Linux 8
java-11-openjdk-11.0.16.0.8-1.el8_6.x86_64.rpm
4e85d484fafe5874fa0ed7cc42fe4ac5f7e52c108c01970a5c643844bb41207d
java-11-openjdk-demo-11.0.16.0.8-1.el8_6.x86_64.rpm
23038fae72b756614597b26cf3db86ec88e12ce3737f8d144538144c7a383b94
java-11-openjdk-devel-11.0.16.0.8-1.el8_6.x86_64.rpm
00647d87101a9c59234ab4a4b9bad8e05799666a8c0575691c121e5c63c5fc51
java-11-openjdk-headless-11.0.16.0.8-1.el8_6.x86_64.rpm
9513fd5811b05493a59f576c956b085f6278e91d5dc27df8ecb7b7ca6b011402
java-11-openjdk-javadoc-11.0.16.0.8-1.el8_6.x86_64.rpm
8265a90c9718cb276a30df2f1676bf807499de5aff79ac0f6db7d9e1f9172e4c
java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el8_6.x86_64.rpm
5ac1904b9332a63a159e69ac1595f01205cb19e680c3ea382866a1af12a91930
java-11-openjdk-jmods-11.0.16.0.8-1.el8_6.x86_64.rpm
e0af5f26eb6e28ce0f4b1252e95467217d7f7fe1a7102fc645712f6985d9ce84
java-11-openjdk-src-11.0.16.0.8-1.el8_6.x86_64.rpm
e43a9e193dd1b6e55c303fb37fad0d7685b30173b43dcfbc31a966f06bf209a2
java-11-openjdk-static-libs-11.0.16.0.8-1.el8_6.x86_64.rpm
f9e5e46f0a0d7ef8e0d3dd8d365dd8bbd0898716f972f7279553f70cacf6e84d
java-17-openjdk-17.0.4.0.8-2.el8_6.x86_64.rpm
94f11bbf192ccd164c16d071cc53c708d320899704e2184070897da87768e083
java-17-openjdk-demo-17.0.4.0.8-2.el8_6.x86_64.rpm
29d1affae63306a31f9ed47cbd7289bec4b6822826f75253b9e2663e6309f0b4
java-17-openjdk-devel-17.0.4.0.8-2.el8_6.x86_64.rpm
78c428ba13d7fe544272bd84d3045c0fcfb9adb6b5360215302407dd51cce413
java-17-openjdk-headless-17.0.4.0.8-2.el8_6.x86_64.rpm
ebd40aa5c968c6f3a96954fc05c59b3cfc7fe31807901d63915ed9a775c42f87
java-17-openjdk-javadoc-17.0.4.0.8-2.el8_6.x86_64.rpm
a2754643644ec0c88c945c0d80e57325e1ef9be77b7c649346b3254764f712f1
java-17-openjdk-javadoc-zip-17.0.4.0.8-2.el8_6.x86_64.rpm
0184c7c142c3574465a3f8c14fb4ce67a3a63262ad0e850fc1b2b50248e88165
java-17-openjdk-jmods-17.0.4.0.8-2.el8_6.x86_64.rpm
9a382e3beff52f05ce80a23692976096bdc5fe74b5311ed082e190c5553293ff
java-17-openjdk-src-17.0.4.0.8-2.el8_6.x86_64.rpm
ba3e0a6d61a2fed0c7e673b3d0bb2cb3f8994e38148a61928171daccaaeb8cf6
java-17-openjdk-static-libs-17.0.4.0.8-2.el8_6.x86_64.rpm
604755ed2baa5eafeabb4845c5b0e9870b0b521b35f9cbbf4e706aff56844335
java-1.8.0-openjdk-1.8.0.342.b07-2.el8_6.x86_64.rpm
2d573a5b5d9fa4c3e5f8bf654b1717c5b77b00d13822a9e577a9a9f27cca8afe
java-1.8.0-openjdk-accessibility-1.8.0.342.b07-2.el8_6.x86_64.rpm
50b25dff3d5dc13d538656a91ea81f7203aafa7abbb636a8e966996190e7c67b
java-1.8.0-openjdk-demo-1.8.0.342.b07-2.el8_6.x86_64.rpm
309ea9cc9199096a5ecb9f76a60456e2791eb2ed0e06c3c816198735d31b4ffb
java-1.8.0-openjdk-devel-1.8.0.342.b07-2.el8_6.x86_64.rpm
5c479f22f25ab550e94dce89b3e5a27507b4c251e39ed9926ca9037e24f83601
java-1.8.0-openjdk-headless-1.8.0.342.b07-2.el8_6.x86_64.rpm
550cec82f3361c29e37a2f2192a1ccf30ff47700349e9eb49770f049d0c3cc03
java-1.8.0-openjdk-javadoc-1.8.0.342.b07-2.el8_6.noarch.rpm
1483d672f536f1de53450dc5a8cab9e07e13601c7f5d2c16633f133a1e88a1dd
java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-2.el8_6.noarch.rpm
278f74e142b40303d9eaf58fc3f327c42bb543f02200af6e5e0bdd80a6593228
java-1.8.0-openjdk-src-1.8.0.342.b07-2.el8_6.x86_64.rpm
ac1895f75442f0f13ff932b420affe822c4185432492263240177ea7a8a863bc
java-11-openjdk-11.0.16.0.8-1.el8_6.x86_64.rpm
4e85d484fafe5874fa0ed7cc42fe4ac5f7e52c108c01970a5c643844bb41207d
java-11-openjdk-demo-11.0.16.0.8-1.el8_6.x86_64.rpm
23038fae72b756614597b26cf3db86ec88e12ce3737f8d144538144c7a383b94
java-11-openjdk-devel-11.0.16.0.8-1.el8_6.x86_64.rpm
00647d87101a9c59234ab4a4b9bad8e05799666a8c0575691c121e5c63c5fc51
java-11-openjdk-headless-11.0.16.0.8-1.el8_6.x86_64.rpm
9513fd5811b05493a59f576c956b085f6278e91d5dc27df8ecb7b7ca6b011402
java-11-openjdk-javadoc-11.0.16.0.8-1.el8_6.x86_64.rpm
8265a90c9718cb276a30df2f1676bf807499de5aff79ac0f6db7d9e1f9172e4c
java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el8_6.x86_64.rpm
5ac1904b9332a63a159e69ac1595f01205cb19e680c3ea382866a1af12a91930
java-11-openjdk-jmods-11.0.16.0.8-1.el8_6.x86_64.rpm
e0af5f26eb6e28ce0f4b1252e95467217d7f7fe1a7102fc645712f6985d9ce84
java-11-openjdk-src-11.0.16.0.8-1.el8_6.x86_64.rpm
e43a9e193dd1b6e55c303fb37fad0d7685b30173b43dcfbc31a966f06bf209a2
java-11-openjdk-static-libs-11.0.16.0.8-1.el8_6.x86_64.rpm
f9e5e46f0a0d7ef8e0d3dd8d365dd8bbd0898716f972f7279553f70cacf6e84d
java-17-openjdk-17.0.4.0.8-2.el8_6.x86_64.rpm
94f11bbf192ccd164c16d071cc53c708d320899704e2184070897da87768e083
java-17-openjdk-demo-17.0.4.0.8-2.el8_6.x86_64.rpm
29d1affae63306a31f9ed47cbd7289bec4b6822826f75253b9e2663e6309f0b4
java-17-openjdk-devel-17.0.4.0.8-2.el8_6.x86_64.rpm
78c428ba13d7fe544272bd84d3045c0fcfb9adb6b5360215302407dd51cce413
java-17-openjdk-headless-17.0.4.0.8-2.el8_6.x86_64.rpm
ebd40aa5c968c6f3a96954fc05c59b3cfc7fe31807901d63915ed9a775c42f87
java-17-openjdk-javadoc-17.0.4.0.8-2.el8_6.x86_64.rpm
a2754643644ec0c88c945c0d80e57325e1ef9be77b7c649346b3254764f712f1
java-17-openjdk-javadoc-zip-17.0.4.0.8-2.el8_6.x86_64.rpm
0184c7c142c3574465a3f8c14fb4ce67a3a63262ad0e850fc1b2b50248e88165
java-17-openjdk-jmods-17.0.4.0.8-2.el8_6.x86_64.rpm
9a382e3beff52f05ce80a23692976096bdc5fe74b5311ed082e190c5553293ff
java-17-openjdk-src-17.0.4.0.8-2.el8_6.x86_64.rpm
ba3e0a6d61a2fed0c7e673b3d0bb2cb3f8994e38148a61928171daccaaeb8cf6
java-17-openjdk-static-libs-17.0.4.0.8-2.el8_6.x86_64.rpm
604755ed2baa5eafeabb4845c5b0e9870b0b521b35f9cbbf4e706aff56844335
java-1.8.0-openjdk-1.8.0.342.b07-2.el8_6.x86_64.rpm
2d573a5b5d9fa4c3e5f8bf654b1717c5b77b00d13822a9e577a9a9f27cca8afe
java-1.8.0-openjdk-accessibility-1.8.0.342.b07-2.el8_6.x86_64.rpm
50b25dff3d5dc13d538656a91ea81f7203aafa7abbb636a8e966996190e7c67b
java-1.8.0-openjdk-demo-1.8.0.342.b07-2.el8_6.x86_64.rpm
309ea9cc9199096a5ecb9f76a60456e2791eb2ed0e06c3c816198735d31b4ffb
java-1.8.0-openjdk-devel-1.8.0.342.b07-2.el8_6.x86_64.rpm
5c479f22f25ab550e94dce89b3e5a27507b4c251e39ed9926ca9037e24f83601
java-1.8.0-openjdk-headless-1.8.0.342.b07-2.el8_6.x86_64.rpm
550cec82f3361c29e37a2f2192a1ccf30ff47700349e9eb49770f049d0c3cc03
java-1.8.0-openjdk-javadoc-1.8.0.342.b07-2.el8_6.noarch.rpm
1483d672f536f1de53450dc5a8cab9e07e13601c7f5d2c16633f133a1e88a1dd
java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-2.el8_6.noarch.rpm
278f74e142b40303d9eaf58fc3f327c42bb543f02200af6e5e0bdd80a6593228
java-1.8.0-openjdk-src-1.8.0.342.b07-2.el8_6.x86_64.rpm
ac1895f75442f0f13ff932b420affe822c4185432492263240177ea7a8a863bc
java-11-openjdk-11.0.16.0.8-1.el8_6.x86_64.rpm
4e85d484fafe5874fa0ed7cc42fe4ac5f7e52c108c01970a5c643844bb41207d
java-11-openjdk-demo-11.0.16.0.8-1.el8_6.x86_64.rpm
23038fae72b756614597b26cf3db86ec88e12ce3737f8d144538144c7a383b94
java-11-openjdk-devel-11.0.16.0.8-1.el8_6.x86_64.rpm
00647d87101a9c59234ab4a4b9bad8e05799666a8c0575691c121e5c63c5fc51
java-11-openjdk-headless-11.0.16.0.8-1.el8_6.x86_64.rpm
9513fd5811b05493a59f576c956b085f6278e91d5dc27df8ecb7b7ca6b011402
java-11-openjdk-javadoc-11.0.16.0.8-1.el8_6.x86_64.rpm
8265a90c9718cb276a30df2f1676bf807499de5aff79ac0f6db7d9e1f9172e4c
java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el8_6.x86_64.rpm
5ac1904b9332a63a159e69ac1595f01205cb19e680c3ea382866a1af12a91930
java-11-openjdk-jmods-11.0.16.0.8-1.el8_6.x86_64.rpm
e0af5f26eb6e28ce0f4b1252e95467217d7f7fe1a7102fc645712f6985d9ce84
java-11-openjdk-src-11.0.16.0.8-1.el8_6.x86_64.rpm
e43a9e193dd1b6e55c303fb37fad0d7685b30173b43dcfbc31a966f06bf209a2
java-11-openjdk-static-libs-11.0.16.0.8-1.el8_6.x86_64.rpm
f9e5e46f0a0d7ef8e0d3dd8d365dd8bbd0898716f972f7279553f70cacf6e84d
java-17-openjdk-17.0.4.0.8-2.el8_6.x86_64.rpm
94f11bbf192ccd164c16d071cc53c708d320899704e2184070897da87768e083
java-17-openjdk-demo-17.0.4.0.8-2.el8_6.x86_64.rpm
29d1affae63306a31f9ed47cbd7289bec4b6822826f75253b9e2663e6309f0b4
java-17-openjdk-devel-17.0.4.0.8-2.el8_6.x86_64.rpm
78c428ba13d7fe544272bd84d3045c0fcfb9adb6b5360215302407dd51cce413
java-17-openjdk-headless-17.0.4.0.8-2.el8_6.x86_64.rpm
ebd40aa5c968c6f3a96954fc05c59b3cfc7fe31807901d63915ed9a775c42f87
java-17-openjdk-javadoc-17.0.4.0.8-2.el8_6.x86_64.rpm
a2754643644ec0c88c945c0d80e57325e1ef9be77b7c649346b3254764f712f1
java-17-openjdk-javadoc-zip-17.0.4.0.8-2.el8_6.x86_64.rpm
0184c7c142c3574465a3f8c14fb4ce67a3a63262ad0e850fc1b2b50248e88165
java-17-openjdk-jmods-17.0.4.0.8-2.el8_6.x86_64.rpm
9a382e3beff52f05ce80a23692976096bdc5fe74b5311ed082e190c5553293ff
java-17-openjdk-src-17.0.4.0.8-2.el8_6.x86_64.rpm
ba3e0a6d61a2fed0c7e673b3d0bb2cb3f8994e38148a61928171daccaaeb8cf6
java-17-openjdk-static-libs-17.0.4.0.8-2.el8_6.x86_64.rpm
604755ed2baa5eafeabb4845c5b0e9870b0b521b35f9cbbf4e706aff56844335
java-1.8.0-openjdk-1.8.0.342.b07-2.el8_6.x86_64.rpm
2d573a5b5d9fa4c3e5f8bf654b1717c5b77b00d13822a9e577a9a9f27cca8afe
java-1.8.0-openjdk-accessibility-1.8.0.342.b07-2.el8_6.x86_64.rpm
50b25dff3d5dc13d538656a91ea81f7203aafa7abbb636a8e966996190e7c67b
java-1.8.0-openjdk-demo-1.8.0.342.b07-2.el8_6.x86_64.rpm
309ea9cc9199096a5ecb9f76a60456e2791eb2ed0e06c3c816198735d31b4ffb
java-1.8.0-openjdk-devel-1.8.0.342.b07-2.el8_6.x86_64.rpm
5c479f22f25ab550e94dce89b3e5a27507b4c251e39ed9926ca9037e24f83601
java-1.8.0-openjdk-headless-1.8.0.342.b07-2.el8_6.x86_64.rpm
550cec82f3361c29e37a2f2192a1ccf30ff47700349e9eb49770f049d0c3cc03
java-1.8.0-openjdk-javadoc-1.8.0.342.b07-2.el8_6.noarch.rpm
1483d672f536f1de53450dc5a8cab9e07e13601c7f5d2c16633f133a1e88a1dd
java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-2.el8_6.noarch.rpm
278f74e142b40303d9eaf58fc3f327c42bb543f02200af6e5e0bdd80a6593228
java-1.8.0-openjdk-src-1.8.0.342.b07-2.el8_6.x86_64.rpm
ac1895f75442f0f13ff932b420affe822c4185432492263240177ea7a8a863bc
RLSA-2022:2074
Moderate: samba security, bug fix, and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for samba is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:2074
Rocky Linux 8
samba-vfs-iouring-4.15.5-5.el8.x86_64.rpm
7dc183ab343b29b58bf43d6a71281fc74f01963813f50f70eb91d105d382bb9b
RLSA-2022:1820
Low: udisks2 security and bug fix update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update for udisks2 is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:1820
Rocky Linux 8
libudisks2-2.9.0-9.el8.i686.rpm
b6a3891bb289e01826b1bc4e26397e5f12718f44e2dc6413f4f5e626fde70061
libudisks2-2.9.0-9.el8.x86_64.rpm
13a2d984b5d4a21f35ab57ddd95914c27ccc916993620b4dab9bbd697ee2911a
udisks2-2.9.0-9.el8.x86_64.rpm
5d4821126edacaebbe000dd9896ebb8dc63993f6f5da7e689e9968f946738a22
udisks2-iscsi-2.9.0-9.el8.x86_64.rpm
56eaaef8707e7c62a15fb4ce052a398cca4de48677e8ef3b7b9d10e96184cce2
udisks2-lsm-2.9.0-9.el8.x86_64.rpm
375eeb6adab3d131e8d96cbc816da721444799bcbf8f60c6b45d7b0f23016578
udisks2-lvm2-2.9.0-9.el8.x86_64.rpm
b9ad578c257ddfc2788078ef33be243cde33c0a9f6793529b334c2ebaa860412
RLSA-2022:1950
Moderate: dovecot security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for dovecot is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:1950
Rocky Linux 8
dovecot-2.3.16-2.el8.x86_64.rpm
9a1ed964988493cc43f3675461d57fcfad0cd93a6186b07d3c03c62786e9fe20
dovecot-mysql-2.3.16-2.el8.x86_64.rpm
dac798b094655507e03a94ec37e065e9117b3afdabf58e91544486ad1288c96d
dovecot-pgsql-2.3.16-2.el8.x86_64.rpm
b3cc3cc4d64ef877e5f1ffe1bb3deee45ad4559db309546064d0aa7f6cd122e2
dovecot-pigeonhole-2.3.16-2.el8.x86_64.rpm
538a64dafcb31dd1a45c423f5a2afcbcc65d5dfa891026e1938bcf31e34008f3
RLSA-2022:441
Important: aide security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update for aide is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:441
Rocky Linux 8
aide-0.16-14.el8_5.1.x86_64.rpm
cd5d83d0836f7ae2f5b59f914bf67cdee69e404f8b9864363f1d93d76747c6aa
RLSA-2021:3590
Moderate: mysql:8.0 security, bug fix, and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for the mysql:8.0 module is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:3590
Rocky Linux 8
mecab-0.996-1.module+el8.3.0+242+87d3366a.9.x86_64.rpm
14952996574de43eec381be174d1a4dd572e04536682e0ac26946c6cb5c707ba
mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm
19b0e3eeea327b2ce021e978337b84189ad9a488f0e82a4dfd1602436c1d0549
mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm
490449bfec869b5947ac0da58a4f56ca9369e2b6a04c22dbc0eef1cd5306c96f
mysql-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm
5835ef2fafa38168bfe18ed1a6f91e345c1bbe3ce8803c4c812cae7d1554f702
mysql-common-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm
98597b5e26add557d0687defca496399a59eb64a443d08bba55f5772d7d6ef13
mysql-devel-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm
6804ebf957f76275b7237d7d4042d45be95d2ae292da9060bef4e0b34acff53b
mysql-errmsg-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm
05cb72589e13e1181c621fe309f071d28bddc74848977baf93e085faffcf84aa
mysql-libs-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm
50d42c4c557faae38d755dfa690df2020be414c0aedd1d338be4e04a84891615
mysql-server-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm
246223ae9c8ef779ac1ecd1b544ddbc38f3df620cff78f634e311817a82baa69
mysql-test-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm
834328ec93539879520f5dbea5989df2c1aae47575d243226dc3973a0f0704d1
RLBA-2021:3594
libdb bug fix and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update for libdb is now available for Rocky Linux 8.
For more information visit https://errata.rockylinux.org/RLBA-2021:3594
Rocky Linux 8
libdb-devel-5.3.28-42.el8_4.i686.rpm
0c8d56ff99ebbef82cda32cad3a77de5c01a5a735c0d9e0463e3969142728d51
libdb-devel-5.3.28-42.el8_4.x86_64.rpm
4038cac5a947df780f43ad543f735f1c0307a106ae02b1ac518fba0349d5bdc9
RLBA-2021:3083
gcc-toolset-10-valgrind bug fix and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update for gcc-toolset-10-valgrind is now available for Rocky Linux 8.
For more information visit https://errata.rockylinux.org/RLBA-2021:3083
Rocky Linux 8
gcc-toolset-10-valgrind-3.16.0-6.el8_4.i686.rpm
e1ce0850349148b3ab3aba7bf21cfffe7cc26f8e78a7b63c07601ce5c349b101
gcc-toolset-10-valgrind-3.16.0-6.el8_4.x86_64.rpm
eaee7045eb86911441e2ca185719dac4846cf6761b34b1cd4503e66276f0b650
gcc-toolset-10-valgrind-devel-3.16.0-6.el8_4.i686.rpm
5fbac89725917a18834c3d4e7450065437144dcf0a0efa3f85d56666a6290a36
gcc-toolset-10-valgrind-devel-3.16.0-6.el8_4.x86_64.rpm
4b0fc0732a44b410281e4ebb01b853a5ae5b49173e876bfba3064ea2a42410d3
RLSA-2022:4769
Critical: thunderbird security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Critical
An update for thunderbird is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:4769
Rocky Linux 8
firefox-91.9.1-1.el8_6.x86_64.rpm
a622ecb5bdd7309923b929740e63371d8d1b64f93b4107eda1098bda35dba50f
thunderbird-91.9.1-1.el8_6.x86_64.rpm
54aa39e85079e1a573a5c95c5415bc0997fb5a42e0e40f526af19770de3d2d88
firefox-91.9.1-1.el8_6.x86_64.rpm
a622ecb5bdd7309923b929740e63371d8d1b64f93b4107eda1098bda35dba50f
thunderbird-91.9.1-1.el8_6.x86_64.rpm
54aa39e85079e1a573a5c95c5415bc0997fb5a42e0e40f526af19770de3d2d88
RLSA-2022:4799
Important: rsyslog security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update for rsyslog is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:4799
Rocky Linux 8
rsyslog-8.2102.0-7.el8_6.1.x86_64.rpm
ea07612c26bc3edfdd184dcf6a984b9397c4898eead7ff537d9fab37e5c01450
rsyslog-crypto-8.2102.0-7.el8_6.1.x86_64.rpm
b0fbc486ec0b8aa580300cb889029ce3c8d99db145be81fc91fcbd21c6771094
rsyslog-doc-8.2102.0-7.el8_6.1.noarch.rpm
f9dafefb3d37a6de75ed495ac4674add44c708bd07b0e254add7dfeddd11d132
rsyslog-elasticsearch-8.2102.0-7.el8_6.1.x86_64.rpm
57f0f73088d8760723bf88e9edb120db399c9124c0c8b792a05c3dcf9dc514a1
rsyslog-gnutls-8.2102.0-7.el8_6.1.x86_64.rpm
228fd14edd78c0d1e6ed9eec5bebfbdfb6314cf83259f73c050586ef93969514
rsyslog-gssapi-8.2102.0-7.el8_6.1.x86_64.rpm
d262565b3cf9742398f7de307f76218cf27a4bc4a9feddcc2a606a8191d2580b
rsyslog-kafka-8.2102.0-7.el8_6.1.x86_64.rpm
17de8174f4d0ccf2317fe3576f2637b45bd95539ab8ca05f05e6290d1fc6a278
rsyslog-mmaudit-8.2102.0-7.el8_6.1.x86_64.rpm
5f80d78631a22fcd386a8fbd7a9e077e81fafef0fa24be4089e2c811bfe958e9
rsyslog-mmfields-8.2102.0-7.el8_6.1.x86_64.rpm
19d7b2e3383dc6533c1c7d14546a527ecc66a817573b79b6f5a4e6100524c2cd
rsyslog-mmjsonparse-8.2102.0-7.el8_6.1.x86_64.rpm
d4563ef2fed753e5249331139a8b604be3d2310bd5b8baf683840d0ac82a9941
rsyslog-mmkubernetes-8.2102.0-7.el8_6.1.x86_64.rpm
ec23ecdf3412ac5ada07608c99a606a65238bfdd8aa776d08b81711ae6380d93
rsyslog-mmnormalize-8.2102.0-7.el8_6.1.x86_64.rpm
e241a56b556c9917c1d3314cd31296f295572048a5fd6d9c401bf578f2283b68
rsyslog-mmsnmptrapd-8.2102.0-7.el8_6.1.x86_64.rpm
c71c5a98ea889def78474c169fc87422faca1cf262e952c754fdf41dcbf19aca
rsyslog-mysql-8.2102.0-7.el8_6.1.x86_64.rpm
2fa8fae0b4c4afcf76698bac4acb6910ff511419e12669f243b269048436de8f
rsyslog-omamqp1-8.2102.0-7.el8_6.1.x86_64.rpm
283fb7a1e80dd375f253bddfb3c062b916129e990a60afaddd6f9701c82cf9a2
rsyslog-openssl-8.2102.0-7.el8_6.1.x86_64.rpm
1bff451e19d60935f1088325025ab09efa46242a2f6c3cae6f25a6c46e9ce4bf
rsyslog-pgsql-8.2102.0-7.el8_6.1.x86_64.rpm
3fdae136d67395bf194b264a75b3bf13d6544ddb33824d5ab0c1a2df6754a6b0
rsyslog-relp-8.2102.0-7.el8_6.1.x86_64.rpm
b516a0ed920f0650ba482d10ae5fe7632eb1345e6866fe28c2925ff44fd392ed
rsyslog-snmp-8.2102.0-7.el8_6.1.x86_64.rpm
16ba1f239f955a3443b59395ea521c8a69dce7fbc1328cb47d8a6eb6710036db
rsyslog-udpspoof-8.2102.0-7.el8_6.1.x86_64.rpm
ca30f551846bb493856021f6855000143feb2f2dacbfca61abcc14802156f78a
RLSA-2022:1808
Moderate: aspell security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for aspell is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:1808
Rocky Linux 8
aspell-0.60.6.1-22.el8.i686.rpm
c141d22dd8a85ff028f54a89e35260ff3a0d930558eaa041c33a9a55339b7d89
aspell-0.60.6.1-22.el8.x86_64.rpm
35a21a9a576b4ce6f4b34851a880ece09a2baaf51d16df49edbcd76b8e19f243
RLSA-2021:4325
Moderate: lasso security and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for lasso is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:4325
Rocky Linux 8
lasso-2.6.0-12.el8.i686.rpm
b05640c5b0eaa54e4f0ac2d7d44f100d047489dbb1f5912fb611bbbe69261fdb
lasso-2.6.0-12.el8.x86_64.rpm
5cdb83a6ef598be1d8f63872ba0bcbf32cf19b0f16fd9e323ed80348e953a6df
RLSA-2022:5813
Moderate: vim security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for vim is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:5813
Rocky Linux 8
vim-common-8.0.1763-19.el8_6.4.x86_64.rpm
58fb2fd64740f3dddd0465d725779b9a92382096a451b38a3d13e598fb537a65
vim-enhanced-8.0.1763-19.el8_6.4.x86_64.rpm
555bf2c9cb7a631f91195a2c477713668210b2dfcb82c5dc5258fe411bfb7e4c
vim-filesystem-8.0.1763-19.el8_6.4.noarch.rpm
37b57ef90a9d794c1f1ef30ca31a1a26a8651d05b752f582dc91f3112a8fb124
vim-X11-8.0.1763-19.el8_6.4.x86_64.rpm
138b57307d0b6d219d4739841ec0d118256c885f6357c4052400276513f5dc63
RLSA-2022:2199
Important: .NET 6.0 security, bug fix, and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update for .NET 6.0 is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:2199
Rocky Linux 8
aspnetcore-runtime-3.1-3.1.25-1.el8_6.x86_64.rpm
3ab054d83fdef0b7e8ad7d0e9ea190d056223a2cba120191bddd06512ae556e5
aspnetcore-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm
d486dec30aa390f81e1f9b88d74223c6f82438c6f61d784d9418c1fbcb43ec1a
aspnetcore-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm
044191f102db47baafc1478922ddd2ec8a57132da7a63fcb4217e5c8ce532572
aspnetcore-targeting-pack-3.1-3.1.25-1.el8_6.x86_64.rpm
1bfe32ec9815519733767e40c1f3d7fbafe25994c22a73f9450f230e3cd2c607
aspnetcore-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm
25ea9a4ee9219c905c60a2fb6c1d0980790c0fc18bbb095a68c1841667a80ad5
aspnetcore-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm
78cb5230f4dd8d0af104d30a175f0bd4dc48266ff4d844255c7a12de0ca92863
dotnet-6.0.105-1.el8_6.x86_64.rpm
80c33981bb9bfd293a75f6953155c4950c40949b466bb7aaf0c7a530eae021eb
dotnet-apphost-pack-3.1-3.1.25-1.el8_6.x86_64.rpm
7c157f825b5ce5811a9d4bf3dabd4f093ecbc9e49e6b5b8bd82c13fabfdbd540
dotnet-apphost-pack-5.0-5.0.17-1.el8_6.x86_64.rpm
d796e4163087da226589f147642c803920504ffbb7f14ebd7dd77d63069371e7
dotnet-apphost-pack-6.0-6.0.5-1.el8_6.x86_64.rpm
1a7f2653de383eb098b609f65685bcc7e79e20753b2856fbfefeb8ffdd140644
dotnet-host-6.0.5-1.el8_6.x86_64.rpm
6f5fd968b6afcae67cf7a675c29bf1132f22d07ac6a0485d4e9a3946c24ad8ec
dotnet-hostfxr-3.1-3.1.25-1.el8_6.x86_64.rpm
262fefa7902f53fb17cd03a722bce57a045228e9edd9fa9208a9ea0b0ba445af
dotnet-hostfxr-5.0-5.0.17-1.el8_6.x86_64.rpm
7c90bf6baddc73ce33607cbe4a3dd8ce09e4924bd71cfeec24ca034ae75c715b
dotnet-hostfxr-6.0-6.0.5-1.el8_6.x86_64.rpm
300faa33609d3d855a3f3bccdc829deade5f7eb062a38fbd19696da8b5a66c42
dotnet-runtime-3.1-3.1.25-1.el8_6.x86_64.rpm
a89e9e77423da793ed6a383f1265cdf7ebffc6a99cdc2060b5864fa2c97a2336
dotnet-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm
4b94310a8e8c720fcfb381249798db29d48530ecf929e416952823ff2e0c8d85
dotnet-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm
ae1c22f5b6f35c7733e019c53e1a25ddfc3ff36b174b863be945cad1efa8d47f
dotnet-sdk-3.1-3.1.419-1.el8_6.x86_64.rpm
e193f8bff7bd1809e62193cffcb7fa2334d3ab154cb64bcb27e5faad82dfa874
dotnet-sdk-5.0-5.0.214-1.el8_6.x86_64.rpm
b09467d0681cdf6529562e270694a024f25a0b925c9084269141502fa9c46420
dotnet-sdk-6.0-6.0.105-1.el8_6.x86_64.rpm
7c0005651e8718bba891fba51d563d0718345306c6d44b3740b66a77c2fcf6a9
dotnet-targeting-pack-3.1-3.1.25-1.el8_6.x86_64.rpm
d5880f077a71534b12d3b19332c65eb1d740662eedcb347a60df9fbe2a457069
dotnet-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm
e9caa16fc3a9a967eaddcc7b7dd4dccdc929c7dbedeb58c0243c0870492af325
dotnet-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm
109537126216cb649f1835c1a7759d665a383b7f5046205e7b01c1eeaf127e70
dotnet-templates-3.1-3.1.419-1.el8_6.x86_64.rpm
4728a16a4ab8ca0bf6edb8208179aaf86852632ec652cc8302e8bb6b2e9fcb92
dotnet-templates-5.0-5.0.214-1.el8_6.x86_64.rpm
2f603a86303818a50b579bc999d12d8e8ed69db10575ea3ce048cdc021c7f969
dotnet-templates-6.0-6.0.105-1.el8_6.x86_64.rpm
b05606f5a00cbcde5c17a88d32ac4b7746ca04ed45f8df6417d0b1c34e6e6f73
netstandard-targeting-pack-2.1-6.0.105-1.el8_6.x86_64.rpm
1bb145c46608f933ebea4b268ca0922ff5ad7e9d769b4b71833222ce84740d24
aspnetcore-runtime-3.1-3.1.25-1.el8_6.x86_64.rpm
3ab054d83fdef0b7e8ad7d0e9ea190d056223a2cba120191bddd06512ae556e5
aspnetcore-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm
d486dec30aa390f81e1f9b88d74223c6f82438c6f61d784d9418c1fbcb43ec1a
aspnetcore-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm
044191f102db47baafc1478922ddd2ec8a57132da7a63fcb4217e5c8ce532572
aspnetcore-targeting-pack-3.1-3.1.25-1.el8_6.x86_64.rpm
1bfe32ec9815519733767e40c1f3d7fbafe25994c22a73f9450f230e3cd2c607
aspnetcore-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm
25ea9a4ee9219c905c60a2fb6c1d0980790c0fc18bbb095a68c1841667a80ad5
aspnetcore-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm
78cb5230f4dd8d0af104d30a175f0bd4dc48266ff4d844255c7a12de0ca92863
dotnet-6.0.105-1.el8_6.x86_64.rpm
80c33981bb9bfd293a75f6953155c4950c40949b466bb7aaf0c7a530eae021eb
dotnet-apphost-pack-3.1-3.1.25-1.el8_6.x86_64.rpm
7c157f825b5ce5811a9d4bf3dabd4f093ecbc9e49e6b5b8bd82c13fabfdbd540
dotnet-apphost-pack-5.0-5.0.17-1.el8_6.x86_64.rpm
d796e4163087da226589f147642c803920504ffbb7f14ebd7dd77d63069371e7
dotnet-apphost-pack-6.0-6.0.5-1.el8_6.x86_64.rpm
1a7f2653de383eb098b609f65685bcc7e79e20753b2856fbfefeb8ffdd140644
dotnet-host-6.0.5-1.el8_6.x86_64.rpm
6f5fd968b6afcae67cf7a675c29bf1132f22d07ac6a0485d4e9a3946c24ad8ec
dotnet-hostfxr-3.1-3.1.25-1.el8_6.x86_64.rpm
262fefa7902f53fb17cd03a722bce57a045228e9edd9fa9208a9ea0b0ba445af
dotnet-hostfxr-5.0-5.0.17-1.el8_6.x86_64.rpm
7c90bf6baddc73ce33607cbe4a3dd8ce09e4924bd71cfeec24ca034ae75c715b
dotnet-hostfxr-6.0-6.0.5-1.el8_6.x86_64.rpm
300faa33609d3d855a3f3bccdc829deade5f7eb062a38fbd19696da8b5a66c42
dotnet-runtime-3.1-3.1.25-1.el8_6.x86_64.rpm
a89e9e77423da793ed6a383f1265cdf7ebffc6a99cdc2060b5864fa2c97a2336
dotnet-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm
4b94310a8e8c720fcfb381249798db29d48530ecf929e416952823ff2e0c8d85
dotnet-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm
ae1c22f5b6f35c7733e019c53e1a25ddfc3ff36b174b863be945cad1efa8d47f
dotnet-sdk-3.1-3.1.419-1.el8_6.x86_64.rpm
e193f8bff7bd1809e62193cffcb7fa2334d3ab154cb64bcb27e5faad82dfa874
dotnet-sdk-5.0-5.0.214-1.el8_6.x86_64.rpm
b09467d0681cdf6529562e270694a024f25a0b925c9084269141502fa9c46420
dotnet-sdk-6.0-6.0.105-1.el8_6.x86_64.rpm
7c0005651e8718bba891fba51d563d0718345306c6d44b3740b66a77c2fcf6a9
dotnet-targeting-pack-3.1-3.1.25-1.el8_6.x86_64.rpm
d5880f077a71534b12d3b19332c65eb1d740662eedcb347a60df9fbe2a457069
dotnet-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm
e9caa16fc3a9a967eaddcc7b7dd4dccdc929c7dbedeb58c0243c0870492af325
dotnet-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm
109537126216cb649f1835c1a7759d665a383b7f5046205e7b01c1eeaf127e70
dotnet-templates-3.1-3.1.419-1.el8_6.x86_64.rpm
4728a16a4ab8ca0bf6edb8208179aaf86852632ec652cc8302e8bb6b2e9fcb92
dotnet-templates-5.0-5.0.214-1.el8_6.x86_64.rpm
2f603a86303818a50b579bc999d12d8e8ed69db10575ea3ce048cdc021c7f969
dotnet-templates-6.0-6.0.105-1.el8_6.x86_64.rpm
b05606f5a00cbcde5c17a88d32ac4b7746ca04ed45f8df6417d0b1c34e6e6f73
netstandard-targeting-pack-2.1-6.0.105-1.el8_6.x86_64.rpm
1bb145c46608f933ebea4b268ca0922ff5ad7e9d769b4b71833222ce84740d24
aspnetcore-runtime-3.1-3.1.25-1.el8_6.x86_64.rpm
3ab054d83fdef0b7e8ad7d0e9ea190d056223a2cba120191bddd06512ae556e5
aspnetcore-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm
d486dec30aa390f81e1f9b88d74223c6f82438c6f61d784d9418c1fbcb43ec1a
aspnetcore-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm
044191f102db47baafc1478922ddd2ec8a57132da7a63fcb4217e5c8ce532572
aspnetcore-targeting-pack-3.1-3.1.25-1.el8_6.x86_64.rpm
1bfe32ec9815519733767e40c1f3d7fbafe25994c22a73f9450f230e3cd2c607
aspnetcore-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm
25ea9a4ee9219c905c60a2fb6c1d0980790c0fc18bbb095a68c1841667a80ad5
aspnetcore-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm
78cb5230f4dd8d0af104d30a175f0bd4dc48266ff4d844255c7a12de0ca92863
dotnet-6.0.105-1.el8_6.x86_64.rpm
80c33981bb9bfd293a75f6953155c4950c40949b466bb7aaf0c7a530eae021eb
dotnet-apphost-pack-3.1-3.1.25-1.el8_6.x86_64.rpm
7c157f825b5ce5811a9d4bf3dabd4f093ecbc9e49e6b5b8bd82c13fabfdbd540
dotnet-apphost-pack-5.0-5.0.17-1.el8_6.x86_64.rpm
d796e4163087da226589f147642c803920504ffbb7f14ebd7dd77d63069371e7
dotnet-apphost-pack-6.0-6.0.5-1.el8_6.x86_64.rpm
1a7f2653de383eb098b609f65685bcc7e79e20753b2856fbfefeb8ffdd140644
dotnet-host-6.0.5-1.el8_6.x86_64.rpm
6f5fd968b6afcae67cf7a675c29bf1132f22d07ac6a0485d4e9a3946c24ad8ec
dotnet-hostfxr-3.1-3.1.25-1.el8_6.x86_64.rpm
262fefa7902f53fb17cd03a722bce57a045228e9edd9fa9208a9ea0b0ba445af
dotnet-hostfxr-5.0-5.0.17-1.el8_6.x86_64.rpm
7c90bf6baddc73ce33607cbe4a3dd8ce09e4924bd71cfeec24ca034ae75c715b
dotnet-hostfxr-6.0-6.0.5-1.el8_6.x86_64.rpm
300faa33609d3d855a3f3bccdc829deade5f7eb062a38fbd19696da8b5a66c42
dotnet-runtime-3.1-3.1.25-1.el8_6.x86_64.rpm
a89e9e77423da793ed6a383f1265cdf7ebffc6a99cdc2060b5864fa2c97a2336
dotnet-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm
4b94310a8e8c720fcfb381249798db29d48530ecf929e416952823ff2e0c8d85
dotnet-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm
ae1c22f5b6f35c7733e019c53e1a25ddfc3ff36b174b863be945cad1efa8d47f
dotnet-sdk-3.1-3.1.419-1.el8_6.x86_64.rpm
e193f8bff7bd1809e62193cffcb7fa2334d3ab154cb64bcb27e5faad82dfa874
dotnet-sdk-5.0-5.0.214-1.el8_6.x86_64.rpm
b09467d0681cdf6529562e270694a024f25a0b925c9084269141502fa9c46420
dotnet-sdk-6.0-6.0.105-1.el8_6.x86_64.rpm
7c0005651e8718bba891fba51d563d0718345306c6d44b3740b66a77c2fcf6a9
dotnet-targeting-pack-3.1-3.1.25-1.el8_6.x86_64.rpm
d5880f077a71534b12d3b19332c65eb1d740662eedcb347a60df9fbe2a457069
dotnet-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm
e9caa16fc3a9a967eaddcc7b7dd4dccdc929c7dbedeb58c0243c0870492af325
dotnet-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm
109537126216cb649f1835c1a7759d665a383b7f5046205e7b01c1eeaf127e70
dotnet-templates-3.1-3.1.419-1.el8_6.x86_64.rpm
4728a16a4ab8ca0bf6edb8208179aaf86852632ec652cc8302e8bb6b2e9fcb92
dotnet-templates-5.0-5.0.214-1.el8_6.x86_64.rpm
2f603a86303818a50b579bc999d12d8e8ed69db10575ea3ce048cdc021c7f969
dotnet-templates-6.0-6.0.105-1.el8_6.x86_64.rpm
b05606f5a00cbcde5c17a88d32ac4b7746ca04ed45f8df6417d0b1c34e6e6f73
netstandard-targeting-pack-2.1-6.0.105-1.el8_6.x86_64.rpm
1bb145c46608f933ebea4b268ca0922ff5ad7e9d769b4b71833222ce84740d24
RLSA-2022:1777
Moderate: webkit2gtk3 security, bug fix, and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for webkit2gtk3 is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:1777
Rocky Linux 8
webkit2gtk3-2.34.6-1.el8.i686.rpm
1763e4cd8cb39b3134dfb1579d8ff090cb794978970d3f692abd922afc8fc404
webkit2gtk3-2.34.6-1.el8.x86_64.rpm
d74c016528055ff3a12ee190dda714df7255ca92065f70b0fd275f3d61204974
webkit2gtk3-devel-2.34.6-1.el8.i686.rpm
b73465b6e1775ee5615d32be46cf0aa81d093ac52647d15c27acc6b22729055a
webkit2gtk3-devel-2.34.6-1.el8.x86_64.rpm
1dee55b448206d8acdda5aea1cb4c0e8cd7ffb20bcd1d642377d3b96ac1d09aa
webkit2gtk3-jsc-2.34.6-1.el8.i686.rpm
600a932fc8e6df7e83144b6f246a01d7993e397f9fed6c92f99564b11310cc4e
webkit2gtk3-jsc-2.34.6-1.el8.x86_64.rpm
a611bddb1e3d46f45f8170cdfc64a8cab8383fefb7b1d95f884424a2b3b401ef
webkit2gtk3-jsc-devel-2.34.6-1.el8.i686.rpm
71a209d3ce40f120fac580a9a87b02fa35f3ffad06dca4ac2439ac70dca7ca2d
webkit2gtk3-jsc-devel-2.34.6-1.el8.x86_64.rpm
21d9fc119349e0906576b1af8beb6cb23b9081f507b73621963a0433c8f39372
RLSA-2022:2031
Low: libssh security, bug fix, and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update for libssh is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:2031
Rocky Linux 8
libssh-devel-0.9.6-3.el8.i686.rpm
4a9b1c9d0bfc6a5346035675fa96793e173fbe235e8f7dba6f0e1a043cbbb877
libssh-devel-0.9.6-3.el8.x86_64.rpm
7cb2b675798815b1a1bf842d17c69edf8dfc941ece898b2d471e235161e0cccc
RLBA-2021:3593
gcc-toolset-10-elfutils bug fix update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update for gcc-toolset-10-elfutils is now available for Rocky Linux 8.
For more information visit https://errata.rockylinux.org/RLBA-2021:3593
Rocky Linux 8
gcc-toolset-10-elfutils-0.182-6.el8_4.x86_64.rpm
f64e85941a97279c482bbd079fbd153255a348556053cf6e40b7b1abea70c7bf
gcc-toolset-10-elfutils-debuginfod-client-0.182-6.el8_4.i686.rpm
dea4b32d33daaa5cf93dd48e6d736fbc8ae87f03626cc746f127f1b816be2593
gcc-toolset-10-elfutils-debuginfod-client-0.182-6.el8_4.x86_64.rpm
fbf71de210a57662e2215e22fe634b8822b0533020a47c1f6615e0e50b9c2e66
gcc-toolset-10-elfutils-debuginfod-client-devel-0.182-6.el8_4.i686.rpm
e923f2207f99247d9dfddc1cb2aed5b36fe36f1e441374b4b6a768ec6bd6a860
gcc-toolset-10-elfutils-debuginfod-client-devel-0.182-6.el8_4.x86_64.rpm
47103bfcc834e8d9585ea457e023013726ea8fd98bfb6cc9ab1003ac9df38925
gcc-toolset-10-elfutils-devel-0.182-6.el8_4.i686.rpm
589fcba6c71733265f0d4f18d6ec1200079f23eb3b475aa4b4622b8824153854
gcc-toolset-10-elfutils-devel-0.182-6.el8_4.x86_64.rpm
20d78a08fcad187ce1fe69bdb260016abe2cfc43d6fe882099adfc1c11cb4b55
gcc-toolset-10-elfutils-libelf-0.182-6.el8_4.i686.rpm
9aba44906c12278e4eea29af4495c11e3904fc6f3270932cba6d61b9dbb25869
gcc-toolset-10-elfutils-libelf-0.182-6.el8_4.x86_64.rpm
b27fdaf713c099c491534f785cc4418944976ced9ace65c6a1b4cfdc64441000
gcc-toolset-10-elfutils-libelf-devel-0.182-6.el8_4.i686.rpm
63ec7c979c6905b8b59d61fb3c472846f7184fcbbfe29e72d8563da8ddf218fb
gcc-toolset-10-elfutils-libelf-devel-0.182-6.el8_4.x86_64.rpm
06e63e0c75d6871db6259dca49854a356e43dfc658de0edfb41b193111939565
gcc-toolset-10-elfutils-libs-0.182-6.el8_4.i686.rpm
5145964b5e9afa734749f7d1fa9ee072d3959cd05d69efb670ac58c159364c09
gcc-toolset-10-elfutils-libs-0.182-6.el8_4.x86_64.rpm
769e4bb8af44477862465592d22f364ae865f1f7cd86bf005b0a2e304ce20765
RLSA-2021:4451
Moderate: gnutls and nettle security, bug fix, and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for gnutls and nettle is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:4451
Rocky Linux 8
gnutls-c++-3.6.16-4.el8.i686.rpm
16e4e7457d33f3a9c5ac13a78f56dbfea5094f1e9e159a49d3c0794b60c5625e
gnutls-c++-3.6.16-4.el8.x86_64.rpm
f5cace4997962dceaeb0129f34a9f357e1b3045880753c59186ee157950dc6f4
gnutls-dane-3.6.16-4.el8.i686.rpm
d390052fbab34c8e35ce145437f9cdc717ba2d7c5935369fefa8931b781ce2b7
gnutls-dane-3.6.16-4.el8.x86_64.rpm
ea8253bb4e2cfafa089b3fd0cea3bab872085c191e7709866a1339bdcbd9234b
gnutls-devel-3.6.16-4.el8.i686.rpm
4b19d22990727cfa53992baa68db928a1de40433addee44fb3d524193670ba8f
gnutls-devel-3.6.16-4.el8.x86_64.rpm
b76969461713ad0198127c08e708dd796dc59c0eb638ad0c3f920fccd73110ab
gnutls-utils-3.6.16-4.el8.x86_64.rpm
286f9b40d0a059b5733dd733bfc82e4e84909595e8da1cfc88f22d68f43524cf
nettle-devel-3.4.1-7.el8.i686.rpm
eb98378a434c3c7b684688debf50dfc820f24ed391abafcd4bf3e45fac268fc2
nettle-devel-3.4.1-7.el8.x86_64.rpm
e139494f5eaa94ff5410adc22013d4c5b3888d875e78089bb1c3a35be09c2933
RLSA-2022:4872
Important: firefox security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update for firefox is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:4872
Rocky Linux 8
firefox-91.10.0-1.el8_6.x86_64.rpm
83ca19a3bf653a517ff937b296a7d4e17d358404197b04bece23a5ce6c0b49ed
thunderbird-91.10.0-1.el8_6.x86_64.rpm
a92648dc77a00808a20131b3e34bb85062873ec22fc154746c61159cc4d6dd01
firefox-91.10.0-1.el8_6.x86_64.rpm
83ca19a3bf653a517ff937b296a7d4e17d358404197b04bece23a5ce6c0b49ed
thunderbird-91.10.0-1.el8_6.x86_64.rpm
a92648dc77a00808a20131b3e34bb85062873ec22fc154746c61159cc4d6dd01
RLSA-2021:1983
Important: idm:DL1 security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update for the idm:DL1 module is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:1983
Rocky Linux 8
python3-jwcrypto-0.5.0-1.module+el8.4.0+430+1dcf16bb.noarch.rpm
8f52e2bf2531bf764f3d698863ec27fb18d7457493ff72fe91d5cf871eea4f02
python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm
a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033
python3-pyusb-1.0.0-9.module+el8.4.0+430+1dcf16bb.noarch.rpm
c1461c922fe67180fdd438b037b2452f88b934f2438c0d77aefd23bc8d5a620e
python3-yubico-1.3.2-9.module+el8.4.0+430+1dcf16bb.noarch.rpm
57ba1a75366409cb10214266d4ff5512a4e27e9a804f1668862e80d6dc0eecd4
python3-jwcrypto-0.5.0-1.module+el8.4.0+430+1dcf16bb.noarch.rpm
8f52e2bf2531bf764f3d698863ec27fb18d7457493ff72fe91d5cf871eea4f02
python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm
a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033
python3-pyusb-1.0.0-9.module+el8.4.0+430+1dcf16bb.noarch.rpm
c1461c922fe67180fdd438b037b2452f88b934f2438c0d77aefd23bc8d5a620e
python3-yubico-1.3.2-9.module+el8.4.0+430+1dcf16bb.noarch.rpm
57ba1a75366409cb10214266d4ff5512a4e27e9a804f1668862e80d6dc0eecd4
python3-jwcrypto-0.5.0-1.module+el8.4.0+430+1dcf16bb.noarch.rpm
8f52e2bf2531bf764f3d698863ec27fb18d7457493ff72fe91d5cf871eea4f02
python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm
a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033
python3-pyusb-1.0.0-9.module+el8.4.0+430+1dcf16bb.noarch.rpm
c1461c922fe67180fdd438b037b2452f88b934f2438c0d77aefd23bc8d5a620e
python3-yubico-1.3.2-9.module+el8.4.0+430+1dcf16bb.noarch.rpm
57ba1a75366409cb10214266d4ff5512a4e27e9a804f1668862e80d6dc0eecd4
RLSA-2021:1979
Important: squid:4 security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update for the squid:4 module is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:1979
Rocky Linux 8
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93
RLSA-2022:1930
Moderate: keepalived security and bug fix update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for keepalived is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:1930
Rocky Linux 8
keepalived-2.1.5-8.el8.x86_64.rpm
41e700d02b5f6c77b75a1fa66d487d80006360bdbcb94297ac291221ed5d319c
RLSA-2021:4903
Critical: nss security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Critical
An update for nss is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:4903
Rocky Linux 8
nss-3.67.0-7.el8_5.i686.rpm
aa2d297d55a4bc7d2c5fcfd3f26cd8604f8e759f471d1531d527c5840301b3c4
nss-3.67.0-7.el8_5.x86_64.rpm
b050e18bf644e6c217a0bf4f5a91f458424bc7597d4a7be38ee9ba6bc450a79d
nss-devel-3.67.0-7.el8_5.i686.rpm
a92a8b9c2120b6a0ce006da294d933c058961b665d3a54b4164c7bf57b2026c7
nss-devel-3.67.0-7.el8_5.x86_64.rpm
d9eaaf9754d53e21416fc5045830f62cec67aa386b57078e4157bcc30ea0f346
nss-softokn-3.67.0-7.el8_5.i686.rpm
289a2f903f28fb675d515b64322e17656317909f0effcbcec13c31b195512a5e
nss-softokn-3.67.0-7.el8_5.x86_64.rpm
1821044e946375b14a39f0d73f3a1bc8669df601c61076ee8932a18ecede2341
nss-softokn-devel-3.67.0-7.el8_5.i686.rpm
4cc44aac64b44913774eb4b0f9f0b6876e74f5068c0954f9350192e61f5f5347
nss-softokn-devel-3.67.0-7.el8_5.x86_64.rpm
acf1a833eece9d866dd96612ec902e541138f1487e72dbc77058888175568f77
nss-softokn-freebl-3.67.0-7.el8_5.i686.rpm
b1e4758ee17e0e062096d4a7dc42d1130e1ccc224885b5663eab4e9f01c377aa
nss-softokn-freebl-3.67.0-7.el8_5.x86_64.rpm
cddb83d15260e2bfd151633963092ad239a416b37478add83eee0bb69c35472b
nss-softokn-freebl-devel-3.67.0-7.el8_5.i686.rpm
dd265aca1c251fdb2a5fe8974d34010ab95ff2cee1f7d9f74837e84b51847681
nss-softokn-freebl-devel-3.67.0-7.el8_5.x86_64.rpm
3c82897ae2d43abe2842ec6738de4e2e158eba476a66bd38b4716bc51a6a8055
nss-sysinit-3.67.0-7.el8_5.x86_64.rpm
c278b5bf6e1ebb927ee71d3748ddc657fdaba8ff6eeefd4d9b86ec665bbcd398
nss-tools-3.67.0-7.el8_5.x86_64.rpm
b99a319b024c11d4bb3735040acf17813ec40e40cf770bb78c507f900574bc20
nss-util-3.67.0-7.el8_5.i686.rpm
35f59e0b907027a693a391fcb4a7df7ca79f03e53ff27ee5769c64d42752b3a1
nss-util-3.67.0-7.el8_5.x86_64.rpm
1b1e28f5988c5af06559c8e8898373a99837b1cc7a1a58450bce001f063ba8c2
nss-util-devel-3.67.0-7.el8_5.i686.rpm
2441423b11a67f6a12a0e594e6648dd4dc553f0e78343631a41d25e13bd5c7a4
nss-util-devel-3.67.0-7.el8_5.x86_64.rpm
d76484b976f6e1868076da9ae8a92104153b272ea4faec1532ae42a1185403ac
RLSA-2022:5056
Important: cups security and bug fix update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update for cups is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:5056
Rocky Linux 8
cups-2.2.6-45.el8_6.2.x86_64.rpm
1def7e8edea64aa177797768bdf95859d478e4f45243ea93898b392276ff3cdf
cups-client-2.2.6-45.el8_6.2.x86_64.rpm
f0f8351929d603b7b76e4bfa77c54b25b78788d98a4d102de3fc364f1cbfe77e
cups-devel-2.2.6-45.el8_6.2.i686.rpm
3c109dae8bbf159eb43ef6d115c968acae1d7448a9b12ce0efcee142cb6f2a9e
cups-devel-2.2.6-45.el8_6.2.x86_64.rpm
ed791ac2eb00541534468618fcb033892a304fa33326fc3a52766114b5a7c8c1
cups-filesystem-2.2.6-45.el8_6.2.noarch.rpm
35e4b12c7ccdd9bfb176d3146f295e332e3c9e20659b55f3b5907d0b3a3c882a
cups-ipptool-2.2.6-45.el8_6.2.x86_64.rpm
30b7c2814c74654cc5b6f78d1087a070fdf523a1d0245b29cfb724b3b6a4b757
cups-lpd-2.2.6-45.el8_6.2.x86_64.rpm
7714f35ba101a2bb0dc1f40e174b7f7bc06cbfb8785d383de4899b824ec8de4f
RLSA-2021:2583
Moderate: python38:3.8 and python38-devel:3.8 security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for the python38:3.8 and python38-devel:3.8 modules is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:2583
Rocky Linux 8
python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm
c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5
python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm
e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885
python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm
c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058
python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm
6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b
python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm
12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33
python38-mod_wsgi-4.6.8-3.module+el8.4.0+570+c2eaf144.x86_64.rpm
c504193195a97b1802c950a753237b34bc16b4673c232c25bb589dab51255f41
python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm
d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba
python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm
21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9
python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm
5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1
python38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm
693b174f895dd685857753ad75f07f4fdb95e82a88e4c3f8618392b5d4b81b5e
python39-chardet-3.0.4-19.module+el8.4.0+574+843c4898.noarch.rpm
9a21825b6b2a472ec12024574f4d39e2b516dec4a8bf1514572f05bed2915afd
python39-ply-3.11-10.module+el8.4.0+574+843c4898.noarch.rpm
964120ccea403bb0c770c16065565fb671e85f9c8f3d5807544259f183ac23ac
python39-pysocks-1.7.1-4.module+el8.4.0+574+843c4898.noarch.rpm
6d48f8fb19e1cce6f8d808cd72005c6c87cf0569a296bd22c509b0c27f020660
RLSA-2022:5163
Low: httpd:2.4 security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update for the httpd:2.4 module is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:5163
Rocky Linux 8
httpd-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
2ff10cfc3e3f3a717a6402ba7ad98d9afa5b88c178d653481ba90104e066d093
httpd-devel-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
9af273600fbaa5ddf2edc2dd0b3ddbafbc77c6cf72fc4f5cab88b95c591e5325
httpd-filesystem-2.4.37-47.module+el8.6.0+985+b8ff6398.2.noarch.rpm
4a3e8996c1ac45467499555f8626731f59228c0efbbb36003d9a364a8b7d082e
httpd-manual-2.4.37-47.module+el8.6.0+985+b8ff6398.2.noarch.rpm
7a062f3fe19623f5189be392bf870275bd9e7de0b082441ac60e925aef7aa9b2
httpd-tools-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
a0a124a51496534bfde1f69fba84b6d97e9e1ba3b56a7c6b4d35af80e99a4f3b
mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm
4c38731a882c46a2a227c602054bc420cc132713bc60608912a5462181585ac5
mod_ldap-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
cedc735a81b123c864c97d7bf6cfe707d643e8b164c65f692c36b6cfce2c78c9
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
mod_proxy_html-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
0fe237bf434610661cb76bf2a735e3b49a908100094aa69e6b63c19141d352a0
mod_session-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
ce05c3d83cd4f2b9c156046c056a57d9b62a3eeb08bdbcb45a553bcf7ba5cf1b
mod_ssl-2.4.37-47.module+el8.6.0+985+b8ff6398.2.x86_64.rpm
f2c075771ffc5534432913468f667e6ea7a6dce0a0f1eb184a24f03e1aecb8ee
RLSA-2021:3623
Important: nodejs:12 security and bug fix update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update for the nodejs:12 module is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:3623
Rocky Linux 8
nodejs-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm
6eda5b4e2f92a536468d0e044f8c6dceaf5abd6f3ef01ccc23a4274350682524
nodejs-devel-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm
50c090640fb144376fa6f27305ba9f617a224971cae68d49f5d8ab4bdd7e0b9a
nodejs-docs-12.22.5-1.module+el8.4.0+647+e905fa21.noarch.rpm
8bb738d9c8410f662b3c2f32aed10130e9f6887e873754199bb435970d32470f
nodejs-full-i18n-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm
c5ae64d1ca085036e507b540533798726e90180d8fe6a69416f13c3551351278
nodejs-packaging-23-3.module+el8.5.0+733+de4fee6c.noarch.rpm
de384459a7bf627a23b2dc78c14c6b94ae7402e3185305950a7a1e86cb1e823a
npm-6.14.14-1.12.22.5.1.module+el8.4.0+647+e905fa21.x86_64.rpm
ecdf41ce219c3afc89f36ee75da98797809ff753994f1c699477de2bf265062a
nodejs-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm
6eda5b4e2f92a536468d0e044f8c6dceaf5abd6f3ef01ccc23a4274350682524
nodejs-devel-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm
50c090640fb144376fa6f27305ba9f617a224971cae68d49f5d8ab4bdd7e0b9a
nodejs-docs-12.22.5-1.module+el8.4.0+647+e905fa21.noarch.rpm
8bb738d9c8410f662b3c2f32aed10130e9f6887e873754199bb435970d32470f
nodejs-full-i18n-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm
c5ae64d1ca085036e507b540533798726e90180d8fe6a69416f13c3551351278
nodejs-packaging-23-3.module+el8.5.0+733+de4fee6c.noarch.rpm
de384459a7bf627a23b2dc78c14c6b94ae7402e3185305950a7a1e86cb1e823a
npm-6.14.14-1.12.22.5.1.module+el8.4.0+647+e905fa21.x86_64.rpm
ecdf41ce219c3afc89f36ee75da98797809ff753994f1c699477de2bf265062a
nodejs-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm
6eda5b4e2f92a536468d0e044f8c6dceaf5abd6f3ef01ccc23a4274350682524
nodejs-devel-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm
50c090640fb144376fa6f27305ba9f617a224971cae68d49f5d8ab4bdd7e0b9a
nodejs-docs-12.22.5-1.module+el8.4.0+647+e905fa21.noarch.rpm
8bb738d9c8410f662b3c2f32aed10130e9f6887e873754199bb435970d32470f
nodejs-full-i18n-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm
c5ae64d1ca085036e507b540533798726e90180d8fe6a69416f13c3551351278
nodejs-packaging-23-3.module+el8.5.0+733+de4fee6c.noarch.rpm
de384459a7bf627a23b2dc78c14c6b94ae7402e3185305950a7a1e86cb1e823a
npm-6.14.14-1.12.22.5.1.module+el8.4.0+647+e905fa21.x86_64.rpm
ecdf41ce219c3afc89f36ee75da98797809ff753994f1c699477de2bf265062a
RLSA-2021:3074
Moderate: nodejs:14 security, bug fix, and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for the nodejs:14 module is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:3074
Rocky Linux 8
nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm
eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm
eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm
eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm
eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm
eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
RLSA-2022:1730
Important: thunderbird security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update for thunderbird is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:1730
Rocky Linux 8
thunderbird-91.9.0-3.el8_5.x86_64.rpm
5382b81916e6a938f30afcf2ae8f7861ea22543e665b56fe0807571691f10daf
RLSA-2021:4381
Moderate: GNOME security, bug fix, and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for GNOME is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:4381
Rocky Linux 8
gnome-autoar-0.2.3-2.el8.i686.rpm
7df0767dcf8e4e1f791a56142199e265d9d2ddc7b3919b7aba93402e82802db1
gnome-autoar-0.2.3-2.el8.x86_64.rpm
ec104b742f1ee24ed3b790f8bcf2e9c3624d835c37d4f046226737569af9c0b5
gnome-calculator-3.28.2-2.el8.x86_64.rpm
bfc480d1f9e922cdeebbd6056672a2a349776204c6be7a6240a5eea1a623de39
gnome-online-accounts-3.28.2-3.el8.i686.rpm
c62c2f20e4765b4ee9a4cb86fdc3676f07ee1bf88c6e6f787989f7f3201dc539
gnome-online-accounts-3.28.2-3.el8.x86_64.rpm
128fe18ab8bfd55fcf3d048764c08baa784e475c43e05bee007663ed65266f64
gnome-online-accounts-devel-3.28.2-3.el8.i686.rpm
83eba37218a17c873e8339da654bd7fdf30542e309fe541d8fbb22e9e114077f
gnome-online-accounts-devel-3.28.2-3.el8.x86_64.rpm
2424a681b21ec3cc257eb8117d833e143b766ced3bb3f0d80fc6580ebe78b52d
gnome-settings-daemon-3.32.0-16.el8.x86_64.rpm
1f0b302fe6d536520fa78ee670b4a02602f305c8e04833ad4e0297a07118cc25
gnome-software-3.36.1-10.el8.x86_64.rpm
2a9f077aa8113e2a4c4c3788d5258918fd7aaa4a97a3b5696d604e849fd23c5d
gsettings-desktop-schemas-3.32.0-6.el8.i686.rpm
9e3de8ab0df91a21383d9784b9ef2889a54058eea2c18c31142a4eb99b055039
gsettings-desktop-schemas-devel-3.32.0-6.el8.i686.rpm
6a8b085c3076824a5080c1bad4047d4c0177387ca5018fe0e82293d9ac621037
gsettings-desktop-schemas-devel-3.32.0-6.el8.x86_64.rpm
440c33ca267b2f26215df09174ce6574a2bb5113fe6d7c740eba3f1133c93af8
LibRaw-0.19.5-3.el8.i686.rpm
ca62265ca6516b645dcb52d822cd12b25d42ebb51c998fa008f218596d254b7a
LibRaw-0.19.5-3.el8.x86_64.rpm
df151c39f20ea9815d46aff810e74f2c837a34fb755909c23d2e159714999d90
vino-3.22.0-11.el8.x86_64.rpm
3ba0c279a775b11f29b6dbeb5daa462d4bbe721a3bc0f541dcaa8b0c25555ec1
RLSA-2021:2588
Moderate: ruby:2.6 security, bug fix, and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for the ruby:2.6 module is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:2588
Rocky Linux 8
rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3
rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm
1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505
rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6
rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b
rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6
rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e
rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4
rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac
rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21
rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093
rubygem-abrt-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm
0db38261694321b3fe358091a3b00b487152713cd0b2075c79c2a695f039602e
rubygem-abrt-doc-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm
88c0b4efaf57ff92de9214032eead69fd4e8cbbe9fb31aa2869e626e9d91de28
rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3
rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm
1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505
rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm
7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc
rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6
rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b
rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm
861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498
rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d
rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6
rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e
rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6
rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4
rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac
rubygem-mysql2-0.5.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm
a7b94f06c62bf6f720d4e22dd40ec7c86beffb871418fd41761eade4c94320ac
rubygem-mysql2-doc-0.5.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
6e0d3c34c3e32ae39c98ef6a7ced21bfc9d98ed97a60f0cd250e25f340ed03b0
rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21
rubygem-pg-1.2.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm
49ab41e4cac5db1b5c138740ebf80c32ba208b24fac3dc1505b15b93513d7fba
rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093
rubygem-pg-doc-1.2.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
c09ae194775cac6c4c6b26052d23abb727f170cf8a3d26de38f9963cb23db7c9
rubygem-abrt-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm
0db38261694321b3fe358091a3b00b487152713cd0b2075c79c2a695f039602e
rubygem-abrt-doc-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm
88c0b4efaf57ff92de9214032eead69fd4e8cbbe9fb31aa2869e626e9d91de28
rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3
rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm
1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505
rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm
7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc
rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6
rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b
rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm
861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498
rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d
rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6
rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e
rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6
rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4
rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac
rubygem-mysql2-0.5.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm
a7b94f06c62bf6f720d4e22dd40ec7c86beffb871418fd41761eade4c94320ac
rubygem-mysql2-doc-0.5.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
6e0d3c34c3e32ae39c98ef6a7ced21bfc9d98ed97a60f0cd250e25f340ed03b0
rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21
rubygem-pg-1.2.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm
49ab41e4cac5db1b5c138740ebf80c32ba208b24fac3dc1505b15b93513d7fba
rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093
rubygem-pg-doc-1.2.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
c09ae194775cac6c4c6b26052d23abb727f170cf8a3d26de38f9963cb23db7c9
rubygem-abrt-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm
0db38261694321b3fe358091a3b00b487152713cd0b2075c79c2a695f039602e
rubygem-abrt-doc-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm
88c0b4efaf57ff92de9214032eead69fd4e8cbbe9fb31aa2869e626e9d91de28
rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3
rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm
1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505
rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm
7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc
rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6
rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b
rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm
861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498
rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d
rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6
rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e
rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6
rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4
rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac
rubygem-mysql2-0.5.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm
a7b94f06c62bf6f720d4e22dd40ec7c86beffb871418fd41761eade4c94320ac
rubygem-mysql2-doc-0.5.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
6e0d3c34c3e32ae39c98ef6a7ced21bfc9d98ed97a60f0cd250e25f340ed03b0
rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21
rubygem-pg-1.2.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm
49ab41e4cac5db1b5c138740ebf80c32ba208b24fac3dc1505b15b93513d7fba
rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093
rubygem-pg-doc-1.2.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
c09ae194775cac6c4c6b26052d23abb727f170cf8a3d26de38f9963cb23db7c9
RLSA-2022:5046
Moderate: .NET 6.0 security and bugfix update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for .NET 6.0 is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:5046
Rocky Linux 8
aspnetcore-runtime-3.1-3.1.26-1.el8_6.x86_64.rpm
5f70101f414acb836e44a8c3273c6e762909ebaed7154d6474fc9f519379979c
aspnetcore-runtime-6.0-6.0.6-1.el8_6.x86_64.rpm
8fbc1f5d39dc387f2754fed1e8f137d152d1774d18fdbe0d533cadde19ef7b99
aspnetcore-targeting-pack-3.1-3.1.26-1.el8_6.x86_64.rpm
81c818ce04e533a5d58de33c5a47b98bc32bf1dedd4460846581ee2f103649c3
aspnetcore-targeting-pack-6.0-6.0.6-1.el8_6.x86_64.rpm
f0bbf90b2b5707ed1b872bdd9e07553acdf421961b685af26abbade140dd35b0
dotnet-6.0.106-1.el8_6.x86_64.rpm
402095f22050d69b5f3b1a9a038143499bb8ef59af3f57b2bb3780465c9988bc
dotnet-apphost-pack-3.1-3.1.26-1.el8_6.x86_64.rpm
66d23783d31e5d669012e923f46f19ca177fcb95336b0eacb01d322756868b40
dotnet-apphost-pack-6.0-6.0.6-1.el8_6.x86_64.rpm
d71d564d823a03a521a65cc6faad530af339a69a52f00162559f0ef378fd90be
dotnet-host-6.0.6-1.el8_6.x86_64.rpm
419c61820d5c984c8c21fc1983913e19e33f09522b13921aecca073eee5ec6ce
dotnet-hostfxr-3.1-3.1.26-1.el8_6.x86_64.rpm
35ceeea7ce9b41876e74e476c70d45eb44974aaa9edf83d691d8ddf1b1a48afa
dotnet-hostfxr-6.0-6.0.6-1.el8_6.x86_64.rpm
3362f41d6a76ff523877e76cd3fb94937efd6b039d3c4114ad572d1587fe5585
dotnet-runtime-3.1-3.1.26-1.el8_6.x86_64.rpm
1b1f4f112b2e2d1c3b07da0f99d15cd4f2a666761e86dad4a73d3ca5eddedb95
dotnet-runtime-6.0-6.0.6-1.el8_6.x86_64.rpm
24b4d011116436143e939fb1d0c44feda09d19bd8dcc7793396736d738070390
dotnet-sdk-3.1-3.1.420-1.el8_6.x86_64.rpm
c248a3770ab3a277a4a393e69f1cfd99c5caa6e241a524f16ccca6a48d35ddd1
dotnet-sdk-6.0-6.0.106-1.el8_6.x86_64.rpm
2c4cb325a5baaa4e203f023773d34b11b867736978684e0e8355af77b24808af
dotnet-targeting-pack-3.1-3.1.26-1.el8_6.x86_64.rpm
04e5137270decb5d50d1dd744e3b913878137630d3f6833f5a4cd95a9ecf71c8
dotnet-targeting-pack-6.0-6.0.6-1.el8_6.x86_64.rpm
d0b7e683a10ca5dccf0711264b44d1ed86c7527e4cac0a737ee02607d72736b5
dotnet-templates-3.1-3.1.420-1.el8_6.x86_64.rpm
d91e762014e9bc06b4886bb0d6713d3a8b7bcff25c7d65919965234ac4bda016
dotnet-templates-6.0-6.0.106-1.el8_6.x86_64.rpm
ea9c7a7e9ccea413ceadd7e49b4c3b16002fec7a30c0f03e82b6ea2ad22e98b2
netstandard-targeting-pack-2.1-6.0.106-1.el8_6.x86_64.rpm
59a0238855763584f8c2a2a74918a118a98c8cd4f62d52fd519ea0c50ce21901
aspnetcore-runtime-3.1-3.1.26-1.el8_6.x86_64.rpm
5f70101f414acb836e44a8c3273c6e762909ebaed7154d6474fc9f519379979c
aspnetcore-runtime-6.0-6.0.6-1.el8_6.x86_64.rpm
8fbc1f5d39dc387f2754fed1e8f137d152d1774d18fdbe0d533cadde19ef7b99
aspnetcore-targeting-pack-3.1-3.1.26-1.el8_6.x86_64.rpm
81c818ce04e533a5d58de33c5a47b98bc32bf1dedd4460846581ee2f103649c3
aspnetcore-targeting-pack-6.0-6.0.6-1.el8_6.x86_64.rpm
f0bbf90b2b5707ed1b872bdd9e07553acdf421961b685af26abbade140dd35b0
dotnet-6.0.106-1.el8_6.x86_64.rpm
402095f22050d69b5f3b1a9a038143499bb8ef59af3f57b2bb3780465c9988bc
dotnet-apphost-pack-3.1-3.1.26-1.el8_6.x86_64.rpm
66d23783d31e5d669012e923f46f19ca177fcb95336b0eacb01d322756868b40
dotnet-apphost-pack-6.0-6.0.6-1.el8_6.x86_64.rpm
d71d564d823a03a521a65cc6faad530af339a69a52f00162559f0ef378fd90be
dotnet-host-6.0.6-1.el8_6.x86_64.rpm
419c61820d5c984c8c21fc1983913e19e33f09522b13921aecca073eee5ec6ce
dotnet-hostfxr-3.1-3.1.26-1.el8_6.x86_64.rpm
35ceeea7ce9b41876e74e476c70d45eb44974aaa9edf83d691d8ddf1b1a48afa
dotnet-hostfxr-6.0-6.0.6-1.el8_6.x86_64.rpm
3362f41d6a76ff523877e76cd3fb94937efd6b039d3c4114ad572d1587fe5585
dotnet-runtime-3.1-3.1.26-1.el8_6.x86_64.rpm
1b1f4f112b2e2d1c3b07da0f99d15cd4f2a666761e86dad4a73d3ca5eddedb95
dotnet-runtime-6.0-6.0.6-1.el8_6.x86_64.rpm
24b4d011116436143e939fb1d0c44feda09d19bd8dcc7793396736d738070390
dotnet-sdk-3.1-3.1.420-1.el8_6.x86_64.rpm
c248a3770ab3a277a4a393e69f1cfd99c5caa6e241a524f16ccca6a48d35ddd1
dotnet-sdk-6.0-6.0.106-1.el8_6.x86_64.rpm
2c4cb325a5baaa4e203f023773d34b11b867736978684e0e8355af77b24808af
dotnet-targeting-pack-3.1-3.1.26-1.el8_6.x86_64.rpm
04e5137270decb5d50d1dd744e3b913878137630d3f6833f5a4cd95a9ecf71c8
dotnet-targeting-pack-6.0-6.0.6-1.el8_6.x86_64.rpm
d0b7e683a10ca5dccf0711264b44d1ed86c7527e4cac0a737ee02607d72736b5
dotnet-templates-3.1-3.1.420-1.el8_6.x86_64.rpm
d91e762014e9bc06b4886bb0d6713d3a8b7bcff25c7d65919965234ac4bda016
dotnet-templates-6.0-6.0.106-1.el8_6.x86_64.rpm
ea9c7a7e9ccea413ceadd7e49b4c3b16002fec7a30c0f03e82b6ea2ad22e98b2
netstandard-targeting-pack-2.1-6.0.106-1.el8_6.x86_64.rpm
59a0238855763584f8c2a2a74918a118a98c8cd4f62d52fd519ea0c50ce21901
RLSA-2022:5470
Important: thunderbird security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update for thunderbird is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:5470
Rocky Linux 8
firefox-91.11.0-2.el8_6.x86_64.rpm
77026735c2b8087eca3fe70550e282411c33df5d1f00a86f157cebbafb822d77
thunderbird-91.11.0-2.el8_6.x86_64.rpm
d592780374748ecf672c96024400bd51e4c7251d76c27b3d46cdca85f15d2799
firefox-91.11.0-2.el8_6.x86_64.rpm
77026735c2b8087eca3fe70550e282411c33df5d1f00a86f157cebbafb822d77
thunderbird-91.11.0-2.el8_6.x86_64.rpm
d592780374748ecf672c96024400bd51e4c7251d76c27b3d46cdca85f15d2799
RLSA-2021:2363
Important: gupnp security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update for gupnp is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:2363
Rocky Linux 8
gupnp-1.0.6-2.el8_4.i686.rpm
9b8dddbfbdc089e8168175fa66c8f695977c2720f6f4bd441196cb9b5e701662
gupnp-1.0.6-2.el8_4.x86_64.rpm
99156c05f5915a79b954b5a4e6d5d38b65d7c455f9a66af27e036a35635570cc
RLSA-2021:4622
Important: freerdp security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update for freerdp is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:4622
Rocky Linux 8
freerdp-2.2.0-7.el8_5.x86_64.rpm
acf21c1eeed45c522a4dd8f44b30779ab83b1a3c648b53ba9a43951f4e56bf1c
freerdp-libs-2.2.0-7.el8_5.i686.rpm
8bde65f2d37f4a0832cc276b52c0dec889feb2ef19680f938c80677c2be8f633
freerdp-libs-2.2.0-7.el8_5.x86_64.rpm
0302055f4b4c6738477eb15068598026a5425954c72905c949181ef848364f63
libwinpr-2.2.0-7.el8_5.i686.rpm
595048be37744b36d5480ffdb9b6c08ef5817109da3ff5e6416466e6369a1072
libwinpr-2.2.0-7.el8_5.x86_64.rpm
90abb5fd442565640cc5e9fbeac05901e398fdb97838c1ab87d7b0ef51931d36
libwinpr-devel-2.2.0-7.el8_5.i686.rpm
1e9bfc11aeb8012ec3d75b33a6cab3b78ab4d822b01cc185c7f591c88e011f1c
libwinpr-devel-2.2.0-7.el8_5.x86_64.rpm
1cfe282e82a7ca1b9e2ee3f52d5d16a0ac13c6889c201dc2c36d551854893fa1
RLBA-2021:3240
.NET Core 2.1 bugfix update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update for .NET Core 2.1 is now available for Rocky Linux.
For more information visit https://errata.rockylinux.org/RLBA-2021:3240
Rocky Linux 8
dotnet-host-fxr-2.1-2.1.30-1.el8_4.rocky.x86_64.rpm
a4d8e71402fc6bd36ccae8ba4395eb873b0f3c784db09d3084e6ca440cda925d
dotnet-runtime-2.1-2.1.30-1.el8_4.rocky.x86_64.rpm
cbfff6de30501753f7e3e22633e6bb2b79f127fe1aa3852be5f49569a0197f4c
dotnet-sdk-2.1-2.1.526-1.el8_4.rocky.x86_64.rpm
b01ae5a57232950f63cd3847d35e22abbbb6ed9546f798908e4f2c4f5e491649
dotnet-sdk-2.1.5xx-2.1.526-1.el8_4.rocky.x86_64.rpm
c366fad3118e4a8e74178c05148f40faaf4f058e720a4bf78926f6713b259deb
RLSA-2021:2259
Important: nginx:1.18 security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update for the nginx:1.18 module is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:2259
Rocky Linux 8
nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
a7e8f12bcadbfb850ced0c9f7c738dd34bce16d491e5145b3cdd7f3ad6e5e6ee
nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
bf37394530514e4f89d360aa6c4ea22c049dd243a88a84dcb83209895c5168c7
nginx-all-modules-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm
3b0073666d96b7699491be25e37ada5e61fb5fcffdb5605bc6c757d2f22098de
nginx-all-modules-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm
7fb26e744e26ed89e749ac1a22dbf72e28fa553724839a76dfcbceb3ed840d90
nginx-filesystem-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm
51ffdebca045cd896d1166a62b73ccec82c034bf133f6fb3ffbeb10719924991
nginx-filesystem-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm
43fa77fc74095e53b63439cb405f6a8a9617913fa085beacb4d740d4fe316c37
nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
5d100dcfd14470e027fd70954a37040a03c5ac42b28d06f353788d7800d33a20
nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
03d6fe221bb98ed1b023d3513435e18887c7818bae8c4d71f6c2f983417eb7e7
nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
e73f87b0fe704a434776fbb00e5b0c15259070dd098fbf73c8e26f0492013e55
nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
771754953dbb211e3464a1e9f14561ec5f8b7742de5e6677e294fe4e3bf3d334
nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
980d5cd6502bc54e842f0ec78820541adc7e4ed15e213756a0426c1431fbb904
nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
1aaf30cd71829f8482f1d7bfd73b17c6356cfa9b881da79a6928108890e22ddc
nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
29ab92d9f77c68de5b9f91c600b0bef4b3b2afbb1cc01891f200d26883010a4f
nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
4c9c4c5d0ee6e2d0e774a37dc131d64267485d95033ca486b157f37b86b39449
nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
12a16e26088f86d84e6a0b8295960956284b6588f87ede147e1347b24ad31462
nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
9d1bafbf400e3d4432337f9651a87c8b4b3f7e696a10910232c9c4d0ae0f719e
nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
a7e8f12bcadbfb850ced0c9f7c738dd34bce16d491e5145b3cdd7f3ad6e5e6ee
nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
bf37394530514e4f89d360aa6c4ea22c049dd243a88a84dcb83209895c5168c7
nginx-all-modules-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm
3b0073666d96b7699491be25e37ada5e61fb5fcffdb5605bc6c757d2f22098de
nginx-all-modules-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm
7fb26e744e26ed89e749ac1a22dbf72e28fa553724839a76dfcbceb3ed840d90
nginx-filesystem-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm
51ffdebca045cd896d1166a62b73ccec82c034bf133f6fb3ffbeb10719924991
nginx-filesystem-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm
43fa77fc74095e53b63439cb405f6a8a9617913fa085beacb4d740d4fe316c37
nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
5d100dcfd14470e027fd70954a37040a03c5ac42b28d06f353788d7800d33a20
nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
03d6fe221bb98ed1b023d3513435e18887c7818bae8c4d71f6c2f983417eb7e7
nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
e73f87b0fe704a434776fbb00e5b0c15259070dd098fbf73c8e26f0492013e55
nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
771754953dbb211e3464a1e9f14561ec5f8b7742de5e6677e294fe4e3bf3d334
nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
980d5cd6502bc54e842f0ec78820541adc7e4ed15e213756a0426c1431fbb904
nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
1aaf30cd71829f8482f1d7bfd73b17c6356cfa9b881da79a6928108890e22ddc
nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
29ab92d9f77c68de5b9f91c600b0bef4b3b2afbb1cc01891f200d26883010a4f
nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
4c9c4c5d0ee6e2d0e774a37dc131d64267485d95033ca486b157f37b86b39449
nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
12a16e26088f86d84e6a0b8295960956284b6588f87ede147e1347b24ad31462
nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
9d1bafbf400e3d4432337f9651a87c8b4b3f7e696a10910232c9c4d0ae0f719e
RLSA-2022:5467
Important: php:7.4 security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update for the php:7.4 module is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:5467
Rocky Linux 8
apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm
cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe
apcu-panel-5.1.20-1.module+el8.6.0+790+fc63e43f.noarch.rpm
0e9d74cc0eba28463f32c2fcd7da6b7959146b32f959df3c9c876cfe4b743680
libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14
libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
996d397031508e9101b6e9a0094a6cba118da93efb4f1b1bd224769d65008d91
libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f
libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
6f832b96a25a454bc576303745f9cb041a65531528a90437ab6936505abc7177
libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77
libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
e4f4ace1b7cc21f2018213138a4ee06fe6150056f4170206a595de2e6f581b77
php-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
a4febeee8d494a1f555ad1a58dcbfdef89784d2cbab135d2e216a8b68be6f66b
php-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
33de3488d56e32629eb3368ce59728a33b544fa06a40ae916349f4a71e28a2a7
php-bcmath-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
879a7eb3d80872fee5de77d61ca6c7f7f49df3b8e779620a37004414f76ef727
php-bcmath-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
798f10d3178811c7bae17164a81e77cf649c14804ba508c4041f2c47354d3394
php-cli-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
a9ab838793b51975b92249702949aecb79da70d43a087d000e9a97dacb67d4e9
php-cli-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
07349dab9274a1839c56d43dc06b6775ce923f33359825c7ef17222aa2dfedd2
php-common-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
69816897883913231826a258c3bbbf30c1ae8f2be20df44e6720ef8c2751070b
php-common-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
850e33e3462faef73ad8b30af20bbf5b1bb6a66fcdaf2d6405737b251ae3f9c3
php-dba-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
7ffcfa425e7dae756d19ce98dfe3c20f34f2de4d33a9b72261bd31e48e9672b7
php-dba-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
6d79bfc8eaaf0e35b43b3d53e8b5d883d5e361eac6e2789f0c737b0d3d9f06d2
php-dbg-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
ea341a2f2434ceefd6f92eb0b52f7ede51062dce9a1e16330460908ac5f1a382
php-dbg-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
5b05d2069bcd096fb5aaf5b04558b48aacc42bf24a811578970ff06f74e78faa
php-devel-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
920d8611e9febdcdcf46edac659925abafa44ec3f8c4df0239542635725af267
php-devel-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
874eae7c08de8a21759f50b253d8a9b96a44dd08513809d9cb50f7b86c7a73f7
php-embedded-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
3f079b1038fa1ccb19d40ea47db95cf7bef447785c25b6fc1973dd8e4ce42ca9
php-embedded-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
d41a98c9648d37ea6f29237ceafed762e05eb7896981288a24521bbffb831cb6
php-enchant-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
d58d0c6645d6a20bf29c7d82d3dffc563a2e3d2c50ffc37725c094cee74f4100
php-enchant-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
a950daacfed3adbbcc94483613af957439ce45dfbdb5906c5a11a15a2aaafd89
php-ffi-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
6dcacdc50af9e95b5e24729afd45e0cb1a3d58c66377d59186f274bb893c404a
php-ffi-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
7a860213ae839720bae6cc17ece06208800ded15262b05e7174f425b40e42512
php-fpm-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
6648f40551c961d7571afce832afd751a2b4593323c0033c1d217ef81f23e794
php-fpm-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
0c43099c25e4ef8e62ec8bf4e233823c218f842a58cffed28da21bb1bec4a890
php-gd-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
f272c584386ebf720aef1782a19656c97ab5a6c1b06ebeb1e052659c7b3ba12b
php-gd-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
46cd4c338ab54d3125e5639f3064927fe6468a7d91da91c513258e2c76f2cbda
php-gmp-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
1639ccbe241713b621b94177fd408774d80b3976f188cf01e4a2b9b61e13d929
php-gmp-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
fe7e418b3c518c179596815d686f5e8dd9210410107b2122dbc4b74d8e96ed2d
php-intl-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
74ddf34cb98a75dd06a42d20d2cace47a0203597f515522bb4151a93c9bd58f2
php-intl-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
b69a46d9df293a5849e9999b4f3bdb4497373e7f85bbaf2876a0d5c515941124
php-json-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
7d89c9f38a08b904aef57e80ba9e296a3d5697542827ba72ecdca733fe06cb80
php-ldap-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
7319fa42d561d7460d4fdb8c7015ebac308ae1b71b87126dda3e78dd22e5b582
php-ldap-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
151035812290a32b2432659cba2170a7c587c5b43a41c14ce76763d5ce9e6bcd
php-mbstring-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
809f869011a3c9e9a12d78e1dfe88e056f785fdba1306c94547348af7a142411
php-mbstring-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
3c92d15293eeceb5e75aab4837eb4c9d3eb65f8edabdcb37b2486fb81c178392
php-mysqlnd-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
bb69d6a16c610c1724b37493632a50e6130f1c90d7d83e57f17419347a8da346
php-mysqlnd-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
e58267502219f1ee82c808cb1f3c0d00e9d10562ad9f856fccaa82cbdcc17ba6
php-odbc-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
175124bf994ee7855293b56ef035b7842695fff5abd3a2d554721079abb936d3
php-odbc-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
1ceb0b036200e46be99257ae081afe3cce11b5ca7e3c5e35116392510c8b25f2
php-opcache-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
d093e827e814775c56ab89e76aeb86bff8a89dc46012af7dd9f75cce1565ec25
php-opcache-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
9cb46f15b80f01b9143bea8baf59850b1007a4a741f0e1c6b0dcfd5e748791e3
php-pdo-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
491b1be9633ef3462f08e57af0d7e1a92cb412688fa143772d5c36828a438a49
php-pdo-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
463e761391433286e77b9acb2d159aa7fa51a4b0137bd6e24c41243831f95ea3
php-pear-1.10.12-1.module+el8.6.0+789+2130c178.noarch.rpm
c20c31a8cafb68671583a79c3a85b7a87668132557e1adb08b2ff7ce6a9c4058
php-pear-1.10.13-1.module+el8.6.0+790+fc63e43f.noarch.rpm
e46b2f905e5a36adba35af3f70884467592cb7ba32cecfaee3d1192127eb04e5
php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d
php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
f1572b2afbf482909317a87e31242e42931f5d4da5084ad048e349a6cbf16e74
php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4
php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
8912da51f22348d378782eaa3188d977be4ecf0f2b59ab80aee4e18b01ef35d6
php-pecl-rrd-2.0.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
0715edabc98e62f4980b4485417182bc7e39b3dddbfd94a41a2eb53bc9201135
php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
2678c55e406ed194b50e9eb58d1caa05bb088bfb1744af92db94f4cf86fc0cff
php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm
2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30
php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
a34ecbe5457a2820ef2959811e2ed8512a48561f9c9d02588ff4a0d086df308f
php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm
04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657
php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
74648336246a6f9ccd0520eb157ee3237bb3553bb7a1810f49cf1e3bfcf5ba60
php-pgsql-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
fe48b9201336ee70beeaeae6dd39f293f463a2216306f497b58237839cc929dd
php-pgsql-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
3983d0b71fc33e34f57f6efc4162f06fd14181a44f03987412fe1c808a6c73d8
php-process-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
09c20637c652a99e109b591ce13575466f6fbaef30d5ac1ef382c2306628b4cd
php-process-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
2337c39530e88dbc004d6d967bed426f3c5137ac8b734acfc242bee8fec36ac7
php-snmp-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
dfd9436a32cbd22422d71dc345a4c56434727236ff01edae23e3b52a04ea427e
php-snmp-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
66e846d00c10931b080c132dcbc1125f385475acb10f50450576591dfa29471b
php-soap-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
6446c04f3bcbeb687005662b18fc6e1a4e073d333591aeef80a3c4352a780e83
php-soap-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
728e4d7e83730ea963a83f492c52670485ff0dc9670166045ed210c713ec8886
php-xml-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
984b7604c5e952c676c902f0ecebecace5b0cc3577043137de58cac56396e037
php-xml-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
1635eab26e5fc55dd48f2ff06106168d1ec0a556e75691f48ad2c7f82fbd867a
php-xmlrpc-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
833d09983f38255e7e7bb014df4478dcaa988654ac003375025c3ed8375ca677
apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm
cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe
apcu-panel-5.1.20-1.module+el8.6.0+790+fc63e43f.noarch.rpm
0e9d74cc0eba28463f32c2fcd7da6b7959146b32f959df3c9c876cfe4b743680
libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14
libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
996d397031508e9101b6e9a0094a6cba118da93efb4f1b1bd224769d65008d91
libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f
libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
6f832b96a25a454bc576303745f9cb041a65531528a90437ab6936505abc7177
libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77
libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
e4f4ace1b7cc21f2018213138a4ee06fe6150056f4170206a595de2e6f581b77
php-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
a4febeee8d494a1f555ad1a58dcbfdef89784d2cbab135d2e216a8b68be6f66b
php-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
33de3488d56e32629eb3368ce59728a33b544fa06a40ae916349f4a71e28a2a7
php-bcmath-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
879a7eb3d80872fee5de77d61ca6c7f7f49df3b8e779620a37004414f76ef727
php-bcmath-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
798f10d3178811c7bae17164a81e77cf649c14804ba508c4041f2c47354d3394
php-cli-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
a9ab838793b51975b92249702949aecb79da70d43a087d000e9a97dacb67d4e9
php-cli-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
07349dab9274a1839c56d43dc06b6775ce923f33359825c7ef17222aa2dfedd2
php-common-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
69816897883913231826a258c3bbbf30c1ae8f2be20df44e6720ef8c2751070b
php-common-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
850e33e3462faef73ad8b30af20bbf5b1bb6a66fcdaf2d6405737b251ae3f9c3
php-dba-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
7ffcfa425e7dae756d19ce98dfe3c20f34f2de4d33a9b72261bd31e48e9672b7
php-dba-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
6d79bfc8eaaf0e35b43b3d53e8b5d883d5e361eac6e2789f0c737b0d3d9f06d2
php-dbg-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
ea341a2f2434ceefd6f92eb0b52f7ede51062dce9a1e16330460908ac5f1a382
php-dbg-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
5b05d2069bcd096fb5aaf5b04558b48aacc42bf24a811578970ff06f74e78faa
php-devel-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
920d8611e9febdcdcf46edac659925abafa44ec3f8c4df0239542635725af267
php-devel-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
874eae7c08de8a21759f50b253d8a9b96a44dd08513809d9cb50f7b86c7a73f7
php-embedded-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
3f079b1038fa1ccb19d40ea47db95cf7bef447785c25b6fc1973dd8e4ce42ca9
php-embedded-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
d41a98c9648d37ea6f29237ceafed762e05eb7896981288a24521bbffb831cb6
php-enchant-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
d58d0c6645d6a20bf29c7d82d3dffc563a2e3d2c50ffc37725c094cee74f4100
php-enchant-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
a950daacfed3adbbcc94483613af957439ce45dfbdb5906c5a11a15a2aaafd89
php-ffi-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
6dcacdc50af9e95b5e24729afd45e0cb1a3d58c66377d59186f274bb893c404a
php-ffi-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
7a860213ae839720bae6cc17ece06208800ded15262b05e7174f425b40e42512
php-fpm-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
6648f40551c961d7571afce832afd751a2b4593323c0033c1d217ef81f23e794
php-fpm-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
0c43099c25e4ef8e62ec8bf4e233823c218f842a58cffed28da21bb1bec4a890
php-gd-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
f272c584386ebf720aef1782a19656c97ab5a6c1b06ebeb1e052659c7b3ba12b
php-gd-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
46cd4c338ab54d3125e5639f3064927fe6468a7d91da91c513258e2c76f2cbda
php-gmp-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
1639ccbe241713b621b94177fd408774d80b3976f188cf01e4a2b9b61e13d929
php-gmp-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
fe7e418b3c518c179596815d686f5e8dd9210410107b2122dbc4b74d8e96ed2d
php-intl-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
74ddf34cb98a75dd06a42d20d2cace47a0203597f515522bb4151a93c9bd58f2
php-intl-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
b69a46d9df293a5849e9999b4f3bdb4497373e7f85bbaf2876a0d5c515941124
php-json-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
7d89c9f38a08b904aef57e80ba9e296a3d5697542827ba72ecdca733fe06cb80
php-ldap-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
7319fa42d561d7460d4fdb8c7015ebac308ae1b71b87126dda3e78dd22e5b582
php-ldap-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
151035812290a32b2432659cba2170a7c587c5b43a41c14ce76763d5ce9e6bcd
php-mbstring-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
809f869011a3c9e9a12d78e1dfe88e056f785fdba1306c94547348af7a142411
php-mbstring-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
3c92d15293eeceb5e75aab4837eb4c9d3eb65f8edabdcb37b2486fb81c178392
php-mysqlnd-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
bb69d6a16c610c1724b37493632a50e6130f1c90d7d83e57f17419347a8da346
php-mysqlnd-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
e58267502219f1ee82c808cb1f3c0d00e9d10562ad9f856fccaa82cbdcc17ba6
php-odbc-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
175124bf994ee7855293b56ef035b7842695fff5abd3a2d554721079abb936d3
php-odbc-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
1ceb0b036200e46be99257ae081afe3cce11b5ca7e3c5e35116392510c8b25f2
php-opcache-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
d093e827e814775c56ab89e76aeb86bff8a89dc46012af7dd9f75cce1565ec25
php-opcache-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
9cb46f15b80f01b9143bea8baf59850b1007a4a741f0e1c6b0dcfd5e748791e3
php-pdo-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
491b1be9633ef3462f08e57af0d7e1a92cb412688fa143772d5c36828a438a49
php-pdo-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
463e761391433286e77b9acb2d159aa7fa51a4b0137bd6e24c41243831f95ea3
php-pear-1.10.12-1.module+el8.6.0+789+2130c178.noarch.rpm
c20c31a8cafb68671583a79c3a85b7a87668132557e1adb08b2ff7ce6a9c4058
php-pear-1.10.13-1.module+el8.6.0+790+fc63e43f.noarch.rpm
e46b2f905e5a36adba35af3f70884467592cb7ba32cecfaee3d1192127eb04e5
php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d
php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
f1572b2afbf482909317a87e31242e42931f5d4da5084ad048e349a6cbf16e74
php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4
php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
8912da51f22348d378782eaa3188d977be4ecf0f2b59ab80aee4e18b01ef35d6
php-pecl-rrd-2.0.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
0715edabc98e62f4980b4485417182bc7e39b3dddbfd94a41a2eb53bc9201135
php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
2678c55e406ed194b50e9eb58d1caa05bb088bfb1744af92db94f4cf86fc0cff
php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm
2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30
php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
a34ecbe5457a2820ef2959811e2ed8512a48561f9c9d02588ff4a0d086df308f
php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm
04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657
php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
74648336246a6f9ccd0520eb157ee3237bb3553bb7a1810f49cf1e3bfcf5ba60
php-pgsql-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
fe48b9201336ee70beeaeae6dd39f293f463a2216306f497b58237839cc929dd
php-pgsql-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
3983d0b71fc33e34f57f6efc4162f06fd14181a44f03987412fe1c808a6c73d8
php-process-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
09c20637c652a99e109b591ce13575466f6fbaef30d5ac1ef382c2306628b4cd
php-process-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
2337c39530e88dbc004d6d967bed426f3c5137ac8b734acfc242bee8fec36ac7
php-snmp-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
dfd9436a32cbd22422d71dc345a4c56434727236ff01edae23e3b52a04ea427e
php-snmp-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
66e846d00c10931b080c132dcbc1125f385475acb10f50450576591dfa29471b
php-soap-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
6446c04f3bcbeb687005662b18fc6e1a4e073d333591aeef80a3c4352a780e83
php-soap-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
728e4d7e83730ea963a83f492c52670485ff0dc9670166045ed210c713ec8886
php-xml-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
984b7604c5e952c676c902f0ecebecace5b0cc3577043137de58cac56396e037
php-xml-8.0.13-3.module+el8.6.0+989+3fbff15c.x86_64.rpm
1635eab26e5fc55dd48f2ff06106168d1ec0a556e75691f48ad2c7f82fbd867a
php-xmlrpc-7.4.19-3.module+el8.6.0+990+389ef54a.x86_64.rpm
833d09983f38255e7e7bb014df4478dcaa988654ac003375025c3ed8375ca677
RLSA-2022:2013
Moderate: openssh security, bug fix, and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for openssh is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:2013
Rocky Linux 8
openssh-askpass-8.0p1-13.el8.x86_64.rpm
fbec26a84dd6c8009a4a0e321218af39d545eff4d315defebbe241cb50fb3e7b