RLSA-2022:1820 Low: udisks2 security and bug fix update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update for udisks2 is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1820 Rocky Linux 8 libudisks2-2.9.0-9.el8.i686.rpm b6a3891bb289e01826b1bc4e26397e5f12718f44e2dc6413f4f5e626fde70061 libudisks2-2.9.0-9.el8.x86_64.rpm 13a2d984b5d4a21f35ab57ddd95914c27ccc916993620b4dab9bbd697ee2911a udisks2-2.9.0-9.el8.x86_64.rpm 5d4821126edacaebbe000dd9896ebb8dc63993f6f5da7e689e9968f946738a22 udisks2-iscsi-2.9.0-9.el8.x86_64.rpm 56eaaef8707e7c62a15fb4ce052a398cca4de48677e8ef3b7b9d10e96184cce2 udisks2-lsm-2.9.0-9.el8.x86_64.rpm 375eeb6adab3d131e8d96cbc816da721444799bcbf8f60c6b45d7b0f23016578 udisks2-lvm2-2.9.0-9.el8.x86_64.rpm b9ad578c257ddfc2788078ef33be243cde33c0a9f6793529b334c2ebaa860412 RLSA-2022:1950 Moderate: dovecot security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for dovecot is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1950 Rocky Linux 8 dovecot-2.3.16-2.el8.x86_64.rpm 9a1ed964988493cc43f3675461d57fcfad0cd93a6186b07d3c03c62786e9fe20 dovecot-mysql-2.3.16-2.el8.x86_64.rpm dac798b094655507e03a94ec37e065e9117b3afdabf58e91544486ad1288c96d dovecot-pgsql-2.3.16-2.el8.x86_64.rpm b3cc3cc4d64ef877e5f1ffe1bb3deee45ad4559db309546064d0aa7f6cd122e2 dovecot-pigeonhole-2.3.16-2.el8.x86_64.rpm 538a64dafcb31dd1a45c423f5a2afcbcc65d5dfa891026e1938bcf31e34008f3 RLSA-2022:1808 Moderate: aspell security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for aspell is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1808 Rocky Linux 8 aspell-0.60.6.1-22.el8.i686.rpm c141d22dd8a85ff028f54a89e35260ff3a0d930558eaa041c33a9a55339b7d89 aspell-0.60.6.1-22.el8.x86_64.rpm 35a21a9a576b4ce6f4b34851a880ece09a2baaf51d16df49edbcd76b8e19f243 RLBA-2021:3083 gcc-toolset-10-valgrind bug fix and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update for gcc-toolset-10-valgrind is now available for Rocky Linux 8. For more information visit https://errata.rockylinux.org/RLBA-2021:3083 Rocky Linux 8 gcc-toolset-10-valgrind-3.16.0-6.el8_4.i686.rpm e1ce0850349148b3ab3aba7bf21cfffe7cc26f8e78a7b63c07601ce5c349b101 gcc-toolset-10-valgrind-3.16.0-6.el8_4.x86_64.rpm eaee7045eb86911441e2ca185719dac4846cf6761b34b1cd4503e66276f0b650 gcc-toolset-10-valgrind-devel-3.16.0-6.el8_4.i686.rpm 5fbac89725917a18834c3d4e7450065437144dcf0a0efa3f85d56666a6290a36 gcc-toolset-10-valgrind-devel-3.16.0-6.el8_4.x86_64.rpm 4b0fc0732a44b410281e4ebb01b853a5ae5b49173e876bfba3064ea2a42410d3 RLSA-2021:2583 Moderate: python38:3.8 and python38-devel:3.8 security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for the python38:3.8 and python38-devel:3.8 modules is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:2583 Rocky Linux 8 python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm 6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm 12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33 python38-mod_wsgi-4.6.8-3.module+el8.4.0+570+c2eaf144.x86_64.rpm c504193195a97b1802c950a753237b34bc16b4673c232c25bb589dab51255f41 python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm 21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm 5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1 python38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm 693b174f895dd685857753ad75f07f4fdb95e82a88e4c3f8618392b5d4b81b5e python39-chardet-3.0.4-19.module+el8.4.0+574+843c4898.noarch.rpm 9a21825b6b2a472ec12024574f4d39e2b516dec4a8bf1514572f05bed2915afd python39-ply-3.11-10.module+el8.4.0+574+843c4898.noarch.rpm 964120ccea403bb0c770c16065565fb671e85f9c8f3d5807544259f183ac23ac python39-pysocks-1.7.1-4.module+el8.4.0+574+843c4898.noarch.rpm 6d48f8fb19e1cce6f8d808cd72005c6c87cf0569a296bd22c509b0c27f020660 RLSA-2021:2363 Important: gupnp security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for gupnp is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:2363 Rocky Linux 8 gupnp-1.0.6-2.el8_4.i686.rpm 9b8dddbfbdc089e8168175fa66c8f695977c2720f6f4bd441196cb9b5e701662 gupnp-1.0.6-2.el8_4.x86_64.rpm 99156c05f5915a79b954b5a4e6d5d38b65d7c455f9a66af27e036a35635570cc RLSA-2021:3074 Moderate: nodejs:14 security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for the nodejs:14 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:3074 Rocky Linux 8 nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLBA-2021:3593 gcc-toolset-10-elfutils bug fix update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update for gcc-toolset-10-elfutils is now available for Rocky Linux 8. For more information visit https://errata.rockylinux.org/RLBA-2021:3593 Rocky Linux 8 gcc-toolset-10-elfutils-0.182-6.el8_4.x86_64.rpm f64e85941a97279c482bbd079fbd153255a348556053cf6e40b7b1abea70c7bf gcc-toolset-10-elfutils-debuginfod-client-0.182-6.el8_4.i686.rpm dea4b32d33daaa5cf93dd48e6d736fbc8ae87f03626cc746f127f1b816be2593 gcc-toolset-10-elfutils-debuginfod-client-0.182-6.el8_4.x86_64.rpm fbf71de210a57662e2215e22fe634b8822b0533020a47c1f6615e0e50b9c2e66 gcc-toolset-10-elfutils-debuginfod-client-devel-0.182-6.el8_4.i686.rpm e923f2207f99247d9dfddc1cb2aed5b36fe36f1e441374b4b6a768ec6bd6a860 gcc-toolset-10-elfutils-debuginfod-client-devel-0.182-6.el8_4.x86_64.rpm 47103bfcc834e8d9585ea457e023013726ea8fd98bfb6cc9ab1003ac9df38925 gcc-toolset-10-elfutils-devel-0.182-6.el8_4.i686.rpm 589fcba6c71733265f0d4f18d6ec1200079f23eb3b475aa4b4622b8824153854 gcc-toolset-10-elfutils-devel-0.182-6.el8_4.x86_64.rpm 20d78a08fcad187ce1fe69bdb260016abe2cfc43d6fe882099adfc1c11cb4b55 gcc-toolset-10-elfutils-libelf-0.182-6.el8_4.i686.rpm 9aba44906c12278e4eea29af4495c11e3904fc6f3270932cba6d61b9dbb25869 gcc-toolset-10-elfutils-libelf-0.182-6.el8_4.x86_64.rpm b27fdaf713c099c491534f785cc4418944976ced9ace65c6a1b4cfdc64441000 gcc-toolset-10-elfutils-libelf-devel-0.182-6.el8_4.i686.rpm 63ec7c979c6905b8b59d61fb3c472846f7184fcbbfe29e72d8563da8ddf218fb gcc-toolset-10-elfutils-libelf-devel-0.182-6.el8_4.x86_64.rpm 06e63e0c75d6871db6259dca49854a356e43dfc658de0edfb41b193111939565 gcc-toolset-10-elfutils-libs-0.182-6.el8_4.i686.rpm 5145964b5e9afa734749f7d1fa9ee072d3959cd05d69efb670ac58c159364c09 gcc-toolset-10-elfutils-libs-0.182-6.el8_4.x86_64.rpm 769e4bb8af44477862465592d22f364ae865f1f7cd86bf005b0a2e304ce20765 RLSA-2022:2031 Low: libssh security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update for libssh is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:2031 Rocky Linux 8 libssh-devel-0.9.6-3.el8.i686.rpm 4a9b1c9d0bfc6a5346035675fa96793e173fbe235e8f7dba6f0e1a043cbbb877 libssh-devel-0.9.6-3.el8.x86_64.rpm 7cb2b675798815b1a1bf842d17c69edf8dfc941ece898b2d471e235161e0cccc RLSA-2021:3590 Moderate: mysql:8.0 security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for the mysql:8.0 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:3590 Rocky Linux 8 mecab-0.996-1.module+el8.3.0+242+87d3366a.9.x86_64.rpm 14952996574de43eec381be174d1a4dd572e04536682e0ac26946c6cb5c707ba mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm 19b0e3eeea327b2ce021e978337b84189ad9a488f0e82a4dfd1602436c1d0549 mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm 490449bfec869b5947ac0da58a4f56ca9369e2b6a04c22dbc0eef1cd5306c96f mysql-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm 5835ef2fafa38168bfe18ed1a6f91e345c1bbe3ce8803c4c812cae7d1554f702 mysql-common-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm 98597b5e26add557d0687defca496399a59eb64a443d08bba55f5772d7d6ef13 mysql-devel-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm 6804ebf957f76275b7237d7d4042d45be95d2ae292da9060bef4e0b34acff53b mysql-errmsg-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm 05cb72589e13e1181c621fe309f071d28bddc74848977baf93e085faffcf84aa mysql-libs-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm 50d42c4c557faae38d755dfa690df2020be414c0aedd1d338be4e04a84891615 mysql-server-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm 246223ae9c8ef779ac1ecd1b544ddbc38f3df620cff78f634e311817a82baa69 mysql-test-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm 834328ec93539879520f5dbea5989df2c1aae47575d243226dc3973a0f0704d1 RLSA-2021:3623 Important: nodejs:12 security and bug fix update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for the nodejs:12 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:3623 Rocky Linux 8 nodejs-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm 6eda5b4e2f92a536468d0e044f8c6dceaf5abd6f3ef01ccc23a4274350682524 nodejs-devel-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm 50c090640fb144376fa6f27305ba9f617a224971cae68d49f5d8ab4bdd7e0b9a nodejs-docs-12.22.5-1.module+el8.4.0+647+e905fa21.noarch.rpm 8bb738d9c8410f662b3c2f32aed10130e9f6887e873754199bb435970d32470f nodejs-full-i18n-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm c5ae64d1ca085036e507b540533798726e90180d8fe6a69416f13c3551351278 nodejs-packaging-23-3.module+el8.5.0+733+de4fee6c.noarch.rpm de384459a7bf627a23b2dc78c14c6b94ae7402e3185305950a7a1e86cb1e823a npm-6.14.14-1.12.22.5.1.module+el8.4.0+647+e905fa21.x86_64.rpm ecdf41ce219c3afc89f36ee75da98797809ff753994f1c699477de2bf265062a nodejs-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm 6eda5b4e2f92a536468d0e044f8c6dceaf5abd6f3ef01ccc23a4274350682524 nodejs-devel-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm 50c090640fb144376fa6f27305ba9f617a224971cae68d49f5d8ab4bdd7e0b9a nodejs-docs-12.22.5-1.module+el8.4.0+647+e905fa21.noarch.rpm 8bb738d9c8410f662b3c2f32aed10130e9f6887e873754199bb435970d32470f nodejs-full-i18n-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm c5ae64d1ca085036e507b540533798726e90180d8fe6a69416f13c3551351278 nodejs-packaging-23-3.module+el8.5.0+733+de4fee6c.noarch.rpm de384459a7bf627a23b2dc78c14c6b94ae7402e3185305950a7a1e86cb1e823a npm-6.14.14-1.12.22.5.1.module+el8.4.0+647+e905fa21.x86_64.rpm ecdf41ce219c3afc89f36ee75da98797809ff753994f1c699477de2bf265062a nodejs-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm 6eda5b4e2f92a536468d0e044f8c6dceaf5abd6f3ef01ccc23a4274350682524 nodejs-devel-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm 50c090640fb144376fa6f27305ba9f617a224971cae68d49f5d8ab4bdd7e0b9a nodejs-docs-12.22.5-1.module+el8.4.0+647+e905fa21.noarch.rpm 8bb738d9c8410f662b3c2f32aed10130e9f6887e873754199bb435970d32470f nodejs-full-i18n-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm c5ae64d1ca085036e507b540533798726e90180d8fe6a69416f13c3551351278 nodejs-packaging-23-3.module+el8.5.0+733+de4fee6c.noarch.rpm de384459a7bf627a23b2dc78c14c6b94ae7402e3185305950a7a1e86cb1e823a npm-6.14.14-1.12.22.5.1.module+el8.4.0+647+e905fa21.x86_64.rpm ecdf41ce219c3afc89f36ee75da98797809ff753994f1c699477de2bf265062a RLSA-2021:4622 Important: freerdp security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for freerdp is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:4622 Rocky Linux 8 freerdp-2.2.0-7.el8_5.x86_64.rpm acf21c1eeed45c522a4dd8f44b30779ab83b1a3c648b53ba9a43951f4e56bf1c freerdp-libs-2.2.0-7.el8_5.i686.rpm 8bde65f2d37f4a0832cc276b52c0dec889feb2ef19680f938c80677c2be8f633 freerdp-libs-2.2.0-7.el8_5.x86_64.rpm 0302055f4b4c6738477eb15068598026a5425954c72905c949181ef848364f63 libwinpr-2.2.0-7.el8_5.i686.rpm 595048be37744b36d5480ffdb9b6c08ef5817109da3ff5e6416466e6369a1072 libwinpr-2.2.0-7.el8_5.x86_64.rpm 90abb5fd442565640cc5e9fbeac05901e398fdb97838c1ab87d7b0ef51931d36 libwinpr-devel-2.2.0-7.el8_5.i686.rpm 1e9bfc11aeb8012ec3d75b33a6cab3b78ab4d822b01cc185c7f591c88e011f1c libwinpr-devel-2.2.0-7.el8_5.x86_64.rpm 1cfe282e82a7ca1b9e2ee3f52d5d16a0ac13c6889c201dc2c36d551854893fa1 RLBA-2021:3594 libdb bug fix and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update for libdb is now available for Rocky Linux 8. For more information visit https://errata.rockylinux.org/RLBA-2021:3594 Rocky Linux 8 libdb-devel-5.3.28-42.el8_4.i686.rpm 0c8d56ff99ebbef82cda32cad3a77de5c01a5a735c0d9e0463e3969142728d51 libdb-devel-5.3.28-42.el8_4.x86_64.rpm 4038cac5a947df780f43ad543f735f1c0307a106ae02b1ac518fba0349d5bdc9 RLSA-2021:2290 Important: nginx:1.16 security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for the nginx:1.16 module is now available for Rocky Linux 8, Rocky Linux 8.1 Extended Update Support, and Rocky Linux 8.2 Extended Update Support. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:2290 Rocky Linux 8 nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm a7e8f12bcadbfb850ced0c9f7c738dd34bce16d491e5145b3cdd7f3ad6e5e6ee nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm bf37394530514e4f89d360aa6c4ea22c049dd243a88a84dcb83209895c5168c7 nginx-all-modules-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm 3b0073666d96b7699491be25e37ada5e61fb5fcffdb5605bc6c757d2f22098de nginx-all-modules-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm 7fb26e744e26ed89e749ac1a22dbf72e28fa553724839a76dfcbceb3ed840d90 nginx-filesystem-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm 51ffdebca045cd896d1166a62b73ccec82c034bf133f6fb3ffbeb10719924991 nginx-filesystem-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm 43fa77fc74095e53b63439cb405f6a8a9617913fa085beacb4d740d4fe316c37 nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 5d100dcfd14470e027fd70954a37040a03c5ac42b28d06f353788d7800d33a20 nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 03d6fe221bb98ed1b023d3513435e18887c7818bae8c4d71f6c2f983417eb7e7 nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm e73f87b0fe704a434776fbb00e5b0c15259070dd098fbf73c8e26f0492013e55 nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 771754953dbb211e3464a1e9f14561ec5f8b7742de5e6677e294fe4e3bf3d334 nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 980d5cd6502bc54e842f0ec78820541adc7e4ed15e213756a0426c1431fbb904 nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 1aaf30cd71829f8482f1d7bfd73b17c6356cfa9b881da79a6928108890e22ddc nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 29ab92d9f77c68de5b9f91c600b0bef4b3b2afbb1cc01891f200d26883010a4f nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 4c9c4c5d0ee6e2d0e774a37dc131d64267485d95033ca486b157f37b86b39449 nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 12a16e26088f86d84e6a0b8295960956284b6588f87ede147e1347b24ad31462 nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 9d1bafbf400e3d4432337f9651a87c8b4b3f7e696a10910232c9c4d0ae0f719e nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm a7e8f12bcadbfb850ced0c9f7c738dd34bce16d491e5145b3cdd7f3ad6e5e6ee nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm bf37394530514e4f89d360aa6c4ea22c049dd243a88a84dcb83209895c5168c7 nginx-all-modules-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm 3b0073666d96b7699491be25e37ada5e61fb5fcffdb5605bc6c757d2f22098de nginx-all-modules-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm 7fb26e744e26ed89e749ac1a22dbf72e28fa553724839a76dfcbceb3ed840d90 nginx-filesystem-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm 51ffdebca045cd896d1166a62b73ccec82c034bf133f6fb3ffbeb10719924991 nginx-filesystem-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm 43fa77fc74095e53b63439cb405f6a8a9617913fa085beacb4d740d4fe316c37 nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 5d100dcfd14470e027fd70954a37040a03c5ac42b28d06f353788d7800d33a20 nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 03d6fe221bb98ed1b023d3513435e18887c7818bae8c4d71f6c2f983417eb7e7 nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm e73f87b0fe704a434776fbb00e5b0c15259070dd098fbf73c8e26f0492013e55 nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 771754953dbb211e3464a1e9f14561ec5f8b7742de5e6677e294fe4e3bf3d334 nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 980d5cd6502bc54e842f0ec78820541adc7e4ed15e213756a0426c1431fbb904 nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 1aaf30cd71829f8482f1d7bfd73b17c6356cfa9b881da79a6928108890e22ddc nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 29ab92d9f77c68de5b9f91c600b0bef4b3b2afbb1cc01891f200d26883010a4f nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 4c9c4c5d0ee6e2d0e774a37dc131d64267485d95033ca486b157f37b86b39449 nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 12a16e26088f86d84e6a0b8295960956284b6588f87ede147e1347b24ad31462 nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 9d1bafbf400e3d4432337f9651a87c8b4b3f7e696a10910232c9c4d0ae0f719e RLSA-2022:5467 Important: php:7.4 security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for the php:7.4 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:5467 Rocky Linux 8 apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe apcu-panel-5.1.20-1.module+el8.6.0+790+fc63e43f.noarch.rpm 0e9d74cc0eba28463f32c2fcd7da6b7959146b32f959df3c9c876cfe4b743680 libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14 libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 996d397031508e9101b6e9a0094a6cba118da93efb4f1b1bd224769d65008d91 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 6f832b96a25a454bc576303745f9cb041a65531528a90437ab6936505abc7177 libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77 libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm e4f4ace1b7cc21f2018213138a4ee06fe6150056f4170206a595de2e6f581b77 php-pear-1.10.12-1.module+el8.6.0+789+2130c178.noarch.rpm c20c31a8cafb68671583a79c3a85b7a87668132557e1adb08b2ff7ce6a9c4058 php-pear-1.10.13-1.module+el8.6.0+790+fc63e43f.noarch.rpm e46b2f905e5a36adba35af3f70884467592cb7ba32cecfaee3d1192127eb04e5 php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm f1572b2afbf482909317a87e31242e42931f5d4da5084ad048e349a6cbf16e74 php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm 6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4 php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 8912da51f22348d378782eaa3188d977be4ecf0f2b59ab80aee4e18b01ef35d6 php-pecl-rrd-2.0.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 0715edabc98e62f4980b4485417182bc7e39b3dddbfd94a41a2eb53bc9201135 php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 2678c55e406ed194b50e9eb58d1caa05bb088bfb1744af92db94f4cf86fc0cff php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm 2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30 php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm a34ecbe5457a2820ef2959811e2ed8512a48561f9c9d02588ff4a0d086df308f php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm 04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657 php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 74648336246a6f9ccd0520eb157ee3237bb3553bb7a1810f49cf1e3bfcf5ba60 apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe apcu-panel-5.1.20-1.module+el8.6.0+790+fc63e43f.noarch.rpm 0e9d74cc0eba28463f32c2fcd7da6b7959146b32f959df3c9c876cfe4b743680 libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14 libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 996d397031508e9101b6e9a0094a6cba118da93efb4f1b1bd224769d65008d91 libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 6f832b96a25a454bc576303745f9cb041a65531528a90437ab6936505abc7177 libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77 libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm e4f4ace1b7cc21f2018213138a4ee06fe6150056f4170206a595de2e6f581b77 php-pear-1.10.12-1.module+el8.6.0+789+2130c178.noarch.rpm c20c31a8cafb68671583a79c3a85b7a87668132557e1adb08b2ff7ce6a9c4058 php-pear-1.10.13-1.module+el8.6.0+790+fc63e43f.noarch.rpm e46b2f905e5a36adba35af3f70884467592cb7ba32cecfaee3d1192127eb04e5 php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm f1572b2afbf482909317a87e31242e42931f5d4da5084ad048e349a6cbf16e74 php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm 6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4 php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 8912da51f22348d378782eaa3188d977be4ecf0f2b59ab80aee4e18b01ef35d6 php-pecl-rrd-2.0.1-1.module+el8.6.0+789+2130c178.x86_64.rpm 0715edabc98e62f4980b4485417182bc7e39b3dddbfd94a41a2eb53bc9201135 php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 2678c55e406ed194b50e9eb58d1caa05bb088bfb1744af92db94f4cf86fc0cff php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm 2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30 php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm a34ecbe5457a2820ef2959811e2ed8512a48561f9c9d02588ff4a0d086df308f php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm 04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657 php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm 74648336246a6f9ccd0520eb157ee3237bb3553bb7a1810f49cf1e3bfcf5ba60 RLSA-2022:1930 Moderate: keepalived security and bug fix update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for keepalived is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1930 Rocky Linux 8 keepalived-2.1.5-8.el8.x86_64.rpm 41e700d02b5f6c77b75a1fa66d487d80006360bdbcb94297ac291221ed5d319c RLSA-2022:1810 Moderate: libtiff security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for libtiff is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1810 Rocky Linux 8 libtiff-4.0.9-21.el8.i686.rpm ca86985eb62d17f49004acab002b99dd6d8c30eff36a246e3fb66c802169f8a9 libtiff-4.0.9-21.el8.x86_64.rpm 1393a72113f12a5a28273defb7e4da56888066ea67bb5100630d0e13f263c68c libtiff-devel-4.0.9-21.el8.i686.rpm 16e6b5ce489a597e2f36b50fe4fc59b5ae63b1d865a873d961685da8efd5a216 libtiff-devel-4.0.9-21.el8.x86_64.rpm 9d0e1fa160af29ee4cf5be9cf345e0ab6f40a33134f96ef3490799f60c108fe1 RLSA-2021:4903 Critical: nss security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Critical An update for nss is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:4903 Rocky Linux 8 nss-3.67.0-7.el8_5.i686.rpm aa2d297d55a4bc7d2c5fcfd3f26cd8604f8e759f471d1531d527c5840301b3c4 nss-3.67.0-7.el8_5.x86_64.rpm b050e18bf644e6c217a0bf4f5a91f458424bc7597d4a7be38ee9ba6bc450a79d nss-devel-3.67.0-7.el8_5.i686.rpm a92a8b9c2120b6a0ce006da294d933c058961b665d3a54b4164c7bf57b2026c7 nss-devel-3.67.0-7.el8_5.x86_64.rpm d9eaaf9754d53e21416fc5045830f62cec67aa386b57078e4157bcc30ea0f346 nss-softokn-3.67.0-7.el8_5.i686.rpm 289a2f903f28fb675d515b64322e17656317909f0effcbcec13c31b195512a5e nss-softokn-3.67.0-7.el8_5.x86_64.rpm 1821044e946375b14a39f0d73f3a1bc8669df601c61076ee8932a18ecede2341 nss-softokn-devel-3.67.0-7.el8_5.i686.rpm 4cc44aac64b44913774eb4b0f9f0b6876e74f5068c0954f9350192e61f5f5347 nss-softokn-devel-3.67.0-7.el8_5.x86_64.rpm acf1a833eece9d866dd96612ec902e541138f1487e72dbc77058888175568f77 nss-softokn-freebl-3.67.0-7.el8_5.i686.rpm b1e4758ee17e0e062096d4a7dc42d1130e1ccc224885b5663eab4e9f01c377aa nss-softokn-freebl-3.67.0-7.el8_5.x86_64.rpm cddb83d15260e2bfd151633963092ad239a416b37478add83eee0bb69c35472b nss-softokn-freebl-devel-3.67.0-7.el8_5.i686.rpm dd265aca1c251fdb2a5fe8974d34010ab95ff2cee1f7d9f74837e84b51847681 nss-softokn-freebl-devel-3.67.0-7.el8_5.x86_64.rpm 3c82897ae2d43abe2842ec6738de4e2e158eba476a66bd38b4716bc51a6a8055 nss-sysinit-3.67.0-7.el8_5.x86_64.rpm c278b5bf6e1ebb927ee71d3748ddc657fdaba8ff6eeefd4d9b86ec665bbcd398 nss-tools-3.67.0-7.el8_5.x86_64.rpm b99a319b024c11d4bb3735040acf17813ec40e40cf770bb78c507f900574bc20 nss-util-3.67.0-7.el8_5.i686.rpm 35f59e0b907027a693a391fcb4a7df7ca79f03e53ff27ee5769c64d42752b3a1 nss-util-3.67.0-7.el8_5.x86_64.rpm 1b1e28f5988c5af06559c8e8898373a99837b1cc7a1a58450bce001f063ba8c2 nss-util-devel-3.67.0-7.el8_5.i686.rpm 2441423b11a67f6a12a0e594e6648dd4dc553f0e78343631a41d25e13bd5c7a4 nss-util-devel-3.67.0-7.el8_5.x86_64.rpm d76484b976f6e1868076da9ae8a92104153b272ea4faec1532ae42a1185403ac RLSA-2021:1979 Important: squid:4 security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for the squid:4 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:1979 Rocky Linux 8 libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 RLSA-2022:5163 Low: httpd:2.4 security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update for the httpd:2.4 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:5163 Rocky Linux 8 mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm 4c38731a882c46a2a227c602054bc420cc132713bc60608912a5462181585ac5 mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm 9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9 RLSA-2022:2013 Moderate: openssh security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for openssh is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:2013 Rocky Linux 8 openssh-askpass-8.0p1-13.el8.x86_64.rpm fbec26a84dd6c8009a4a0e321218af39d545eff4d315defebbe241cb50fb3e7b RLSA-2022:441 Important: aide security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for aide is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:441 Rocky Linux 8 aide-0.16-14.el8_5.1.x86_64.rpm cd5d83d0836f7ae2f5b59f914bf67cdee69e404f8b9864363f1d93d76747c6aa RLSA-2021:4325 Moderate: lasso security and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for lasso is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:4325 Rocky Linux 8 lasso-2.6.0-12.el8.i686.rpm b05640c5b0eaa54e4f0ac2d7d44f100d047489dbb1f5912fb611bbbe69261fdb lasso-2.6.0-12.el8.x86_64.rpm 5cdb83a6ef598be1d8f63872ba0bcbf32cf19b0f16fd9e323ed80348e953a6df RLSA-2021:1983 Important: idm:DL1 security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for the idm:DL1 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:1983 Rocky Linux 8 python3-jwcrypto-0.5.0-1.module+el8.4.0+430+1dcf16bb.noarch.rpm 8f52e2bf2531bf764f3d698863ec27fb18d7457493ff72fe91d5cf871eea4f02 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-pyusb-1.0.0-9.module+el8.4.0+430+1dcf16bb.noarch.rpm c1461c922fe67180fdd438b037b2452f88b934f2438c0d77aefd23bc8d5a620e python3-yubico-1.3.2-9.module+el8.4.0+430+1dcf16bb.noarch.rpm 57ba1a75366409cb10214266d4ff5512a4e27e9a804f1668862e80d6dc0eecd4 python3-jwcrypto-0.5.0-1.module+el8.4.0+430+1dcf16bb.noarch.rpm 8f52e2bf2531bf764f3d698863ec27fb18d7457493ff72fe91d5cf871eea4f02 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-pyusb-1.0.0-9.module+el8.4.0+430+1dcf16bb.noarch.rpm c1461c922fe67180fdd438b037b2452f88b934f2438c0d77aefd23bc8d5a620e python3-yubico-1.3.2-9.module+el8.4.0+430+1dcf16bb.noarch.rpm 57ba1a75366409cb10214266d4ff5512a4e27e9a804f1668862e80d6dc0eecd4 python3-jwcrypto-0.5.0-1.module+el8.4.0+430+1dcf16bb.noarch.rpm 8f52e2bf2531bf764f3d698863ec27fb18d7457493ff72fe91d5cf871eea4f02 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-pyusb-1.0.0-9.module+el8.4.0+430+1dcf16bb.noarch.rpm c1461c922fe67180fdd438b037b2452f88b934f2438c0d77aefd23bc8d5a620e python3-yubico-1.3.2-9.module+el8.4.0+430+1dcf16bb.noarch.rpm 57ba1a75366409cb10214266d4ff5512a4e27e9a804f1668862e80d6dc0eecd4 RLBA-2021:3240 .NET Core 2.1 bugfix update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update for .NET Core 2.1 is now available for Rocky Linux. For more information visit https://errata.rockylinux.org/RLBA-2021:3240 Rocky Linux 8 dotnet-host-fxr-2.1-2.1.30-1.el8_4.rocky.x86_64.rpm a4d8e71402fc6bd36ccae8ba4395eb873b0f3c784db09d3084e6ca440cda925d dotnet-runtime-2.1-2.1.30-1.el8_4.rocky.x86_64.rpm cbfff6de30501753f7e3e22633e6bb2b79f127fe1aa3852be5f49569a0197f4c dotnet-sdk-2.1-2.1.526-1.el8_4.rocky.x86_64.rpm b01ae5a57232950f63cd3847d35e22abbbb6ed9546f798908e4f2c4f5e491649 dotnet-sdk-2.1.5xx-2.1.526-1.el8_4.rocky.x86_64.rpm c366fad3118e4a8e74178c05148f40faaf4f058e720a4bf78926f6713b259deb RLSA-2021:2588 Moderate: ruby:2.6 security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for the ruby:2.6 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:2588 Rocky Linux 8 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm 1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505 rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm 0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 rubygem-abrt-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm 0db38261694321b3fe358091a3b00b487152713cd0b2075c79c2a695f039602e rubygem-abrt-doc-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm 88c0b4efaf57ff92de9214032eead69fd4e8cbbe9fb31aa2869e626e9d91de28 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm 1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505 rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm 7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm 861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498 rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm 0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac rubygem-mysql2-0.5.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm a7b94f06c62bf6f720d4e22dd40ec7c86beffb871418fd41761eade4c94320ac rubygem-mysql2-doc-0.5.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 6e0d3c34c3e32ae39c98ef6a7ced21bfc9d98ed97a60f0cd250e25f340ed03b0 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 rubygem-pg-1.2.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm 49ab41e4cac5db1b5c138740ebf80c32ba208b24fac3dc1505b15b93513d7fba rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 rubygem-pg-doc-1.2.3-1.module+el8.4.0+594+11b6673a.noarch.rpm c09ae194775cac6c4c6b26052d23abb727f170cf8a3d26de38f9963cb23db7c9 rubygem-abrt-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm 0db38261694321b3fe358091a3b00b487152713cd0b2075c79c2a695f039602e rubygem-abrt-doc-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm 88c0b4efaf57ff92de9214032eead69fd4e8cbbe9fb31aa2869e626e9d91de28 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm 1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505 rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm 7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm 861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498 rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm 0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac rubygem-mysql2-0.5.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm a7b94f06c62bf6f720d4e22dd40ec7c86beffb871418fd41761eade4c94320ac rubygem-mysql2-doc-0.5.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 6e0d3c34c3e32ae39c98ef6a7ced21bfc9d98ed97a60f0cd250e25f340ed03b0 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 rubygem-pg-1.2.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm 49ab41e4cac5db1b5c138740ebf80c32ba208b24fac3dc1505b15b93513d7fba rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 rubygem-pg-doc-1.2.3-1.module+el8.4.0+594+11b6673a.noarch.rpm c09ae194775cac6c4c6b26052d23abb727f170cf8a3d26de38f9963cb23db7c9 rubygem-abrt-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm 0db38261694321b3fe358091a3b00b487152713cd0b2075c79c2a695f039602e rubygem-abrt-doc-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm 88c0b4efaf57ff92de9214032eead69fd4e8cbbe9fb31aa2869e626e9d91de28 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm 1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505 rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm 7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm 861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498 rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm 0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac rubygem-mysql2-0.5.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm a7b94f06c62bf6f720d4e22dd40ec7c86beffb871418fd41761eade4c94320ac rubygem-mysql2-doc-0.5.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 6e0d3c34c3e32ae39c98ef6a7ced21bfc9d98ed97a60f0cd250e25f340ed03b0 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 rubygem-pg-1.2.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm 49ab41e4cac5db1b5c138740ebf80c32ba208b24fac3dc1505b15b93513d7fba rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 rubygem-pg-doc-1.2.3-1.module+el8.4.0+594+11b6673a.noarch.rpm c09ae194775cac6c4c6b26052d23abb727f170cf8a3d26de38f9963cb23db7c9 RLSA-2022:1777 Moderate: webkit2gtk3 security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for webkit2gtk3 is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1777 Rocky Linux 8 webkit2gtk3-2.34.6-1.el8.i686.rpm 1763e4cd8cb39b3134dfb1579d8ff090cb794978970d3f692abd922afc8fc404 webkit2gtk3-2.34.6-1.el8.x86_64.rpm d74c016528055ff3a12ee190dda714df7255ca92065f70b0fd275f3d61204974 webkit2gtk3-devel-2.34.6-1.el8.i686.rpm b73465b6e1775ee5615d32be46cf0aa81d093ac52647d15c27acc6b22729055a webkit2gtk3-devel-2.34.6-1.el8.x86_64.rpm 1dee55b448206d8acdda5aea1cb4c0e8cd7ffb20bcd1d642377d3b96ac1d09aa webkit2gtk3-jsc-2.34.6-1.el8.i686.rpm 600a932fc8e6df7e83144b6f246a01d7993e397f9fed6c92f99564b11310cc4e webkit2gtk3-jsc-2.34.6-1.el8.x86_64.rpm a611bddb1e3d46f45f8170cdfc64a8cab8383fefb7b1d95f884424a2b3b401ef webkit2gtk3-jsc-devel-2.34.6-1.el8.i686.rpm 71a209d3ce40f120fac580a9a87b02fa35f3ffad06dca4ac2439ac70dca7ca2d webkit2gtk3-jsc-devel-2.34.6-1.el8.x86_64.rpm 21d9fc119349e0906576b1af8beb6cb23b9081f507b73621963a0433c8f39372 RLSA-2022:2074 Moderate: samba security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for samba is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:2074 Rocky Linux 8 samba-vfs-iouring-4.15.5-5.el8.x86_64.rpm 7dc183ab343b29b58bf43d6a71281fc74f01963813f50f70eb91d105d382bb9b RLSA-2022:1730 Important: thunderbird security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for thunderbird is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1730 Rocky Linux 8 thunderbird-91.9.0-3.el8_5.x86_64.rpm 5382b81916e6a938f30afcf2ae8f7861ea22543e665b56fe0807571691f10daf RLSA-2021:4381 Moderate: GNOME security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for GNOME is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:4381 Rocky Linux 8 gnome-autoar-0.2.3-2.el8.i686.rpm 7df0767dcf8e4e1f791a56142199e265d9d2ddc7b3919b7aba93402e82802db1 gnome-autoar-0.2.3-2.el8.x86_64.rpm ec104b742f1ee24ed3b790f8bcf2e9c3624d835c37d4f046226737569af9c0b5 gnome-calculator-3.28.2-2.el8.x86_64.rpm bfc480d1f9e922cdeebbd6056672a2a349776204c6be7a6240a5eea1a623de39 gnome-online-accounts-3.28.2-3.el8.i686.rpm c62c2f20e4765b4ee9a4cb86fdc3676f07ee1bf88c6e6f787989f7f3201dc539 gnome-online-accounts-3.28.2-3.el8.x86_64.rpm 128fe18ab8bfd55fcf3d048764c08baa784e475c43e05bee007663ed65266f64 gnome-online-accounts-devel-3.28.2-3.el8.i686.rpm 83eba37218a17c873e8339da654bd7fdf30542e309fe541d8fbb22e9e114077f gnome-online-accounts-devel-3.28.2-3.el8.x86_64.rpm 2424a681b21ec3cc257eb8117d833e143b766ced3bb3f0d80fc6580ebe78b52d gnome-settings-daemon-3.32.0-16.el8.x86_64.rpm 1f0b302fe6d536520fa78ee670b4a02602f305c8e04833ad4e0297a07118cc25 gnome-software-3.36.1-10.el8.x86_64.rpm 2a9f077aa8113e2a4c4c3788d5258918fd7aaa4a97a3b5696d604e849fd23c5d gsettings-desktop-schemas-3.32.0-6.el8.i686.rpm 9e3de8ab0df91a21383d9784b9ef2889a54058eea2c18c31142a4eb99b055039 gsettings-desktop-schemas-devel-3.32.0-6.el8.i686.rpm 6a8b085c3076824a5080c1bad4047d4c0177387ca5018fe0e82293d9ac621037 gsettings-desktop-schemas-devel-3.32.0-6.el8.x86_64.rpm 440c33ca267b2f26215df09174ce6574a2bb5113fe6d7c740eba3f1133c93af8 LibRaw-0.19.5-3.el8.i686.rpm ca62265ca6516b645dcb52d822cd12b25d42ebb51c998fa008f218596d254b7a LibRaw-0.19.5-3.el8.x86_64.rpm df151c39f20ea9815d46aff810e74f2c837a34fb755909c23d2e159714999d90 vino-3.22.0-11.el8.x86_64.rpm 3ba0c279a775b11f29b6dbeb5daa462d4bbe721a3bc0f541dcaa8b0c25555ec1