RLSA-2022:1820
Low: udisks2 security and bug fix update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update for udisks2 is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:1820
Rocky Linux 8
libudisks2-2.9.0-9.el8.i686.rpm
b6a3891bb289e01826b1bc4e26397e5f12718f44e2dc6413f4f5e626fde70061
libudisks2-2.9.0-9.el8.x86_64.rpm
13a2d984b5d4a21f35ab57ddd95914c27ccc916993620b4dab9bbd697ee2911a
udisks2-2.9.0-9.el8.x86_64.rpm
5d4821126edacaebbe000dd9896ebb8dc63993f6f5da7e689e9968f946738a22
udisks2-iscsi-2.9.0-9.el8.x86_64.rpm
56eaaef8707e7c62a15fb4ce052a398cca4de48677e8ef3b7b9d10e96184cce2
udisks2-lsm-2.9.0-9.el8.x86_64.rpm
375eeb6adab3d131e8d96cbc816da721444799bcbf8f60c6b45d7b0f23016578
udisks2-lvm2-2.9.0-9.el8.x86_64.rpm
b9ad578c257ddfc2788078ef33be243cde33c0a9f6793529b334c2ebaa860412
RLSA-2022:1950
Moderate: dovecot security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for dovecot is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:1950
Rocky Linux 8
dovecot-2.3.16-2.el8.x86_64.rpm
9a1ed964988493cc43f3675461d57fcfad0cd93a6186b07d3c03c62786e9fe20
dovecot-mysql-2.3.16-2.el8.x86_64.rpm
dac798b094655507e03a94ec37e065e9117b3afdabf58e91544486ad1288c96d
dovecot-pgsql-2.3.16-2.el8.x86_64.rpm
b3cc3cc4d64ef877e5f1ffe1bb3deee45ad4559db309546064d0aa7f6cd122e2
dovecot-pigeonhole-2.3.16-2.el8.x86_64.rpm
538a64dafcb31dd1a45c423f5a2afcbcc65d5dfa891026e1938bcf31e34008f3
RLSA-2022:1808
Moderate: aspell security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for aspell is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:1808
Rocky Linux 8
aspell-0.60.6.1-22.el8.i686.rpm
c141d22dd8a85ff028f54a89e35260ff3a0d930558eaa041c33a9a55339b7d89
aspell-0.60.6.1-22.el8.x86_64.rpm
35a21a9a576b4ce6f4b34851a880ece09a2baaf51d16df49edbcd76b8e19f243
RLBA-2021:3083
gcc-toolset-10-valgrind bug fix and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update for gcc-toolset-10-valgrind is now available for Rocky Linux 8.
For more information visit https://errata.rockylinux.org/RLBA-2021:3083
Rocky Linux 8
gcc-toolset-10-valgrind-3.16.0-6.el8_4.i686.rpm
e1ce0850349148b3ab3aba7bf21cfffe7cc26f8e78a7b63c07601ce5c349b101
gcc-toolset-10-valgrind-3.16.0-6.el8_4.x86_64.rpm
eaee7045eb86911441e2ca185719dac4846cf6761b34b1cd4503e66276f0b650
gcc-toolset-10-valgrind-devel-3.16.0-6.el8_4.i686.rpm
5fbac89725917a18834c3d4e7450065437144dcf0a0efa3f85d56666a6290a36
gcc-toolset-10-valgrind-devel-3.16.0-6.el8_4.x86_64.rpm
4b0fc0732a44b410281e4ebb01b853a5ae5b49173e876bfba3064ea2a42410d3
RLSA-2021:2583
Moderate: python38:3.8 and python38-devel:3.8 security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for the python38:3.8 and python38-devel:3.8 modules is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:2583
Rocky Linux 8
python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm
c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5
python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm
e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885
python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm
c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058
python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm
6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b
python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm
12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33
python38-mod_wsgi-4.6.8-3.module+el8.4.0+570+c2eaf144.x86_64.rpm
c504193195a97b1802c950a753237b34bc16b4673c232c25bb589dab51255f41
python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm
d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba
python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm
21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9
python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm
5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1
python38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm
693b174f895dd685857753ad75f07f4fdb95e82a88e4c3f8618392b5d4b81b5e
python39-chardet-3.0.4-19.module+el8.4.0+574+843c4898.noarch.rpm
9a21825b6b2a472ec12024574f4d39e2b516dec4a8bf1514572f05bed2915afd
python39-ply-3.11-10.module+el8.4.0+574+843c4898.noarch.rpm
964120ccea403bb0c770c16065565fb671e85f9c8f3d5807544259f183ac23ac
python39-pysocks-1.7.1-4.module+el8.4.0+574+843c4898.noarch.rpm
6d48f8fb19e1cce6f8d808cd72005c6c87cf0569a296bd22c509b0c27f020660
RLSA-2021:2363
Important: gupnp security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update for gupnp is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:2363
Rocky Linux 8
gupnp-1.0.6-2.el8_4.i686.rpm
9b8dddbfbdc089e8168175fa66c8f695977c2720f6f4bd441196cb9b5e701662
gupnp-1.0.6-2.el8_4.x86_64.rpm
99156c05f5915a79b954b5a4e6d5d38b65d7c455f9a66af27e036a35635570cc
RLSA-2021:3074
Moderate: nodejs:14 security, bug fix, and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for the nodejs:14 module is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:3074
Rocky Linux 8
nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm
eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm
eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm
eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm
eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm
eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b
nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm
86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c
RLBA-2021:3593
gcc-toolset-10-elfutils bug fix update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update for gcc-toolset-10-elfutils is now available for Rocky Linux 8.
For more information visit https://errata.rockylinux.org/RLBA-2021:3593
Rocky Linux 8
gcc-toolset-10-elfutils-0.182-6.el8_4.x86_64.rpm
f64e85941a97279c482bbd079fbd153255a348556053cf6e40b7b1abea70c7bf
gcc-toolset-10-elfutils-debuginfod-client-0.182-6.el8_4.i686.rpm
dea4b32d33daaa5cf93dd48e6d736fbc8ae87f03626cc746f127f1b816be2593
gcc-toolset-10-elfutils-debuginfod-client-0.182-6.el8_4.x86_64.rpm
fbf71de210a57662e2215e22fe634b8822b0533020a47c1f6615e0e50b9c2e66
gcc-toolset-10-elfutils-debuginfod-client-devel-0.182-6.el8_4.i686.rpm
e923f2207f99247d9dfddc1cb2aed5b36fe36f1e441374b4b6a768ec6bd6a860
gcc-toolset-10-elfutils-debuginfod-client-devel-0.182-6.el8_4.x86_64.rpm
47103bfcc834e8d9585ea457e023013726ea8fd98bfb6cc9ab1003ac9df38925
gcc-toolset-10-elfutils-devel-0.182-6.el8_4.i686.rpm
589fcba6c71733265f0d4f18d6ec1200079f23eb3b475aa4b4622b8824153854
gcc-toolset-10-elfutils-devel-0.182-6.el8_4.x86_64.rpm
20d78a08fcad187ce1fe69bdb260016abe2cfc43d6fe882099adfc1c11cb4b55
gcc-toolset-10-elfutils-libelf-0.182-6.el8_4.i686.rpm
9aba44906c12278e4eea29af4495c11e3904fc6f3270932cba6d61b9dbb25869
gcc-toolset-10-elfutils-libelf-0.182-6.el8_4.x86_64.rpm
b27fdaf713c099c491534f785cc4418944976ced9ace65c6a1b4cfdc64441000
gcc-toolset-10-elfutils-libelf-devel-0.182-6.el8_4.i686.rpm
63ec7c979c6905b8b59d61fb3c472846f7184fcbbfe29e72d8563da8ddf218fb
gcc-toolset-10-elfutils-libelf-devel-0.182-6.el8_4.x86_64.rpm
06e63e0c75d6871db6259dca49854a356e43dfc658de0edfb41b193111939565
gcc-toolset-10-elfutils-libs-0.182-6.el8_4.i686.rpm
5145964b5e9afa734749f7d1fa9ee072d3959cd05d69efb670ac58c159364c09
gcc-toolset-10-elfutils-libs-0.182-6.el8_4.x86_64.rpm
769e4bb8af44477862465592d22f364ae865f1f7cd86bf005b0a2e304ce20765
RLSA-2022:2031
Low: libssh security, bug fix, and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update for libssh is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:2031
Rocky Linux 8
libssh-devel-0.9.6-3.el8.i686.rpm
4a9b1c9d0bfc6a5346035675fa96793e173fbe235e8f7dba6f0e1a043cbbb877
libssh-devel-0.9.6-3.el8.x86_64.rpm
7cb2b675798815b1a1bf842d17c69edf8dfc941ece898b2d471e235161e0cccc
RLSA-2021:3590
Moderate: mysql:8.0 security, bug fix, and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for the mysql:8.0 module is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:3590
Rocky Linux 8
mecab-0.996-1.module+el8.3.0+242+87d3366a.9.x86_64.rpm
14952996574de43eec381be174d1a4dd572e04536682e0ac26946c6cb5c707ba
mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm
19b0e3eeea327b2ce021e978337b84189ad9a488f0e82a4dfd1602436c1d0549
mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm
490449bfec869b5947ac0da58a4f56ca9369e2b6a04c22dbc0eef1cd5306c96f
mysql-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm
5835ef2fafa38168bfe18ed1a6f91e345c1bbe3ce8803c4c812cae7d1554f702
mysql-common-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm
98597b5e26add557d0687defca496399a59eb64a443d08bba55f5772d7d6ef13
mysql-devel-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm
6804ebf957f76275b7237d7d4042d45be95d2ae292da9060bef4e0b34acff53b
mysql-errmsg-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm
05cb72589e13e1181c621fe309f071d28bddc74848977baf93e085faffcf84aa
mysql-libs-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm
50d42c4c557faae38d755dfa690df2020be414c0aedd1d338be4e04a84891615
mysql-server-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm
246223ae9c8ef779ac1ecd1b544ddbc38f3df620cff78f634e311817a82baa69
mysql-test-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm
834328ec93539879520f5dbea5989df2c1aae47575d243226dc3973a0f0704d1
RLSA-2021:3623
Important: nodejs:12 security and bug fix update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update for the nodejs:12 module is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:3623
Rocky Linux 8
nodejs-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm
6eda5b4e2f92a536468d0e044f8c6dceaf5abd6f3ef01ccc23a4274350682524
nodejs-devel-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm
50c090640fb144376fa6f27305ba9f617a224971cae68d49f5d8ab4bdd7e0b9a
nodejs-docs-12.22.5-1.module+el8.4.0+647+e905fa21.noarch.rpm
8bb738d9c8410f662b3c2f32aed10130e9f6887e873754199bb435970d32470f
nodejs-full-i18n-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm
c5ae64d1ca085036e507b540533798726e90180d8fe6a69416f13c3551351278
nodejs-packaging-23-3.module+el8.5.0+733+de4fee6c.noarch.rpm
de384459a7bf627a23b2dc78c14c6b94ae7402e3185305950a7a1e86cb1e823a
npm-6.14.14-1.12.22.5.1.module+el8.4.0+647+e905fa21.x86_64.rpm
ecdf41ce219c3afc89f36ee75da98797809ff753994f1c699477de2bf265062a
nodejs-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm
6eda5b4e2f92a536468d0e044f8c6dceaf5abd6f3ef01ccc23a4274350682524
nodejs-devel-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm
50c090640fb144376fa6f27305ba9f617a224971cae68d49f5d8ab4bdd7e0b9a
nodejs-docs-12.22.5-1.module+el8.4.0+647+e905fa21.noarch.rpm
8bb738d9c8410f662b3c2f32aed10130e9f6887e873754199bb435970d32470f
nodejs-full-i18n-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm
c5ae64d1ca085036e507b540533798726e90180d8fe6a69416f13c3551351278
nodejs-packaging-23-3.module+el8.5.0+733+de4fee6c.noarch.rpm
de384459a7bf627a23b2dc78c14c6b94ae7402e3185305950a7a1e86cb1e823a
npm-6.14.14-1.12.22.5.1.module+el8.4.0+647+e905fa21.x86_64.rpm
ecdf41ce219c3afc89f36ee75da98797809ff753994f1c699477de2bf265062a
nodejs-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm
6eda5b4e2f92a536468d0e044f8c6dceaf5abd6f3ef01ccc23a4274350682524
nodejs-devel-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm
50c090640fb144376fa6f27305ba9f617a224971cae68d49f5d8ab4bdd7e0b9a
nodejs-docs-12.22.5-1.module+el8.4.0+647+e905fa21.noarch.rpm
8bb738d9c8410f662b3c2f32aed10130e9f6887e873754199bb435970d32470f
nodejs-full-i18n-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm
c5ae64d1ca085036e507b540533798726e90180d8fe6a69416f13c3551351278
nodejs-packaging-23-3.module+el8.5.0+733+de4fee6c.noarch.rpm
de384459a7bf627a23b2dc78c14c6b94ae7402e3185305950a7a1e86cb1e823a
npm-6.14.14-1.12.22.5.1.module+el8.4.0+647+e905fa21.x86_64.rpm
ecdf41ce219c3afc89f36ee75da98797809ff753994f1c699477de2bf265062a
RLSA-2021:4622
Important: freerdp security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update for freerdp is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:4622
Rocky Linux 8
freerdp-2.2.0-7.el8_5.x86_64.rpm
acf21c1eeed45c522a4dd8f44b30779ab83b1a3c648b53ba9a43951f4e56bf1c
freerdp-libs-2.2.0-7.el8_5.i686.rpm
8bde65f2d37f4a0832cc276b52c0dec889feb2ef19680f938c80677c2be8f633
freerdp-libs-2.2.0-7.el8_5.x86_64.rpm
0302055f4b4c6738477eb15068598026a5425954c72905c949181ef848364f63
libwinpr-2.2.0-7.el8_5.i686.rpm
595048be37744b36d5480ffdb9b6c08ef5817109da3ff5e6416466e6369a1072
libwinpr-2.2.0-7.el8_5.x86_64.rpm
90abb5fd442565640cc5e9fbeac05901e398fdb97838c1ab87d7b0ef51931d36
libwinpr-devel-2.2.0-7.el8_5.i686.rpm
1e9bfc11aeb8012ec3d75b33a6cab3b78ab4d822b01cc185c7f591c88e011f1c
libwinpr-devel-2.2.0-7.el8_5.x86_64.rpm
1cfe282e82a7ca1b9e2ee3f52d5d16a0ac13c6889c201dc2c36d551854893fa1
RLBA-2021:3594
libdb bug fix and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update for libdb is now available for Rocky Linux 8.
For more information visit https://errata.rockylinux.org/RLBA-2021:3594
Rocky Linux 8
libdb-devel-5.3.28-42.el8_4.i686.rpm
0c8d56ff99ebbef82cda32cad3a77de5c01a5a735c0d9e0463e3969142728d51
libdb-devel-5.3.28-42.el8_4.x86_64.rpm
4038cac5a947df780f43ad543f735f1c0307a106ae02b1ac518fba0349d5bdc9
RLSA-2021:2290
Important: nginx:1.16 security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update for the nginx:1.16 module is now available for Rocky Linux 8, Rocky Linux 8.1 Extended Update Support, and Rocky Linux 8.2 Extended Update Support.
Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:2290
Rocky Linux 8
nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
a7e8f12bcadbfb850ced0c9f7c738dd34bce16d491e5145b3cdd7f3ad6e5e6ee
nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
bf37394530514e4f89d360aa6c4ea22c049dd243a88a84dcb83209895c5168c7
nginx-all-modules-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm
3b0073666d96b7699491be25e37ada5e61fb5fcffdb5605bc6c757d2f22098de
nginx-all-modules-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm
7fb26e744e26ed89e749ac1a22dbf72e28fa553724839a76dfcbceb3ed840d90
nginx-filesystem-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm
51ffdebca045cd896d1166a62b73ccec82c034bf133f6fb3ffbeb10719924991
nginx-filesystem-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm
43fa77fc74095e53b63439cb405f6a8a9617913fa085beacb4d740d4fe316c37
nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
5d100dcfd14470e027fd70954a37040a03c5ac42b28d06f353788d7800d33a20
nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
03d6fe221bb98ed1b023d3513435e18887c7818bae8c4d71f6c2f983417eb7e7
nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
e73f87b0fe704a434776fbb00e5b0c15259070dd098fbf73c8e26f0492013e55
nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
771754953dbb211e3464a1e9f14561ec5f8b7742de5e6677e294fe4e3bf3d334
nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
980d5cd6502bc54e842f0ec78820541adc7e4ed15e213756a0426c1431fbb904
nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
1aaf30cd71829f8482f1d7bfd73b17c6356cfa9b881da79a6928108890e22ddc
nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
29ab92d9f77c68de5b9f91c600b0bef4b3b2afbb1cc01891f200d26883010a4f
nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
4c9c4c5d0ee6e2d0e774a37dc131d64267485d95033ca486b157f37b86b39449
nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
12a16e26088f86d84e6a0b8295960956284b6588f87ede147e1347b24ad31462
nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
9d1bafbf400e3d4432337f9651a87c8b4b3f7e696a10910232c9c4d0ae0f719e
nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
a7e8f12bcadbfb850ced0c9f7c738dd34bce16d491e5145b3cdd7f3ad6e5e6ee
nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
bf37394530514e4f89d360aa6c4ea22c049dd243a88a84dcb83209895c5168c7
nginx-all-modules-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm
3b0073666d96b7699491be25e37ada5e61fb5fcffdb5605bc6c757d2f22098de
nginx-all-modules-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm
7fb26e744e26ed89e749ac1a22dbf72e28fa553724839a76dfcbceb3ed840d90
nginx-filesystem-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm
51ffdebca045cd896d1166a62b73ccec82c034bf133f6fb3ffbeb10719924991
nginx-filesystem-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm
43fa77fc74095e53b63439cb405f6a8a9617913fa085beacb4d740d4fe316c37
nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
5d100dcfd14470e027fd70954a37040a03c5ac42b28d06f353788d7800d33a20
nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
03d6fe221bb98ed1b023d3513435e18887c7818bae8c4d71f6c2f983417eb7e7
nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
e73f87b0fe704a434776fbb00e5b0c15259070dd098fbf73c8e26f0492013e55
nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
771754953dbb211e3464a1e9f14561ec5f8b7742de5e6677e294fe4e3bf3d334
nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
980d5cd6502bc54e842f0ec78820541adc7e4ed15e213756a0426c1431fbb904
nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
1aaf30cd71829f8482f1d7bfd73b17c6356cfa9b881da79a6928108890e22ddc
nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
29ab92d9f77c68de5b9f91c600b0bef4b3b2afbb1cc01891f200d26883010a4f
nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
4c9c4c5d0ee6e2d0e774a37dc131d64267485d95033ca486b157f37b86b39449
nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
12a16e26088f86d84e6a0b8295960956284b6588f87ede147e1347b24ad31462
nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
9d1bafbf400e3d4432337f9651a87c8b4b3f7e696a10910232c9c4d0ae0f719e
RLSA-2022:5467
Important: php:7.4 security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update for the php:7.4 module is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:5467
Rocky Linux 8
apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm
cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe
apcu-panel-5.1.20-1.module+el8.6.0+790+fc63e43f.noarch.rpm
0e9d74cc0eba28463f32c2fcd7da6b7959146b32f959df3c9c876cfe4b743680
libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14
libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
996d397031508e9101b6e9a0094a6cba118da93efb4f1b1bd224769d65008d91
libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f
libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
6f832b96a25a454bc576303745f9cb041a65531528a90437ab6936505abc7177
libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77
libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
e4f4ace1b7cc21f2018213138a4ee06fe6150056f4170206a595de2e6f581b77
php-pear-1.10.12-1.module+el8.6.0+789+2130c178.noarch.rpm
c20c31a8cafb68671583a79c3a85b7a87668132557e1adb08b2ff7ce6a9c4058
php-pear-1.10.13-1.module+el8.6.0+790+fc63e43f.noarch.rpm
e46b2f905e5a36adba35af3f70884467592cb7ba32cecfaee3d1192127eb04e5
php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d
php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
f1572b2afbf482909317a87e31242e42931f5d4da5084ad048e349a6cbf16e74
php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4
php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
8912da51f22348d378782eaa3188d977be4ecf0f2b59ab80aee4e18b01ef35d6
php-pecl-rrd-2.0.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
0715edabc98e62f4980b4485417182bc7e39b3dddbfd94a41a2eb53bc9201135
php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
2678c55e406ed194b50e9eb58d1caa05bb088bfb1744af92db94f4cf86fc0cff
php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm
2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30
php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
a34ecbe5457a2820ef2959811e2ed8512a48561f9c9d02588ff4a0d086df308f
php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm
04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657
php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
74648336246a6f9ccd0520eb157ee3237bb3553bb7a1810f49cf1e3bfcf5ba60
apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpm
cab6f6a14e4c59f9eafa0707a0e4f55528e15de73b85919930ecb08c451fa9fe
apcu-panel-5.1.20-1.module+el8.6.0+790+fc63e43f.noarch.rpm
0e9d74cc0eba28463f32c2fcd7da6b7959146b32f959df3c9c876cfe4b743680
libzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
75f34497afc158430c69257447733a95a153e6263d9da5d2fc6bfb5c96ae6b14
libzip-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
996d397031508e9101b6e9a0094a6cba118da93efb4f1b1bd224769d65008d91
libzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
80816bfd658c85fbe1bc27954f013ce322c2f8470e26927b79206adb7f5d823f
libzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
6f832b96a25a454bc576303745f9cb041a65531528a90437ab6936505abc7177
libzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
260ab30a46a3b23f290be9cb9d77788d6e3b70146190f2d3c42c30c0176e6f77
libzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
e4f4ace1b7cc21f2018213138a4ee06fe6150056f4170206a595de2e6f581b77
php-pear-1.10.12-1.module+el8.6.0+789+2130c178.noarch.rpm
c20c31a8cafb68671583a79c3a85b7a87668132557e1adb08b2ff7ce6a9c4058
php-pear-1.10.13-1.module+el8.6.0+790+fc63e43f.noarch.rpm
e46b2f905e5a36adba35af3f70884467592cb7ba32cecfaee3d1192127eb04e5
php-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
d10b2be6269aefd10d24cbd2b2f6526650d1d0dc16c7913bb63b367c3aea358d
php-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
f1572b2afbf482909317a87e31242e42931f5d4da5084ad048e349a6cbf16e74
php-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpm
6bf62205c31e2d2cf76fa22986aa300aa1861d3d70e45fb7adae783470f31ad4
php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
8912da51f22348d378782eaa3188d977be4ecf0f2b59ab80aee4e18b01ef35d6
php-pecl-rrd-2.0.1-1.module+el8.6.0+789+2130c178.x86_64.rpm
0715edabc98e62f4980b4485417182bc7e39b3dddbfd94a41a2eb53bc9201135
php-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
2678c55e406ed194b50e9eb58d1caa05bb088bfb1744af92db94f4cf86fc0cff
php-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpm
2bb72c5e64afb3dc9df7e066f161246c52ddcf92cc06e36a0be9cccf04935e30
php-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
a34ecbe5457a2820ef2959811e2ed8512a48561f9c9d02588ff4a0d086df308f
php-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm
04f2cde035b9fac9461cd94fe06c1d6626b5287cb4b4c4311561ddceb1d5c657
php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm
74648336246a6f9ccd0520eb157ee3237bb3553bb7a1810f49cf1e3bfcf5ba60
RLSA-2022:1930
Moderate: keepalived security and bug fix update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for keepalived is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:1930
Rocky Linux 8
keepalived-2.1.5-8.el8.x86_64.rpm
41e700d02b5f6c77b75a1fa66d487d80006360bdbcb94297ac291221ed5d319c
RLSA-2022:1810
Moderate: libtiff security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for libtiff is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:1810
Rocky Linux 8
libtiff-4.0.9-21.el8.i686.rpm
ca86985eb62d17f49004acab002b99dd6d8c30eff36a246e3fb66c802169f8a9
libtiff-4.0.9-21.el8.x86_64.rpm
1393a72113f12a5a28273defb7e4da56888066ea67bb5100630d0e13f263c68c
libtiff-devel-4.0.9-21.el8.i686.rpm
16e6b5ce489a597e2f36b50fe4fc59b5ae63b1d865a873d961685da8efd5a216
libtiff-devel-4.0.9-21.el8.x86_64.rpm
9d0e1fa160af29ee4cf5be9cf345e0ab6f40a33134f96ef3490799f60c108fe1
RLSA-2021:4903
Critical: nss security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Critical
An update for nss is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:4903
Rocky Linux 8
nss-3.67.0-7.el8_5.i686.rpm
aa2d297d55a4bc7d2c5fcfd3f26cd8604f8e759f471d1531d527c5840301b3c4
nss-3.67.0-7.el8_5.x86_64.rpm
b050e18bf644e6c217a0bf4f5a91f458424bc7597d4a7be38ee9ba6bc450a79d
nss-devel-3.67.0-7.el8_5.i686.rpm
a92a8b9c2120b6a0ce006da294d933c058961b665d3a54b4164c7bf57b2026c7
nss-devel-3.67.0-7.el8_5.x86_64.rpm
d9eaaf9754d53e21416fc5045830f62cec67aa386b57078e4157bcc30ea0f346
nss-softokn-3.67.0-7.el8_5.i686.rpm
289a2f903f28fb675d515b64322e17656317909f0effcbcec13c31b195512a5e
nss-softokn-3.67.0-7.el8_5.x86_64.rpm
1821044e946375b14a39f0d73f3a1bc8669df601c61076ee8932a18ecede2341
nss-softokn-devel-3.67.0-7.el8_5.i686.rpm
4cc44aac64b44913774eb4b0f9f0b6876e74f5068c0954f9350192e61f5f5347
nss-softokn-devel-3.67.0-7.el8_5.x86_64.rpm
acf1a833eece9d866dd96612ec902e541138f1487e72dbc77058888175568f77
nss-softokn-freebl-3.67.0-7.el8_5.i686.rpm
b1e4758ee17e0e062096d4a7dc42d1130e1ccc224885b5663eab4e9f01c377aa
nss-softokn-freebl-3.67.0-7.el8_5.x86_64.rpm
cddb83d15260e2bfd151633963092ad239a416b37478add83eee0bb69c35472b
nss-softokn-freebl-devel-3.67.0-7.el8_5.i686.rpm
dd265aca1c251fdb2a5fe8974d34010ab95ff2cee1f7d9f74837e84b51847681
nss-softokn-freebl-devel-3.67.0-7.el8_5.x86_64.rpm
3c82897ae2d43abe2842ec6738de4e2e158eba476a66bd38b4716bc51a6a8055
nss-sysinit-3.67.0-7.el8_5.x86_64.rpm
c278b5bf6e1ebb927ee71d3748ddc657fdaba8ff6eeefd4d9b86ec665bbcd398
nss-tools-3.67.0-7.el8_5.x86_64.rpm
b99a319b024c11d4bb3735040acf17813ec40e40cf770bb78c507f900574bc20
nss-util-3.67.0-7.el8_5.i686.rpm
35f59e0b907027a693a391fcb4a7df7ca79f03e53ff27ee5769c64d42752b3a1
nss-util-3.67.0-7.el8_5.x86_64.rpm
1b1e28f5988c5af06559c8e8898373a99837b1cc7a1a58450bce001f063ba8c2
nss-util-devel-3.67.0-7.el8_5.i686.rpm
2441423b11a67f6a12a0e594e6648dd4dc553f0e78343631a41d25e13bd5c7a4
nss-util-devel-3.67.0-7.el8_5.x86_64.rpm
d76484b976f6e1868076da9ae8a92104153b272ea4faec1532ae42a1185403ac
RLSA-2021:1979
Important: squid:4 security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update for the squid:4 module is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:1979
Rocky Linux 8
libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082
libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm
00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93
RLSA-2022:5163
Low: httpd:2.4 security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update for the httpd:2.4 module is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:5163
Rocky Linux 8
mod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpm
4c38731a882c46a2a227c602054bc420cc132713bc60608912a5462181585ac5
mod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm
9d4f06cb522d0e81d55e73005c9cbb16990264cf6aa9e5be55b31f0b40c41cf9
RLSA-2022:2013
Moderate: openssh security, bug fix, and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for openssh is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:2013
Rocky Linux 8
openssh-askpass-8.0p1-13.el8.x86_64.rpm
fbec26a84dd6c8009a4a0e321218af39d545eff4d315defebbe241cb50fb3e7b
RLSA-2022:441
Important: aide security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update for aide is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:441
Rocky Linux 8
aide-0.16-14.el8_5.1.x86_64.rpm
cd5d83d0836f7ae2f5b59f914bf67cdee69e404f8b9864363f1d93d76747c6aa
RLSA-2021:4325
Moderate: lasso security and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for lasso is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:4325
Rocky Linux 8
lasso-2.6.0-12.el8.i686.rpm
b05640c5b0eaa54e4f0ac2d7d44f100d047489dbb1f5912fb611bbbe69261fdb
lasso-2.6.0-12.el8.x86_64.rpm
5cdb83a6ef598be1d8f63872ba0bcbf32cf19b0f16fd9e323ed80348e953a6df
RLSA-2021:1983
Important: idm:DL1 security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update for the idm:DL1 module is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:1983
Rocky Linux 8
python3-jwcrypto-0.5.0-1.module+el8.4.0+430+1dcf16bb.noarch.rpm
8f52e2bf2531bf764f3d698863ec27fb18d7457493ff72fe91d5cf871eea4f02
python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm
a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033
python3-pyusb-1.0.0-9.module+el8.4.0+430+1dcf16bb.noarch.rpm
c1461c922fe67180fdd438b037b2452f88b934f2438c0d77aefd23bc8d5a620e
python3-yubico-1.3.2-9.module+el8.4.0+430+1dcf16bb.noarch.rpm
57ba1a75366409cb10214266d4ff5512a4e27e9a804f1668862e80d6dc0eecd4
python3-jwcrypto-0.5.0-1.module+el8.4.0+430+1dcf16bb.noarch.rpm
8f52e2bf2531bf764f3d698863ec27fb18d7457493ff72fe91d5cf871eea4f02
python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm
a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033
python3-pyusb-1.0.0-9.module+el8.4.0+430+1dcf16bb.noarch.rpm
c1461c922fe67180fdd438b037b2452f88b934f2438c0d77aefd23bc8d5a620e
python3-yubico-1.3.2-9.module+el8.4.0+430+1dcf16bb.noarch.rpm
57ba1a75366409cb10214266d4ff5512a4e27e9a804f1668862e80d6dc0eecd4
python3-jwcrypto-0.5.0-1.module+el8.4.0+430+1dcf16bb.noarch.rpm
8f52e2bf2531bf764f3d698863ec27fb18d7457493ff72fe91d5cf871eea4f02
python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm
a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033
python3-pyusb-1.0.0-9.module+el8.4.0+430+1dcf16bb.noarch.rpm
c1461c922fe67180fdd438b037b2452f88b934f2438c0d77aefd23bc8d5a620e
python3-yubico-1.3.2-9.module+el8.4.0+430+1dcf16bb.noarch.rpm
57ba1a75366409cb10214266d4ff5512a4e27e9a804f1668862e80d6dc0eecd4
RLBA-2021:3240
.NET Core 2.1 bugfix update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update for .NET Core 2.1 is now available for Rocky Linux.
For more information visit https://errata.rockylinux.org/RLBA-2021:3240
Rocky Linux 8
dotnet-host-fxr-2.1-2.1.30-1.el8_4.rocky.x86_64.rpm
a4d8e71402fc6bd36ccae8ba4395eb873b0f3c784db09d3084e6ca440cda925d
dotnet-runtime-2.1-2.1.30-1.el8_4.rocky.x86_64.rpm
cbfff6de30501753f7e3e22633e6bb2b79f127fe1aa3852be5f49569a0197f4c
dotnet-sdk-2.1-2.1.526-1.el8_4.rocky.x86_64.rpm
b01ae5a57232950f63cd3847d35e22abbbb6ed9546f798908e4f2c4f5e491649
dotnet-sdk-2.1.5xx-2.1.526-1.el8_4.rocky.x86_64.rpm
c366fad3118e4a8e74178c05148f40faaf4f058e720a4bf78926f6713b259deb
RLSA-2021:2588
Moderate: ruby:2.6 security, bug fix, and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for the ruby:2.6 module is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:2588
Rocky Linux 8
rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3
rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm
1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505
rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6
rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b
rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6
rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e
rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4
rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac
rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21
rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093
rubygem-abrt-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm
0db38261694321b3fe358091a3b00b487152713cd0b2075c79c2a695f039602e
rubygem-abrt-doc-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm
88c0b4efaf57ff92de9214032eead69fd4e8cbbe9fb31aa2869e626e9d91de28
rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3
rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm
1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505
rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm
7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc
rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6
rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b
rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm
861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498
rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d
rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6
rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e
rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6
rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4
rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac
rubygem-mysql2-0.5.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm
a7b94f06c62bf6f720d4e22dd40ec7c86beffb871418fd41761eade4c94320ac
rubygem-mysql2-doc-0.5.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
6e0d3c34c3e32ae39c98ef6a7ced21bfc9d98ed97a60f0cd250e25f340ed03b0
rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21
rubygem-pg-1.2.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm
49ab41e4cac5db1b5c138740ebf80c32ba208b24fac3dc1505b15b93513d7fba
rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093
rubygem-pg-doc-1.2.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
c09ae194775cac6c4c6b26052d23abb727f170cf8a3d26de38f9963cb23db7c9
rubygem-abrt-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm
0db38261694321b3fe358091a3b00b487152713cd0b2075c79c2a695f039602e
rubygem-abrt-doc-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm
88c0b4efaf57ff92de9214032eead69fd4e8cbbe9fb31aa2869e626e9d91de28
rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3
rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm
1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505
rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm
7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc
rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6
rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b
rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm
861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498
rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d
rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6
rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e
rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6
rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4
rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac
rubygem-mysql2-0.5.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm
a7b94f06c62bf6f720d4e22dd40ec7c86beffb871418fd41761eade4c94320ac
rubygem-mysql2-doc-0.5.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
6e0d3c34c3e32ae39c98ef6a7ced21bfc9d98ed97a60f0cd250e25f340ed03b0
rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21
rubygem-pg-1.2.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm
49ab41e4cac5db1b5c138740ebf80c32ba208b24fac3dc1505b15b93513d7fba
rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093
rubygem-pg-doc-1.2.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
c09ae194775cac6c4c6b26052d23abb727f170cf8a3d26de38f9963cb23db7c9
rubygem-abrt-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm
0db38261694321b3fe358091a3b00b487152713cd0b2075c79c2a695f039602e
rubygem-abrt-doc-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm
88c0b4efaf57ff92de9214032eead69fd4e8cbbe9fb31aa2869e626e9d91de28
rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3
rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm
1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505
rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm
7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc
rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6
rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b
rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm
861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498
rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d
rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6
rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e
rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6
rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm
c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4
rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm
0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac
rubygem-mysql2-0.5.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm
a7b94f06c62bf6f720d4e22dd40ec7c86beffb871418fd41761eade4c94320ac
rubygem-mysql2-doc-0.5.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
6e0d3c34c3e32ae39c98ef6a7ced21bfc9d98ed97a60f0cd250e25f340ed03b0
rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm
6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21
rubygem-pg-1.2.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm
49ab41e4cac5db1b5c138740ebf80c32ba208b24fac3dc1505b15b93513d7fba
rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm
63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093
rubygem-pg-doc-1.2.3-1.module+el8.4.0+594+11b6673a.noarch.rpm
c09ae194775cac6c4c6b26052d23abb727f170cf8a3d26de38f9963cb23db7c9
RLSA-2022:1777
Moderate: webkit2gtk3 security, bug fix, and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for webkit2gtk3 is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:1777
Rocky Linux 8
webkit2gtk3-2.34.6-1.el8.i686.rpm
1763e4cd8cb39b3134dfb1579d8ff090cb794978970d3f692abd922afc8fc404
webkit2gtk3-2.34.6-1.el8.x86_64.rpm
d74c016528055ff3a12ee190dda714df7255ca92065f70b0fd275f3d61204974
webkit2gtk3-devel-2.34.6-1.el8.i686.rpm
b73465b6e1775ee5615d32be46cf0aa81d093ac52647d15c27acc6b22729055a
webkit2gtk3-devel-2.34.6-1.el8.x86_64.rpm
1dee55b448206d8acdda5aea1cb4c0e8cd7ffb20bcd1d642377d3b96ac1d09aa
webkit2gtk3-jsc-2.34.6-1.el8.i686.rpm
600a932fc8e6df7e83144b6f246a01d7993e397f9fed6c92f99564b11310cc4e
webkit2gtk3-jsc-2.34.6-1.el8.x86_64.rpm
a611bddb1e3d46f45f8170cdfc64a8cab8383fefb7b1d95f884424a2b3b401ef
webkit2gtk3-jsc-devel-2.34.6-1.el8.i686.rpm
71a209d3ce40f120fac580a9a87b02fa35f3ffad06dca4ac2439ac70dca7ca2d
webkit2gtk3-jsc-devel-2.34.6-1.el8.x86_64.rpm
21d9fc119349e0906576b1af8beb6cb23b9081f507b73621963a0433c8f39372
RLSA-2022:2074
Moderate: samba security, bug fix, and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for samba is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:2074
Rocky Linux 8
samba-vfs-iouring-4.15.5-5.el8.x86_64.rpm
7dc183ab343b29b58bf43d6a71281fc74f01963813f50f70eb91d105d382bb9b
RLSA-2022:1730
Important: thunderbird security update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update for thunderbird is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2022:1730
Rocky Linux 8
thunderbird-91.9.0-3.el8_5.x86_64.rpm
5382b81916e6a938f30afcf2ae8f7861ea22543e665b56fe0807571691f10daf
RLSA-2021:4381
Moderate: GNOME security, bug fix, and enhancement update
Copyright (C) 2021 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update for GNOME is now available for Rocky Linux 8.
Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
For more information visit https://errata.rockylinux.org/RLSA-2021:4381
Rocky Linux 8
gnome-autoar-0.2.3-2.el8.i686.rpm
7df0767dcf8e4e1f791a56142199e265d9d2ddc7b3919b7aba93402e82802db1
gnome-autoar-0.2.3-2.el8.x86_64.rpm
ec104b742f1ee24ed3b790f8bcf2e9c3624d835c37d4f046226737569af9c0b5
gnome-calculator-3.28.2-2.el8.x86_64.rpm
bfc480d1f9e922cdeebbd6056672a2a349776204c6be7a6240a5eea1a623de39
gnome-online-accounts-3.28.2-3.el8.i686.rpm
c62c2f20e4765b4ee9a4cb86fdc3676f07ee1bf88c6e6f787989f7f3201dc539
gnome-online-accounts-3.28.2-3.el8.x86_64.rpm
128fe18ab8bfd55fcf3d048764c08baa784e475c43e05bee007663ed65266f64
gnome-online-accounts-devel-3.28.2-3.el8.i686.rpm
83eba37218a17c873e8339da654bd7fdf30542e309fe541d8fbb22e9e114077f
gnome-online-accounts-devel-3.28.2-3.el8.x86_64.rpm
2424a681b21ec3cc257eb8117d833e143b766ced3bb3f0d80fc6580ebe78b52d
gnome-settings-daemon-3.32.0-16.el8.x86_64.rpm
1f0b302fe6d536520fa78ee670b4a02602f305c8e04833ad4e0297a07118cc25
gnome-software-3.36.1-10.el8.x86_64.rpm
2a9f077aa8113e2a4c4c3788d5258918fd7aaa4a97a3b5696d604e849fd23c5d
gsettings-desktop-schemas-3.32.0-6.el8.i686.rpm
9e3de8ab0df91a21383d9784b9ef2889a54058eea2c18c31142a4eb99b055039
gsettings-desktop-schemas-devel-3.32.0-6.el8.i686.rpm
6a8b085c3076824a5080c1bad4047d4c0177387ca5018fe0e82293d9ac621037
gsettings-desktop-schemas-devel-3.32.0-6.el8.x86_64.rpm
440c33ca267b2f26215df09174ce6574a2bb5113fe6d7c740eba3f1133c93af8
LibRaw-0.19.5-3.el8.i686.rpm
ca62265ca6516b645dcb52d822cd12b25d42ebb51c998fa008f218596d254b7a
LibRaw-0.19.5-3.el8.x86_64.rpm
df151c39f20ea9815d46aff810e74f2c837a34fb755909c23d2e159714999d90
vino-3.22.0-11.el8.x86_64.rpm
3ba0c279a775b11f29b6dbeb5daa462d4bbe721a3bc0f541dcaa8b0c25555ec1