RLSA-2022:1730 Important: thunderbird security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for thunderbird is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1730 Rocky Linux 8 thunderbird-91.9.0-3.el8_5.x86_64.rpm 5382b81916e6a938f30afcf2ae8f7861ea22543e665b56fe0807571691f10daf RLSA-2021:4325 Moderate: lasso security and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for lasso is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:4325 Rocky Linux 8 lasso-2.6.0-12.el8.i686.rpm b05640c5b0eaa54e4f0ac2d7d44f100d047489dbb1f5912fb611bbbe69261fdb lasso-2.6.0-12.el8.x86_64.rpm 5cdb83a6ef598be1d8f63872ba0bcbf32cf19b0f16fd9e323ed80348e953a6df RLSA-2021:2259 Important: nginx:1.18 security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for the nginx:1.18 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:2259 Rocky Linux 8 nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm a7e8f12bcadbfb850ced0c9f7c738dd34bce16d491e5145b3cdd7f3ad6e5e6ee nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm bf37394530514e4f89d360aa6c4ea22c049dd243a88a84dcb83209895c5168c7 nginx-all-modules-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm 3b0073666d96b7699491be25e37ada5e61fb5fcffdb5605bc6c757d2f22098de nginx-all-modules-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm 7fb26e744e26ed89e749ac1a22dbf72e28fa553724839a76dfcbceb3ed840d90 nginx-filesystem-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm 51ffdebca045cd896d1166a62b73ccec82c034bf133f6fb3ffbeb10719924991 nginx-filesystem-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm 43fa77fc74095e53b63439cb405f6a8a9617913fa085beacb4d740d4fe316c37 nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 5d100dcfd14470e027fd70954a37040a03c5ac42b28d06f353788d7800d33a20 nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 03d6fe221bb98ed1b023d3513435e18887c7818bae8c4d71f6c2f983417eb7e7 nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm e73f87b0fe704a434776fbb00e5b0c15259070dd098fbf73c8e26f0492013e55 nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 771754953dbb211e3464a1e9f14561ec5f8b7742de5e6677e294fe4e3bf3d334 nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 980d5cd6502bc54e842f0ec78820541adc7e4ed15e213756a0426c1431fbb904 nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 1aaf30cd71829f8482f1d7bfd73b17c6356cfa9b881da79a6928108890e22ddc nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 29ab92d9f77c68de5b9f91c600b0bef4b3b2afbb1cc01891f200d26883010a4f nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 4c9c4c5d0ee6e2d0e774a37dc131d64267485d95033ca486b157f37b86b39449 nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 12a16e26088f86d84e6a0b8295960956284b6588f87ede147e1347b24ad31462 nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 9d1bafbf400e3d4432337f9651a87c8b4b3f7e696a10910232c9c4d0ae0f719e nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm a7e8f12bcadbfb850ced0c9f7c738dd34bce16d491e5145b3cdd7f3ad6e5e6ee nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm bf37394530514e4f89d360aa6c4ea22c049dd243a88a84dcb83209895c5168c7 nginx-all-modules-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm 3b0073666d96b7699491be25e37ada5e61fb5fcffdb5605bc6c757d2f22098de nginx-all-modules-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm 7fb26e744e26ed89e749ac1a22dbf72e28fa553724839a76dfcbceb3ed840d90 nginx-filesystem-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm 51ffdebca045cd896d1166a62b73ccec82c034bf133f6fb3ffbeb10719924991 nginx-filesystem-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm 43fa77fc74095e53b63439cb405f6a8a9617913fa085beacb4d740d4fe316c37 nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 5d100dcfd14470e027fd70954a37040a03c5ac42b28d06f353788d7800d33a20 nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 03d6fe221bb98ed1b023d3513435e18887c7818bae8c4d71f6c2f983417eb7e7 nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm e73f87b0fe704a434776fbb00e5b0c15259070dd098fbf73c8e26f0492013e55 nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 771754953dbb211e3464a1e9f14561ec5f8b7742de5e6677e294fe4e3bf3d334 nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 980d5cd6502bc54e842f0ec78820541adc7e4ed15e213756a0426c1431fbb904 nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 1aaf30cd71829f8482f1d7bfd73b17c6356cfa9b881da79a6928108890e22ddc nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 29ab92d9f77c68de5b9f91c600b0bef4b3b2afbb1cc01891f200d26883010a4f nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 4c9c4c5d0ee6e2d0e774a37dc131d64267485d95033ca486b157f37b86b39449 nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm 12a16e26088f86d84e6a0b8295960956284b6588f87ede147e1347b24ad31462 nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm 9d1bafbf400e3d4432337f9651a87c8b4b3f7e696a10910232c9c4d0ae0f719e RLSA-2022:1808 Moderate: aspell security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for aspell is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1808 Rocky Linux 8 aspell-0.60.6.1-22.el8.i686.rpm c141d22dd8a85ff028f54a89e35260ff3a0d930558eaa041c33a9a55339b7d89 aspell-0.60.6.1-22.el8.x86_64.rpm 35a21a9a576b4ce6f4b34851a880ece09a2baaf51d16df49edbcd76b8e19f243 RLSA-2022:1810 Moderate: libtiff security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for libtiff is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1810 Rocky Linux 8 libtiff-4.0.9-21.el8.i686.rpm ca86985eb62d17f49004acab002b99dd6d8c30eff36a246e3fb66c802169f8a9 libtiff-4.0.9-21.el8.x86_64.rpm 1393a72113f12a5a28273defb7e4da56888066ea67bb5100630d0e13f263c68c libtiff-devel-4.0.9-21.el8.i686.rpm 16e6b5ce489a597e2f36b50fe4fc59b5ae63b1d865a873d961685da8efd5a216 libtiff-devel-4.0.9-21.el8.x86_64.rpm 9d0e1fa160af29ee4cf5be9cf345e0ab6f40a33134f96ef3490799f60c108fe1 RLSA-2022:441 Important: aide security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for aide is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:441 Rocky Linux 8 aide-0.16-14.el8_5.1.x86_64.rpm cd5d83d0836f7ae2f5b59f914bf67cdee69e404f8b9864363f1d93d76747c6aa RLBA-2021:3083 gcc-toolset-10-valgrind bug fix and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update for gcc-toolset-10-valgrind is now available for Rocky Linux 8. For more information visit https://errata.rockylinux.org/RLBA-2021:3083 Rocky Linux 8 gcc-toolset-10-valgrind-3.16.0-6.el8_4.i686.rpm e1ce0850349148b3ab3aba7bf21cfffe7cc26f8e78a7b63c07601ce5c349b101 gcc-toolset-10-valgrind-3.16.0-6.el8_4.x86_64.rpm eaee7045eb86911441e2ca185719dac4846cf6761b34b1cd4503e66276f0b650 gcc-toolset-10-valgrind-devel-3.16.0-6.el8_4.i686.rpm 5fbac89725917a18834c3d4e7450065437144dcf0a0efa3f85d56666a6290a36 gcc-toolset-10-valgrind-devel-3.16.0-6.el8_4.x86_64.rpm 4b0fc0732a44b410281e4ebb01b853a5ae5b49173e876bfba3064ea2a42410d3 RLSA-2022:2200 Important: .NET 5.0 security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for .NET 5.0 is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:2200 Rocky Linux 8 aspnetcore-runtime-3.1-3.1.25-1.el8_6.x86_64.rpm 3ab054d83fdef0b7e8ad7d0e9ea190d056223a2cba120191bddd06512ae556e5 aspnetcore-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm d486dec30aa390f81e1f9b88d74223c6f82438c6f61d784d9418c1fbcb43ec1a aspnetcore-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm 044191f102db47baafc1478922ddd2ec8a57132da7a63fcb4217e5c8ce532572 aspnetcore-targeting-pack-3.1-3.1.25-1.el8_6.x86_64.rpm 1bfe32ec9815519733767e40c1f3d7fbafe25994c22a73f9450f230e3cd2c607 aspnetcore-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm 25ea9a4ee9219c905c60a2fb6c1d0980790c0fc18bbb095a68c1841667a80ad5 aspnetcore-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm 78cb5230f4dd8d0af104d30a175f0bd4dc48266ff4d844255c7a12de0ca92863 dotnet-6.0.105-1.el8_6.x86_64.rpm 80c33981bb9bfd293a75f6953155c4950c40949b466bb7aaf0c7a530eae021eb dotnet-apphost-pack-3.1-3.1.25-1.el8_6.x86_64.rpm 7c157f825b5ce5811a9d4bf3dabd4f093ecbc9e49e6b5b8bd82c13fabfdbd540 dotnet-apphost-pack-5.0-5.0.17-1.el8_6.x86_64.rpm d796e4163087da226589f147642c803920504ffbb7f14ebd7dd77d63069371e7 dotnet-apphost-pack-6.0-6.0.5-1.el8_6.x86_64.rpm 1a7f2653de383eb098b609f65685bcc7e79e20753b2856fbfefeb8ffdd140644 dotnet-host-6.0.5-1.el8_6.x86_64.rpm 6f5fd968b6afcae67cf7a675c29bf1132f22d07ac6a0485d4e9a3946c24ad8ec dotnet-hostfxr-3.1-3.1.25-1.el8_6.x86_64.rpm 262fefa7902f53fb17cd03a722bce57a045228e9edd9fa9208a9ea0b0ba445af dotnet-hostfxr-5.0-5.0.17-1.el8_6.x86_64.rpm 7c90bf6baddc73ce33607cbe4a3dd8ce09e4924bd71cfeec24ca034ae75c715b dotnet-hostfxr-6.0-6.0.5-1.el8_6.x86_64.rpm 300faa33609d3d855a3f3bccdc829deade5f7eb062a38fbd19696da8b5a66c42 dotnet-runtime-3.1-3.1.25-1.el8_6.x86_64.rpm a89e9e77423da793ed6a383f1265cdf7ebffc6a99cdc2060b5864fa2c97a2336 dotnet-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm 4b94310a8e8c720fcfb381249798db29d48530ecf929e416952823ff2e0c8d85 dotnet-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm ae1c22f5b6f35c7733e019c53e1a25ddfc3ff36b174b863be945cad1efa8d47f dotnet-sdk-3.1-3.1.419-1.el8_6.x86_64.rpm e193f8bff7bd1809e62193cffcb7fa2334d3ab154cb64bcb27e5faad82dfa874 dotnet-sdk-5.0-5.0.214-1.el8_6.x86_64.rpm b09467d0681cdf6529562e270694a024f25a0b925c9084269141502fa9c46420 dotnet-sdk-6.0-6.0.105-1.el8_6.x86_64.rpm 7c0005651e8718bba891fba51d563d0718345306c6d44b3740b66a77c2fcf6a9 dotnet-targeting-pack-3.1-3.1.25-1.el8_6.x86_64.rpm d5880f077a71534b12d3b19332c65eb1d740662eedcb347a60df9fbe2a457069 dotnet-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm e9caa16fc3a9a967eaddcc7b7dd4dccdc929c7dbedeb58c0243c0870492af325 dotnet-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm 109537126216cb649f1835c1a7759d665a383b7f5046205e7b01c1eeaf127e70 dotnet-templates-3.1-3.1.419-1.el8_6.x86_64.rpm 4728a16a4ab8ca0bf6edb8208179aaf86852632ec652cc8302e8bb6b2e9fcb92 dotnet-templates-5.0-5.0.214-1.el8_6.x86_64.rpm 2f603a86303818a50b579bc999d12d8e8ed69db10575ea3ce048cdc021c7f969 dotnet-templates-6.0-6.0.105-1.el8_6.x86_64.rpm b05606f5a00cbcde5c17a88d32ac4b7746ca04ed45f8df6417d0b1c34e6e6f73 netstandard-targeting-pack-2.1-6.0.105-1.el8_6.x86_64.rpm 1bb145c46608f933ebea4b268ca0922ff5ad7e9d769b4b71833222ce84740d24 aspnetcore-runtime-3.1-3.1.25-1.el8_6.x86_64.rpm 3ab054d83fdef0b7e8ad7d0e9ea190d056223a2cba120191bddd06512ae556e5 aspnetcore-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm d486dec30aa390f81e1f9b88d74223c6f82438c6f61d784d9418c1fbcb43ec1a aspnetcore-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm 044191f102db47baafc1478922ddd2ec8a57132da7a63fcb4217e5c8ce532572 aspnetcore-targeting-pack-3.1-3.1.25-1.el8_6.x86_64.rpm 1bfe32ec9815519733767e40c1f3d7fbafe25994c22a73f9450f230e3cd2c607 aspnetcore-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm 25ea9a4ee9219c905c60a2fb6c1d0980790c0fc18bbb095a68c1841667a80ad5 aspnetcore-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm 78cb5230f4dd8d0af104d30a175f0bd4dc48266ff4d844255c7a12de0ca92863 dotnet-6.0.105-1.el8_6.x86_64.rpm 80c33981bb9bfd293a75f6953155c4950c40949b466bb7aaf0c7a530eae021eb dotnet-apphost-pack-3.1-3.1.25-1.el8_6.x86_64.rpm 7c157f825b5ce5811a9d4bf3dabd4f093ecbc9e49e6b5b8bd82c13fabfdbd540 dotnet-apphost-pack-5.0-5.0.17-1.el8_6.x86_64.rpm d796e4163087da226589f147642c803920504ffbb7f14ebd7dd77d63069371e7 dotnet-apphost-pack-6.0-6.0.5-1.el8_6.x86_64.rpm 1a7f2653de383eb098b609f65685bcc7e79e20753b2856fbfefeb8ffdd140644 dotnet-host-6.0.5-1.el8_6.x86_64.rpm 6f5fd968b6afcae67cf7a675c29bf1132f22d07ac6a0485d4e9a3946c24ad8ec dotnet-hostfxr-3.1-3.1.25-1.el8_6.x86_64.rpm 262fefa7902f53fb17cd03a722bce57a045228e9edd9fa9208a9ea0b0ba445af dotnet-hostfxr-5.0-5.0.17-1.el8_6.x86_64.rpm 7c90bf6baddc73ce33607cbe4a3dd8ce09e4924bd71cfeec24ca034ae75c715b dotnet-hostfxr-6.0-6.0.5-1.el8_6.x86_64.rpm 300faa33609d3d855a3f3bccdc829deade5f7eb062a38fbd19696da8b5a66c42 dotnet-runtime-3.1-3.1.25-1.el8_6.x86_64.rpm a89e9e77423da793ed6a383f1265cdf7ebffc6a99cdc2060b5864fa2c97a2336 dotnet-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm 4b94310a8e8c720fcfb381249798db29d48530ecf929e416952823ff2e0c8d85 dotnet-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm ae1c22f5b6f35c7733e019c53e1a25ddfc3ff36b174b863be945cad1efa8d47f dotnet-sdk-3.1-3.1.419-1.el8_6.x86_64.rpm e193f8bff7bd1809e62193cffcb7fa2334d3ab154cb64bcb27e5faad82dfa874 dotnet-sdk-5.0-5.0.214-1.el8_6.x86_64.rpm b09467d0681cdf6529562e270694a024f25a0b925c9084269141502fa9c46420 dotnet-sdk-6.0-6.0.105-1.el8_6.x86_64.rpm 7c0005651e8718bba891fba51d563d0718345306c6d44b3740b66a77c2fcf6a9 dotnet-targeting-pack-3.1-3.1.25-1.el8_6.x86_64.rpm d5880f077a71534b12d3b19332c65eb1d740662eedcb347a60df9fbe2a457069 dotnet-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm e9caa16fc3a9a967eaddcc7b7dd4dccdc929c7dbedeb58c0243c0870492af325 dotnet-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm 109537126216cb649f1835c1a7759d665a383b7f5046205e7b01c1eeaf127e70 dotnet-templates-3.1-3.1.419-1.el8_6.x86_64.rpm 4728a16a4ab8ca0bf6edb8208179aaf86852632ec652cc8302e8bb6b2e9fcb92 dotnet-templates-5.0-5.0.214-1.el8_6.x86_64.rpm 2f603a86303818a50b579bc999d12d8e8ed69db10575ea3ce048cdc021c7f969 dotnet-templates-6.0-6.0.105-1.el8_6.x86_64.rpm b05606f5a00cbcde5c17a88d32ac4b7746ca04ed45f8df6417d0b1c34e6e6f73 netstandard-targeting-pack-2.1-6.0.105-1.el8_6.x86_64.rpm 1bb145c46608f933ebea4b268ca0922ff5ad7e9d769b4b71833222ce84740d24 aspnetcore-runtime-3.1-3.1.25-1.el8_6.x86_64.rpm 3ab054d83fdef0b7e8ad7d0e9ea190d056223a2cba120191bddd06512ae556e5 aspnetcore-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm d486dec30aa390f81e1f9b88d74223c6f82438c6f61d784d9418c1fbcb43ec1a aspnetcore-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm 044191f102db47baafc1478922ddd2ec8a57132da7a63fcb4217e5c8ce532572 aspnetcore-targeting-pack-3.1-3.1.25-1.el8_6.x86_64.rpm 1bfe32ec9815519733767e40c1f3d7fbafe25994c22a73f9450f230e3cd2c607 aspnetcore-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm 25ea9a4ee9219c905c60a2fb6c1d0980790c0fc18bbb095a68c1841667a80ad5 aspnetcore-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm 78cb5230f4dd8d0af104d30a175f0bd4dc48266ff4d844255c7a12de0ca92863 dotnet-6.0.105-1.el8_6.x86_64.rpm 80c33981bb9bfd293a75f6953155c4950c40949b466bb7aaf0c7a530eae021eb dotnet-apphost-pack-3.1-3.1.25-1.el8_6.x86_64.rpm 7c157f825b5ce5811a9d4bf3dabd4f093ecbc9e49e6b5b8bd82c13fabfdbd540 dotnet-apphost-pack-5.0-5.0.17-1.el8_6.x86_64.rpm d796e4163087da226589f147642c803920504ffbb7f14ebd7dd77d63069371e7 dotnet-apphost-pack-6.0-6.0.5-1.el8_6.x86_64.rpm 1a7f2653de383eb098b609f65685bcc7e79e20753b2856fbfefeb8ffdd140644 dotnet-host-6.0.5-1.el8_6.x86_64.rpm 6f5fd968b6afcae67cf7a675c29bf1132f22d07ac6a0485d4e9a3946c24ad8ec dotnet-hostfxr-3.1-3.1.25-1.el8_6.x86_64.rpm 262fefa7902f53fb17cd03a722bce57a045228e9edd9fa9208a9ea0b0ba445af dotnet-hostfxr-5.0-5.0.17-1.el8_6.x86_64.rpm 7c90bf6baddc73ce33607cbe4a3dd8ce09e4924bd71cfeec24ca034ae75c715b dotnet-hostfxr-6.0-6.0.5-1.el8_6.x86_64.rpm 300faa33609d3d855a3f3bccdc829deade5f7eb062a38fbd19696da8b5a66c42 dotnet-runtime-3.1-3.1.25-1.el8_6.x86_64.rpm a89e9e77423da793ed6a383f1265cdf7ebffc6a99cdc2060b5864fa2c97a2336 dotnet-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm 4b94310a8e8c720fcfb381249798db29d48530ecf929e416952823ff2e0c8d85 dotnet-runtime-6.0-6.0.5-1.el8_6.x86_64.rpm ae1c22f5b6f35c7733e019c53e1a25ddfc3ff36b174b863be945cad1efa8d47f dotnet-sdk-3.1-3.1.419-1.el8_6.x86_64.rpm e193f8bff7bd1809e62193cffcb7fa2334d3ab154cb64bcb27e5faad82dfa874 dotnet-sdk-5.0-5.0.214-1.el8_6.x86_64.rpm b09467d0681cdf6529562e270694a024f25a0b925c9084269141502fa9c46420 dotnet-sdk-6.0-6.0.105-1.el8_6.x86_64.rpm 7c0005651e8718bba891fba51d563d0718345306c6d44b3740b66a77c2fcf6a9 dotnet-targeting-pack-3.1-3.1.25-1.el8_6.x86_64.rpm d5880f077a71534b12d3b19332c65eb1d740662eedcb347a60df9fbe2a457069 dotnet-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpm e9caa16fc3a9a967eaddcc7b7dd4dccdc929c7dbedeb58c0243c0870492af325 dotnet-targeting-pack-6.0-6.0.5-1.el8_6.x86_64.rpm 109537126216cb649f1835c1a7759d665a383b7f5046205e7b01c1eeaf127e70 dotnet-templates-3.1-3.1.419-1.el8_6.x86_64.rpm 4728a16a4ab8ca0bf6edb8208179aaf86852632ec652cc8302e8bb6b2e9fcb92 dotnet-templates-5.0-5.0.214-1.el8_6.x86_64.rpm 2f603a86303818a50b579bc999d12d8e8ed69db10575ea3ce048cdc021c7f969 dotnet-templates-6.0-6.0.105-1.el8_6.x86_64.rpm b05606f5a00cbcde5c17a88d32ac4b7746ca04ed45f8df6417d0b1c34e6e6f73 netstandard-targeting-pack-2.1-6.0.105-1.el8_6.x86_64.rpm 1bb145c46608f933ebea4b268ca0922ff5ad7e9d769b4b71833222ce84740d24 RLSA-2022:1820 Low: udisks2 security and bug fix update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update for udisks2 is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1820 Rocky Linux 8 libudisks2-2.9.0-9.el8.i686.rpm b6a3891bb289e01826b1bc4e26397e5f12718f44e2dc6413f4f5e626fde70061 libudisks2-2.9.0-9.el8.x86_64.rpm 13a2d984b5d4a21f35ab57ddd95914c27ccc916993620b4dab9bbd697ee2911a udisks2-2.9.0-9.el8.x86_64.rpm 5d4821126edacaebbe000dd9896ebb8dc63993f6f5da7e689e9968f946738a22 udisks2-iscsi-2.9.0-9.el8.x86_64.rpm 56eaaef8707e7c62a15fb4ce052a398cca4de48677e8ef3b7b9d10e96184cce2 udisks2-lsm-2.9.0-9.el8.x86_64.rpm 375eeb6adab3d131e8d96cbc816da721444799bcbf8f60c6b45d7b0f23016578 udisks2-lvm2-2.9.0-9.el8.x86_64.rpm b9ad578c257ddfc2788078ef33be243cde33c0a9f6793529b334c2ebaa860412 RLBA-2021:3240 .NET Core 2.1 bugfix update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update for .NET Core 2.1 is now available for Rocky Linux. For more information visit https://errata.rockylinux.org/RLBA-2021:3240 Rocky Linux 8 dotnet-host-fxr-2.1-2.1.30-1.el8_4.rocky.x86_64.rpm a4d8e71402fc6bd36ccae8ba4395eb873b0f3c784db09d3084e6ca440cda925d dotnet-runtime-2.1-2.1.30-1.el8_4.rocky.x86_64.rpm cbfff6de30501753f7e3e22633e6bb2b79f127fe1aa3852be5f49569a0197f4c dotnet-sdk-2.1-2.1.526-1.el8_4.rocky.x86_64.rpm b01ae5a57232950f63cd3847d35e22abbbb6ed9546f798908e4f2c4f5e491649 dotnet-sdk-2.1.5xx-2.1.526-1.el8_4.rocky.x86_64.rpm c366fad3118e4a8e74178c05148f40faaf4f058e720a4bf78926f6713b259deb RLSA-2021:1979 Important: squid:4 security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for the squid:4 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:1979 Rocky Linux 8 libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 4222046cb69389fb98b8e9bc1972bbbbc1a32f1cdad4188d850d2f1cc1e12082 libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm 00d57d4af8bf02fb2ecdf9cd3f429ba7c83a46109782057a99d53aee376eea93 RLSA-2022:2013 Moderate: openssh security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for openssh is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:2013 Rocky Linux 8 openssh-askpass-8.0p1-13.el8.x86_64.rpm fbec26a84dd6c8009a4a0e321218af39d545eff4d315defebbe241cb50fb3e7b RLSA-2021:3666 Important: nodejs:14 security and bug fix update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for the nodejs:14 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:3666 Rocky Linux 8 nodejs-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm 6eda5b4e2f92a536468d0e044f8c6dceaf5abd6f3ef01ccc23a4274350682524 nodejs-devel-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm 50c090640fb144376fa6f27305ba9f617a224971cae68d49f5d8ab4bdd7e0b9a nodejs-docs-12.22.5-1.module+el8.4.0+647+e905fa21.noarch.rpm 8bb738d9c8410f662b3c2f32aed10130e9f6887e873754199bb435970d32470f nodejs-full-i18n-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm c5ae64d1ca085036e507b540533798726e90180d8fe6a69416f13c3551351278 nodejs-packaging-23-3.module+el8.5.0+733+de4fee6c.noarch.rpm de384459a7bf627a23b2dc78c14c6b94ae7402e3185305950a7a1e86cb1e823a npm-6.14.14-1.12.22.5.1.module+el8.4.0+647+e905fa21.x86_64.rpm ecdf41ce219c3afc89f36ee75da98797809ff753994f1c699477de2bf265062a nodejs-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm 6eda5b4e2f92a536468d0e044f8c6dceaf5abd6f3ef01ccc23a4274350682524 nodejs-devel-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm 50c090640fb144376fa6f27305ba9f617a224971cae68d49f5d8ab4bdd7e0b9a nodejs-docs-12.22.5-1.module+el8.4.0+647+e905fa21.noarch.rpm 8bb738d9c8410f662b3c2f32aed10130e9f6887e873754199bb435970d32470f nodejs-full-i18n-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm c5ae64d1ca085036e507b540533798726e90180d8fe6a69416f13c3551351278 nodejs-packaging-23-3.module+el8.5.0+733+de4fee6c.noarch.rpm de384459a7bf627a23b2dc78c14c6b94ae7402e3185305950a7a1e86cb1e823a npm-6.14.14-1.12.22.5.1.module+el8.4.0+647+e905fa21.x86_64.rpm ecdf41ce219c3afc89f36ee75da98797809ff753994f1c699477de2bf265062a nodejs-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm 6eda5b4e2f92a536468d0e044f8c6dceaf5abd6f3ef01ccc23a4274350682524 nodejs-devel-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm 50c090640fb144376fa6f27305ba9f617a224971cae68d49f5d8ab4bdd7e0b9a nodejs-docs-12.22.5-1.module+el8.4.0+647+e905fa21.noarch.rpm 8bb738d9c8410f662b3c2f32aed10130e9f6887e873754199bb435970d32470f nodejs-full-i18n-12.22.5-1.module+el8.4.0+647+e905fa21.x86_64.rpm c5ae64d1ca085036e507b540533798726e90180d8fe6a69416f13c3551351278 nodejs-packaging-23-3.module+el8.5.0+733+de4fee6c.noarch.rpm de384459a7bf627a23b2dc78c14c6b94ae7402e3185305950a7a1e86cb1e823a npm-6.14.14-1.12.22.5.1.module+el8.4.0+647+e905fa21.x86_64.rpm ecdf41ce219c3afc89f36ee75da98797809ff753994f1c699477de2bf265062a RLSA-2021:4903 Critical: nss security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Critical An update for nss is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:4903 Rocky Linux 8 nss-3.67.0-7.el8_5.i686.rpm aa2d297d55a4bc7d2c5fcfd3f26cd8604f8e759f471d1531d527c5840301b3c4 nss-3.67.0-7.el8_5.x86_64.rpm b050e18bf644e6c217a0bf4f5a91f458424bc7597d4a7be38ee9ba6bc450a79d nss-devel-3.67.0-7.el8_5.i686.rpm a92a8b9c2120b6a0ce006da294d933c058961b665d3a54b4164c7bf57b2026c7 nss-devel-3.67.0-7.el8_5.x86_64.rpm d9eaaf9754d53e21416fc5045830f62cec67aa386b57078e4157bcc30ea0f346 nss-softokn-3.67.0-7.el8_5.i686.rpm 289a2f903f28fb675d515b64322e17656317909f0effcbcec13c31b195512a5e nss-softokn-3.67.0-7.el8_5.x86_64.rpm 1821044e946375b14a39f0d73f3a1bc8669df601c61076ee8932a18ecede2341 nss-softokn-devel-3.67.0-7.el8_5.i686.rpm 4cc44aac64b44913774eb4b0f9f0b6876e74f5068c0954f9350192e61f5f5347 nss-softokn-devel-3.67.0-7.el8_5.x86_64.rpm acf1a833eece9d866dd96612ec902e541138f1487e72dbc77058888175568f77 nss-softokn-freebl-3.67.0-7.el8_5.i686.rpm b1e4758ee17e0e062096d4a7dc42d1130e1ccc224885b5663eab4e9f01c377aa nss-softokn-freebl-3.67.0-7.el8_5.x86_64.rpm cddb83d15260e2bfd151633963092ad239a416b37478add83eee0bb69c35472b nss-softokn-freebl-devel-3.67.0-7.el8_5.i686.rpm dd265aca1c251fdb2a5fe8974d34010ab95ff2cee1f7d9f74837e84b51847681 nss-softokn-freebl-devel-3.67.0-7.el8_5.x86_64.rpm 3c82897ae2d43abe2842ec6738de4e2e158eba476a66bd38b4716bc51a6a8055 nss-sysinit-3.67.0-7.el8_5.x86_64.rpm c278b5bf6e1ebb927ee71d3748ddc657fdaba8ff6eeefd4d9b86ec665bbcd398 nss-tools-3.67.0-7.el8_5.x86_64.rpm b99a319b024c11d4bb3735040acf17813ec40e40cf770bb78c507f900574bc20 nss-util-3.67.0-7.el8_5.i686.rpm 35f59e0b907027a693a391fcb4a7df7ca79f03e53ff27ee5769c64d42752b3a1 nss-util-3.67.0-7.el8_5.x86_64.rpm 1b1e28f5988c5af06559c8e8898373a99837b1cc7a1a58450bce001f063ba8c2 nss-util-devel-3.67.0-7.el8_5.i686.rpm 2441423b11a67f6a12a0e594e6648dd4dc553f0e78343631a41d25e13bd5c7a4 nss-util-devel-3.67.0-7.el8_5.x86_64.rpm d76484b976f6e1868076da9ae8a92104153b272ea4faec1532ae42a1185403ac RLBA-2021:3594 libdb bug fix and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update for libdb is now available for Rocky Linux 8. For more information visit https://errata.rockylinux.org/RLBA-2021:3594 Rocky Linux 8 libdb-devel-5.3.28-42.el8_4.i686.rpm 0c8d56ff99ebbef82cda32cad3a77de5c01a5a735c0d9e0463e3969142728d51 libdb-devel-5.3.28-42.el8_4.x86_64.rpm 4038cac5a947df780f43ad543f735f1c0307a106ae02b1ac518fba0349d5bdc9 RLSA-2021:4622 Important: freerdp security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for freerdp is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:4622 Rocky Linux 8 freerdp-2.2.0-7.el8_5.x86_64.rpm acf21c1eeed45c522a4dd8f44b30779ab83b1a3c648b53ba9a43951f4e56bf1c freerdp-libs-2.2.0-7.el8_5.i686.rpm 8bde65f2d37f4a0832cc276b52c0dec889feb2ef19680f938c80677c2be8f633 freerdp-libs-2.2.0-7.el8_5.x86_64.rpm 0302055f4b4c6738477eb15068598026a5425954c72905c949181ef848364f63 libwinpr-2.2.0-7.el8_5.i686.rpm 595048be37744b36d5480ffdb9b6c08ef5817109da3ff5e6416466e6369a1072 libwinpr-2.2.0-7.el8_5.x86_64.rpm 90abb5fd442565640cc5e9fbeac05901e398fdb97838c1ab87d7b0ef51931d36 libwinpr-devel-2.2.0-7.el8_5.i686.rpm 1e9bfc11aeb8012ec3d75b33a6cab3b78ab4d822b01cc185c7f591c88e011f1c libwinpr-devel-2.2.0-7.el8_5.x86_64.rpm 1cfe282e82a7ca1b9e2ee3f52d5d16a0ac13c6889c201dc2c36d551854893fa1 RLSA-2021:2588 Moderate: ruby:2.6 security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for the ruby:2.6 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:2588 Rocky Linux 8 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm 1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505 rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm 0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 rubygem-abrt-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm 0db38261694321b3fe358091a3b00b487152713cd0b2075c79c2a695f039602e rubygem-abrt-doc-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm 88c0b4efaf57ff92de9214032eead69fd4e8cbbe9fb31aa2869e626e9d91de28 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm 1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505 rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm 7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm 861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498 rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm 0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac rubygem-mysql2-0.5.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm a7b94f06c62bf6f720d4e22dd40ec7c86beffb871418fd41761eade4c94320ac rubygem-mysql2-doc-0.5.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 6e0d3c34c3e32ae39c98ef6a7ced21bfc9d98ed97a60f0cd250e25f340ed03b0 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 rubygem-pg-1.2.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm 49ab41e4cac5db1b5c138740ebf80c32ba208b24fac3dc1505b15b93513d7fba rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 rubygem-pg-doc-1.2.3-1.module+el8.4.0+594+11b6673a.noarch.rpm c09ae194775cac6c4c6b26052d23abb727f170cf8a3d26de38f9963cb23db7c9 rubygem-abrt-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm 0db38261694321b3fe358091a3b00b487152713cd0b2075c79c2a695f039602e rubygem-abrt-doc-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm 88c0b4efaf57ff92de9214032eead69fd4e8cbbe9fb31aa2869e626e9d91de28 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm 1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505 rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm 7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm 861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498 rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm 0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac rubygem-mysql2-0.5.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm a7b94f06c62bf6f720d4e22dd40ec7c86beffb871418fd41761eade4c94320ac rubygem-mysql2-doc-0.5.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 6e0d3c34c3e32ae39c98ef6a7ced21bfc9d98ed97a60f0cd250e25f340ed03b0 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 rubygem-pg-1.2.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm 49ab41e4cac5db1b5c138740ebf80c32ba208b24fac3dc1505b15b93513d7fba rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 rubygem-pg-doc-1.2.3-1.module+el8.4.0+594+11b6673a.noarch.rpm c09ae194775cac6c4c6b26052d23abb727f170cf8a3d26de38f9963cb23db7c9 rubygem-abrt-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm 0db38261694321b3fe358091a3b00b487152713cd0b2075c79c2a695f039602e rubygem-abrt-doc-0.4.0-1.module+el8.4.0+594+11b6673a.noarch.rpm 88c0b4efaf57ff92de9214032eead69fd4e8cbbe9fb31aa2869e626e9d91de28 rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 716796875e0868a929b33f6dbf31b15a517a61be8fc6dc5feabbe2b9658db9f3 rubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpm 1acecb58e5f53b5d95fd7cc8dc29125baff256a5618253f1dcec0f5e98f9f505 rubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpm 7abaeaafa6904d4426acdc6269a3462fcf2359ffaf23dbdbfee678b2c49168fc rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 1d36b196c6dd6a3e29f039d8fe9d50d841c2a3ebce94145a4434b51e574199b6 rubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm f51dc2f253192759985f1c0e153e7e73e6c10447b0eca24c3c47518909fade8b rubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpm 861db8d32437a14199ccd74f14430bb8eb2fc2a02afdc1973d4ded05f6d9e498 rubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 8ef7eea8eea486e7f9d0f612894ca18eba465b88e69250dd181a0445ab3e7e5d rubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm 70f609a89be83f990bcaf2412025256afef6df9aca13e6832d9fe7ee2ff800b6 rubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm bba015a7361c997e7688427c4953e23bf542cea444503861ef9fe57f0686608e rubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm b829c1f991864d63a4de6216ca483fb3f4505be9971d4ac745255c17e51143c6 rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm c4ab2ff9085b0cdfc55ffec54ed200c49d840205f53895c9e789c472c20dece4 rubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm 0f10418751d4088b6c250b030aed48f62b2ce1a98bf83e6167f50addeb0db5ac rubygem-mysql2-0.5.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm a7b94f06c62bf6f720d4e22dd40ec7c86beffb871418fd41761eade4c94320ac rubygem-mysql2-doc-0.5.3-1.module+el8.4.0+594+11b6673a.noarch.rpm 6e0d3c34c3e32ae39c98ef6a7ced21bfc9d98ed97a60f0cd250e25f340ed03b0 rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm 6f089b3f1a4d9a2b6c43224c1a10c13cdc00b56731ae7e616b24776f02365b21 rubygem-pg-1.2.3-1.module+el8.4.0+594+11b6673a.x86_64.rpm 49ab41e4cac5db1b5c138740ebf80c32ba208b24fac3dc1505b15b93513d7fba rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm 63df6a0ab48a53b6ee0c486feb4a21ee9e840c43f9da0a74ffc9dcaf694e1093 rubygem-pg-doc-1.2.3-1.module+el8.4.0+594+11b6673a.noarch.rpm c09ae194775cac6c4c6b26052d23abb727f170cf8a3d26de38f9963cb23db7c9 RLSA-2021:2583 Moderate: python38:3.8 and python38-devel:3.8 security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for the python38:3.8 and python38-devel:3.8 modules is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:2583 Rocky Linux 8 python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm c2689fa1cb76238c220b0f75679b1ff49a435162d43778812615e7b39e148eb5 python38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm e731f34d8f7c6e41d083f309740f88811bb32667020216bca94e2d3bf4058885 python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm c231c763738cdf08854d08b5330a55fc27b168ab9f58c4d72029fb8529f16058 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpm 6db2c539e4cc226af4c3cb10a5365015bc02f29140949cfc162810c8c9a38c4b python38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpm 12700c24469733f2ae447e146939448aea556ac0f2e1ae1beb1476789d880d33 python38-mod_wsgi-4.6.8-3.module+el8.4.0+570+c2eaf144.x86_64.rpm c504193195a97b1802c950a753237b34bc16b4673c232c25bb589dab51255f41 python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm d969cfb21775f4f185a05800c6ba376244bb46d8e8fcbd24d4ce9a7dc9d25dba python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm 21fd2df0afa8a0f719a9641b77f0e58dcf05ddf3db67abdf1ef61c4709f037c9 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpm 5af857427988d6f280eeb45dc85e20898ad55034083db3a4fb71a3bb2e326ef1 python38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm 693b174f895dd685857753ad75f07f4fdb95e82a88e4c3f8618392b5d4b81b5e python39-chardet-3.0.4-19.module+el8.4.0+574+843c4898.noarch.rpm 9a21825b6b2a472ec12024574f4d39e2b516dec4a8bf1514572f05bed2915afd python39-ply-3.11-10.module+el8.4.0+574+843c4898.noarch.rpm 964120ccea403bb0c770c16065565fb671e85f9c8f3d5807544259f183ac23ac python39-pysocks-1.7.1-4.module+el8.4.0+574+843c4898.noarch.rpm 6d48f8fb19e1cce6f8d808cd72005c6c87cf0569a296bd22c509b0c27f020660 RLSA-2022:1777 Moderate: webkit2gtk3 security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for webkit2gtk3 is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1777 Rocky Linux 8 webkit2gtk3-2.34.6-1.el8.i686.rpm 1763e4cd8cb39b3134dfb1579d8ff090cb794978970d3f692abd922afc8fc404 webkit2gtk3-2.34.6-1.el8.x86_64.rpm d74c016528055ff3a12ee190dda714df7255ca92065f70b0fd275f3d61204974 webkit2gtk3-devel-2.34.6-1.el8.i686.rpm b73465b6e1775ee5615d32be46cf0aa81d093ac52647d15c27acc6b22729055a webkit2gtk3-devel-2.34.6-1.el8.x86_64.rpm 1dee55b448206d8acdda5aea1cb4c0e8cd7ffb20bcd1d642377d3b96ac1d09aa webkit2gtk3-jsc-2.34.6-1.el8.i686.rpm 600a932fc8e6df7e83144b6f246a01d7993e397f9fed6c92f99564b11310cc4e webkit2gtk3-jsc-2.34.6-1.el8.x86_64.rpm a611bddb1e3d46f45f8170cdfc64a8cab8383fefb7b1d95f884424a2b3b401ef webkit2gtk3-jsc-devel-2.34.6-1.el8.i686.rpm 71a209d3ce40f120fac580a9a87b02fa35f3ffad06dca4ac2439ac70dca7ca2d webkit2gtk3-jsc-devel-2.34.6-1.el8.x86_64.rpm 21d9fc119349e0906576b1af8beb6cb23b9081f507b73621963a0433c8f39372 RLSA-2022:1930 Moderate: keepalived security and bug fix update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for keepalived is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1930 Rocky Linux 8 keepalived-2.1.5-8.el8.x86_64.rpm 41e700d02b5f6c77b75a1fa66d487d80006360bdbcb94297ac291221ed5d319c RLSA-2021:3073 Moderate: nodejs:12 security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for the nodejs:12 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:3073 Rocky Linux 8 nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c nodejs-nodemon-2.0.3-1.module+el8.4.0+638+5344c6f7.noarch.rpm eb745ae46635317e8e1958eb9e28a005bf5fd957b61526de08afcb9a2ce1652b nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm 86c72be0faad356d18c0e95c5ac88bcf8431a173849015ed0a7345ed6704809c RLSA-2022:1950 Moderate: dovecot security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for dovecot is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:1950 Rocky Linux 8 dovecot-2.3.16-2.el8.x86_64.rpm 9a1ed964988493cc43f3675461d57fcfad0cd93a6186b07d3c03c62786e9fe20 dovecot-mysql-2.3.16-2.el8.x86_64.rpm dac798b094655507e03a94ec37e065e9117b3afdabf58e91544486ad1288c96d dovecot-pgsql-2.3.16-2.el8.x86_64.rpm b3cc3cc4d64ef877e5f1ffe1bb3deee45ad4559db309546064d0aa7f6cd122e2 dovecot-pigeonhole-2.3.16-2.el8.x86_64.rpm 538a64dafcb31dd1a45c423f5a2afcbcc65d5dfa891026e1938bcf31e34008f3 RLSA-2021:2363 Important: gupnp security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for gupnp is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:2363 Rocky Linux 8 gupnp-1.0.6-2.el8_4.i686.rpm 9b8dddbfbdc089e8168175fa66c8f695977c2720f6f4bd441196cb9b5e701662 gupnp-1.0.6-2.el8_4.x86_64.rpm 99156c05f5915a79b954b5a4e6d5d38b65d7c455f9a66af27e036a35635570cc RLSA-2022:2031 Low: libssh security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update for libssh is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:2031 Rocky Linux 8 libssh-devel-0.9.6-3.el8.i686.rpm 4a9b1c9d0bfc6a5346035675fa96793e173fbe235e8f7dba6f0e1a043cbbb877 libssh-devel-0.9.6-3.el8.x86_64.rpm 7cb2b675798815b1a1bf842d17c69edf8dfc941ece898b2d471e235161e0cccc RLSA-2022:2074 Moderate: samba security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for samba is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2022:2074 Rocky Linux 8 samba-vfs-iouring-4.15.5-5.el8.x86_64.rpm 7dc183ab343b29b58bf43d6a71281fc74f01963813f50f70eb91d105d382bb9b RLSA-2021:3590 Moderate: mysql:8.0 security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for the mysql:8.0 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:3590 Rocky Linux 8 mecab-0.996-1.module+el8.3.0+242+87d3366a.9.x86_64.rpm 14952996574de43eec381be174d1a4dd572e04536682e0ac26946c6cb5c707ba mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm 19b0e3eeea327b2ce021e978337b84189ad9a488f0e82a4dfd1602436c1d0549 mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm 490449bfec869b5947ac0da58a4f56ca9369e2b6a04c22dbc0eef1cd5306c96f mysql-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm 5835ef2fafa38168bfe18ed1a6f91e345c1bbe3ce8803c4c812cae7d1554f702 mysql-common-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm 98597b5e26add557d0687defca496399a59eb64a443d08bba55f5772d7d6ef13 mysql-devel-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm 6804ebf957f76275b7237d7d4042d45be95d2ae292da9060bef4e0b34acff53b mysql-errmsg-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm 05cb72589e13e1181c621fe309f071d28bddc74848977baf93e085faffcf84aa mysql-libs-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm 50d42c4c557faae38d755dfa690df2020be414c0aedd1d338be4e04a84891615 mysql-server-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm 246223ae9c8ef779ac1ecd1b544ddbc38f3df620cff78f634e311817a82baa69 mysql-test-8.0.26-1.module+el8.4.0+652+6de068a7.x86_64.rpm 834328ec93539879520f5dbea5989df2c1aae47575d243226dc3973a0f0704d1 RLBA-2021:3593 gcc-toolset-10-elfutils bug fix update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update for gcc-toolset-10-elfutils is now available for Rocky Linux 8. For more information visit https://errata.rockylinux.org/RLBA-2021:3593 Rocky Linux 8 gcc-toolset-10-elfutils-0.182-6.el8_4.x86_64.rpm f64e85941a97279c482bbd079fbd153255a348556053cf6e40b7b1abea70c7bf gcc-toolset-10-elfutils-debuginfod-client-0.182-6.el8_4.i686.rpm dea4b32d33daaa5cf93dd48e6d736fbc8ae87f03626cc746f127f1b816be2593 gcc-toolset-10-elfutils-debuginfod-client-0.182-6.el8_4.x86_64.rpm fbf71de210a57662e2215e22fe634b8822b0533020a47c1f6615e0e50b9c2e66 gcc-toolset-10-elfutils-debuginfod-client-devel-0.182-6.el8_4.i686.rpm e923f2207f99247d9dfddc1cb2aed5b36fe36f1e441374b4b6a768ec6bd6a860 gcc-toolset-10-elfutils-debuginfod-client-devel-0.182-6.el8_4.x86_64.rpm 47103bfcc834e8d9585ea457e023013726ea8fd98bfb6cc9ab1003ac9df38925 gcc-toolset-10-elfutils-devel-0.182-6.el8_4.i686.rpm 589fcba6c71733265f0d4f18d6ec1200079f23eb3b475aa4b4622b8824153854 gcc-toolset-10-elfutils-devel-0.182-6.el8_4.x86_64.rpm 20d78a08fcad187ce1fe69bdb260016abe2cfc43d6fe882099adfc1c11cb4b55 gcc-toolset-10-elfutils-libelf-0.182-6.el8_4.i686.rpm 9aba44906c12278e4eea29af4495c11e3904fc6f3270932cba6d61b9dbb25869 gcc-toolset-10-elfutils-libelf-0.182-6.el8_4.x86_64.rpm b27fdaf713c099c491534f785cc4418944976ced9ace65c6a1b4cfdc64441000 gcc-toolset-10-elfutils-libelf-devel-0.182-6.el8_4.i686.rpm 63ec7c979c6905b8b59d61fb3c472846f7184fcbbfe29e72d8563da8ddf218fb gcc-toolset-10-elfutils-libelf-devel-0.182-6.el8_4.x86_64.rpm 06e63e0c75d6871db6259dca49854a356e43dfc658de0edfb41b193111939565 gcc-toolset-10-elfutils-libs-0.182-6.el8_4.i686.rpm 5145964b5e9afa734749f7d1fa9ee072d3959cd05d69efb670ac58c159364c09 gcc-toolset-10-elfutils-libs-0.182-6.el8_4.x86_64.rpm 769e4bb8af44477862465592d22f364ae865f1f7cd86bf005b0a2e304ce20765 RLSA-2021:4381 Moderate: GNOME security, bug fix, and enhancement update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update for GNOME is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:4381 Rocky Linux 8 gnome-autoar-0.2.3-2.el8.i686.rpm 7df0767dcf8e4e1f791a56142199e265d9d2ddc7b3919b7aba93402e82802db1 gnome-autoar-0.2.3-2.el8.x86_64.rpm ec104b742f1ee24ed3b790f8bcf2e9c3624d835c37d4f046226737569af9c0b5 gnome-calculator-3.28.2-2.el8.x86_64.rpm bfc480d1f9e922cdeebbd6056672a2a349776204c6be7a6240a5eea1a623de39 gnome-online-accounts-3.28.2-3.el8.i686.rpm c62c2f20e4765b4ee9a4cb86fdc3676f07ee1bf88c6e6f787989f7f3201dc539 gnome-online-accounts-3.28.2-3.el8.x86_64.rpm 128fe18ab8bfd55fcf3d048764c08baa784e475c43e05bee007663ed65266f64 gnome-online-accounts-devel-3.28.2-3.el8.i686.rpm 83eba37218a17c873e8339da654bd7fdf30542e309fe541d8fbb22e9e114077f gnome-online-accounts-devel-3.28.2-3.el8.x86_64.rpm 2424a681b21ec3cc257eb8117d833e143b766ced3bb3f0d80fc6580ebe78b52d gnome-settings-daemon-3.32.0-16.el8.x86_64.rpm 1f0b302fe6d536520fa78ee670b4a02602f305c8e04833ad4e0297a07118cc25 gnome-software-3.36.1-10.el8.x86_64.rpm 2a9f077aa8113e2a4c4c3788d5258918fd7aaa4a97a3b5696d604e849fd23c5d gsettings-desktop-schemas-3.32.0-6.el8.i686.rpm 9e3de8ab0df91a21383d9784b9ef2889a54058eea2c18c31142a4eb99b055039 gsettings-desktop-schemas-devel-3.32.0-6.el8.i686.rpm 6a8b085c3076824a5080c1bad4047d4c0177387ca5018fe0e82293d9ac621037 gsettings-desktop-schemas-devel-3.32.0-6.el8.x86_64.rpm 440c33ca267b2f26215df09174ce6574a2bb5113fe6d7c740eba3f1133c93af8 LibRaw-0.19.5-3.el8.i686.rpm ca62265ca6516b645dcb52d822cd12b25d42ebb51c998fa008f218596d254b7a LibRaw-0.19.5-3.el8.x86_64.rpm df151c39f20ea9815d46aff810e74f2c837a34fb755909c23d2e159714999d90 vino-3.22.0-11.el8.x86_64.rpm 3ba0c279a775b11f29b6dbeb5daa462d4bbe721a3bc0f541dcaa8b0c25555ec1 RLSA-2021:1983 Important: idm:DL1 security update Copyright (C) 2021 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update for the idm:DL1 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. For more information visit https://errata.rockylinux.org/RLSA-2021:1983 Rocky Linux 8 python3-jwcrypto-0.5.0-1.module+el8.4.0+430+1dcf16bb.noarch.rpm 8f52e2bf2531bf764f3d698863ec27fb18d7457493ff72fe91d5cf871eea4f02 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-pyusb-1.0.0-9.module+el8.4.0+430+1dcf16bb.noarch.rpm c1461c922fe67180fdd438b037b2452f88b934f2438c0d77aefd23bc8d5a620e python3-yubico-1.3.2-9.module+el8.4.0+430+1dcf16bb.noarch.rpm 57ba1a75366409cb10214266d4ff5512a4e27e9a804f1668862e80d6dc0eecd4 python3-jwcrypto-0.5.0-1.module+el8.4.0+430+1dcf16bb.noarch.rpm 8f52e2bf2531bf764f3d698863ec27fb18d7457493ff72fe91d5cf871eea4f02 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-pyusb-1.0.0-9.module+el8.4.0+430+1dcf16bb.noarch.rpm c1461c922fe67180fdd438b037b2452f88b934f2438c0d77aefd23bc8d5a620e python3-yubico-1.3.2-9.module+el8.4.0+430+1dcf16bb.noarch.rpm 57ba1a75366409cb10214266d4ff5512a4e27e9a804f1668862e80d6dc0eecd4 python3-jwcrypto-0.5.0-1.module+el8.4.0+430+1dcf16bb.noarch.rpm 8f52e2bf2531bf764f3d698863ec27fb18d7457493ff72fe91d5cf871eea4f02 python3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm a21a0365de04260c56759432462b08cbd2b01e78c1cf1f76a8805e2eb4f0b033 python3-pyusb-1.0.0-9.module+el8.4.0+430+1dcf16bb.noarch.rpm c1461c922fe67180fdd438b037b2452f88b934f2438c0d77aefd23bc8d5a620e python3-yubico-1.3.2-9.module+el8.4.0+430+1dcf16bb.noarch.rpm 57ba1a75366409cb10214266d4ff5512a4e27e9a804f1668862e80d6dc0eecd4