SOLV F 0dnf1.01.2or$Y4 fU kuȋLSix86_64noarchbugzilla2cveCopyright 2025 Rocky Enterprise Software Foundationfinalreleng@rockylinux.orgself7:20180414-29.el8_8 5.el8None1:6.4.7.2-16.el8_9 1.el8 2.el8_75.3.7-20.el8_102.el8_107.el820161022-7.el8.11.24.0-4.module+el8.6.0+847+b490afdd5.15.3-1.el8ModerateImportantd63f516d1:1.44.0-9.module+el8.7.0+1084+97b81f61.rocky8.0.0-10.module+el8.7.0+1084+97b81f610.2.8-12.module+el8.7.0+1084+97b81f611.18.0-8.module+el8.7.0+1084+97b81f613.15-3.module+el8.7.0+1077+0e4f03d4container-tools3.12-9.module+el8.5.0+681+c9a1951f4.2.1-103.el8 _7.129.el88.0.0-10.1.module+el8.7.0+1125+fc135c6d1.66.0-13.el87.2.24-1.module+el8.4.0+413+c9202dda3.20-1.module+el8.4.0+414+2e7afcdd4.30-1.module+el8.7.0+1067+0a7071cc2.24-11.el8criuslirp4netns8.0.20-2.module+el8.7.0+1068+7fd2c980critpython3-criunodejs3.15-1.module+el8.7.0+1076+9b1c11c114.0.6-1.module+el8.7.0+1080+d88dc670udica1.11.1-1.module+el8.6.0+818+bd3952632:9.11.36-5.el8_7.2.10.9-21.el8.rocky.03.32.1-39.el8_1040.el8_105:6.2.0-20.module+el8.7.0+1084+97b81f61.2containernetworking-pluginsnodejs-packaging3.32.1-29.el833.el81.3.18-23.module+el8.7.0+1084+97b81f616.1-1.el80-5.module+el8.7.0+1084+97b81f618.2102.0-10.el83b9f49c45.1-12.module+el8.4.0+429+6bd33feanodejs-nodemon12.1.1-3.2.el8 4.el8_73.2.1-6.2.el84.2.1-7.1.el8_100.6.0-3.module+el8.4.0+429+6bd33fea11.2.1-9.1.el82.2.1-7.6.el8_104.3.1-1.module+el8.7.0+1076+9b1c11c1fuse-overlayfs0.9.4-11.20200615git1e36e30.el813.3.1-2.2.el8_102.28-6.el89.5-15.el8.rocky.6.33.28.1-8.el8faa19cc5cockpit-podmanlibslirp-develtoolbox390774194.4.0-1.module+el8.7.0+1077+0e4f03d41.62.1-1.module+el8.7.0+1079+7c7e17442:9.11.36-11.el8_9.1 4.el8_10 6.el8_10.4 8.el8_8.13:10.5.16-2.module+el8.6.0+995+5ac2a4835.10.120-10.module+el8.3.0+252+a4420673:6.2.0-21.module+el8.7.0+1125+fc135c6d.21:0.1.41-4.module+el8.5.0+770+e2f49861libiscsi-devel utilsnetcf-devellibsthunderbird1.14.1-2.module+el8.7.0+1066+f8abeb190.21-2.module+el8.6.0+977+ab6e685c3-1.module+el8.7.0+1118+c6c6f44a3.1-1.2.el8_522.1.5-2.el83.0.20-12.module+el8.6.0+798+87c3dbe0:10.3.35-1.module+el8.6.0+1005+cdf19c2280700202301121706429.2.1-2.3.el8firefoxrhelvirt12.12-1.module+el8.6.0+1049+f8fc4c363.7-2.module+el8.6.0+980+9caa008a2.2.11-11.module+el8.3.0+53+ea0629901:1.20.1-1.module+el8.6.0+791+48a2bb9d2.31.1-2.el83.el8_79.3-1.el8_843.5-1.el8_104.9.10-6.module+el8.7.0+1075+05db0c1d9.module+el8.7.0+1119+c1de6b591.0.1-2.module+el8.4.0+404+316a0dc56.1-1.module+el8.6.0+789+2130c1782.6.0-5.module+el8.4.0+429+6bd33fea8.16-13.module+el8.3.0+178+274154514-4.module+el8.6.0+794+eba840173.04.7-1.el8ruby1.10.2-5.module+el8.7.0+1065+42200b2e5.1.18-1.module+el8.6.0+789+2130c1785.3-2.el84.el80.3.0-4.module+el8.5.0+738+032c9c021.0:1.18.0-3.module+el8.4.0+544+e40554cf.18.0.352.b08-2.el8_7postgresql1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861python-podman-api1.36.2-14.el88.5.0-15.el86.el8_722.el8_103.el8_109.6.22-1.module+el8.5.0+687+7cd82e08php17-3.module+el8.3.0+101+f84c7154container-selinuxdotnet-hostnetstandard-targeting-pack-2.1perl-DBD-Pg0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f611.3.0-2.module+el8.7.0+1084+97b81f613.101.0-11.el8_107.el8_1079.0-10.el8_61.el8_790.0-4.el8_96.el8_97.el8_10libvirt-dbusrubygem-mysql2-docpg-doc0.2.1-2.module+el8.5.0+770+e2f49861python3-qrcode-core1.7.25-4.module+el8.5.0+697+f586bb30DL1apcu-panelcontainers-commonidmperl-DBD-SQLiterubygem-abrt -docmysql2pgnccustodiapython3-custodia0.4.2-3.git21fdece.module+el8.5.0+770+e2f498611.0.1-10.module+el8.3.0+53+ea0629901.8-1.module+el8.7.0+1076+9b1c11c19-1.el86.1-6.el8.1 _8.10:11.0.17.0.8-1.el8_72.el8_68.0.10-2.el8_79.0.7-4.el820.0.8-3.el8_83.0.9-3.el85.0.9-2.el87.0.13.0.11-3.el85.0.8-1.el8_7 2.el8_66.0.10-3.el8_77.0.7-1.el8_7 3.el821.0.3.0.9-1.el84.0.7-1.el85.0.10-3.el86.0.7-1.el82.8.6-2.module+el8.6.0+795+de4edbcc30b713e68.0.10-1.el8_104-1.el8_95-1.el8_107-1.el8_10050020211109140251aspnetcore-runtime-6.0 targeting-pack-6.0dotnet-apphost-pack-6.0hostfxr-6.0runtime-6.0sdk-6.0targeting-pack-6.0emplates-6.0libzip-develtoolsphp-pecl-apcu -devel zipskopeo0.0.7-1.module+el8.5.0+770+e2f498611.5.19-14.el8_55.15.3-8.el8_10Lowslf4j3.18.1-8.module+el8.3.0+53+ea06299080600202210250801017002022110817593692098735perl-DBD-MySQLFCGI0.4-5.module+el8.3.0+244+0b2ae7521.18.3-1.module+el8.3.0+101+f84c71542.10.0-1.module+el8.3.0+53+ea062990perl-YAMLython3-kdcproxyrubygem-bson-docmongo -doc0.8.3-4.module+el8.5.0+770+e2f49861122.08.0.11-1.el8_10.12-1.el8_103-1.el8_1003002021042610084950020220426164243conmonrubygem-bson0.4.10-4.module+el8.5.0+739+43897a5e1.0.0-2.module+el8.4.0+592+03ff458a1-1.module+el8.5.0+770+e2f498613.8.13-1.module+el8.7.0+1063+20f2b9a44.3.0-2.module+el8.4.0+592+03ff458a9.0.6-6.el8.10.10.0-2.module+el8.5.0+684+c3892ef94.0-1.module+el8.5.0+668+665814fa9.1-1.module+el8.7.0+1076+9b1c11c11.5.2-1.module+el8.4.0+414+2e7afcdd0.65-11.el8:0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f1.1.1-2.module+el8.6.0+843+5a13dac34.1-9.module+el8.4.0+542+815472296.1-2.module+el8.4.0+543+efbf198b.18.0.362.b09-2.el8_7 72.b07-4.el8 82.b05-2.el8412.b08-2.el8 32.b06-2.el82.5.1-2.module+el8.4.0+592+03ff458a7.16-2.module+el8.4.0+403+9ae17a319.9-1.module+el8.3.0+53+ea062990:2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f4.9.10-3.module+el8.7.0+1074+aae18f3ab4937e53criu-devellibsoci-systemd-hookumountpostgres-decoderbufssquid1.19.4-3.module+el8.5.0+673+102836213.2-2.module+el8.4.0+403+9ae17a310.12.0-4.module+el8.7.0+1069+6f3de942:1.14.2-16.module+el8.5.0+706+735ec4b35.1.17-1.module+el8.4.0+414+2e7afcddmavenperl-App-cpanminus0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f 1.module+el8.7.0+1076+9b1c11c1182-6.el8_45-5.el838-6.el84.5-1.el81.0.0-2.el818.4-1.module+el8.7.0+1073+99e3b3cd9-1.module+el8.7.0+1133+56289a014.0-4.el8:1.3.4-1.el82.7.18-11.module+el8.7.0+1062+663ba31c.rocky.0.2:3.5.8-4.el83.63.16.10.5-1.el8.rocky.0.17.12-1.el8.rocky.0.14.1-4.el84-5.el85-6.el87.0.0-1.el8_71-1.el8_70-1.el8_82-1.el8_73-1.el8_74-1.el8_75-2.el8_87-1.el8_88-1.el8_89-1.el8_88.0.2-2.el8_93-1.el8_90-1.module+el8.6.0+1057+4d6a17219.0.0-1.el8_102.el8_101-1.el8_102-1.el8_10aspnetcore-runtime-7.0 targeting-pack-7.0dotnet-apphost-pack-7.0hostfxr-7.0runtime-7.0sdk-7.0targeting-pack-7.0emplates-7.0httpdoci-seccomp-bpf-hookperltoolbox-tests0.2.4-1.module+el8.7.0+1076+9b1c11c15.3-1.module+el8.5.0+668+665814fa1.0.27-22.el82.3-1.module+el8.5.0+668+665814fa2:4.0.2-8.module+el8.7.0+1077+0e4f03d43.9.13-1.module+el8.7.0+1064+ad5642292.module+el8.7.0+1092+55aa9635:4.2.0-4.module+el8.7.0+1078+e72fcd4f6.module+el8.7.0+1122+04a7498b4:5.24.4-404.module+el8.6.0+882+2fa1e48f30.1-452.module+el8.6.0+878+f93dfff7php-pear1:2.0.8-8.module+el8.5.0+695+1fa8055e2.4.37-51.module+el8.7.0+1059+126e9251:9.16.23-0.14.el8_8.1 6.el8_9.2 22.el8_10.28060020220510152758cdc2268mod_mdnginxphp-pecl-rrdython27rhel8skopeo-testsubversionwebkit2gtk3 -devel jsc-devel1.12.0-7.el88.el8_79.el8_7.13.1-10.el8_103.el8_104.el8_102.el8_9.10:3.6.2-7.module+el8.6.0+976+839b99e929-2.module+el8.7.0+1076+9b1c11c11.1.12-6.el8.0.220.11-23.el8_10 4.el8_10 5.el8_109.el83.6-4.el8.rocky.0.25.el8_7.rocky.0.24.0-2.module+el8.7.0+1076+9b1c11c15.1-2.module+el8.4.0+413+c9202dda7.3-1.module+el8.6.0+790+fc63e43f:0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f9.0.62-27.el8_9.3 5.el8_8.287-1.el8_10.122.1.7-1.module+el8.4.0+429+6bd33fea36.7-1.el8_648.14.70-1.el81-1.el83.0.3-1.el8_1.rocky1.30-1.el8_62-1.el8_76.8-48.el8_7.rocky.05.0.17-1.el8_66.0.10-1.el8_62-1.el8_73-1.el8_74-1.el8_76-1.el8_72.el8_88-1.el8_89-1.el8_820-1.el8_81-1.el8_82-1.el8_84-1.el8_88-1.el8_99-1.el8_930-1.el8_105-1.el8_106-1.el8_107.0.17-1.el8_98-1.el8_99-1.el8_10libecap-develmariadbnodejs-docsopendnssecpgauditsofthsm-devel1.17.3-6.module+el8.5.0+672+ab6eb0154.3.30-6.module+el8.7.0+1060+852806e7:2.2.6-50.el8 1.el8_8.1 7.el862.el8_102.0.3-1.module+el8.6.0+982+9fdca2d43.0.1-13.module+el8.7.0+1076+9b1c11c17.0-1.module+el8.5.0+671+195e45635.1.12-2.module+el8.4.0+413+c9202dda20-1.module+el8.6.0+790+fc63e43f6-32.el80-0.33.20180415git.el84.20180415git.el8_7.28.1-7.module+el8.5.0+706+735ec4b31.7.28-3.module+el8.6.0+844+4401f2ed:4.16-7.module+el8.6.0+852+cc16a6863.1.2-141.module+el8.7.0+1081+f0a697432-16.module+el8.5.0+706+735ec4b328.5-18.el825.el8_96.el8_107.el8_107.4-4.module+el8.6.0+900+0603912d4.23.0-1.module+el8.7.0+1069+6f3de9425.1-4.module+el8.5.0+706+735ec4b3:5.32.1-471.module+el8.6.0+879+823e30128060020220621142345 2141024 1004160333crunpython2-Cythoncoveragepyyaml360.14-12.module+el8.4.0+403+9ae17a316.0-8.module+el8.5.0+706+735ec4b38.0-10.module+el8.5.0+706+735ec4b31.0.18-6.module+el8.4.0+403+9ae17a312-13.module+el8.4.0+403+9ae17a3115.7-6.module+el8.4.0+403+9ae17a315.3-6.module+el8.5.0+706+735ec4b36.8-6.module+el8.5.0+706+735ec4b39.0-4.module+el8.4.0+403+9ae17a3110-1.el8.rocky.0.27.4.0-10.module+el8.5.0+706+735ec4b32.0.0-13.module+el8.4.0+403+9ae17a315-7.module+el8.5.0+706+735ec4b3017.2-12.module+el8.5.0+706+735ec4b33-3.module+el8.7.0+1071+4bdda2a83-38.module+el8.4.0+403+9ae17a31.0.4-10.module+el8.5.0+706+735ec4b320.2-4.el84.2-13.module+el8.5.0+706+735ec4b35.11.99-8.module+el8.3.0+252+a44206734.70-4.module+el8.3.0+252+a44206739.4.30-2.v20200611.module+el8.6.0+852+cc16a686nmstate-plugin-ovsdbpython2-PyMySQLattrschardetdocutilsfuncsigsidna paddressmockpluggy y socks test-mock zrpm-macrossetuptools_scm3-libnmstatetigervnc-icons license selinux0.12.0-8.el876-5.el83.6-1.el86.1-2.module+el8.3.0+129+2feafa467.8-1.module+el8.5.0+770+e2f49861a326c831.0.5-18.module+el8.4.0+427+adf3570713.0-1.el85.0-2.el89.0-1.el84.6-3.module+el8.5.0+684+c3892ef958-2.module+el8.6.0+896+210082530.1-0.el81.1-1.el8:5.8-25.el8 _7.130.el82.0.1-1.module+el8.4.0+414+2e7afcdd24.32-5.el867.0.20070801-16.module+el8.3.0+242+87d3366a9.0-9.el8:2.0.15-1.module+el8.5.0+770+e2f498613.1.0-1.module+el8.6.0+843+5a13dac38.4-9.el874.066cd68148.0.104-1.el8_95-1.el8_107-1.el8_1010-1.el8_1005002021110919575660020220513012759 6281503009.0-4.el8Judyaspnetcore-runtime-8.0 targeting-pack-8.0dotnet-apphost-pack-8.0hostfxr-8.0runtime-8.0sdk-8.0targeting-pack-8.0emplates-8.0jansiva-1.8.0-openjdk-javadoc-zippg_repackhp-pecl-xdebugki-depsython3-podmantzdata-javaxml-commons-apis0.5.2-1.module+el8.5.0+738+032c9c021.0.0-8.el8 _7.21.4-1.module+el8.5.0+738+032c9c022.7-1.el8:26.1-7.el8 _7.12.3.6-1.el8:2.130.0-1.module+el8.5.0+770+e2f498619.16.23-0.9.el8.13.11.10-1.el8_101-1.el8_102-2.el8_8.19-7.el8_102.5-2.el8_106-1.el8_108-1.el8_1028.5-24.el84.5.0-1.module+el8.4.0+593+8d7f9f0c8.1-1.module+el8.4.0+594+11b6673aapache-commons-cliodeciolang3tinjectcdi-apigoogle-guicehttpcomponents-corejcl-over-slf4jplexus-cipherlassworldsontainers-component-annotationsinterpolationsec-dispatcherutilsrubygem-bundler0.3-5.module+el8.5.0+681+c9a1951f1.3.9-9.module+el8.7.0+1065+42200b2e583:0.35.1-4.module+el8.5.0+673+1028362178-11.module+el8.6.0+916+1765b8a02.003-11.el896-1.module+el8.6.0+879+823e301211.3-1.module+el8.4.0+594+11b6673a5.9-110.module+el8.6.0+992+fc951c187.6-138.module+el8.6.0+1001+b56781808.0-1.module+el8.4.0+593+8d7f9f0c3.0.4-141.module+el8.6.0+1002+a7dba0ac9.0.1-13.module+el8.4.0+403+9ae17a314.046-3.module+el8.6.0+904+791e07d450.3.2-4.module+el8.5.0+673+102836216.0.8-1.module+el8.5.0+736+fec10e21.15-1.el8.rocky.0.18.4.1-5.module+el8.6.0+852+cc16a68605002021110913082060020220513012746 6011617047002022110817593993-1.el8_9.1.rocky.0.282725abbc93984de9b2dbuildahcompat-libpthread-nonsharedglibc-utilslibserfnodejs-develfull-i18npmperl-DBIlatform-python-debugvelodman-dockerython-nss-doc3-idlensstkinter80-19.20110809svn.module+el8.3.0+53+ea0629901.04-24.module+el8.6.0+961+4779e2d22-26.module+el8.3.0+53+ea062990.0-16.module+el8.3.0+53+ea06299013-9.module+el8.3.0+53+ea0629904-3.module+el8.6.0+953+2c10460a4.01-25.module+el8.5.0+697+f586bb305.4-8.module+el8.3.0+53+ea0629907-24.module+el8.3.0+53+ea062990.7-8.module+el8.3.0+53+ea062990:3.1-28.module+el8.3.0+53+ea0629902.093-1.module+el8.6.0+878+f93dfff71.4-5.el8_7.21.0-34.module+el8.3.0+53+ea0629902.12-8.module+el8.3.0+53+ea0629906-21.module+el8.3.0+53+ea0629907.1-38.module+el8.3.0+53+ea0629906-4.module+el8.3.0+53+ea062990011.1-7.module+el8.3.0+53+ea0629903.2.2-10.module+el8.3.0+53+ea062990apache-commons-collectionslangbea-stax-apiind-licenseglassfish-fastinfoset jaxb-apicoreruntimetxw2jackson-module-jaxb-annotationskarta-commons-httpclientvassist -javadocpacemaker-schemaserl-IO-Socket-SSLString-ShellQuoteython-sqlalchemy-doc3-bindrelaxngDatatypeslf4j-jdk14tax-exvelocityxalan-j2erces-j2ml-commons-resolverstreambuffersom0.17.7-6.el829.14-4.module+el8.4.0+570+c2eaf14430-18.el84.15-5.5.el8_106.7-32.el8789.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61e56aea91.1.1-6.module+el8.4.0+570+c2eaf14403.2-3.module+el8.4.0+570+c2eaf1445.12-6.el86.1-2.el85.el8_102-2.el85.8.el8_10 el8_9.67-396.module+el8.6.0+878+f93dfff78.2-1.module+el8.6.0+789+2130c1782.0-3.module+el8.7.0+1076+9b1c11c143.1-4.module+el8.5.0+672+ab6eb0155.3-12.el870449-1.module+el8.7.0+1077+0e4f03d40.32.0.5-2.el81.5-2.el8_8.32.5-3.el8_9.13.5-2.el8:2.3.16-3.el8 5.el8 6.el8_102.36.7-1.el8_7.128.5-1.el8_8.34540.5-1.el8_9.11-3.el8_102.5-1.el86.3-1.el8_102.el8_105-1.el8_106.5-9.el88-3.module+el8.5.0+672+ab6eb0159.5-1.module+el8.4.0+415+e936cba30.11.0-5.el86.el818.2-10.el8_10.122.2-5.el8:2.11.7-1.el8_102.0-10.el88.el83.22.30-11.el8 2.el8_108.1-14.el820.el8_84-16.el86.16-5.el8_66.el8_78.el8_9.38-48.el8_7.1.rocky.051.el8_8.1.rocky.06.el8_9.3.rocky.062.el8_10.rocky.07.el8_10.rocky.09.el8_10.rocky.084.0465.2.1-2.module+el8.7.0+1084+97b81f618-1.el862-3.el8_7.rocky.0.1a1d53c57.0.100-1.el8_71-1.el8_72-1.el8_73-1.el8_74-1.el8_75-2.el8_87-1.el8_88-1.el8_89-1.el8_810-1.el8_88111232ba85dc78.0.0-1.module+el8.7.0+1084+97b81f61102-2.el8_93-1.el8_96-1.module+el8.7.0+1084+97b81f61060020220513012802400163607 152155 913075833700202211081113089.0.100-1.el8_101-2.el8_102-1.el8_103-1.el8_10a201e4c2opalliancespnetcore-runtime-dbg-8.0dotnet-runtime-dbg-8.0sdk-dbg-8.0geronimo-annotationrafanahivex-develjava-1.8.0-openjdk-accessibilitydemovelheadlesssrc1-openjdk-demovelheadlessjavadoc-zipmodssrctatic-libssouplibguestfs-winsupportnbd-develtiff-develnbdfusekit-basic-filters pluginscurl-plugindevelexample-pluginsgzip-filter pluginlinuxdisk-pluginnbd-pluginpython-pluginserversh-plugintar-filter pluginmpdisk-pluginvddk-pluginxz-filterginx-all-modulesfilesystemmstate-libsss-develsoftokn -devel freebl-develysinittoolsutil-develperl-Sys-Virthivexython3-hivexlibnbd8-Cython cffi ryptography markupsafe psycopg2-doctests scipy9repokey:type:iduby-hivexsssd-idptigervnc-server-minimalodule1.03-471.module+el8.6.0+879+823e301210.7-1.el82.9-1.el8_103.el8_105.0-10.module+el8.7.0+1062+663ba31c2.0-3.module+el8.4.0+570+c2eaf1446.4-28.module+el8.5.0+770+e2f498618-5.el89.el8_107.1-4.module+el8.4.0+570+c2eaf144:10.24.0-1.module+el8.3.0+101+f84c71542.22.12-1.module+el8.6.0+982+9fdca2d44.20.1-2.module+el8.7.0+1071+4bdda2a81.1-2.module+el8.7.0+1116+bd2a84b46.17.1-1.module+el8.6.0+1046+80feca588.1-3.module+el8.7.0+1108+49363b0d8.12.1-2.module+el8.7.0+1104+549f92a69.1-1.module+el8.7.0+1072+5b1687803.8.5-3.module+el8.7.0+1082+b3a88d232.19-3.module+el8.4.0+570+c2eaf14422.0-9.module+el8.4.0+570+c2eaf1446.10-109.module+el8.6.0+988+8031c1938-6.module+el8.4.0+570+c2eaf144019.3-3.module+el8.4.0+570+c2eaf1441.11-1.el82.el8_7:2.189.0-1.module+el8.7.0+1076+9b1c11c17.42-1.module+el8.6.0+878+f93dfff78.0.1763-19.el8_6.43.0.4-19.module+el8.4.0+570+c2eaf1445.0-15.el86.8-38.module+el8.5.0+671+195e45634.0.0-1.module+el8.7.0+1077+0e4f03d4:5.26.3-421.el8 2.el88.2-19.el8cloud-initjackson-jaxrs-json-providerproviderslibnbd-bash-completionnbdkit-bash-completionperl-Attribute-HandlersDevel-SelfStubberExtUtils-EmbedMiniperlLocale-Maketext-SimpleMemoizeodule-LoadedNet-PingPod-HtmlSelfLoaderTestlibnetcfgopenutilsython2-dns ocs -info38-asn1crypto chardet idna pycparser socks tz requestsrhel-system-rolesuby-docgem-minitestpower_assertrake doctest-units-develscap-security-guide-doc0.33.6-6.module+el8.5.0+672+ab6eb0152bae9351.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f1.8-2.module+el8.7.0+1077+0e4f03d46.1-4.module+el8.6.0+992+fc951c182.0-2.module+el8.7.0+1078+e72fcd4f3.3-1.el84.el8_78.el8_74.4-1.el8_82.el8_85-2.el8_96-2.el8_105-1.module+el8.7.0+1077+0e4f03d4.0-1.module+el8.5.0+684+c3892ef96:1.1.1-3.module+el8.7.0+1078+e72fcd4f2.0.7.1-6.module+el8.3.0+252+a442067300024-7.module+el8.6.0+878+f93dfff75.1-10.module+el8.5.0+706+735ec4b38.1-5.module+el8.3.0+252+a44206733-5.module+el8.3.0+252+a44206735-4.module+el8.3.0+252+a44206730.2.4-7.module+el8.7.0+1064+ad56422921.06-4.module+el8.7.0+1072+5b16878041.6.0-5.module+el8.5.0+672+ab6eb0155.5.110-6.module+el8.3.0+252+a4420673294be167.48.015.2-34.el8060020220510152755 915163017NetworkManager-cloud-setupbind-chrootdevellibs -litete-develpkcs11 -devel libs utilssdb-chrootutilsguavajava-17-openjdk-demovelheadlessjavadoc-zipmodssrctatic-libssr-305mailmanven-resolverwagonutternginx-mod-http-image-filterperlxslt-filter mail streampacemaker-cluster-libs libserl-generatorsodmanstgresql-test-rpm-macrosredissisuvarnish0.014-6.module+el8.6.0+961+4779e2d212-13.module+el8.6.0+878+f93dfff74-12.module+el8.4.0+597+ddf0ddea2.6-3.module+el8.7.0+1077+0e4f03d441-7.module+el8.6.0+961+4779e2d21.014-6.module+el8.6.0+961+4779e2d21002-7.module+el8.6.0+961+4779e2d27044-5.module+el8.6.0+961+4779e2d22.20.0-3.module+el8.5.0+706+735ec4b35-1.module+el8.6.0+1046+80feca5876-1.el886.2-1.el8_83.6.7-2.module+el8.4.0+597+ddf0ddea10.3-2.el83.el8_105.32.1-471.module+el8.6.0+879+823e3012httpcomponents-clientmaven-libperl-CPAN-DistnameInfo Meta-CheckFile-pushdModule-CPANfileParse-PMFilelibwww-perlython2-requests3-docs utils0.12.0-9.el8_74.0-12.el8.15.0-2.el87.0-1.el88.0-1.el8_1024.0-2.el85.0-9.el8_103.11-5.el84.28-3.el85.4-4.module+el8.5.0+728+553fbdb86.0-3.el87.4-4.git9ebe139.module+el8.5.0+681+c9a1951f91-1.el89.1-1.el82.3-16.module+el8.6.0+805+841d2db41.0.0-73.rc95.module+el8.7.0+1076+9b1c11c12-2.el8_8.15-1.el805-11.el82-471.module+el8.6.0+879+823e30129-471.module+el8.6.0+879+823e30121.3-1.el84.3-2.module+el8.4.0+574+843c48986.1-4.el82.0-10.el825-8.el8_106-1.module+el8.7.0+1078+e72fcd4f0.7-17.el83.0-6.el87-31.module+el8.5.0+671+195e45634.0-5.module+el8.5.0+686+20453ecc5.4-3.module+el8.5.0+673+1028362101-1.el8.rocky.0.42.el8_10.rocky.0.64.0.6-2.module+el8.7.0+1080+d88dc670:1.2.4-2.module+el8.7.0+1076+9b1c11c12.0.5-2.el819.0-1.el82.0-2.el81.0-1.el8_92.1-4.el8_10.18-251.el8_10.23.4-18.el821.el8_102-17.el8_140-21.el82.7-4.el85.5-2.el80181214-11.git133f4c47.el8:1.0.1-35.module+el8.7.0+1077+0e4f03d49.3-1.module+el8.7.0+1078+e72fcd4f3.28.0-4.el8_63.0.0-1.el87-24.el812.2-5.el828.1-4.el83.1-2.module+el8.5.0+673+102836218.4-4.el84.14.3-24.el8_79.25-1.el83.0-3.el8:3.01-439.module+el8.6.0+878+f93dfff75.4.1-1.module+el8.5.0+673+102836216.0-16.el820.el88.0-4.module+el8.5.0+673+10283621dbfe8be6.0.8-2.module+el8.7.0+1094+66cdd070.12-1.module+el8.7.0+1070+25eee9558.0.111-1.el8_10.12-1.el8_103-1.el8_100600202210171515079-4.el8.27-11.el82.el83.el8_105.el8_104.el8f9e2e7eansible-freeipa-testsbind9.16-licenseuildah-testscockpit-machinespackagekitstoragedups-filesystemdpdk-docedk2-ovmfvolution-help langpacksghostscript -x11it-allcore-docemailguiinstaweblfssvnkwebnome-classic-sessionshell-extension-apps-menuuto-move-windowsclassification-bannerommondash-to-dockpanelesktop-iconsisable-screenshieldrive-menugesture-inhibitorheads-up-displayorizontal-workspaceslaunch-new-instancenative-window-placemento-hot-cornerpanel-favoriteslaces-menuscreenshot-window-sizerystemMonitortop-iconsupdates-dialogser-themewindow-grouperlistsNavigatororkspace-indicatorinkscapelibgsxml2-develmod_auth_openidcysqlopen-vm-tools -desktopsalt-miniondmpperl-Devel-PeekGit-SVNTime-HiRes Piecedevelodman-remotetestsstgresql-contrib docs plperlython3 tcl server-devel tatic testython2-sqlalchemy3-jinja2libmount.11-rpm-macros9-cffi ryptography psutil ycopg2-doctests yyaml scipyrpm-ostree -libsuby-devellibsgem-bigdecimalio-console rbjsonpsychtomcat-admin-webappsdocs-webappel-3.0-apijsp-2.3-apilibservlet-4.0-apiwebappsuned-gtkprofiles-postgresqlutils -systemtap0-0.25.20130910svn.module+el8.6.0+844+4401f2ed.10.1-1.module+el8.5.0+672+ab6eb0152.module+el8.5.0+673+102836215.module+el8.4.0+574+843c48984-2.el83.4-2.module+el8.6.0+844+4401f2ed1-31.20100611svn86.module+el8.6.0+844+4401f2ed.0-20.module+el8.6.0+844+4401f2ed6.module+el8.6.0+844+4401f2ed12.0-10.module+el8.4.0+570+c2eaf1441-3.module+el8.6.0+844+4401f2ed3-3.module+el8.6.0+844+4401f2ed5.0-3.module+el8.4.0+574+843c48988-4.module+el8.6.0+844+4401f2ed2.7.2-1.el83-471.module+el8.6.0+879+823e30126-3.module+el8.6.0+844+4401f2ed3.224.0-1.el883.0-1.el8_104-29.module+el8.6.0+844+4401f2ed7.module+el8.6.0+844+4401f2ed.1-3.module+el8.6.0+844+4401f2ed6-3.el87-17.module+el8.6.0+844+4401f2ed.1-14.module+el8.4.0+394+13a3c7238.18-18.el80.2-5.el83-1.el876-5.el81.0.0-2.el82.20-1.el832-2.el869-1.el8_1070-2.el8_1088-1.el8_10:1.10.13-1.module+el8.7.0+1067+0a7071cc2.6-6.module+el8.6.0+844+4401f2ed2.0.1-3.module+el8.6.0+844+4401f2ed74-2.module+el8.6.0+882+2fa1e48f1.0-2.module+el8.6.0+844+4401f2ed5-8.1.el8_87-5.1.el8_102.el8_10el8_100-3.module+el8.4.0+574+843c489820-3.module+el8.4.0+574+843c48985.0-2.module+el8.4.0+574+843c48984.0-5.el86.0-4.module+el8.6.0+844+4401f2ed3.11-1.el82.el8_108.1-3.module+el8.6.0+844+4401f2ed3.0.12-19.module+el8.4.0+385+82b6e8041.11-2.el8_31-10.module+el8.4.0+570+c2eaf14428.5-20.el83.0-3.module+el8.6.0+844+4401f2ed4-2.module+el8.6.0+844+4401f2ed4.2-1.el89-4.module+el8.6.0+844+4401f2ed4.0.2-3.module+el8.4.0+386+8a292e6f1.1-3.el82.2-4.module+el8.6.0+844+4401f2ed4.12-3.module+el8.6.0+844+4401f2ed5.0.3-5.module+el8.5.0+657+2674830e15.0-3.el86.0.9-5.module+el8.5.0+658+721728542.7-1.module+el8.7.0+1105+8815ce787.1.1-10.el88.3-1.el89.2-4.el8jackson-annotationscoredatabindldapjdk-javadocperl-Archive-Tar ZipCPANExportertUtils-CBuilderommandInstallMM-UtilsakeMakernifestFile-Tempter-SimpleGetopt-LongHTTP-TinyIO-CompressModule-Build CoreList-tools Load-ConditionalPod-Perldoc SimpleTest-Simpleexperimentalperlfaqodlatorsython38-PyMySQL ply six9-PyMySQL idna pycparser requests six toml0.008-1.module+el8.6.0+878+f93dfff71-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f3.0-0.el8_58-3.module+el8.7.0+1076+9b1c11c13.1-2.module+el8.5.0+676+5f023c1e6.5-2.module+el8.3.0+214+edf13b3f7-1.module+el8.3.0+214+edf13b3f1.0-16.module+el8.4.0+403+9ae17a315.module+el8.3.0+214+edf13b3f.1-6.module+el8.3.0+214+edf13b3f4-3.module+el8.3.0+214+edf13b3f12-471.module+el8.6.0+879+823e30125.4-1.module+el8.4.0+414+2e7afcdd2.1-5.module+el8.4.0+405+66dfe7da2-3.module+el8.4.0+405+66dfe7da641-4.module+el8.6.0+891+677074cb:0.3.3-6.module+el8.6.0+843+5a13dac31.1.4-1.module+el8.7.0+1077+0e4f03d43.5.4-5.module+el8.6.0+975+c0ed2db85.20191220-1.module+el8.6.0+878+f93dfff76.02-2.module+el8.6.0+878+f93dfff72.1.11-3.module+el8.4.0+405+66dfe7da8.5-11.module+el8.3.0+178+274154516-6.module+el8.3.0+252+a44206738.module+el8.3.0+178+27415451:2.1.4-1.module+el8.7.0+1077+0e4f03d43.15-1001.module+el8.6.0+878+f93dfff728.0-3.el8945ff1b7c5.304.1-1.module+el8.5.0+672+ab6eb0156e5cea508060020220512171251 30151432 913075840 102507571370020221108111133759429.0.3-19.module+el8.6.0+793+57002515aardvark-dnsspnetcore-runtime-9.0 targeting-pack-9.0bind9.16-chroot libs utilscjose-develockpit-pcpppups-clientdevelipptoollpddotnet-apphost-pack-9.0hostfxr-9.0runtime-9.0sdk-9.0targeting-pack-9.0emplates-9.0pdk-toolsevolution -bogofilter pst spamassassingcc-c++gdb-pluginfortranoffload-nvptxplugin-annobinit-coreredential-libsecretdaemonsubtreenutls-c++daneevelutilso-toolsetrafana-pcpselinuxjava-21-openjdk-demovelheadlessjavadoc-zipmodssrctatic-libslemonibasan8itm-develquadmath-develreswansoup-develtdc++-devel ocstsan2mecab-ipadic -EUCJPod_dav_svnnetavarkperl-Carpompress-Bzip2Raw-Bzip2Zlibnfig-Perl-VDB_Fileata-Dumper Sectionevel-PPPort Sizeigest -MD5 SHAEncode -develxtUtils-ParseXSFile-Fetch HomeDir Path WhichterIO-Socket-IPPC-Cmd SysV tem-SimpleJSON-PPLocale-MaketextMIME-Base64ath-BigInt-FastCalcodule-MetadataParams-UtilthToolserlIO-via-QuotedPrintod-Checker UsageScalar-List-Utilsocketftware-Licensetorableub-Exporterys-SyslogTerm-ANSIColorxt-Balanced Diff Templatehread-Queueime-LocalURInicode-Collate Normalizeautodiebignumencodinghomedirlibnetocal-libparenttestshreads -sharedversionhp-bcmathcliommondbagevelembeddednchantfpmgdmpintlldapmbstringysqlndodbcpcachepdogsqlrocesssnmpoapxmlki-coreodman-catatonitpluginsstgresql-upgrade-develython2-backportsnumpy -f2py3-pillow.11 -devel libs tkinter8-pyyaml9-numpy-f2pysamba-vfs-iouringubversion-devel gnome javahl libs perl toolswigxorg-x11-server-Xdmxephyrnestorgvfbcommon0.001-10.module+el8.6.0+878+f93dfff718-1001.module+el8.6.0+878+f93dfff711-5.module+el8.6.0+878+f93dfff70-7.module+el8.6.0+878+f93dfff73-5.module+el8.6.0+878+f93dfff72.6-4.module+el8.7.0+1122+04a7498b614-2.module+el8.6.0+878+f93dfff735-9.module+el8.4.0+533+773bb730928-15.module+el8.6.0+878+f93dfff71.010-397.module+el8.6.0+878+f93dfff74-396.module+el8.6.0+878+f93dfff7106-12.module+el8.6.0+878+f93dfff71.0-6.module+el8.4.0+403+9ae17a31903-10.module+el8.6.0+878+f93dfff724.2-3.module+el8.5.0+706+735ec4b35.10-4.module+el8.5.0+673+1028362133-1001.module+el8.6.0+878+f93dfff74.0-2.module+el8.3.0+120+426d8baf63-1001.module+el8.6.0+878+f93dfff7:0.38-396.module+el8.6.0+878+f93dfff71.07-396.module+el8.6.0+878+f93dfff710.9-1.module+el8.4.0+414+2e7afcdd2.22.0-1.module+el8.6.0+852+cc16a6863.42-2.module+el8.6.0+878+f93dfff72.0.19-2.module+el8.6.0+1046+80feca5866-4.module+el8.6.0+957+15d660ad140-397.module+el8.6.0+878+f93dfff750010-397.module+el8.6.0+878+f93dfff77.1-4.module+el8.6.0+895+381d253127-471.module+el8.6.0+879+823e3012013.0523-396.module+el8.6.0+878+f93dfff790416-1.el8:0.500-10.module+el8.6.0+878+f93dfff72.124.0-1.gitf958d0c.module+el8.5.0+681+c9a1951f7.46-3.module+el8.6.0+879+823e30123-43.el85.el8.2.0-4.el830-396.module+el8.6.0+878+f93dfff75.0.1-12.module+el8.4.0+403+9ae17a316-3.module+el8.3.0+53+ea0629907.24-4.module+el8.6.0+882+2fa1e48fapache-commons-netutocorr-af bg ca s da e en s fa i r ga hr u is t ja ko lb t mn nl pl t ro u sk l r v tr vi zhfence-agents-amt-wspc-snmp bladecenterrocade cisco-mdsucsommonpute drac5 eaton-snmpmersonps heuristics-pingpblade ibm-powervsvpcbladefmiblo-moonshotpssh2ntelmodularpdumilan lpar mpath rhevmsab sbdcsi virshmware-restsoap wtilatpak-selinuxgcc-toolset-13-annobin-docsipa-client-commonommonpython-compatselinuxlibreoffice-data opensymbol-fonts ure-commonmaven-shared-utilsosbuild-luks2 vm2ostreeselinuxpcp-docerl-Algorithm-DiffCPAN-Meta-RequirementsYAMLData-OptListEnvFedora-VSPIO-ZlibMRO-Compatath-BigRat ComplexPackage-Generatorrams-Checkerl-OSTypeod-Escapes ParserSub-InstallTerm-Capst-Harnessxt-Glob ParseWords Tabs+Wrapconstantinc-latestmacrosython-nose-docs2-backports-ssl_match_hostnamenumpy-docscour etuptools-wheel ixurllib33-bind9.16distroipaclient libosbuildpip.12-rpm-macros9-numpy-doc setuptools-wheel urllib3 wheel-wheelredis-docuby-default-gemsgem-net-telnetxmlrpc0.0.4-12.el899.3-0.5.module+el8.7.0+1077+0e4f03d41.5-11.el82-1.1.el8.0-2.el83.68-9.el85.0-6.module+el8.5.0+677+2a78a8697.9-4.el82.7-6.el89-8.el8_07.5-2.el83.15-4.el881.7-1.el8.rocky4.7-2.el86-1.module+el8.6.0+878+f93dfff78.0-1.el84-2.el84.el85.13-2.el800.900-1.module+el8.6.0+878+f93dfff72.20-11.el84-2.el86.1-3.el855-4.el80.0-1.module+el8.7.0+1075+05db0c1d7-21.el87.el8.7-6.el88.1-3.el83-3.module+el8.6.0+878+f93dfff79.0-2.el83.el82.31.0.0-5.el866.rc10.module+el8.5.0+770+e2f498618.el8_718-17.el84-9.el86-3.el89-1.el85.el83.el87-23.module+el8.6.0+878+f93dfff71.0-9.1.el82-2.el85-1.el82.el80.0-1.el81-2.module+el8.6.0+818+bd395263.6-10.module+el8.5.0+770+e2f498613.1-1.el85.3-1.module+el8.4.0+413+c9202dda7-5.module+el8.6.0+823+f143cee16.1-1.el83.el84.el8_103-3.el8_69.2-1.module+el8.6.0+790+fc63e43f9-6.module+el8.7.0+1076+9b1c11c12.0-10.el8_9.11-4.el80-1.el84.el85-39.el86-1.el88-1.el80.0-28.el89.el8_8.235.el8_106.0-1.el83.2-2.module+el8.4.0+597+ddf0ddea24.0-2.el84-1.el84-3.el8.18-3.el82.4-8.el85-8.gite94b4f9.module+el8.5.0+681+c9a1951f.2-1.el88-1.el86-2.el8.1-7.el83-12.el8417.10-1.el89.0-1.el80.9-2.el80.03.0000-3.el8_62.1-2.el867-3.el882.00-7.el82.12.0-1.el8_83.0-2.el8_84.0-1.el8_85.0-1.el8_81-1.el8_84.0-1.el8_6.0.18.0-2.el8_715.11.0-1.el8_102.0-5.el88.2.0-1.el8_103.0-1.el8_104.0-1.el8_107.0-1.el8_103.20-1.el8_105-1.el83.el84.0-0.el8_10:0.17-76.el81.12.8-23.el8_7.1 4.el8_8.14.3-10.el824.5-2.module+el8.7.0+1077+0e4f03d47.2-2.module+el8.7.0+1078+e72fcd4f3-1.module+el8.7.0+1122+04a7498b1.3.0.0-1.el82.0.2-15.el84.37-51.module+el8.7.0+1059+126e92516.2-15.el83.15.0-9.el86.0-6.el8_47.0-6.el89.0-1.el834.3-1.el84.1.1-3.el82.1-1.el82.el83-2.el82.0.0-3.el83-1.module+el8.6.0+790+fc63e43f667-398.module+el8.6.0+878+f93dfff71.30-1.el8_4.rocky526-1.el8_4.rocky3.0-2.el85.el83-1.el82.el8_74-1.el8.2-4.el8_83-1.el874-440.module+el8.6.0+878+f93dfff72.0-1.el83.el85-7.el86-7.module+el8.6.0+878+f93dfff78-211.el825.el8_8.636.el8_9.1351.el8_10.11343.3-1.el85-11.el86.1-2.el82-5.el86.el8_108-16.el84.111-1.el82-2.el855-397.module+el8.6.0+878+f93dfff76.0-13.el879-24.el8 _7.131.el8_9.29.2-9.el89.917-39.20200205.el8022.10.115.g15eba7b1-2.el8_8 7.g52714b51-3.el8_990.g4abaf4b4-4.el85.el8_76.el8_72-2.el84.2-1.el8_103.11.0-1.el8:1.6.2-5.module+el8.7.0+1077+0e4f03d42.14.1-46.el87.70-8.el83.0.103-1.el8_1.rocky1.2-1.module+el8.6.0+790+fc63e43f424-1.el8_66-1.el8_726.0-3.el88.1-21.el82-2.el8_103.el84.el83-3.el83.26-5.el86.el82.0-16.el8_6.12-1.el8 _8.24.6-8.el85.12-11.el88.el89.el8_772-15.module+el8.6.0+965+5d46f3c68-439.module+el8.6.0+878+f93dfff731-1.el8_3.2:2.1.29-12.module+el8.5.0+717+27fd1ba7.27.0-2.el8_14.0.9-23.el86.el8_78.el8_89.el8_831.el82.el8_103.el8_1010.1-5.el83-4.el8_734.0-3.el8_65.1-9.el86.5-1.module+el8.6.0+795+de4edbcc9.4-1.module+el8.7.0+1069+6f3de942:2.88-7.module+el8.6.0+882+2fa1e48f3.08-461.module+el8.6.0+879+823e30125.0.214-1.el8_612.5-4.el82-26.el86.4-4.module+el8.5.0+672+ab6eb0156.0-61.3.el8.110-1.el8_62-1.el8_73-1.el8_74-1.el8_76-1.el8_72.el8_88-1.el8_89-1.el8_820-1.el8_81-1.el8_82-1.el8_84-1.el8_88-1.el8_99-1.el8_930-1.el8_105-1.el8_106-1.el8_107.0.117-1.el8_98-1.el8_99-1.el8_1031.1-4.el8:4.15-3.module+el8.6.0+1044+67ab5d0a.28.0.0-18.el82.module+el8.7.0+1084+97b81f6104002021053019244360020220510152652704 301055650719 10251749429.2.10-16.el8_108.el8_1020.el8_101.el8_10alsa-utils -alsabatnsible-coretestvahi-ui-gtk3b951fd09ind9.16-dnssec-utilscups-filters -libsdbus-develx11nsmasq-utilsovecot-mysqlpgsql igeonholefence-agents-all kdumpubevirt redfishlatpak-libssession-helperreerdp-libsgcc-toolset-12-gcc-c++gfortranplugin-devellibasan-develtomic-develgccjit-develocsitm-devellsan-develquadmath-develstdc++-develocstsan-develubsan-develoffload-nvptx 3-annobin-annocheckplugin-gcclassfish-el-apinome-settings-daemonhellstreamer1-plugins-bad-freese-develgood-gtkipa-client -epn sambaerf3jmcqlibXpm-develblockdev -crypto dm fs kbd loop vm-dbus mdraid path nvdimm part lugins-all swap utils vdoguestfs -appliance devel gfs2 object-devel java-devel rescue sync tools-c xfsreoffice-base calc ore draw emailmerge filters gdb-debug-support raphicfilter tk3 help-arbgncasdaezelnstufirgluheiruidtjakoltvnblnplt-BRPTrousiklvtarukzh-Hanst impress langpack-afrsbgnrcasydaezelnstufairgaluheiruidtjakknoltvmailrnblnrsoorpalt-BRPTrousiklrstvtaehnrsukvexhzh-Hanstu math ogltrans pdfimport yuno ure wiki-publisher riter x11 sltfilter kitssh-develtpms-develvirt-clientdaemon-config-networkwfilterdriver-interfacenetworkodedevwfilterqemusecrettorage-corediskglusteriscsi#-directlogicalmpathrbdscsikvm evel ocslibs ock-sanlocknsswiresharkwinpr-develua-guestfsmaven-openjdk117 8od_http2net-snmp-agent-libs devel perl utilsopenssh-askpasssbuild-composer-coreworkerpcp-confdevelexport-pcp2elasticsearchgraphiteinfluxdbjsonsparkxmlzabbix zabbix-agentguiimport-collectl2pcp ganglia2pcp iostat2pcp mrtg2pcp sar2pcplibs-develpmda-activemq pache bash cc ind2 onding pftrace cifs sco dbping enki m ocker s389log elasticsearch gfs2 luster pfs sd hacluster proxy infiniband json libvirt o msensors ogger ustrecomm mailq emcache ic ongodb unts ssql ysql named etcheck filter ws fsclient ginx vidia-gpu openmetrics vswitch racle pdns erfevent odman stfix gresql rabbitmq edis oomtemp syslog samba endmail hping lurm mart nmp ockets tatsd ummary ystemd trace unbound weblog zimbra swapselinuxystem-toolstestsuitezeroconferl-ErrnoHTML-ParserIOObject-HashBase-toolsPCP-LogImport Summary MMV PMDASys-Guestfsinterpreterlibshp-jsonpecl-xdebug3xmlrpcodman-gvproxyrometheus-jmx-exporter-openjdk11 78ython3-blockdevlibguestfs virtpcpsqlalchemyunbound.12 -devel libs tkinter8-numpy-f2py psutil9-lxmlqemu-guest-agentimgkvm-block-curlglusteriscsirbdssh common re docs hw-usbredir ui-opengl spiceredhat-support-lib-pythontoolis-develuby-libguestfsgem-opensslslapi-nisubscription-manager-migrationpermin-develwtpm-devellibstools -pkcs11ysstattcpdumpunbound-devellibsvarnish-devel ocsmodulesirt-dibxorg-x11-server-Xwayland0.015-2.module+el8.6.0+878+f93dfff725-6.module+el8.6.0+878+f93dfff78-396.module+el8.6.0+878+f93dfff7103014-5.module+el8.6.0+878+f93dfff7200007-8.module+el8.6.0+878+f93dfff730-7.module+el8.6.0+965+5d46f3c62-441.module+el8.6.0+878+f93dfff79-6.module+el8.6.0+878+f93dfff75.3-2.module+el8.7.0+1081+f0a697431-439.module+el8.6.0+878+f93dfff76-3.module+el8.6.0+878+f93dfff76.2-8.el8987-16.module+el8.6.0+878+f93dfff71.0.0-8.git921f98f.module+el8.5.0+681+c9a1951f00037-1.module+el8.6.0+878+f93dfff71-11.module+el8.6.0+965+5d46f3c64-6.module+el8.6.0+878+f93dfff73-17.module+el8.6.0+965+5d46f3c65-10.module+el8.6.0+879+823e30129-17.module+el8.6.0+965+5d46f3c61.0-2.el81-3.el83-8.el8 _7.13-471.module+el8.6.0+879+823e301223-4.module+el8.6.0+878+f93dfff704.module+el8.6.0+882+2fa1e48f7.module+el8.6.0+965+5d46f3c65-18.module+el8.6.0+878+f93dfff7.7-5.module+el8.5.0+672+ab6eb0159-440.module+el8.6.0+878+f93dfff73.2-1.module+el8.7.0+1081+f0a6974345-7.module+el8.6.0+878+f93dfff750-439.module+el8.6.0+878+f93dfff78-1.module+el8.6.0+878+f93dfff776-5.module+el8.6.0+878+f93dfff78.4-4.el8:0.237-2.module+el8.6.0+878+f93dfff71.10.5-9.module+el8.4.0+413+c9202dda280-2.module+el8.6.0+878+f93dfff79998.18-1.module+el8.6.0+878+f93dfff72.30-15.module+el8.6.0+965+5d46f3c63.40-439.module+el8.6.0+878+f93dfff74.04-2.module+el8.6.0+878+f93dfff72.03-396.module+el8.6.0+878+f93dfff710-9.module+el8.7.0+1062+663ba31c6-439.module+el8.6.0+878+f93dfff72.5-1.el89-1001.module+el8.6.0+878+f93dfff76.2-21.el87.0-11.module+el8.5.0+672+ab6eb0158.2-3.module+el8.3.0+252+a442067348-4.module+el8.3.0+252+a44206739-20.el80160104-7.module+el8.6.0+965+5d46f3c6:1.04-2.module+el8.6.0+878+f93dfff73.0.26-6.module+el8.5.0+697+f586bb3011-4.module+el8.6.0+878+f93dfff73-2.module+el8.6.0+878+f93dfff720-34.module+el8.6.0+965+5d46f3c68.2-36.el87.el83-6.el85-13.el84.06-397.module+el8.6.0+878+f93dfff78.4-2.el8:1.69-396.module+el8.6.0+878+f93dfff773-396.module+el8.6.0+878+f93dfff75.24.4-404.module+el8.6.0+882+2fa1e48f4.42-4.module+el8.3.0+252+a44206735.1-2.el83-1.module+el8.7.0+1078+e72fcd4f6.01-19.module+el8.6.0+965+5d46f3c62-15.module+el8.6.0+965+5d46f3c68.module+el8.6.0+965+5d46f3c69.module+el8.6.0+965+5d46f3c64-17.module+el8.6.0+965+5d46f3c62.module+el8.6.0+965+5d46f3c67-4.module+el8.6.0+965+5d46f3c617-2.module+el8.6.0+965+5d46f3c68-1.module+el8.6.0+965+5d46f3c634-1.module+el8.6.0+965+5d46f3c67.5.1-13.el8_9.34.el8babelkoanlibguestfs-bash-completion inspect-icons javadoc man-pages-jauk toolsnodejs-packaging-bundlerosadparfaiterl-Data-Dumpigest-HMACEncode-LocaleFile-ListingHTML-TagsetTP-Cookies Date Message NegotiateIO-HTMLmporterLWP-MediaTypes Protocol-httpsMozilla-CANTLMet-HTTPTerm-TableimeDatery-TinyWWW-RobotRulesython2-babeljinja23-koanosa-common drhn-virtualization-commonhost cfg-actionsclientmanagement pushspacewalk-abrtbackend-libsoscapusix8-babel numpy-doc setuptools-wheel urllib3 wheel-wheel9-pip -wheelrepokey:type:strsteasyhn-custom-infovirtualization-hostcfg-actionsclientmanagementpushubygem-bundler-docrbsspacewalk-abrt client-cert oscap usix0.0.51-4.el809-4.module+el8.6.0+879+823e30123-471.module+el8.6.0+879+823e30121.63-4.el8.rocky.0.16-2.el8_7.rocky.0.173-1.el8_10.rocky.1.14-3.el8_10.rocky.1.15-1.el8.rocky.1.30.0-6.el84.1-0.el8_96-14.el8_5.17.5-2.el89.3-13.el81.0-2.el802-11.el85-404.module+el8.6.0+882+2fa1e48f71.module+el8.6.0+879+823e30126-421.el82.el871.module+el8.6.0+879+823e30127-471.module+el8.6.0+879+823e30121-1.el81-16.1.el8471.module+el8.6.0+879+823e30126.module+el8.6.0+852+cc16a6862.1-1.el826-439.module+el8.6.0+878+f93dfff77-439.module+el8.6.0+878+f93dfff73-29.module+el8.6.0+852+cc16a6861-471.module+el8.6.0+879+823e30127-471.module+el8.6.0+879+823e301260-440.module+el8.6.0+878+f93dfff77-7.module+el8.3.0+133+b8b54b58.32-4.module+el8.7.0+1082+b3a88d238.3-1.module+el8.7.0+1073+99e3b3cd2.el8_752-4.module+el8.6.0+878+f93dfff78-2.module+el8.6.0+957+15d660ad9.2-2.el8_83.el8_8760-439.module+el8.6.0+878+f93dfff71.6-4.module+el8.7.0+1075+05db0c1d30-1.el845.1.0-21.module+el8.5.0+671+195e456389.3.1-6.module+el8.7.0+1063+20f2b9a4:0.31.1-3.module+el8.5.0+671+195e45632.22-439.module+el8.6.0+878+f93dfff73.15-442.module+el8.6.0+878+f93dfff74.0-13.el86.0-8.el85.20180414-2.module+el8.6.0+882+2fa1e48f211020-1.module+el8.6.0+879+823e30129.0.30-3.module+el8.5.0+697+f586bb302.000023-2.module+el8.6.0+882+2fa1e48f1.0-5.el87.el828-1.el86.1-3.module+el8.7.0+1065+42200b2e7.0.6-6.el8.rocky.0.18.el8_8.rocky.0.13-4.el8_7.16.3-110.module+el8.6.0+992+fc951c188.0-1.module+el8.4.0+414+2e7afcdd0200916-2.el82.3.1-4.el8_9.15.el83.2.1-4.el8:1-35.module+el8.7.0+1077+0e4f03d4.1.0-5.module+el8.7.0+1078+e72fcd4f7.module+el8.7.0+1078+e72fcd4f59-440.module+el8.6.0+878+f93dfff72.0.26-3.module+el8.7.0+1076+9b1c11c13.0.1-0.14.b08.module+el8.6.0+852+cc16a6863.1-109.module+el8.6.0+988+8031c1931.6-138.module+el8.6.0+1001+b56781804.8-1.module+el8.6.0+852+cc16a6866.15-1.el82.33-141.module+el8.6.0+1002+a7dba0ac3.7-141.module+el8.7.0+1081+f0a6974356-1.module+el8.6.0+878+f93dfff7:1.53-439.module+el8.6.0+878+f93dfff74.000-11.el85-11.el82.3-6.module+el8.6.0+793+570025154.1-7.module+el8.6.0+794+eba840177.1-5.module+el8.7.0+1064+ad5642292.2.14-1.el83.el8_9:2.029-4.module+el8.6.0+878+f93dfff722-439.module+el8.6.0+878+f93dfff75.0.35-3.module+el8.3.0+178+274154511.1-18.el8_574-471.module+el8.6.0+879+823e30126.345.5.1-3.el8_107.2:0.99.24-441.module+el8.6.0+878+f93dfff78.0.1-2.module+el8.5.0+676+5f023c1e7-1.el8030020210429021554400202105301924425002021120216011760020220510152857 3153220 701011518LibRawWALinuxAgent -udeva66e5355idenaconda-core dracut gui install-env-deps tui widgetssible-collection-microsoft-sqlpr-util-bdb devel ldap mysql odbc penssl pgsql sqlitespnetcore-runtime-3.1 targeting-pack-3.1uthselect-compatvahi-toolsbcc-toolsind-dyndb-ldaputils-devellivet-datapftracecheese-libslevis-dracutlukssystemdudisks2ockpit-session-recordingmposer-clirash-trace-commandyptsetup-develd3811607axioelveotnet-apphost-pack-3.1hostfxr-3.1runtime-3.1sdk-3.1targeting-pack-3.1emplates-3.1pdk-develriverctle0b4ded3macs-commonlucidnoxterminaloji-pickervolution-data-server-devellangpacksfapolicyd -selinuxd901a62reeradiusr-selinuxgaleracc-toolset-13-gcc-c++gfortranplugin-annobindevellibasan-develtomic-develgccjit-develitm-devellsan-develquadmath-develstdc++-develocstsan-develubsan-develoffload-nvptx 4-annobin-annocheckdocsplugin-gcc 9-binutils-develdk-pixbuf2-devel modulesnome-control-center-filesystemdesktop3-develsession -kiosk-sessionwayland-sessionxsessionhell-extension-custom-menuoftwareolang-bindocsmiscracesrcteststk-update-icon-cachevnc23-develimmodule-ximvnchaproxyyperv-daemons-licensetoolsfcopydkvpdvssdibus-gtk23libstableyping-boosterwaylandowatcherpa-server -common dns trust-adjansi-nativesper-libskeepalivedleapp-depsibX11-commondevelxcbmaxminddb -develpmem-develblk -devellog -develobj ++-develoc -develpool -develq-develrpmem-develselinux-pythontimezonemapvpxwebp-develnuxptplvm-toolsetorax-composerlmc-novirt virttemplates-genericz4-javamariadb-backupcommondevelembedded-devel rrmsggssapi-serveroqgraph-engineserver-galerautilstestercurialod_auth_mellon-diagnosticstif-develstaticstflintuttysql-selinuxonigurumapenscap-devel engine-sce python3 scanner utilspapi-devellibserl-Convert-ASN1Net-SSLeaysignhp-ffirecodeixman-develmempoolixreorderoppler-glibqt5utilsstgresql-jdbc-javadocwertopython-rpm-macrossrpm-macros2-lxml3-bcc livet sondnf-plugin-modulesyncipaserver testsleapppymongo-gridfsreportlab hn-check lient-tools setup-gnome pm-macrossubversiontracer.11-pip-wheel urllib38-lxml9-devel idle libs mod_wsgi rpm-macros test kinterqatlibzip-libst5-assistantdesigneroctoolslinguistqdbusviewertbase -common devel examples gui mysql odbc postgresql rivate-develtools -common devel examples libs-designercomponentshelpraptor2earhn-checklient-toolssetup -gnometoolssdpm-buildplugin-fapolicydemdt-testsubygem-did_you_meantypeprofst-toolsetsetroubleshoot-servernactorpirv-tools -libstalldwig-docgdbtexlive-adjustbox e lgorithms mscls fonts math nyfontsize size ppendix rabxetex phic ttachfile vantgar wesomeboxbabel -english bib se eamer ra ton ibtex opic di gfoot ookman tabs reakurl qncapt-of ion rlisle hangebarpage rter ngcntr ite jk lasspack m -lgc super ap extra ns ollectboxion-basicfontsrecommendedhtmlxmllatexrecommendedxetex ortbl ntext urier rop squotes tablestack urrfiledatetime vipdfmx ng s svgmec epic nctex umitem viron psf topdf qparbox so-pic tex -pkg oolbox uenc ler ro sym xtsizesfancybox hdr ref vrb ilecontents hook nstrut x2col latvian loat mtcount ncychap ontawesome book s-tlwg pec ware rap otmisc p l ramedgaruda-c90 eometry lyphlist raphics-cfgdef sftopkhelvetic yperref h-utf8 en-baseatifetex luatex mtarg oddpage tex xetex mport ndexjadetex knapltxkastrup erkis nuth-libocal oma-script pathseal3experimental kernel packages astpage tex -fonts 2man config ettrine ib negoal no stings m -math tabptch xmisc ua-alt-getopt latex-math ibs otfload tex85basemakecmds index nfnt-font rginnote vosym thpazo spec tools dwtools emoir tafont logo post flogo-font nfss ware icrotype nsymbol parhack topdf s ultido rownatbib cctools ntrsbk eedspace orasi-c90 tgclassoberdiek verpicpalatino ralist lel skip ssivetex dfpages tex gf hilokalia laceins in olyglossia werdot reprint sfrag latex nfss picture t-3d arrow blur coil eps fill grad math node plot slpe text ools ree ricks-add text xfontsqstestrcs ealscripts sfssansmath uerj cheme-basic ection sty minar pnum tspace howexpl oul tmaryrd ubfigure vn-prov ymbolt2 abu lary etex x -gyre-math ini-files 4ht config live-common-docdocindexenmsg-translationsscripts.infra tcase pos hreeparttable umbpdf imes pa tlesec ing ocloft ols rimspaces xfonts ype1cm htmlucharclasses s hc lem nderscore icode-datamath sugar pdmap-map quote rl topiavarwidthwadalab s y 2-ps sym rapfigxcolor dvi ecjk olor yr index persian search tex -itranspstrickstibetan config fontinfo ifthen keyval ltxtra mltexconfig string tab unicodezapfchan dinglogracer-commonucx-cmadevelibrdmacmsbguard-dbus notifier selinux toolstf8procvirt-whoio-winulkan-headersloader -develtoolsvalidation-layersweldr-clientxdg-desktop-portal-gtkyajl0.020-439.module+el8.6.0+878+f93dfff776-439.module+el8.6.0+878+f93dfff710.1-2.module+el8.4.0+597+ddf0ddea5.0-1.1.module+el8.7.0+1074+aae18f3a7-14.module+el8.7.0+1074+aae18f3a0-1.module+el8.6.0+878+f93dfff795-439.module+el8.6.0+878+f93dfff71-28.20100611svn86.module+el8.6.0+843+5a13dac3.0-17.module+el8.6.0+843+5a13dac323.module+el8.6.0+843+5a13dac3.0-8.module+el8.3.0+133+b8b54b589.1.module+el8.7.0+1074+aae18f3a1-2.module+el8.5.0+676+5f023c1e3-3.module+el8.3.0+214+edf13b3f11-3.module+el8.6.0+843+5a13dac34.module+el8.6.0+878+f93dfff7.3-3.module+el8.6.0+843+5a13dac36-2.module+el8.3.0+133+b8b54b587.1-1.module+el8.3.0+241+f23502a82-13.module+el8.3.0+133+b8b54b588.module+el8.6.0+843+5a13dac32-9.module+el8.6.0+843+5a13dac33.2-3.module+el8.6.0+852+cc16a6869.1.module+el8.7.0+1074+aae18f3a4-26.module+el8.6.0+843+5a13dac34.module+el8.6.0+843+5a13dac367-1.module+el8.6.0+878+f93dfff77-14.module+el8.6.0+843+5a13dac3.1-8.module+el8.6.0+843+5a13dac325-4.module+el8.6.0+843+5a13dac3:0.230.900-439.module+el8.6.0+878+f93dfff780231-439.module+el8.6.0+878+f93dfff734-439.module+el8.6.0+878+f93dfff71.72-438.module+el8.6.0+878+f93dfff72.51-1.module+el8.6.0+878+f93dfff76-3.module+el8.6.0+843+5a13dac33.40-1.module+el8.6.0+878+f93dfff74.12-2.module+el8.6.0+878+f93dfff765.1-3.module+el8.6.0+852+cc16a6862.0.19-1.module+el8.7.0+1072+5b16878020-2.module+el8.7.0+1108+49363b0d14-440.module+el8.6.0+878+f93dfff727-2.module+el8.6.0+878+f93dfff732-440.module+el8.6.0+878+f93dfff75.2-9.module+el8.6.0+843+5a13dac38.4-5.module+el8.3.0+252+a44206730.0-8.module+el8.3.0+133+b8b54b5822f-1.el8:0.42.29-4.module+el8.6.0+878+f93dfff73.0.1-0.7.b08.module+el8.6.0+975+c0ed2db81.0-3.module+el8.6.0+843+5a13dac328.01-442.module+el8.6.0+878+f93dfff77-3.module+el8.6.0+843+5a13dac3:1.302170-1.module+el8.6.0+878+f93dfff74.1-11.module+el8.6.0+843+5a13dac32.1-1.module+el8.7.0+1078+e72fcd4f4.10-3.module+el8.6.0+843+5a13dac35.10-4.module+el8.6.0+844+4401f2ed5-5.module+el8.6.0+843+5a13dac35.20191102-1.module+el8.6.0+878+f93dfff773-440.module+el8.6.0+878+f93dfff77.7.1-1.module+el8.6.0+788+76246f77HdrHistogram -javadocapache-commons-loggingdirectory-maven-plugin-javadocnf-plugin-spacewalkee4j-parentglassfish-annotation-apiuava20hawtjni-runtimeibus-setupcu4jpa-healthcheck-corejaf-javadocboss-interceptors-1.2-apilog4jz4-java-javadocmaven-resolver-apiconnector-basicimplspitransport-wagonutilwagon-file http-shared provider-apiowasp-java-encoder-javadocpython-pymongo-doc2-pip -wheel3-PyMySQLdnf-plugin-spacewalkjwcryptopyusbrhnlibspacewalk-koanyubicorepokey:type:flexarrayhnlibsi-units-javadocsu-injectplexuspacewalk-koan remote-utilstomcatjssunit-api-javadocom-lib-javadocparentse-javadocystems -javadoc0-3.20221122git9564b5.el8_7.1.0.4-18.el83.el81.0-3.el810-3.el88-3.el80.8-4.el81.4-3.el82-26.el87.el8_72-10.el83.1-1.el83.el84-0.el8_10.00-1.el83-4.el85.1b-25.el84-2.el86-1.el8.0-6.el8_109-471.module+el8.6.0+879+823e3012.5-3.el84.el82.0-39.el83-2.el84-1.el80.0-4.el83-471.module+el8.6.0+879+823e30126-7.el8.4-3.el88-2.el88-25.el8.0-4.el89.0-1.el83-10.el82.el8.0-1.el813-12.el82-2.el86-3.el87-4.el85-398.module+el8.6.0+882+2fa1e48f4-1.el8.1-3.el81-2.el83-4.el84-7.el85.1-4.el85.el86-110.module+el8.6.0+992+fc951c187-109.module+el8.6.0+988+8031c1938-23.el85.0-2.el811-141.module+el8.7.0+1081+f0a697432-1.el86-138.module+el8.6.0+1001+b56781807-141.module+el8.6.0+1002+a7dba0ac00.600-7.module+el8.6.0+882+2fa1e48f6.15-2.el822-5.el8_35-471.module+el8.6.0+879+823e30127-0.3.alpha.el8.420.el8.1-3.el891-28.el89.13-5.el88.3-24.el81-3.module+el8.6.0+882+2fa1e48f9.11-17.el83-2.el86-10.el8_84.el83.el89-5.el89.7-4.el8_79-1.el86-2.module+el8.6.0+1057+4d6a17211.0.0-21.module+el8.5.0+671+195e456312-1.el84-2.el884-1.el82-3.el85.el88-12.el86-2.el8 _47-2.el88-37.el89-4.el81-5.el8.0-1.el86.el82-24.el832-6.el85-3.el89-3.el80.0-2.el83.el84.el81-1.el82-2.module+el8.6.0+879+823e301213-2.el82.0-1.el88.el86-1.el83.1-11.el85-3.el8471.module+el8.6.0+879+823e3012.1-1.el86-471.module+el8.6.0+879+823e3012.0-2.el81-2.el8_97-3.el8_6.1-1.el8_78-471.module+el8.6.0+879+823e30129.5-10.el82.0-11.el8_108.el82-4.el85-1.el8module+el8.7.0+1077+0e4f03d42.el8 _76-6.el80-2.module+el8.6.0+882+2fa1e48f471.module+el8.6.0+879+823e30121.0.0.0-3.el85-1001.module+el8.6.0+882+2fa1e48f404.module+el8.6.0+882+2fa1e48f6-421.el82.el8.2-8.el87-458.module+el8.6.0+879+823e30128-452.module+el8.6.0+878+f93dfff771.module+el8.6.0+879+823e3012.32-1.el86-2.el83.el8_8.rocky.0.19-1.module+el8.6.0+879+823e30123.283.0-2.el8_10 3.el8_104-110.module+el8.6.0+992+fc951c180-452.module+el8.6.0+878+f93dfff771.module+el8.6.0+879+823e30121-1.el8404.module+el8.6.0+882+2fa1e48f21.el82.el83-452.module+el8.6.0+878+f93dfff7401-471.module+el8.6.0+879+823e30126-404.module+el8.6.0+882+2fa1e48f4-2.el8.1-109.module+el8.6.0+988+8031c1934-1.el85.el8_0.19-17.el80-452.module+el8.6.0+878+f93dfff73-471.module+el8.6.0+879+823e30127-471.module+el8.6.0+879+823e30128-471.module+el8.6.0+879+823e30125.1-2.el85.el86.el822-2.el830-7.el86.2-5.el88-3.module+el8.6.0+882+2fa1e48f6-8.el89.el8_10.0-1.el81-20.el89.el82-43.el83-16.el82.el84-14.el86-17.el81-457.module+el8.6.0+879+823e30127-1.el8.0-11.el8_1021.el88.el84.1-1.el88.0-1.el81-1.el827-5.el8 _10.138-1.el80-471.module+el8.6.0+879+823e301242-2.module+el8.6.0+882+2fa1e48f55-1.module+el8.6.0+879+823e30129-19.el8.0-3.el80.7-1.el84-471.module+el8.6.0+879+823e3012753-2.module+el8.6.0+882+2fa1e48f0.1-7.el8.0-1.el82.10.0-2.el8_71.0-1.el8_7 2.el8_74.0-3.el8_85.0-1.el8_72.el8_76.0-1.el8_77.0-1.el8_71-1.el8_72.el8_79.0-1.el8_73.el8_71.2-3.el87.3-13.el8_107.el8 _7.15.10.0-1.el8_9 2.el8_92.0-1.el8_101-1.el8_103.0-3.el8_108.0-1.el8_99.0-1.el8_91-1.el8_92.el8_92.1-2.el84.el8.0-1.el88.3.1-1.el8_102.el8_105.0-1.el8_101-1.el8_106.0-1.el8_103.el8_104-1.el8.2-3.el8_105.9-11.el89.1.0-1.el8:0.2.7-12.el84.0-25.el81.0.2o-4.el8_61.1-2.module+el8.7.0+1077+0e4f03d43.6-2.el840.0-2.el8_7 5.el8_7 6.el8_716-15.el8_9 3.el8_8 4.el8_81.1-1.el8_42.0-5.el82.21-3.module+el8.6.0+882+2fa1e48f5-457.module+el8.6.0+879+823e301256-369.module+el8.6.0+882+2fa1e48f3.11.7-4.el821-457.module+el8.6.0+879+823e30124.3-1.el80.0-24.el86.14.11-1.10.24.0.1.module+el8.3.0+101+f84c71546-1.12.22.12.1.module+el8.6.0+982+9fdca2d47-1.14.20.1.2.module+el8.7.0+1071+4bdda2a81.1.2.module+el8.7.0+1116+bd2a84b47.5-41.el88.15.0-1.16.17.1.1.module+el8.6.0+1046+80feca589.1-1.18.9.1.1.module+el8.7.0+1072+5b1687802-1.16.18.1.3.module+el8.7.0+1108+49363b0d 8.12.1.2.module+el8.7.0+1104+549f92a62.0-18.el8.0-138.module+el8.6.0+1001+b567818020.el814-5.el86.el8_105-16.el87.el8_109-1.module+el8.6.0+879+823e30121.0-109.module+el8.6.0+988+8031c1931.el80.module+el8.6.0+992+fc951c182.el841.module+el8.7.0+1081+f0a6974325.el82-109.module+el8.6.0+988+8031c19310.module+el8.6.0+992+fc951c187-6.el8_53-138.module+el8.6.0+1001+b56781805-10.el8_102.el89.el80-1.el8.0-6.el83.0-1.el83-3.el8_65-1.el861-5.module+el8.6.0+882+2fa1e48f7-15.el88.1-12.el82.0-12.el83.el83-3.el85-3.el89-24.el84.2-7.el85-6.el88-2.module+el8.6.0+879+823e30123-2.el830.el8.0-138.module+el8.6.0+1001+b56781807-2.el85.el89-17.el80-117.el825.el8_102.1-38.el89.el8_742.el8_83.el84.el8_9.14-1.el8.0-6.module+el8.7.0+1082+b3a88d235-4.el89.4-1.module+el8.7.0+1061+55d143820.1-43.el86.el85-3.el8.1-141.module+el8.6.0+1002+a7dba0ac2-1.el86.el86.0-2.el88-1.module+el8.6.0+879+823e30126-11.el8_93.el87.el8.0-11.el81-141.module+el8.7.0+1081+f0a697432.3-2.el85.el86.el8_107.el8_107-10.el8.3-4.el8_7.38.0-9.el81-11.el82-3.el8_89-2.1.module+el8.4.0+532+c114ce356.el8.1-4.el8_93-1.el84-3.el8_105.el8_10.17-15.el8 _7.16.el8_8.18.el8_10.120120801-257.el82107-5.el81.1.3-16.el8_107.el8_106.el82.07.0-1.el85.3.35-1.module+el8.6.0+1005+cdf19c226.4.11-1.module+el8.6.0+995+5ac2a483:0.60.6.1-22.el892-3.el81-43.module+el8.7.0+1078+e72fcd4f4.module+el8.7.0+1122+04a7498b.58-3.module+el8.6.0+882+2fa1e48f60-1.module+el8.6.0+879+823e30122.3.15-25.el83.0-2.el8.0-141.module+el8.6.0+1002+a7dba0ac5.el82-110.module+el8.6.0+992+fc951c183-35.el81.0-109.module+el8.6.0+988+8031c19338.module+el8.6.0+1001+b56781801-141.module+el8.7.0+1081+f0a697433.el8 _8.12-1.el85-2.el88-17.el83.3-11.el89-3.el82.0-2.el83.el8_92.0-11.el823.el82-3.el86.0-16.el8_67.el8_78.el8_89.el8_98.0-11.el84.el81-2.el82-2.el83-2.el83.el8_105-2.el83.1-2.el82-141.module+el8.6.0+1002+a7dba0ac2.0-6.el82-48.el851.el85.el867.el8_79.el8_870.el8_81.el8_9.12.el83.el8_106-6.module+el8.6.0+882+2fa1e48f.1-10.el81.el85-8.el8.rocky.0.14.0-23.20180522git70f7e08.el88.el89.el81-2.el8_103.el8_104.el8_107.el86-1.el85-11.el8_106.el87.el8_862-1.module+el8.6.0+879+823e30123-368.module+el8.6.0+882+2fa1e48f9.4-13.el839b348d47cc21f5.12-2.el85-4.el889-ds-base -devel legacy-tools ibs snmp:1.48-2.module+el8.6.0+882+2fa1e48f4.0.3-141.module+el8.7.0+1081+f0a697430-2.el81-1.el8.1-2.el82-2.el8_10.3 9.26.4-2.el84.el8_76.el8_79.4-6.el8_102.10-25.el83-1.el84.el84.4-13.el81.0-1.el85.0-1.el85-1.el8.1-5.el86.4-5.el88-4.module+el8.7.0+1063+20f2b9a49-3.el8_8.3-2.el8:1.55-457.module+el8.6.0+879+823e30129758-2.el864-459.module+el8.6.0+879+823e30122.027-4.module+el8.6.0+882+2fa1e48f31-1.module+el8.6.0+879+823e301219-7.module+el8.6.0+882+2fa1e48f3.00-461.module+el8.6.0+879+823e30124.9.3-3.el8 _9.15.el8b0e848d5.0-6.el81-6.el8.0-16.el81-2.el8_10 90.el81.el8_109.el8_103-7.el88.12-8.el8.13.28-42.el8_44-12.el824.3-11.el85.2.0-21.el863-1.el87-2.el8:2.0.7-2.el83.el86.0.1-2.el820.00-15.el84.24-1.el88.2-2.el83.el8392b1f8:0.99.24-2.module+el8.6.0+882+2fa1e48f7-6.el8.3.2-2.el84.el8_8.143.0.2-4.el85.15-3.el85.el8_87-28.el830.el8:0.99.29-1.module+el8.6.0+879+823e30128.0.1-4.module+el8.5.0+676+5f023c1ep1-16.el87.el8_79.el8_84.0-5.20181118git1830dcb.el8030020210428035500 133748400202106100901245002021110911570320126145328 20316425760020220510152709 2074252 171321 3015143770020221108111113965629 16151040301091632289.0-12.el88-4.el82.10-8.el8_99-2.el8.36.4-1.el8B.02.19.2-6.el8HdrHistogram_cNetworkManager-libreswan-gnomeOpenEXR-libsPackageKit -command-not-found ron glib streamer-plugin tk3-moduleSDL-develabrt-addon-ccpp oredump-helper kerneloops pstoreoops vmcore xorgcli-ngonsole-notificationdbusesktopgui-libsjava-connectorlibsplugin-machine-id sosreporttuiccountsservice-libsdwaita-qt5e9e1765lsa-lib-develplugins-arcamav maemo oss pulseaudio sampleratepeex upmixsbstream vdownmixnnobin-annocheckpr-develspellnetcore-runtime-3.05.0 targeting-pack-3.05.0tkmmuthdogen-liboptsb41b4492acula-clientommon nsoledirectorlibs -sqlstorageobabe1f0497luez-cupsogofilterost-atomicchronoontainer extroutinedate-timeevelfiberlesystemgraphiostreamslocalegmathprogram-optionsrandomegexserializationignalstacktraceystemtesthreadimerype_erasurewaverasero-libsnautiluslapi-javatty-at-spi2dracutespeak-ngxwotli-develc0229ad2airo-develgobject -develmmrgoertmongerhanrome-gnome-shelllang-devellibsresource-filesystemtools-extraippyuttermake-filesystemguiompat-exiv2-026libtiff3openssl10iler-rtntainer-exception-loggerreos-installer-bootinfradracutosynclibrash-gcore-commandptdump-commandeaterepo_c -devel libsscopeyrus-imapd -utils vzicsasl-sqldaxctl-develconfleyna-corerendererserverotnet-apphost-pack-3.05.0host-fxr-2.1 fxr-3.05.0runtime-2.13.05.0sdk-2.1.5xx 3.0 5.0targeting-pack-3.05.0emplates-3.05.0rpmwzyninste82d91b1clipse-equinox-osgipde latformswtgl-waylandnchant2scriptscth-tools-basic fastfabricvince-browser-pluginlibsnautilusolution-data-server-ui-devel ews mapixempiiv2-libsfabtestsdo-admin-cliclientinitmanufacturing-serverowner-cli onboarding-serverrendezvous-serverence-virt d -cpg libvirt multicast serial tcptchmailile-rollerolatpak-builderspawnxdg-utilsprintd-pamreeradius-devel oc krb5 ldap mysql perl ostgresql rest sqlite unixODBC tilsi0r-plugins-opencvibidi-develstrm-develgcc-toolset-10-annobinbinutils-develuilddwzyninst-develelfutils-debuginfod-client)-develvellibelf-develsgcc-c++gdb-pluginfortrandb-gdbserverlibasan-develtomic-develitm-devellsan-develquadmath-develstdc++-develocstsan-develubsan-develtracemake-develperftoolsruntimestraceystemtap-clientdevelinitscriptruntimesdt-develervertoolchainvalgrind-devel 1-annobin-annocheckplugin-gccbinutils-develuilddwzyninst-develelfutils-debuginfod-client)-develvellibelf-develsgcc-c++gdb-pluginfortranplugin-develdb-gdbserverlibasan-develtomic-develgccjit-develocsitm-devellsan-develquadmath-develstdc++-develocstsan-develubsan-develtracemake-develperftoolsruntimestraceystemtap-clientdevelinitscriptruntimesdt-develervertoolchainvalgrind-devel 2-annobin-annocheckplugin-gccbinutils-golddwzgcc-plugin-annobindbruntime 3-binutils-develgoldgdb 4-binutils-develgoldprofngdwzgcc-c++gfortranplugin-annobindeveldblibasan-develtomic-develgccjit-develitm-devellsan-develquadmath-develstdc++-develocstsan-develubsan-develoffload-nvptxruntime 9 -annobinbuilddwzyninstelfutils-devellibelf-develsgcc-c++gdb-pluginfortrandb-gdbserverlibasan-develtomic-develitm-devellsan-develquadmath-develstdc++-develocstsan-develubsan-develtracemake-develperftoolsruntimestraceystemtap-clientdevelinitscriptruntimesdt-develervertoolchainvalgrind-develd-develb-gdbserverheadlessmedit-plugin-bookmarksracketcompletion codecommentlorpickerschemermmander drawspaces findinfiles joinlines multiedit smartspaces terminalxtsizeranslate wordcompletion s -datagl04oclue2-demos libsode-glib -develfbgraphit-clang-formatjslibmm24usterfs-api clix-utilsnome-abrtutoarbluetooth-libsoxescalculatorolor-managerinitial-setupkeyring -pammenusonline-accounts-develphotos -testsremote-desktopterminal-nautilusompm-devellibsraphvizilosettings-desktop-schemas-develsdptreamer1 -devel plugins-ugly-freetk2-devel -docsimmodule-xim smm2430upnpvfs-afcprchiveclientdevelfusegoaphoto2mtpsmbhexchat-develostapdplip-commonguilibsttp-parserd-develtoolswloc-guipluginsibus-hangullibpinyincedtea-webdm-pki-symkeytoolsn2lmbasenitial-setup -guikscape-docs view1 -docs viewtel-gpu-toolspmievdtoolvsadmrssijansson-develbig2dec-libsigawattsnason-c-devels-javadockernelsharkshlassodnsftpibICE-develXau-develdmcpext-develft-develi-develmu-develrandr -develt-develvMCxf86dga -develadwaita-qt5san6bytesizecacard -develnberra -devel gtk23diomisdazzleb-develrm-develecpgpoxy-develubgenstrvdevxiffastjsondtprintgdata-develexiv2it2-gliblvnd-core-devel devel egl gles x openglovirtpodweather -develidn2-develnput-utilsjpeg-turbo -develutilskkc-datalangtagognorm -docuisuksmeta -develmademcached -libspc-develspacknmaotify -develumbertextomp-develtestrcussinfopfm-develgtypesinyin -datamem-debugblk-debuglog-debugobj-debugpool-debugng15roxy-bin gnome networkmanager webkitgtk4urplerdkafkaelpoffice -voikkoport -anaconda cli gtk newt plugin-bugzillakerneloopsloggermailxreportuploaderhtsupportureport rhel-anaconda-bugzillabugzilla webvenge -gdbpmem-debugsvg2-devel toolssane-hpaioeccomp-devellinux-rubyigc++20mindfiletasn1-devel toolsudisks2vva-develdpauerto-libevirt-gconfig lib objectsualmaem-develmalloc -develncserveroikkorbiswacomyland-client ursor egl servermf-litesman1xcb-develdpkbcommon -devel x11fileslt-develyangzhuyinld-devellibsb-develvm-develgoogletestlibsstatictestm_sensors-sensordpsolveshw-guitracetng-ustuaksmetamake43riadb-connector-c-develodbcpamdevctlecabmcachedkindrcurial-chg hgksa-dri-driversfilesystemlibEGL -develGL -devel w -develOSMesagbm lapixatrackervdpau-driversulkan-devel riversod_auth_gssapifcgidldapproxy_htmlsecurity -mlogcssionslzilla-filesystempich-develtests-mpich vapich2-psm2 openmpitr-gtkunge-libsvapich2-devel psm2 -develysql-commondevelerrmsglibsservertestnautilus-extensionscompressdctl-develetpbm-progstle-develwork-manager-appletwt-develginx-mod-develispor-develm-connection-editorap-ncatspr-devels-altfilespam-ldapd_wrapperoddjob-mkhomedirmpingpenblas-threadschangev-contrib rejpeg2 -toolsmpi-develslpwsman-client python3 serverrc-compilerdevelsbuild-composer-dnf-jsoninfo-db-toolstree-develgrub2libspango-develmmcmerl-BCompress-Raw-LzmaDynaLoaderFcntlile-DosGlobGDBM_FileSSAPIHash-Util-FieldHashI18N-LanginfoNDBM_FileODBM_FilepcodePOSIXSys-Hostnamecorelibmrophidginpewire-devel oc libs utils0.2-devel libslatform-python-coverageymouth-core-libs graphics-libs plugin-fade-throbberlabelscriptpace-flaresthrobgresswo-step scripts ystem-theme theme-chargefade-inscriptolarpinfinitynermdk-convertolicycoreutils-sandboxstfix-cdbldapmysqlpcre erl-scripts gsqlsqlitegresql-odbc-teststraceptprotobuf-c -compiler devel ompiler liteulseaudio -libs-develglib2 module-bluetoothx11 utilsython2-debug vellibstest kinter ools3-abrt -addon container-addonbrlapi otli ytesizeclang overage reaterepo_cfreeradiusgevent object reenlet ssapilasso dap ibmodulemd report ldb xmlmod_wsginewt umpy -f2pypsutil ycurl odbc parted qt5-sipqt5 -basesanlock cipytbbwx-siplib.11-psycopg2 scipy 2-cffi lxml pyyaml6-debug vel8-debug vel idle libs mod_wsgi test kinterqatenginelib-servicegnomeplatformpgmepdf-libserft5-qt3d-devel examplescanvas3d-examplesonnectivity-develexamplesdeclarative-develexamplesgraphicaleffectsimageformatslocation-develexamplesmultimedia-develexamplesquickcontrols-examples2-examplesscript -devel examplesensors -develexamplesrialbus-examples port-develexamplesvg -devel exampleswayland -examplesebchannel-develexamples sockets-develexamplesx11extras-develmlpatterns-develexamplesradvdlsshimyslog-cryptoelasticsearchgnutls ssapikafkammaudit fields jsonparse kubernetes normalize snmptrapd ysqlomamqp1 pensslpgsqlrelpsnmpudpspoofuby-bundled-gemsst-analysisdocstd-static-wasm32-unknown-unknownwasifmtsane-backends -daemonevelrivers-camerasscannerslibslk-resetocktellite-5-clientbdlim-cmpi-basegatherindication_helpersfcbwbemclicalap-workbenchl-utils -buildrubendmail-miltertools-console-analysesguivctlipocatundtouchrce-highlightpamassassinice-glib -develtk -tools 3 -devel valaservertreaming-agentvdagentscghpasstratisd-dracutess-ngushiynce4lsfsutilstemtap -client devel exporter initscript runtime-javapython3virtguesthost sdt-devel ervertangbb-develoccl-brlapishelnet-serversseractftp-serverhermaldog-pegasus -libsrque-libsrackerurbojpegwolame-libsudftoolsisks2-iscsilsm vm2powersbredir-develermode-gtkuidvalgrind-develhostmdim-X11commonenhancednagreort-p2v-makertopvieweroikko-toolslume_key -devel libssftpdte-profile291wavpackyland-develebrtc-audio-processinggethoisireshark -clioff2pebackend-fdosmanclixapian-core -libsdp-toolsinetdmlsec1-nssopenssltarletorg-x11-drivers v-ati intel libinput qxl wacom-serial-support font-utils server-Xspice xkb-utilsterm-resizexhash-libsyarapservzenitystdziplib-utils0.0.25-6.el819-3.module+el8.6.0+882+2fa1e48f2-471.module+el8.6.0+879+823e30125-1.module+el8.6.0+879+823e30124-471.module+el8.6.0+879+823e30126-471.module+el8.6.0+879+823e301274-2.module+el8.6.0+882+2fa1e48f8-1.module+el8.6.0+879+823e30129-1.module+el8.6.0+879+823e30121.1-110.module+el8.6.0+992+fc951c1854-12.module+el8.6.0+852+cc16a6868-1.el803012-5.module+el8.6.0+882+2fa1e48f11-1.el85-1.el83-471.module+el8.6.0+879+823e30124-4.el8.2-1.el85.2-141.module+el8.6.0+1002+a7dba0ac2.0-109.module+el8.6.0+988+8031c19338.module+el8.6.0+1001+b56781809-141.module+el8.6.0+1002+a7dba0ac00006-9.module+el8.6.0+882+2fa1e48f1-2.el8.2-141.module+el8.7.0+1081+f0a6974330.600-2.module+el8.6.0+882+2fa1e48f5-471.module+el8.6.0+879+823e30127-17.el88.el83.module+el8.6.0+882+2fa1e48f3-6.el8.0-109.module+el8.6.0+988+8031c19310.module+el8.6.0+992+fc951c1838.module+el8.6.0+1001+b56781801-3.el84.9-2.el81-2.module+el8.6.0+879+823e3012.2-3.el84-471.module+el8.6.0+879+823e30129-3.module+el8.6.0+882+2fa1e48f5.0-12.el84-5.el87.1-2.el860.800-471.module+el8.6.0+879+823e30126-471.module+el8.6.0+879+823e30127-471.module+el8.6.0+879+823e30128-396.module+el8.6.0+882+2fa1e48f7-0.11.94664ddd46a6.el83.el86.el84-1.module+el8.6.0+879+823e30125-471.module+el8.6.0+879+823e30128.6-1.el891-18.el82-367.module+el8.6.0+882+2fa1e48f6-457.module+el8.6.0+879+823e301287-17.module+el8.6.0+879+823e30129-404.module+el8.6.0+882+2fa1e48f21.el82.el803-8.20220519gitffd365e.el81.0.0-109.module+el8.6.0+988+8031c19313-1.el8_102-1.el81.module+el8.6.0+852+cc16a6865-1.el8_64.module+el8.7.0+1082+b3a88d230-1.module+el8.6.0+879+823e30124.module+el8.6.0+882+2fa1e48f0-11.el8033-396.module+el8.6.0+882+2fa1e48f1-452.module+el8.6.0+878+f93dfff771.module+el8.6.0+879+823e30123-404.module+el8.6.0+882+2fa1e48f21.el82.el852.module+el8.6.0+878+f93dfff74-471.module+el8.6.0+879+823e30126-452.module+el8.6.0+878+f93dfff78-32.el8471.module+el8.6.0+879+823e30129-452.module+el8.6.0+878+f93dfff71-3.el8471.module+el8.6.0+879+823e3012.0-4.module+el8.6.0+852+cc16a6865.module+el8.6.0+852+cc16a6867.module+el8.6.0+852+cc16a6861-110.module+el8.6.0+992+fc951c183-109.module+el8.6.0+988+8031c1934.module+el8.6.0+852+cc16a6867-138.module+el8.6.0+1001+b56781800-10.module+el8.6.0+882+2fa1e48f4.el8404.module+el8.6.0+882+2fa1e48f71.module+el8.6.0+879+823e30129.el80.600-471.module+el8.6.0+879+823e30121-421.el82.el852.module+el8.6.0+878+f93dfff73-1.module+el8.6.0+879+823e30125-7.module+el8.7.0+1082+b3a88d236.1-7.el87-471.module+el8.6.0+879+823e3012.2-109.module+el8.6.0+988+8031c1932-2.el8.0-110.module+el8.6.0+992+fc951c1841.module+el8.6.0+1002+a7dba0ac2.module+el8.6.0+852+cc16a6861-8.el84-1.el86-138.module+el8.6.0+1001+b56781800-1.module+el8.6.0+879+823e30123.module+el8.6.0+852+cc16a686.1-1.el81-4.module+el8.6.0+882+2fa1e48f71.module+el8.6.0+879+823e3012.1-1.el8_82-1.el8_82.01-404.module+el8.6.0+882+2fa1e48f2-421.el8 2.el83-421.el82.el8.0-2.21.el84.el8_104-3.module+el8.6.0+882+2fa1e48f452.module+el8.6.0+878+f93dfff75-1.el8452.module+el8.6.0+878+f93dfff771.module+el8.6.0+879+823e30126-12.module+el8.7.0+1082+b3a88d23471.module+el8.6.0+879+823e3012.12-2.el84.el8_109-1.el8_108-397.module+el8.6.0+882+2fa1e48f404.module+el8.6.0+882+2fa1e48f3-36.module+el8.6.0+852+cc16a686.0-109.module+el8.6.0+988+8031c1935-14.module+el8.7.0+1082+b3a88d231.module+el8.6.0+1002+a7dba0ac0-3.module+el8.6.0+879+823e3012421.el82.el8.12-2.el8_63.el8_71-452.module+el8.6.0+878+f93dfff73-404.module+el8.6.0+882+2fa1e48f4-421.el82.el85-452.module+el8.6.0+878+f93dfff771.module+el8.6.0+879+823e30129-471.module+el8.6.0+879+823e30124.0-141.module+el8.6.0+1002+a7dba0ac1-31.module+el8.6.0+852+cc16a6861-141.module+el8.7.0+1081+f0a697430-367.module+el8.6.0+882+2fa1e48f3-471.module+el8.6.0+879+823e30124-4.module+el8.6.0+882+2fa1e48f7-2.module+el8.6.0+882+2fa1e48f5.0-4.module+el8.7.0+1082+b3a88d2329-1.el81-471.module+el8.6.0+879+823e30126-471.module+el8.6.0+879+823e30129-404.module+el8.6.0+882+2fa1e48f52.module+el8.6.0+878+f93dfff771.module+el8.6.0+879+823e30125.module+el8.6.0+882+2fa1e48f6.2-3.el88-3.module+el8.6.0+879+823e301270-396.module+el8.6.0+882+2fa1e48f1-7.module+el8.6.0+882+2fa1e48f9.2-9.el88-8.module+el8.6.0+852+cc16a6869.18-6.el88.el824-2.el8_539-0.el8_102-1.el8.3.3-109.module+el8.6.0+988+8031c19310.module+el8.6.0+992+fc951c183.0.1-138.module+el8.6.0+1001+b56781803-141.module+el8.6.0+1002+a7dba0ac6-141.module+el8.7.0+1081+f0a697436-1.el89.0.0-1.el8:0.08-404.module+el8.6.0+882+2fa1e48f21.el8 2.el852.module+el8.6.0+878+f93dfff771.module+el8.6.0+879+823e301212.2-4.el821-404.module+el8.6.0+882+2fa1e48f21.el8 2.el852.module+el8.6.0+878+f93dfff771.module+el8.6.0+879+823e301231.100-1.module+el8.6.0+879+823e30128-457.module+el8.6.0+879+823e301280225-367.module+el8.6.0+882+2fa1e48f36-1.module+el8.6.0+879+823e30123.5-2.module+el8.7.0+1082+b3a88d232-396.module+el8.6.0+882+2fa1e48f6-1.module+el8.6.0+879+823e301266-7.el898-2.module+el8.6.0+882+2fa1e48f1.10-404.module+el8.6.0+882+2fa1e48f52.module+el8.6.0+878+f93dfff771.module+el8.6.0+879+823e3012302086-2.module+el8.6.0+882+2fa1e48f7.3-5.module+el8.7.0+1082+b3a88d233-1.module+el8.6.0+879+823e30129998.11-6.module+el8.6.0+882+2fa1e48f2.11.0-2.module+el8.7.0+1082+b3a88d2352-1.module+el8.6.0+879+823e30123.31-369.module+el8.6.0+882+2fa1e48f5-396.module+el8.6.0+882+2fa1e48f42-1.module+el8.6.0+879+823e30124.12-14.module+el8.6.0+852+cc16a6864-457.module+el8.6.0+879+823e30127.200-2.el8.28.3.3-1.el8.rocky.3.22-17.el8.0-2.module+el8.7.0+1082+b3a88d234.module+el8.7.0+1082+b3a88d23.1-141.module+el8.7.0+1081+f0a697432-6.module+el8.7.0+1082+b3a88d230-1.module+el8.7.0+1104+549f92a66-2.el805-11.el825-11.el88-11.el83-11.el8471.module+el8.6.0+879+823e30124-1.module+el8.6.0+879+823e3012368.module+el8.6.0+882+2fa1e48f471.module+el8.6.0+879+823e30121.1-2.module+el8.7.0+1082+b3a88d236-6.module+el8.6.0+852+cc16a68653-2.el80.1-3.el84.el85.el8_106.el8_101.3-1.module+el8.7.0+1063+20f2b9a42-368.module+el8.6.0+882+2fa1e48f3-471.module+el8.6.0+879+823e30126-2.module+el8.6.0+882+2fa1e48f2.0-22.module+el8.5.0+671+195e456324-138.module+el8.6.0+1001+b56781803-2.el83-141.module+el8.6.0+1002+a7dba0ac0-1.module+el8.6.0+879+823e30120-2.el88-11.el85.module+el8.6.0+879+823e3012.2-2.el83-4.module+el8.6.0+852+cc16a686.3-3.module+el8.6.0+852+cc16a6864-6.module+el8.6.0+852+cc16a6865-19.module+el8.6.0+852+cc16a6867-141.module+el8.7.0+1081+f0a697430-2.module+el8.6.0+882+2fa1e48f4-1.module+el8.6.0+879+823e3012471.module+el8.6.0+879+823e30125-7.el88-3.module+el8.6.0+879+823e30124.2-1.el81-471.module+el8.6.0+879+823e30123-404.module+el8.6.0+882+2fa1e48f9.1-3.module+el8.6.0+882+2fa1e48f5.1-7.el800-11.el85-421.el82.el86.0-12.module+el8.7.0+1082+b3a88d239-29.el87.1-2.el81-452.module+el8.6.0+878+f93dfff72-471.module+el8.6.0+879+823e30128.4-3.module+el8.6.0+852+cc16a6866-5.module+el8.6.0+852+cc16a6865-471.module+el8.6.0+879+823e301294000-2.module+el8.6.0+882+2fa1e48f0120413-11.el820.1-3.el820126gitbb1bba3d77-13.el8_10.33.el86.el8_9.16727-2.el8g-1.el83c-1.el84a-1.el8b-4.el85a-1.el82.1-5.el86.el8_7.2.0.18.el8_8.1.0.13.4-7.el8_10.3.0.18.0.1:0.42.24-6.module+el8.6.0+882+2fa1e48f31-5.module+el8.6.0+879+823e30121.300-4.module+el8.6.0+879+823e30123-3.el8.0.2-6.module+el8.7.0+1082+b3a88d2300-11.el82-11.el85-11.el85-471.module+el8.6.0+879+823e30121.0-19.module+el8.6.0+852+cc16a6862.0-7.module+el8.7.0+1082+b3a88d233-1.module+el8.6.0+879+823e30124-457.module+el8.6.0+879+823e30122.1-0.2.module+el8.6.0+975+c0ed2db85.module+el8.6.0+976+839b99e95-141.module+el8.6.0+1002+a7dba0ac7-110.module+el8.6.0+992+fc951c189-109.module+el8.6.0+988+8031c1938-397.module+el8.6.0+882+2fa1e48f.01-443.module+el8.6.0+879+823e30121-7.el83.0-10.module+el8.7.0+1082+b3a88d232.el83.module+el8.6.0+895+381d253114-1.el84-138.module+el8.6.0+1001+b56781805.module+el8.7.0+1082+b3a88d237-141.module+el8.6.0+1002+a7dba0ac00-11.el84.4-2.module+el8.6.0+895+381d25312-3.module+el8.6.0+882+2fa1e48f5.1-2.module+el8.7.0+1082+b3a88d233-141.module+el8.7.0+1081+f0a697431.0.1-4.module+el8.7.0+1082+b3a88d239-2.el8:1.302181-2.module+el8.6.0+879+823e30124.0-2.el8.21-14.1.el825.el87-1.el802-11.el89-4.module+el8.6.0+882+2fa1e48f2.3-9.module+el8.7.0+1082+b3a88d234.13-7.module+el8.7.0+1082+b3a88d235.13-5.module+el8.7.0+1082+b3a88d236-471.module+el8.6.0+879+823e30121-1.el86-1.module+el8.7.0+1077+0e4f03d4:1.74-1.module+el8.6.0+879+823e30122.01-1.module+el8.6.0+879+823e30125-7.el8.01-458.module+el8.6.0+879+823e301210.3-110.module+el8.6.0+992+fc951c181.3-109.module+el8.6.0+988+8031c1933.0-138.module+el8.6.0+1001+b56781804.2-141.module+el8.6.0+1002+a7dba0ac5.0-141.module+el8.7.0+1081+f0a6974320180605-2.module+el8.6.0+882+2fa1e48f210520-1.module+el8.6.0+879+823e30126.3-421.el8 2.el830.1-452.module+el8.6.0+878+f93dfff75.1-10.el86.2-2.module+el8.6.0+852+cc16a68672-1001.module+el8.6.0+882+2fa1e48f4-458.module+el8.6.0+879+823e30126.0.1.1-110.module+el8.6.0+992+fc951c181.2.1-109.module+el8.6.0+988+8031c1932.1.1-138.module+el8.6.0+1001+b56781803.3-141.module+el8.6.0+1002+a7dba0ac4.0-141.module+el8.7.0+1081+f0a697438.2.2-4.el8_107.3.1-3.module+el8.6.0+852+cc16a6868-2.el80200724.el8.10-8.el8500-11.el86.0.0-1.el87-1.el8.rocky.0.19.0.3-22.el8.rocky.03.el8_9.1.rocky.04.el8.rocky.000-11.el8Criticalabattis-cantarell-fontsdwaita-cursor-themeicon-themelsa-ucmnaconda-user-helpsible-collection-redhat-rhel_mgmtpcppache-commons-compressjxpathiguardianpstream-datautoconfmakebacula-logwatchtik-cssutilpg-algeti-fontschveulebrivi-fontslassic-fontsourier-fonts s-fontsdedaena-block-fontsjavu-sans-fontselite-fontsxcelsior-caps-fontsondenced-fontsfontsfonts-commonglaho-fontsorda-fontsingiri-fontsrubaqidze-fontsmikhail-stephan-fontsrgvlovani-caps-fontsfontsnateli-caps-fonts ondenced-fonts fontsino-medium-cond-fontsfontssans-fonts medium-fonts odern-fonts regular-fontserif-fonts modern-fontsucnobi-fontsrltty-docscargo-doclang-analyzerdr-emoji-annotationoud-utils-growpartmake-dataocrpm-macrosockpit-composerpy-jdk-configsdejavu-lgc-sans-fontsisruptorocbook-style-xsleclipse-ecf-core runtime mf-core runtime xsdjdtp2-discoveryfi-srpm-macrosvolution-ews-langpacks mapi-langpacksxchange-bmc-os-infofelix-gogo-command runtime shellscrirewall-applet configgcc-toolset-10-gdb-doc 1-annobin-docsgdb-doc 2-annobin-docs 9-gdb-docdb-doclassfish-el jsp -api servlet-apinome-tweakso-srpm-macrosogle-gsonnoto-cjk-fonts-common emoji-color-fontsfonts fonts-common kufi-arabic-fonts mono-fonts naskh-arabic-fontsui-fontstaliq-urdu-fonts sans-armenian-fontsvestan-fontsbalinese-fontsmum-fontstak-fontsengali-fontsui-fontsrahmi-fontsuginese-fontshid-fontscanadian-aboriginal-fontsrian-fontsham-fontserokee-fontsjk-ttc-fontsoptic-fontsuneiform-fontsypriot-fontsdeseret-fontsvanagari-fontsui-fontsegyptian-hieroglyphs-fontsthiopic-fontsfontsgeorgian-fontslagolitic-fontsothic-fontsujarati-fontsui-fontsrmukhi-fontsui-fontshanunoo-fontsebrew-fontsimperial-aramaic-fontsnscriptional-pahlavi-fonts!rthian-fontsjavanese-fontskaithi-fontsnnada-fontsui-fontsyah-li-fontsharoshthi-fontsmer-fontsui-fontslao-fontsui-fontsepcha-fontsimbu-fontsnear-b-fontssu-fontsycian-fontsdian-fontsmalayalam-fontsui-fontsndaic-fontseetei-mayek-fontsongolian-fontsyanmar-fontsui-fontsnew-tai-lue-fontsko-fontsogham-fontsl-chiki-fontsd-italic-fontspersian-fontssouth-arabian-fontsturkic-fontsriya-fontsui-fontssmanya-fontsphags-pa-fontsoenician-fontsrejang-fontsunic-fontssamaritan-fontsurashtra-fontshavian-fontsinhala-fontsundanese-fontsyloti-nagri-fontsmbols-fontsriac-eastern-fontsstrangela-fontswestern-fontstagalog-fontsbanwa-fontsi-le-fontstham-fontsviet-fontsmil-fontsui-fontselugu-fontsui-fontshaana-fontsi-fontsui-fontsibetan-fontsfinagh-fontsugaritic-fontsi-fontsvai-fontsyi-fonts erif-armenian-fontsbengali-fontscjk-ttc-fontsdevanagari-fontsfontsgeorgian-fontsujarati-fontskannada-fontshmer-fontslao-fontsmalayalam-fontstamil-fontselugu-fontshai-fontshamcrest-corettpd-filesystemmanualicedtea-web-javadocdm-pki-acmebase -javacakraserverpxe-bootimgs-aarch64x86roms -qemutstooljakarta-annotationsctoolsetty-continuationhttpiosecurityrver letutilmc-core-javadocolokia-jvm-agents-d3-flame-graphchulietaula-montserrat-fontsnit5zlibkdump-anaconda-addonernel-rpm-macrosycloak-httpd-client-installlangtableftp-scriptsiblangtag-datawacom-datalvm-docog4j-jclslf4jrax-templates-rhelucene-analysis zers-smartcnqueries yparsersandboxman-pages-overridesriadb-connector-c-configjava-clienticropipenvod_security_crsulemd-toolspich-docvapich2-docobjectweb-asmpenjpeg2-devel-docstest4jsbuild-depsolve-dnfcap-anaconda-addoninfo-dbparfait-examplesjavadoccp-parfait-agenterl-AutoLoader SplitB-DebugenchmarkClass-Structonfig-ExtensionsDBM_FilterirHandleumpvalueEnglishxtUtils-ConstantFile-Basename Compare py Find stat Cache HandlendBinGetopt-StdI18N-Collate LangTagsO-Compress-LzmaStringPC-Open3LDAPocale-CodesNEXTetPod-FunctionsSafeearch-DictlectSaverymbolTerm-Complete ReadLinext-Abbrevhread -Semaphoreie-File Memoize RefHashmeUnicode-UCDser-pwentautousebaselibdebuggerprecateiagnosticsocencoding-warningsfieldsletestiflessocalemeta-notationoverload ingsigtraportubsvarsmsishki-servlet-4.0-api engineolicycoreutils-guippler-dataykickstartthon-qt5-rpm-macrosvirtualenv-doc3-abrt-doc ugeasbabeldasbus bus-python-client-genflaskidm-pkijustbases yteskeycloak-httpd-client-install ickstartlangtable ib389 voikko t ouisnetworkx-core ispor oseprotobuf yOpenSSL ghmi mentsrpm-generators fluffsimpleline udsvirtualenvwheel -wheel.11-setuptools-wheel 2-pip-wheel requests setuptools urllib3 wheel6-rpm-macros8-jinja2 pip -wheel resolvelib pm-macrosqpdf-doct5-qt3d-docbase-docconnectivity-docdeclarative-dococgraphicaleffects-docimageformats-doclocation-docmultimedia-docquickcontrols-doc2-docscript-docensors-docrialbus-doc port-docvg-doctools-docranslationswayland-docebchannel-doc sockets-docx11extras-docmlpatterns-docrpm-macrossrpm-macrosredfish-finderhat-rpm-configigpm-mpi-hooksdevtoolslintsyslog-docuby-irbgem-rexml ssst-debugger-commongdblldbsrcsaab-fontsne-backends-docssistt4jendmail-cf doctroubleshoot-pluginsil-nuosu-fontspice-client-win-x6486protocolqxl-wddm-dodvdagent-win-x6486tratis-clitargetcliexlive-translatorunicode-ucdvocity-parsersvim-filesystemrt-installmanager -commonwayland-protocols-develhois-nlsxkeyboard-config-develmlgraphics-commonsorg-x11-proto-develz-javazsh-html0135b5541.14640.5_fileformat_v62.583.189-dsdbb83295.2407c48dc6.2435bff480400202105301710445 603142707 100901235500202110202024189 10914030260020220510152642920 2171222 3010955 30151217 801093653 2073307 9130758397002022110811022411105254695421065630 28165927 206171923 15173329301121011579.6b0d79fe6c806eb65patch:RLBA-2019:0973867152495456770271672343331674385573467824406112639495576023568701480790250047226213346778542668745 20:0347135462599606172236336169739057001323637412355024992892456730364435557621301340586578981870471578236347847528701346799025882483244257950974946781:054267108359161298177506059039801278212378945858634771880259245799023112345672013034679423851259230708324059346614093416347708093562091267892048304475596346749805983079113823789378485034124250116336042:031548578618821560137619709848990480023911682245679312346840525628712358899257990591348223793678404951960579992006182376137991791174145325982464416709111522567322405840438556960256787134567980134567899012345678950012345678910235678201235301234567894025679501234579601234567970123456789824678995678960023457891123479201567930124564124695012345678960123567870123456848938716358946759603974683680519205789312356184878590189203:008145912381025615789202456783482936436501245567707981755276583812205408779062239448496304386890234891001238203568932345454521583023861770111826204104:012378810833631151258129859566004694273235572959635797012678839037830009101692016931458945685256345897458807921081125233024652659792162015760236723381624421328930246526081166809657870124828805445623595046896855:07402451104336445732871EA-2019:336177599420564347546172557 20:033046157598760711840759247079118305446647270011324732428596780233851011:17557981036313450619899390061946554152200293494267567826932231545405882:0352176786984904264354567632014295139644053467528436880601615637869719973:084471574280472034:302420988325405126995195:07381337SA-2019:09758141529972251129372029992533354540376945537038356426973 20:02793485799812933175860795776051624314450867086692631220417748485230325362362732405927243651628941795497069470912435182747539349950036201:05073148951611705611345441064242586702446127589968049114269527992479832259901360370125583478302061734559062366816918454150146012799120113212315567889231624639814515103785826916514271235682:025890323504184154356435872886911049556765675962349378018201342516019191532459614820311432003447967880575594151633263184678526779813216615844378950540277582091126470006127010581928990457861497028251492494185881359234618223483394035787041590821230849254754649833905867733:00165079879956911036713922008883794466360610628082133890212523364035697280298930207681031078922014642533582890134661827394094940589637610027620241968978529706435706864952451448420131253455863928624570571902657168414:0105305525365397689868279551048159163752799798012993453081135435849451464467195181248182289123998203769972296168748269430058495896068910223358614597013401345676266678349546140003684227314515736173550795312694941642268248379612373571352623494636997008516897780241172147327729908830136842379905654073636895:0083144568222813148124012671143837845121583923016385176756737mdkrepokey:type:relidarray numsitory:solvablessolvable:arch buildtime conflicts description evr name patchcategory rovides summary vendorupdate:collection:archevrfilenamenamelistmodule :archcontextnamestreamversionreference:hrefidtitleypeightsseveritytatusbbccddeeffggMNOPQRSTUVWX**:e f --..k l m n ((,B-B2+s t 9H:H++TTUU|;};Vi~KKKK|=}=Cu99xt##$$%%S | |k0l0e0f0m0n0!!""    klef !~XXXXmnrr2_3344LL8k9kS7799::\\[[]]4 5 ;<=>CA? @ DEFGHI33JRKRwixoLUMUNIOIy_zc{k|b}j~`evafqglPMQMnd..m.tt:m::rrabss{|    11hh~  H?@ww2rr i iw#"$%'()w*w+w, -.n/n <<<<5!6.789:?;<=6677ee?d@dbbccddeeffgg;;hhiiggjjkkllmmnn3(aaaaaa\\++,,==>>??BBCCDDEEFFGGHHIIJJKKLLMMNNOOPPQQRRSSTTddcceeffqqB C y z{DE)FG*.{/0881|ZH[H2\l]l^?_?3 `FaFbcdefg4 567 hSiS0LMNOPQRSTUXmYmVPWP4 5 88qQrQVV^^s=t=u=v=wxy?z??{?|?}?~?      !"#=$=%&'=(=)?*?+=,==ZZ?V@V-!"#$ '(=E>E&FFD`E`)`FbGb*bgQhQJJKKLLMMNNOOPPQQ:k/l/m/n/|F}F2 S S|H}Hk.l.m.n.,P-POO^^??@@ 4 4.v/v0v%nT{UrV W"XmY )oZ%r[&7t\J8j qCrC7CDDMF8Q9P:7II;9LLNNhjij<@=6NVZZ``@<jpkp?:BACIbbccD?EJFHG>llHOIMJ8K\LTlemeWW1OnopqYG0+LMNOPQjKR+S+T+U+VbWbBRCRyRzo{oD@E@)@FCGC*CS=W|W}W    nn`^BSCSySzl{l]]Q]**R***TqUqVBWD9u:uPF;'<'_'='>'`sasbEchdh}}ttuuvv&&ww,Y-Yccnn2;CN  oo=g>g8899::;;<<==>>??@@AABBCCJJKKjj__kkll    {rvNIzJzEEFFHHKKMOT U PPQQxxS(WWX%[:[l\lzWef|Cd eaf`gghhjjk*m^nJqX~~88rEttuuw'C?G$OvPvJ"RSRHT.ULV7yUYU\I]<{U_F]|^|a,g0h0i!mwnw o>p@sAt(u(0}9~/jx/y/Ykinf-%og l T m 1G#hwwFFGGeeffgghhiijjkkllmmnnooppqqrrsTTrr____]ssXRY W._/_0_1_,c2]-s5X6Q7Y8W@@AAEEBBCCss0DLMNOPQjDRDSDTDUDVW= > !/"/)5*5+V  VVrVVKD2E2  FoGo!PH;I;";J;K;LFMF#\$\%;&C'C##$$%%&&))))cG3G  N^O^P?Q?(Z)Z  //0ELMNOPQRESETEUE~jjTUV"W"VWddeeAAxx))**,,--..EEFFBByyzz{{||--..//001122AAZ[Se`abctdefghijkulmnovwxpqrsytuvwxDyDzD{DLLMMNNOOPPQQRRSSTTUUVVWWXXYYZZ[[\\]]^^__``aabbccddeeffgg|}~``xxyyzz{{||}}~~     SS:[z[""GGHHIIJJKK(())**++,,--..//0011223344556677jj    ]]  ::55VV``XXaaOO}}99==;;**??TT``}}77QQ    ;;55VV==<<??@@AABBCCDDaa3U4D5T]] ! %g&g'g(g)*J*6f7I89S;09?L@+ABZCiDiG]EJF/YVZVKeLOHN9 : ;<=j>jI_CiDiEXFXGaHaJTKTLSMSNOrr,,00PPRRmmnnooppqqrruuvv    tt{{[[ii>>{{ooEE~~oo..&&OOuu{{%%33[[BBCCDDEERR4455]]^^__``**MM99::;;<<==>>jjkk~~ooppqqrrssMMYY}}~~        ^^PPIIIIiijjkk,,--..//001122PP0011//&&''(())66d d d d>Y    8899<<==BB((..          ==NNOOttttuujjYYZZeeHHZZppqq}}jjii++4444444444&4444444 4!4"4#4$4%4&4'4(4)444dd*x+x^^__mmWssml lFGHI nJKLMNOPQnRSTUVWwwxx]][[\\]]^^__``aabbccddjjkkeeffgghhiiUU``aabbccddeeffgghhXXUUVVddeenn<<88//1122334455SSTT00KKLLMMNNOOPPQQEE::;;rr--..//00XX__??AABBUUSSLL8899::__<<==qqllmmrVsVtVuVllBBJJ11}}~~HHRR::<<==;;>>??@@CCDDEEHHIIkkllmmnn}}HH**WW        bb  zzddppqqrrzz{{&&''''((SSUUVVTTXX,,..HHIIRR$$XzYzkkPPzz44[[^^__7`` \!\GGJJFFGGRRSSdd]]--o@sPzzBBCCDDEEFFGGHHIIJJKKLLMMNNOOPPQQ\\##ssLLAA  //TT5522@@AAUUVVTT66NNccUUVVWW;;//8899yyDDddWWXXYYZZ[[\\]]^^__``aabbccffgghhQQRRYY**ffgghhDDEECC66bbll66778899<<==>>??@@AABBCCDDhhiijjkk~~ZZ[[  //SSTTUUVVWWXX%%))FFGGPP""##!!  ""##$$%%NN((,,77||}}PP++,,oorrssttvvwwxxuuHH4455X Y U V Z [ \ ] ^ _ ` a b c nnooppqqIIJJKKLLMMNNOO>>``OOJJgghhee8811pp8899++!!<<EEFF\\  yy}C~CCCCC ,Ccc8899::ttOOkZlZn6hkikucvcydd==>>??@@AABBCCDDEE  aaQQRR--..//00112233  ^^ssttkknnAA  ??WW~~""}}HHIIrr77yyzzMMNNyyzzssttuuvv??00YYdd8899::ZZ[[vvwwxxpp77  ^^ffEEFF t t t tttZZbbcckkllcc446677ff$$aabbRR||j j!j"j#j$j%j&jrj'j(j44556677::;;<<==>>??@@AABBXxYxUxVxZx[x\x]x^x_x`xaxbxcx)C*C-.XX}};;<<jjppqqccddeeffggkkllmmnnoorrssttuujj/0ttrrssuu..1122  !!ZZ[[ss&&''>>66xx^^{{||          iiTTCC''((VVWWFFGGxx00qqhhii88SSXXyyzz    !!""##$$%%&&''(())UU%%;;\\]]^^__``aabb      mm__``##$$%%&&78~~TTUU}},,??@@&&g~~c,klm%2TCU8VMW^j=X1Y>)3[Z`pXq;d[b9Y:Yw4\G<:,hhz{|}~!!!!]E^V_F`?aBb\ff7<$$!!""##%%UUkk88DDYYccooss||~~MMQQ{{||}}~~{{--@@        ::{{^^N*O*P*Q*;;,,ll4433556677TTPPQQddeemm(())**++{{||]]ZZooqqTTWWZZ^^``bbRSTUVWXY+Z[\]^_RiSi`iaiXiYiTiUiViWi+iZi[i\i]i^i_i3344==b]c]d]e]TTVVWWYY  ZZUUf[g[h[i[ll55WWXXYYZZ[[\\]]^^__``aabbYY\\[[ZZ[[\\]]^^__``aabbjklmnopqf g h i ZZ[[\\]]^^__``aa;;<<TTUUVVWWXXYYrstuvwxyz{89|}ssttuuvvwwxxyyzz{{33445566778899::;;00FFGGHHIIJJKKRR  ~bbKKmmnn8899II::;;<<==>>??@@AABBCCDDEEFFGGHHJJDDEEFFGGHHIIJJKKLLMMNNOOPPQQRRSSTTUUVVWWXXYYZZ[[\\]]^^__``aabbccddeeffgghhiijjkkllmmnnooppqqrrssttuuvvwwxxyyHHzz{{||}}~~            !!""##$$%%&&''(())**++,,--..//00112233445566778899::;;<<==>>??@@AABBCCDDEEFFGG77;;<<WWXXSSXXiijj%%ee99::NNOO||%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\e8f8g8h8i8j8k8l8m8n8o8p8q8r8s8t8u8v8w8x8y8z8{8|8}8~888~~{{||}}zzxxyy            !!""##$$%%&&''(())**++,,--..//00112233445566778899::;;<<==>>??@@AABBCCDDEEFFGGHHIIJJKKLLMMNNOOPPQQRRSSTTUU[[\\]]^^mm((ffgghh''//hhii\\ii~~33..001122445566          ggmmmm  !!""##$$%%&&''))**++,,--7799::;;<<==(())**++,,--..//0011223344DD!!""..//ssttuuIIee**||}}~~[[**)),,--KK44ccddxx001122334455>>tt))**++          PPQQ]]LLMM            !!""t.++.. - 5Auu``FFGGHHSS&&--6666LLMMNNRROOPPQQLL11223344YYZZWWXXYYZZ[[vvuuwwxxRRYY>>jjNNZZ  yyee            77>>WWXXYYssttuuvv||==>>??@@AABBCCCQuuvvwwxxyyzz{{550011223344MMQQRRSSTTUU@@AA  !!""##$$%%&&''(())^^oo  !!$$%%DDEEFFGGHHIIJJ??@@  aaDDOO          vvww!!""##$$**%%++&&)),,--..//KK    llooRRSSOO\\]]^^__kkllIIbbcc\\ooxxyyzz{{yy11ffVVWWEE--vvww(())77cc  ccddjj##$$MMNN !"#$hhii%)&)')()))*)+),)-).)/)0)1)2)3)4)5)6)7)8)9):);)<)=)>)?)@)A)B)C)D)E)F)[[223322336677++  !!""KKJJKKLL``aa??rrss||JJllhhii@@AABBPPQQ""##$$%%ffggCCDDQQ||''((&&__GGyymmnnoofghi=a\\\\GHIJ0SSTTUUVVWWXXYYZZhhrrCRHHGGIIJJKKLLMMNNOOPPQQRRSSTTVVWWXXYYKKLLMMKLMNOPQRwwxxvvwwxxyyzz{{||nnppSSVVYY]]__aatt==>>UUXX[[\\**++,,--..//00mmnnooppqqrruuvvssww''2233445566778899::FF55nnooAABBCCqq!!""##$$>>//00112233445566@@&&''((--..//001122334455 S SSSvvww**++mmnnooppqqrrssttuuvvwwxxyyzz{{||}}}}zzppqqrr  ,,ppqqrrssLLMMNN99::;;<<++~~ll  !!""##$$%%&&''(())**[AShTh3k 4 bw C    GUbVb5\OIPIJzbbWhXhY8Z8 @!@!HRfSf%A&A'A(A)x*x[%\%Je6R7,8_"x9P;_<#H:_R<T(UZ=}VW,->??syp@j]h^h_;`;A >3Y2\+hahbh0]l$%{pchdh_9]\^\A %-BCmDmE/F&a*'r,AgQhQKK([L;G$H=9\:\)8;v mKnK*mehfhI6opCDEKFKGhHhg6h6J!K!L$M$s-bNO~ ijklm)n)o)p)qprpsptpuwvwwwxw!yAzA#{|$}}~}}}F..((""=&(p\733 9 9 9 9 ''rrqqqq            !1"1#A$A%~&~'~(~)*+,-./0123485>6>M$%vQwQx y zi{i|3}3~33NNYYYYYY     J Jkkaaaa%%%% !"R#R$(%(&3'3(%)%*E+E,-.L/L0f1f2i3i4u5u6C7C\89:a;a)<|=|n>?@A]BC?DDEDnF:G:H0I0J#K#L#M#NAOAP6Q6R7S7T&U&VFWFLXGYGZG[GwG\G]G^G_G`NaN[ob:c:pdJeJfxgxhxixMjEkElEmEnEoEpEqEaEqr s turv>w>2UWx!y!z!{!v!|}~eeeeM MZ    A..Bii[SVTV3o4 ,vl/Paa0Sv1MISJSkkkkkk;5dcci23hWVXVY+Z+ P!P!L4WMTTlUlI5 SCC%B&B'B(B)y*y6s P[4\4Jg6S7-8X ~"|9a;X<8#=:X667S B Dm a!aS'WN==*8w,->"#H?;a$=%=&"'"@k<(6)6 9]V^V_B`BAkkX>5X[r[5\5:;*_+_z+VaVbV;=$)OVA %w<BCnDnE0F&#,v-v./<'|Y:Z:012D3D,a=V>fef|+KLdl45eB6(fL@G%H>fC6g7gq9s:s M!<)h?=;w"kAw"48v9vmE#$K*VI5%<nO&qCD'[EVFV(?)L*7+},wGuHurg:h:J/K/L)M)-.w-BIN O C1PVST WXY&Z&!J"y#J+$&%.& 'v,E(\)^*sefg7h7-M@>k?kS@sAsC1E2EDBfCfDfEfFfGfEH;I;J;K;L;M;N;O;P;Q;R;S;T;U;FVWWWGX;Y;HZ [ I\]^_3`afbzczdzezfzgzhzizzj)k){RZ { {{{qrstuvwxyz{|}~ZZ c c  " ===========,,l   >P cNdNeNfN  7 ]]] ]!"""#U$U%U&U'c(c)c*c+c,c-H.H/\0\1|2|3\4\5\6\7899:9;k?@ABCDEFmFSGSHSef!>"    (#V$V%V&V5ef,/]0].qrstuvwxyz{|}~/j*k*7i<j<k<l<94*w+w6  ;o~pqrp?q?wstuxyr r r rz{XYUVZ[\]^_`abc C|  K K} QQQQQQQQQQQQQQQQQQ Q!Q"Q#Q$Q%Q&Q'Q(Q)Q*Q+Q,Q-Q.Q/Qz@UWU1U{|L 012>3>4>5>6>7>8>9>:>;><>=>>>?>@>A>B>C>} DFEFFyGy HIJKLMNO  PUQU~RRSRTIUIVlWl X Y Z [ \ ] ^ _ ` a b`c`d`e`fjgj h?i?j?k?l?m?n?o?p?q?r?s?t?u?v5w5x,y,7,z,{,aFTF|i}i~""""""""""  W Wd t t8888 ~~YYnn000000++x+ +!+"#$'%'&'''"()*3+3,3-3%&'() *+v1 29394q5q6(7(8d9d8d  :{;{- O.6?6@6A6B6C69t:tD3E3!F>G>H>I>J>K>L>M>N>O>P>Q>R>S>T>U>V>W>X>Y>Z>[>\>]>^>_>`>a>b>c>d>e>f>g>h>i>j>k>l>m>/nWoWpOqO0P$1r&s&t&u&v&w&x&y&z&{&|&}&~&&&&&&&&&&& & & & & &&&&&&&&&&&&&&&&&&& &!&"&#&$&%&&&'&"(c)c2*J+J,J-J./012232415161718191#:;<=>-?-@-A-B_C_D_E_FCGCHxIxJxKx3$%LkMkNkOk4P-Q-R-S-T-U-V-W-X-Y-5[O\O67Z`[`&\]^_8bscsdsesfsgs9h2i2j2k2:lEmEnOoOZO'pq;X <}5~5=>EE?gggg@ii i iA  B TTC[qD66E)GH*+,IJ-./0K12r's't'u'v'w'x'y'z'{'|'}'~''''''''''' ' ' ' ' ''''''''''''''''''' '!'"'#'$'%'&'''3456PPPPPPPPPPP P!P"P#P$P%P&P'P(P)P*P+P,P-P.P/P0P1P2P3P4P5P6PL7N8NN9Y:Y9;ZO?L@LPABSCDQEJFJR;G'H'<IJ=>K{L{M{N{SOyPyQyRy?SHTHU_V_c_T@AWXYZU[\V]j^jWLIXB_M`MY*uZaXbXcXdXeXfXCghhhDNMHi$j$[\vJwx^y:z {|c}~jjMdj )uGG j j j  ;;K;;L.^kAlAmAnA_ "ao#p#bq%r%stu<v<wxyz{>|>}1~111<<<< } } > > >>6666qq<!Ec"Fl ld!^"^#^$^%^&^e#fg'@(@hb9V9i)f*f+f,fj-5.5k/G0GlCDEFGHIJKLMNOPQRSTUVXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./023456789:;<m1#2#n@oRtSkp&q34G]r5g6gs7q8q9q:q;qq?q@qAqBqCqDqEqFqGqHqIqJqKqLqMqNqOqPqtvw#mUnno8tQuQ"$L%L&LQKRK'K(KSKTKUKVKWKXK-$.:/90S9:h;g<?~=U>UOtPtQtRtStTtUtZn\?]Q^=jvkvlvmvnvovxZzP#i2}?;f=x(Y^Z^Iyz{|JK[\q]^LMNO}~PQR_1`1a1b1Sc+d+ +TUVWefgh6ijk%l%XYZ[manaoapaqara!asatauavawaxa^yz{|}~A#B#S#C#D#)_`BB F F B B FFFFFFFFFBBBBaww33*::b  ` c!T"T#T$T %e&e 'd(d)d*d +,d-@.@/@0@es#+1g2gf,3-32425262728292:2;2<2=2>2?2@2GtHtAB.CDEF/0U)V)d)W@X@Y@Z@[@\@]@^@_@`@a@b@c@d@e@f@g@h@i@j@k@l@m3n3go@p@hqBrBs4t41uava$a%awaxay^z^2{B|BAB/T3SiTi +WiXiY*Z*!2[3\3"{#5]i^i_A`A>4+iaibi$(cidiA %0&"'{,G(c)e*weifig9h9-Ok}Y~Y+{>>>>ff4!! 5fd!JJ"# - -3- - -$ 6QQ%GG&ss7'MM(JJJJ(((()U U*!D"D#D$D%D&D+rJ,'(-8>C.!/)1*1l013435E6E7E8E9E:E4;=<=5br(r6=.>.7DD9'89:mnoXYUVZ[\]^_`abcpqKLMNOPQRSTUVWXYZ[\]^_`raxbxstuvwxyz{:|};~efgahaiaja<k0l0m0n0o0p0q0r0s0t0u0v0w0x0>@y'z'{'|'e'y)z){)|)e)AB}~r^Fb]ppgehhihJeu;  GU C'bD[[E ~ ~F a a  NNNNNNNNNNG==nnMMMMHssI$ $!$"$J<MtKL#)$)M.p% & ' ( N)T*TO+,P-3.3/303Q1}2}e}R3M4MSA{B{54647484=T9 : ; < =7>7?7@7ABCDEFGHIJ>K1L1DoEo?MkNk@O,P,UQpRpppSpTpUpVppA6WWeXeYZ[\X]b^b_b`bYZ4[a5b5\BCt(Dchdhehfh]qy^Eg$h$X$i$j$_k l FmTnToTpTqTrTsTtTuPvPGw!x!`,yz{|acDbc44dnnnn : : : :e1H f  ~~5~~~~~AAgjjh!!VWiaI``JXXX Xj!>">#>$>k%I&I'(K)`*`+`,`-`.`l&*m s :l;ll?l@lAlBlClDlElFlGlHlIlJlKlLlMlNlOlPlQlRlSl!t"#$%&'()|2~222*+v,Nw xy-./013z45678{|}9)*hic}d} }j}k}l}m}:nIoIpIqIrIsItIuIvIwIxIyIzI{I|I}I~IIIIIIIIIII I I I I IIIII~>yyyyyyyyY9ddOO O!O"O#O$ % & ' ()*+,;-;A./01 E2)3)45556*7*8l9l:s;s8?8@8A8B8C8D8E8F8G8H8I8J8K8LnMnNnOnPnQnRnSnTnUnVnWnXnYnZn[n\n]n^n_n`nanbncndnenf g hijk lmno!pQqQrQsQJtRuRvRwR&xKyK(z{5|})~22.dd0N   3O  QMMMMMMMMMMMMMMMMMM M!M"M#M$M%M&M'M(M)M*M+M,M-M.M/M;f<;<=0x1xO2?3?4A5A6A7A8A9AA:A;A<}=}?>>?>@@1A1B1C1D1E1F1G1H1I1J1K1L1M1N4O4P4Q4R4S4T4U4V4W4X4Y4Z4[4 \]B^_ `_a_  bcdefghijkCDpq4rsv t{u{v7w7x7y7z7{7|8}8G3333333333 3 3 3 3HI4[5[6[gqhq"y?yy@yAy yByCy y y yyDyEyyy6y7y#Q$ - 7  F G V W X Y Z [ \ ] ^ _ ` a b c d f e g h i j H I l m n o p q r t s u v w x y z { | }   ~                   J K L M N O P Q          ! " # % & ' ( ) * + , . / 0 1 2 3 4 5 6 R S 9 : ; < = > ? @ A B C T U E F I H G J K L M N O P Q R S T U V W X V W Z [ \ ] ^ ` a _ b X Y d e f g h i j k l m n Z [ p q r \ ] t u v w x y z { ^ _ } ` a    b c                      d e         ! " # $ % & ' ( ) * + , - 2 3 . / 0 1 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L f g h i R N O P S T U X V W Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z j k | } ~    l m                $nyoy%pAqArAsAtAuAvAwAxAyAzA{A|A}A'R~<<*zz+ee,KDD-www w w w w w/mmS1iiLM2DD45F3G3H3I3J3K333L3M3 3!3N3O3P3Q3"3#3R3S3T3U3$3%3V3W3X3Y3&3'3Z3[3\3]3(3)3^3_3h3i3j3k3l3m3T*B+B,B-B67p_8X.]/]0]1]92P3P:4I5I6I7I8I9I:I;Iy?yP /N)xRgRhRY@vAvRBCDEFG=JTKHIJKLMNOPQRCSCTUVCWCUVW0Y0 XKjLjMjNjOjPjQjRjSjTjUjVjWjXjYjZj[j\j]j^j_j`jgjhjijjjZ[KvLvMvNvOvPvQvRvSvTvUvVvWvXvYvZv[v\v]v^v vgvhvivjv\]efgh6ijk&l&\^|?}?~??L_M!!! !`    9 ==cLJoTTX!66:Ggw<<;<<=U?@>#h  abcd m m m m9m22JNSS88:Fgm==;;<=T?y@y>"hmmmegN ! "^#^$^%^&^'^(^)^*^+^,^-^.^/^0^1^2^3^4^5^6^7^8^9^:^;^<^=^hi>#?#@=A=B=C=D#E#F#G#H#I#J#K#L#M#N#O#P#Q#R#S#T#U#]k%O ! "o#o$o%o&o'o(o)o*o+o,o-o.o/o0o1o2o3o6o7o8o9o:o;o<=V?@>+hnnklm p pfp p p9pc`[[Xqhh:I;O55<4~=W!y? @ >-Kvppn^_`opqrbcdefghijklHmHnopHqHsrstuvwxyz{|}~tefgh6ijk*l*uwKKKKKKKKKKKKKKKK K!Kv"C#C$C%C&C'C(C)C*C+C,C-C.C/C0C1C2C3Cx4o5o6N7N8N9N:N;NN?N@NANBNCN|SuTDEUVKuLuMuNuOuPuQuRuSuTuUuVuWuXuYuZu[u\u]u^u uguhuiuju}FGGG~WXJ#K#\LqMqNqOq]PrQr'xRxSxTxUxVxWx^X@Y@Z@[@\@]@@^@_@`@a@b@c@d@e@f@g@h@i@j@k@l@m@n@o@p@q@r@s@t@u@v@w@x@y@z@{@|@}@_}~abcdefghijklmnopqrstuvwxyz{|~-      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxy.z{|}~/     _IIIIuIIa....bAAAAc``d)Y*YhYiYSA  qrccdccc ccc c!cjckclcmckjljmjnjB)C)D)E)F)G)")#)$)%)&@'@(@)@Q)*&+&e`ccf6      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEgF:G:H:I:hJ\K\iLTMTNTOTPTQTjR]S]kTdUdlV(W(X(Y(I(mZ%[%\%]%n^b_boyz{|~    p`abcdeqfghi/jklmnopqrsturvwxyz{t|D}D~DDsu}vw x    yeeeeeez{} !"#|$%&'()~*+,-./0123456789:;<=>?@ A B C D E F G H I J K 8 L M N O P Q R S T U  VWXYZ[\]^_`abcdefghijklmno  pSqS rstuv;w;x;y;zi{i|i}i~ii |Q  !!!!!!!!! ! ! ! ! !!!!!!!!!!!!!!!! ! ! !!! ! !!! !!!"!#!$!%!&!EEEE555555555555 77 cc c!c L L"L#LfL L L9LcjXXXqq:JD&E&)&F=G=*=;F]]<$:%:=X? @ >2K|LLa)#*#h#i#LLcBdBBB B B!BjBkBlBmBLLLL lM&'()e*]+]*],P-P.0/0011112131415161718191:1;1<1=1>K?K@KAKBKCKD1E1F1G1H1I1J1K1L1M1N1O1P1Q1f1R1S1T1U1V1W1X1Y1Z1[1\1]1Y1^1_1`!a!b!c!defghijklmnopqrstuvwxyz{|p}p~pp}}))}}}}}**}++},,}}},}-} } }ZZ}[[}}}y*z*{*|*e*  b//!>>>>>>>>"77#@VV1u2u3u4u5u\u YYY Y!Y"Y#Y$Y%Y&Y'YY(Y)Y*Y+YYYY,Y-Y.Y/Y0Y1Y2Y3Y$4K5K6K7K%8X9X:X;XX?X&@ABC(D<E<F<G<H<I<J<K<L<M<W<'~NO)}*PqQqRqSqTqUqVqWq+X Y Z [ ,\]^q_qkq-`a.rz/b$c$1dwew2_ 38Vcf\g\+\hUiU4jkkk5lDmDnDoDpDqDrDsDtDuDvDwDxDyDzD{D|D}D~DDDDDDDDDDD D D D D DDDDD687YYY86:}}}} }}}}}}}; !="7#7$7%7&7'7(7)7*7+7,7-7.7/7>L?d1 2 3 4 5 6 7 8 sY9 : ;p ? @ ABCD6@E F G H I J K L M N O P Q R STUVWXYZ[\]^A_4`4a4b4cdBefghijklmnopqrstuvwxyzC{h|hE}d~ddddddd#ddd d d : : ::::::::::::nnnnnnn n!.".#.$.%.&.F1RH'R(RG)-*-I+O,OJ-%.%/%0%1%2%3%4%5%6%7%8%9%:%;%<%=%>%?%@%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%W%X%Y%Z%[%\%]%^%_%`%a%b%Kcdefgmhmimjmkmlmmmnmompmqmrmsmtmumvmwmxmymzm{m|m}m~mmm7de--LZZZMQQNCk kO  fHUP;;;;;;;;;;;;;;; ;!;";#;$;%;&;';(;);*;+;Q F FR STUVuuuuiugDDD Dh!a"aW#$%&'o(o)o*oX+E,EY-#.#Z/L0L1L2L3L4L5L6L7]8]9]:];]<]=]>]?^@^[r,s,t,u,v,w,x,y,z,{,|,},~,,,,,,A,B,,,,,, , , ,,,,,,,,,,,,,,,,, ,!,",#,$,%,CBDB\E4F4g4]r(s(t(u(v(w(x(y(z({(|(}(~((((((A(B(((((( ( ( ( ( ((((((((((((((((( (!("(#($(%(&('(GDHDIDJD]D^KyLy_MxNxOxPxQxRx`SgTgaU V W X YmZm[m\mbdTUIV:WX&YGZ<r3>[=Mp]b^b\Z|,  k l m ~70,1]D^x_R`gaEb' .mZi_n`nanbncndnjetftgthtijklmneo&p&q&r&fg}I~IIIII|IIIyh+l,l-l.l?l@l/l0l1l2l3^4^5l6l7^8^9$:$ ;GG?G@GGAGBGiCDjE_F_G_H_I_J_kKvLvMvNvlOoPonQ+R+S+T+mU)V)W)X)ok2pY0Z0q[u\u]u^u_u`uaubusctdtetftgthtitjtrk+l+m+n+o+p+tqrst!xu0v0w0x0yxzx{x|xu}+~+++v____wx]]y    z  {HZIZJZKZkoo|,A-A~e3}ppkkkkkkkk()!efgh6ijk+l+$)Z*ZhZiZcfdfff fff f!fjfkflfmf%Qz\{\efgh6ijk'l'&):*:JJJJJJJJJJJJJJJJ J!JY"B#B$B%B&B'B(B)B*B+B,B-B.B/B0B1B2B3B[+B,B-B.B/ 0 1B2B3B4B5B6B7B8B9 : ;B ? @  }e~eeeeeee#eee e e'ApBp(CoDo) m m m mmm*efgh6ijCHk-l-+rstuvwxyz{|}~#b c d e f g h i j k lImIn o pIqI$+C,C-C.C/ 0 1C2C3C4C5C6C7C8C9 : ;C ? @ %f)g)h)i),CqDq-efgh6ijk,l,.j`k`l`m`n`o`p`q`/efgh6ijk(l(0b!c!d!e!f!g!h!i!j!k!lJmJn!o!pJqJ1/ 0 +E,E-E.E1E2E3E4E5E6E7E8E9 : ;E ? @ &DE'4B5B6B7B8B9BB:B;B2abcdefghijklmnopqrstuvwxyz{|}~~-      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxy.z{|}~/3~~)~~~~~*~+~,~~~,~-~ ~ ~Z~[~~~)+g5E5F5*_5`5a5b54%$&$'$($)$*$+$,$-$.$/$0$1$2$3$4$5$6$7$8$9$:$;$<$=$>$?$@$A$B$C$D$E$F$G$H$I$J$K$L$M$N$O$P$Q$R$S$T$U$V$W$X$Y$Z$[$\$e`f`g`h`i`j`k`l`m`n`o`p`q`r`s`t`u`v`w`x`y`z`{`|`}`~```6JJJJuJJ-KkLkMkNkOkPkQkRkSkTkUkVkWkXkYkZk[k\k]k^k_k`kgkhkikjk8)[*[h[i[cgdggg ggg g!gjgkglgmg0v1pEqEEEEElEmEnEoErEsEtEuEvEwExEyEzE{E|E}E~EEEEEEE E E E E EEEEE2~~~~~~ ~~~~~3LrMrNrOr5nzoz7;HH?H@HHAHBH8BCDEFG:LLLLLLLLLLLLLLLL L!L<"D#D$D%D&D'D(D)D*D+D,D-D.D/D0D1D2D3D=CrDr?>.?.@.A.@666666666666AAsBsBFNGN']csdsesfsgshsisjsiMtNtOtPtQtRtj2H5I5J5K5L5M5N5O5P5Q5R5S5T5U5V5W5X5Y5Z5[5\5]5^5_5`5a5b5c5d5e5f5g5h5i5j5k5l5m5n5o5p5q5K5VCHDHyAHBHrstuvwxyz{89|}>vzG{G|G}Gu]a? #s ~                ,`jBuuu u!u"m#m$m%m&n'n(n)n=*>+>,>->.>/>0>1>2>3>4>5>6>7>`A<B<09&v'v<i`D8 9 : ; < = > ? @ A B C cDEFGHIJKAtBtC>z?zz@zAz zBzCz ? @ 9b"c"d"e"f"g"h"i"j"k"lKmKn"o"pKqK:K~L~M~N~O~P~Q~R~H!#"#< d dICIDIFAIBIGA=B=;""""""""" " " " " """""""""""""""" " " """ " """ "!"""#"$"%"&"=nL"M"o>: ; 8 9 < = > ? @ A B C ?jakalamanaoapaqaJ+G,G-G.G/01G2G3G4G5G6G7G8G9:;G?@@>$?$D$E$F$G$H$I$J$K$L$M$N$O$P$Q$R$S$T$U$KCvDvLAuBuM e eAb{c{d{e{f{g{h{i{NefB6+7+OKKKKuKKpCNmOmDU V W X EjFkFlFmFnFoFpFqFaFRb#c#d#e#f#g#h#i#j#k#lLmLn#o#pLqLFAkBkPMMMMMMMMMMMMMMMM M!MQP?Q?R?S?T?U?V?W?X?Y?Z?[?\?]?^?_?`?a?P@Q@R@S@T@U@V@W@X@Y@Z@[@\@]@^@_@`@a@W> a--SVXWXTST WXY'Z'!K"z#K+$'%/&!'w,F(])_*tefg8h8-NUbcHooooooo oTdzezK<<<<<<<<<<<<<<< <!<"<#<$<%<&<'<(<)<*<+<L[[[O&w'wRqqUjbkblbmbnbobpbqbV/^0^`NBOBG8Yq@ A B C D E F G H I J K 8 L M N O P Q R S T U IZZZJHHM*** *Nf~g~PhiQVxxx x x x x xWXLLLLuLLYb$c$d$e$f$g$h$i$j$k$lMmMn$o$pMqMZ+H,H-H.H/01H2H3H4H5H6H7H8H9:;H?@[z_{_\NNNNNNNNNNNNNNNN N!N]"E#E$E%E&E'E(E)E*E+E,E-E.E/E0E1E2E3E^rstuvwxyz{89|}_CmDmXAlBlY>{?{{@{A{ {B{C{<{={ { { {{D{E{{{6{7{Z9 : ; < SKLMNOPQR`jckclcmcncocpcqc\ACBC^F G V W X Y Z [ \ ] ^ _ ` a b c d f e g h i j H I l m n o p q r t s u v w x y z { | }   ~                   J K L M N O P Q           ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 7 6 R S 9 : ; < = > ? @ A B C T U E F I H G J K L M N O P Q R S T U V W X V W Z [ \ ] ^ ` a _ b X Y d e f g h i j k l m n Z [ p q r \ ] t u v w x y z { ^ _ } ` a    b c                      d e         ! " # $ % & ' ( ) * + , - 2 3 . / 0 1 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L f g h i R N O P S T U X V W Y Z [ \ ] ^ _ ` a b 0 c d e f g h i j k l m n o p q r s t u v w x y z j k | } ~    l m                cefl8Y9Y:Y;YY?Yg>i?iej9k9l9m9n9o9dGHIJ0e~NOg]]]]]]]]]]&]]]]]]] ]!]"]#]$]%]&]'](])]4]m}m~mmmpmqmmm|mmmXmljdkdldmdndodpdqdoCEDEq!$"$prstuvwxyz{89|}nAEBEr#W$W%W&Ws7O8OuAnBnt..xj+k+fQ,R,S,T,[b%c%d%e%f%g%h%i%j%k%lNmNn%o%pNqN]CCDC_+I,I-I.I/01I2I3I4I5I6I7I8I9:;I?@arLsLtLuLvLwLILxLyLbm*n*o*p*b);*;c_6`6a6b6dLtMtNtOtfMMMMuMMh8Zib&c&d&e&f&g&h&i&j&k&lOmOn&o&pOqOj+J,J-J.J/01J2J3J4J5J6J7J8J9:;J?@k+K,K-K.K/01K2K3K4K5K6K7K8K9:;K?@hb'c'd'e'f'g'h'i'j'k'lPmPn'o'pPqPiADBDjCDDDk >>>>>>>>>>>yb)c)d)e)f)g)h)i)j)k)lRmRn)o)pRqR|CGDG}8Z9Z:Z;ZZ?Z_7`7a7b7 | |||CFDFzAFBF{AGBG~efm*z+zn  t`aopz`{`q)<*<r"F#F$F%F&F'F(F)F*F+F,F-F.F/F0F1F2F3Fs+D,D-D.D/01D2D3D4D5D6D7D8D9:;D?@vb(c(d(e(f(g(h(i(j(k(lQmQn(o(pQqQw[\]^_`abb*c*d*e*f*g*h*i*j*k*lSmSn*o*pSqScPdPePfPv/_0_wz{:;*}+}y|}(~u9988r)=*=x8[9[:[;[<[=[>[?[jekelemeneoepeqe./ b|c|d|e|f|g|h|i| >%?%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U% z^p_pkp j,k, KLMNOPQR2o[\]^_`abk$l$m$n${{>&?&D&E&F&G&H&I&J&K&L&M&N&O&P&Q&R&S&T&U&1{2{3{4{5{\{{LLLL/0LL3L4LLLL L   L L?@CDb+c+d+e+f+g+h+i+j+k+lTmTn+o+pTqT+0,0-0.01020506070809Y:Y;0<0=Y>YMMMM/0MM3M4MMMM M   M M?@UVWX !CD"AB#dabcefghijklmnopqrstuvwxyz{|}~~-      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxy.z{|}~/$ef/`0`]b||OO OOOOOOOOBB9:%77&ZZZZZZZZZZ&ZZZZZZZ Z!Z"Z#Z$Z%Z&Z'Z(Z)Z4Z*b}c}d}e}f}g}h}i}+OmPm'b,c,d,e,f,g,h,i,j,k,lUmUn,o,pUqU VVVVVV/&0&VV3V4VVVV VVV & &&& V V&&?&@& +1,1-1.11121516171819Z:Z;1<1=Z>Z CD /N0N1N2N3N4N5N6N(}n~nnnpnqnnn|nnnXn)C{D{/rstuvwxyz{89|},OOOOOOOO O!O"O#O$O%O&O'O(O)O.A|B|0"G#G$G%G&G'G(G)G*G+G,G-G.G/G0G1G2G3G-bb1 2 } }}}4F%G%3ssDE ???????????F 8Gz{:;H> t    I]cJcQdQeQfQK>j?jE*+K[[[[[[[[[[&[[[[[[[ [!["[#[$[%[&['[([)[4[Lqrstuvwxyz{|}~QijklNPKLMNOPQRScRdReRfRS  TPP PPPP&Q'Q(Q)QeQ.Q/Q0Q1QPPPP 991hDIEIFIGIJIKI{h2h3h4h5h\h5z?z)>*>######### # # # # ################ # # ### # ### #!#"###$#%#&#78\9\:\;\<\=\>\?\MuNuOuPuQuRu6bs(s2u3u4u5u>,?,@,A,8NNNNuNN'G6W7W8W9W:W;Wjgkglgmgngogpgqg9i:\]^_<=O?O@OAOBOCODOEOFO!n"n-.<~NOO O=;l?@ABCDEF>F?F@FAFBFCFDFEFFFGFHFIFJFKFLFMFNFOFPFQFRFSFTFUFVFWFXFYFZF[F\F]F^F_FFFFF R S #=>"||!|}(~s8`%J K $NN&o'p'q'r''~jjzj{j|j}j(zR{R)    *Cl l, `a+*=+=,=-=.=/=0=1=2=3=4=5=6=7=.v>[r-GHIJ0034/ij?.@/@A_8`8a8b8@bcccBRR21_3FF12,3,,O,4de5frgr7q 8hi6l~m~9#@$@%@&@Cne:&&& &;GVDL=UVSTWXYZ[\]^<c d >}}?7^8^9^:^;^<^=^>^@ AUUBBCFGCEFGHIJKLMNOPFlJmJnJoJpJqJjJkJrJsJtJuJvJwJxJyJzJ{J|J}J~JJJJJJJJJJJ J J J J JLl2m2M>'?'D'E'F'G'H'I'J'K'L'M'N'O'P'Q'R'S'T'U'N GaaO     6 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEH9:PggngogId-e-b-c-f-g-h-i-j-k-lVmVn-o-pVqVR+2,2-2.21222526272829[:[;2<2=[>[MQROWWWWWW/'0'WW3W4WWWW WWW ' ''' W W''?'@'QFGGGRA>B>T[\]^_`abUCJDJVAJBJWC}D}XTyUyVyWy'yRySyYMvNvOvPvQvRvZA~B~[>|?||@|A| |B|C|<|=| | | ||D|E|||6|7|\EFGHIJKLMNOPU-.]66666 66666666666 6!6"6#6$6%6&6'6(6)6*6+6VW~NOXGW^OOOOuOOY"?"D"E"F"G"H"I"L"M"N"O"P"Q"R"S"T"U"^CLDLiALBLjKLMNOPQRpyzf     6 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEkpNqNrNsNtNuN^NvNwNlrMsMtMuMvMwMIMxMyMm[v\v]v^v_v`vavbvnGHIJ0_xByBzB{B|B}B` abc~""""d7_8_9_:_;_<_=_>_o5eFHGHqDJEJFJGJJJKJrhhnhohsQ-R-S-T-tAMBMuCMDMvf.g.b.c.d.e.h.i.j.k.lWmWn.o.pWqWwUUUUUU/)0)UU3U4UUUU UUU ) ))) U U))?)@)xCDyABz"H#H$H%H&H'H(H)H*H+H,H-H.H/H0H1H2H3H|QQQQQQQQ Q!Q"Q#Q$Q%Q&Q'Q(Q)Q~IIIIIIIIIIIIIIII I!I}rstuvwxyz{89|}{iinioi> gAAAAAAA AyCNDNANBNE F G H I J K L M N O P Q R )5*5!/"/#/$/%/&/|}(~u_:`:a:b:qrst!yuyvywyxyy0z0{1|1vpOqOrOsOtOuO^OvOwOrJsJtJuJvJwJIJxJyJ8awpkj crdrerfrgrhrirjrhMwNwOwPwQwRwi9: ?_@_  S S S Sxjk//lffffffffztt[[     2-3--O-mOO O!O/ 0 "O#O3O4O$O%O&O'O( ) *O+O, - ? @ {  b/c/d/e/f/g/h/i/j/k/lXmXn/o/pXqXn  o ooo  ooojhkhlhmhnhohphqh QQQQQQQQQQpKLMNOPQR*+~ f fpiqijikiliminioiA B C D A@B@|"P#PPP P!P/!0!3P4P$P%P&P'P(!)!*P+P,!-!?!@!}rKsKtKuKvKwKIKxKyKpPqPrPsPtPuP^PvPwP#K$K%K&KKKKK>!?!D!E!F!G!H!I!J!K!L!M!N!O!P!Q!R!S!T!U! @@@@@@@@@@@C D jjkjljmjnjojpjqj7M8MBCFGA B m4n4 ~ ~~~Juu> uqrstuvwxyz{|}~$  p ppp  ppQQ Q!Q/"0""Q#Q3Q4Q$Q%Q&Q'Q(")"*Q+Q,"-"?"@"jjnjojRRRRRRRR R!R"R#R$R%R&R'R(R)RGXk"|LUMUNUOUPUQUq)?*?rC@D@K2L2s77777 77777777777 7!7"7#7$7%7&7'7(7)7*7+7t/M0M1M2M3M4M5M6MFIGI .p/p0p1p2p3p4p5p!CODO"AOBO#>N?N@NANBNCNDNENFNGNHNINJNKNLNMNNNONPNQNRNSNTNUNVNWNXNYNZN[N\N]N^N_N%RR R!R/#0#"R#R3R4R$R%R&R'R(#)#*R+R,#-#?#@#v     }6G7G8G9G:G;GG?G@GAGBGCGDGEGFGGGHGIGJGKGLGMGNGOGPGQGRGSGTGUGVGWGGGGG&  q qqq  qqw  '  x\\\\\\\\\\&\\\\\\\ \!\"\#\$\%\&\'\(\)\4\(}o~ooopoqooo|oooXo)pPqPrPsP*  y4p/p3p8p6,x1,n.5*Lp7*2*.JpKpF*G*H*IpEBpCpDpAp@p?=p;p:p<*9>0-;NOPSTUVYZ[XABCDEFHIJKLMRX]^ABCDEFHIJKLMR]^lJ<~ HB[BBBBBKBBBBTDBBBDFBBBBFBBBBBFBBBDBBBBeBBJBBHDBBBBBBBBBBHBBBHQBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbugfixperl:5.24 bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=16899121689912https://bugzilla.redhat.com/show_bug.cgi?id=16907731690773https://bugzilla.redhat.com/show_bug.cgi?id=16912791691279https://bugzilla.redhat.com/show_bug.cgi?id=16999581699958https://errata.rockylinux.org/RLBA-2019:3337RLBA-2019:3337RLBA-2019:3337 ]KYm-Ur$3fx~sCEwR ]hperl-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm7Cperl-Algorithm-Diff-1.1903-10.module+el8.6.0+878+f93dfff7.noarch.rpm3kperl-Archive-Tar-2.30-2.module+el8.6.0+882+2fa1e48f.noarch.rpm perl-Attribute-Handlers-0.99-404.module+el8.6.0+882+2fa1e48f.noarch.rpm4 perl-Archive-Zip-1.59-5.module+el8.6.0+882+2fa1e48f.noarch.rpmvNperl-autodie-2.29-1001.module+el8.6.0+878+f93dfff7.noarch.rpmbperl-B-Debug-1.24-3.module+el8.6.0+882+2fa1e48f.noarch.rpmw perl-bignum-0.49-3.module+el8.6.0+882+2fa1e48f.noarch.rpmCperl-Carp-1.40-367.module+el8.6.0+882+2fa1e48f.noarch.rpmDzperl-Compress-Bzip2-2.26-7.module+el8.6.0+878+f93dfff7.x86_64.rpmE perl-Compress-Raw-Bzip2-2.074-2.module+el8.6.0+882+2fa1e48f.x86_64.rpmF perl-Compress-Raw-Zlib-2.074-2.module+el8.6.0+882+2fa1e48f.x86_64.rpmGperl-Config-Perl-V-0.27-3.module+el8.6.0+882+2fa1e48f.noarch.rpmMFperl-constant-1.33-1001.module+el8.6.0+878+f93dfff7.noarch.rpm bperl-core-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm5\perl-CPAN-2.16-2.module+el8.6.0+882+2fa1e48f.noarch.rpm8Qperl-CPAN-Meta-2.150010-397.module+el8.6.0+878+f93dfff7.noarch.rpm9Pperl-CPAN-Meta-Requirements-2.140-397.module+el8.6.0+878+f93dfff7.noarch.rpm:7perl-CPAN-Meta-YAML-0.018-1001.module+el8.6.0+878+f93dfff7.noarch.rpmIIperl-Data-Dumper-2.161-5.module+el8.6.0+882+2fa1e48f.x86_64.rpm;9perl-Data-OptList-0.110-7.module+el8.6.0+878+f93dfff7.noarch.rpmJzperl-Data-Section-0.200006-9.module+el8.6.0+882+2fa1e48f.noarch.rpmHbperl-DB_File-1.842-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm:hperl-devel-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm58perl-Devel-Peek-1.23-404.module+el8.6.0+882+2fa1e48f.x86_64.rpmK@perl-Devel-PPPort-3.36-6.module+el8.6.0+882+2fa1e48f.x86_64.rpm!Hperl-Devel-SelfStubber-1.05-404.module+el8.6.0+882+2fa1e48f.noarch.rpmLfperl-Devel-Size-0.81-3.module+el8.6.0+882+2fa1e48f.x86_64.rpmMOperl-Digest-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpmN perl-Digest-MD5-2.55-397.module+el8.6.0+878+f93dfff7.x86_64.rpmOjperl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.x86_64.rpmPAperl-Encode-2.88-7.module+el8.6.0+882+2fa1e48f.x86_64.rpmQAperl-Encode-devel-2.88-7.module+el8.6.0+882+2fa1e48f.x86_64.rpmxxperl-encoding-2.19-7.module+el8.6.0+882+2fa1e48f.x86_64.rpm<@perl-Env-1.04-396.module+el8.6.0+878+f93dfff7.noarch.rpmV%perl-Errno-1.25-404.module+el8.6.0+882+2fa1e48f.x86_64.rpmJeperl-experimental-0.019-3.module+el8.6.0+882+2fa1e48f.noarch.rpm6Rperl-Exporter-5.72-1001.module+el8.6.0+882+2fa1e48f.noarch.rpm7,perl-ExtUtils-CBuilder-0.280225-367.module+el8.6.0+882+2fa1e48f.noarch.rpm8_perl-ExtUtils-Command-7.24-4.module+el8.6.0+882+2fa1e48f.noarch.rpm"xperl-ExtUtils-Embed-1.33-404.module+el8.6.0+882+2fa1e48f.noarch.rpm9Pperl-ExtUtils-Install-2.04-368.module+el8.6.0+882+2fa1e48f.noarch.rpm;_perl-ExtUtils-MakeMaker-7.24-4.module+el8.6.0+882+2fa1e48f.noarch.rpm<perl-ExtUtils-Manifest-1.70-396.module+el8.6.0+882+2fa1e48f.noarch.rpm#Hperl-ExtUtils-Miniperl-1.05-404.module+el8.6.0+882+2fa1e48f.noarch.rpm:_perl-ExtUtils-MM-Utils-7.24-4.module+el8.6.0+882+2fa1e48f.noarch.rpmR<perl-ExtUtils-ParseXS-3.31-369.module+el8.6.0+882+2fa1e48f.noarch.rpm=6perl-Fedora-VSP-0.001-10.module+el8.6.0+878+f93dfff7.noarch.rpmS(perl-File-Fetch-0.56-3.module+el8.6.0+878+f93dfff7.noarch.rpmT(perl-File-HomeDir-1.00-14.module+el8.6.0+882+2fa1e48f.noarch.rpmUZperl-File-Path-2.12-368.module+el8.6.0+882+2fa1e48f.noarch.rpm=}perl-File-Temp-0.230.600-2.module+el8.6.0+882+2fa1e48f.noarch.rpmVWperl-File-Which-1.21-4.module+el8.6.0+882+2fa1e48f.noarch.rpmWperl-Filter-1.58-3.module+el8.6.0+882+2fa1e48f.x86_64.rpm>perl-Filter-Simple-0.92-367.module+el8.6.0+882+2fa1e48f.noarch.rpm?perl-generators-1.10-10.module+el8.6.0+882+2fa1e48f.noarch.rpm?sperl-Getopt-Long-2.49.1-3.module+el8.6.0+882+2fa1e48f.noarch.rpmypperl-homedir-2.000023-2.module+el8.6.0+882+2fa1e48f.noarch.rpm@jperl-HTTP-Tiny-0.074-2.module+el8.6.0+882+2fa1e48f.noarch.rpmNVperl-inc-latest-0.500-10.module+el8.6.0+878+f93dfff7.noarch.rpm`hperl-interpreter-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpmX;perl-IO-1.36-404.module+el8.6.0+882+2fa1e48f.x86_64.rpmA perl-IO-Compress-2.074-2.module+el8.6.0+882+2fa1e48f.noarch.rpmX%perl-IO-Socket-IP-0.39-6.module+el8.6.0+878+f93dfff7.noarch.rpm>3perl-IO-Zlib-1.10-404.module+el8.6.0+882+2fa1e48f.noarch.rpmY2perl-IPC-Cmd-0.98-2.module+el8.6.0+882+2fa1e48f.noarch.rpm[:perl-IPC-System-Simple-1.25-18.module+el8.6.0+878+f93dfff7.noarch.rpmZlperl-IPC-SysV-2.07-398.module+el8.6.0+878+f93dfff7.x86_64.rpm\perl-JSON-PP-2.94000-2.module+el8.6.0+882+2fa1e48f.noarch.rpmzWperl-libnet-3.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm+hperl-libnetcfg-5.24.4-404.module+el8.6.0+882+2fa1e48f.noarch.rpmahperl-libs-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm0perl-Locale-Codes-3.42-3.module+el8.6.0+882+2fa1e48f.noarch.rpm]lperl-Locale-Maketext-1.28-397.module+el8.6.0+882+2fa1e48f.noarch.rpm$%perl-Locale-Maketext-Simple-0.21-404.module+el8.6.0+882+2fa1e48f.noarch.rpm{pperl-local-lib-2.000023-2.module+el8.6.0+882+2fa1e48f.noarch.rpmOhperl-macros-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm_9perl-Math-BigInt-1.9998.11-6.module+el8.6.0+882+2fa1e48f.noarch.rpm`\perl-Math-BigInt-FastCalc-0.500.600-7.module+el8.6.0+882+2fa1e48f.x86_64.rpm@<perl-Math-BigRat-0.2614-2.module+el8.6.0+878+f93dfff7.noarch.rpmA perl-Math-Complex-1.59-404.module+el8.6.0+882+2fa1e48f.noarch.rpm%-perl-Memoize-1.03-404.module+el8.6.0+882+2fa1e48f.noarch.rpm^pperl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.x86_64.rpmBperl-Module-Build-0.42.24-6.module+el8.6.0+882+2fa1e48f.noarch.rpmCmperl-Module-CoreList-5.20180414-2.module+el8.6.0+882+2fa1e48f.noarch.rpmDmperl-Module-CoreList-tools-5.20180414-2.module+el8.6.0+882+2fa1e48f.noarch.rpmE/perl-Module-Load-0.32-396.module+el8.6.0+882+2fa1e48f.noarch.rpmFperl-Module-Load-Conditional-0.68-396.module+el8.6.0+882+2fa1e48f.noarch.rpm&perl-Module-Loaded-0.08-404.module+el8.6.0+882+2fa1e48f.noarch.rpma*perl-Module-Metadata-1.000033-396.module+el8.6.0+882+2fa1e48f.noarch.rpm?:perl-MRO-Compat-0.13-5.module+el8.6.0+878+f93dfff7.noarch.rpm'rperl-Net-Ping-2.43-404.module+el8.6.0+882+2fa1e48f.noarch.rpm,Aperl-open-1.10-404.module+el8.6.0+882+2fa1e48f.noarch.rpmBAperl-Package-Generator-1.106-12.module+el8.6.0+878+f93dfff7.noarch.rpmCIperl-Params-Check-0.38-396.module+el8.6.0+878+f93dfff7.noarch.rpmbperl-Params-Util-1.07-23.module+el8.6.0+878+f93dfff7.x86_64.rpm|Cperl-parent-0.237-2.module+el8.6.0+878+f93dfff7.noarch.rpmcQperl-PathTools-3.63-368.module+el8.6.0+882+2fa1e48f.x86_64.rpmKKperl-perlfaq-5.20180605-2.module+el8.6.0+882+2fa1e48f.noarch.rpmd perl-PerlIO-via-QuotedPrint-0.08-396.module+el8.6.0+878+f93dfff7.noarch.rpmD?perl-Perl-OSType-1.010-397.module+el8.6.0+878+f93dfff7.noarch.rpmeaperl-Pod-Checker-1.73-396.module+el8.6.0+878+f93dfff7.noarch.rpmEJperl-Pod-Escapes-1.07-396.module+el8.6.0+878+f93dfff7.noarch.rpm([perl-Pod-Html-1.22.01-404.module+el8.6.0+882+2fa1e48f.noarch.rpmL;perl-podlators-4.09-4.module+el8.6.0+882+2fa1e48f.noarch.rpmFHperl-Pod-Parser-1.63-1001.module+el8.6.0+878+f93dfff7.noarch.rpmG$perl-Pod-Perldoc-3.28-397.module+el8.6.0+882+2fa1e48f.noarch.rpmH=perl-Pod-Simple-3.35-396.module+el8.6.0+882+2fa1e48f.noarch.rpmf`perl-Pod-Usage-1.69-396.module+el8.6.0+878+f93dfff7.noarch.rpmg\perl-Scalar-List-Utils-1.48-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm)8perl-SelfLoader-1.23-404.module+el8.6.0+882+2fa1e48f.noarch.rpmhvperl-Socket-2.027-4.module+el8.6.0+882+2fa1e48f.x86_64.rpmipperl-Software-License-0.103012-5.module+el8.6.0+882+2fa1e48f.noarch.rpmj perl-Storable-2.56-369.module+el8.6.0+882+2fa1e48f.x86_64.rpmk*perl-Sub-Exporter-0.987-16.module+el8.6.0+878+f93dfff7.noarch.rpmG>perl-Sub-Install-0.928-15.module+el8.6.0+878+f93dfff7.noarch.rpmlKperl-Sys-Syslog-0.35-398.module+el8.6.0+882+2fa1e48f.x86_64.rpmm^perl-Term-ANSIColor-4.06-397.module+el8.6.0+878+f93dfff7.noarch.rpmHOperl-Term-Cap-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm*mperl-Test-1.28-404.module+el8.6.0+882+2fa1e48f.noarch.rpmIMperl-Test-Harness-3.42-2.module+el8.6.0+878+f93dfff7.noarch.rpm}hperl-tests-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpmI6perl-Test-Simple-1.302086-2.module+el8.6.0+882+2fa1e48f.noarch.rpmnJperl-Text-Balanced-2.03-396.module+el8.6.0+878+f93dfff7.noarch.rpmoperl-Text-Diff-1.44-4.module+el8.6.0+882+2fa1e48f.noarch.rpmJ8perl-Text-Glob-0.11-5.module+el8.6.0+878+f93dfff7.noarch.rpmK\perl-Text-ParseWords-3.30-396.module+el8.6.0+878+f93dfff7.noarch.rpmLTperl-Text-Tabs+Wrap-2013.0523-396.module+el8.6.0+878+f93dfff7.noarch.rpmpperl-Text-Template-1.47-2.module+el8.6.0+882+2fa1e48f.noarch.rpmqXperl-Thread-Queue-3.13-2.module+el8.6.0+878+f93dfff7.noarch.rpm~perl-threads-2.21-3.module+el8.6.0+882+2fa1e48f.x86_64.rpmKperl-threads-shared-1.58-3.module+el8.6.0+882+2fa1e48f.x86_64.rpm8hperl-Time-HiRes-1.9753-2.module+el8.6.0+882+2fa1e48f.x86_64.rpmrEperl-Time-Local-1.280-2.module+el8.6.0+878+f93dfff7.noarch.rpm96perl-Time-Piece-1.31-404.module+el8.6.0+882+2fa1e48f.x86_64.rpmt!perl-Unicode-Collate-1.20-2.module+el8.6.0+882+2fa1e48f.x86_64.rpmu$perl-Unicode-Normalize-1.25-1001.module+el8.6.0+882+2fa1e48f.x86_64.rpmsperl-URI-1.71-7.module+el8.6.0+882+2fa1e48f.noarch.rpm-bperl-utils-5.24.4-404.module+el8.6.0+882+2fa1e48f.noarch.rpmperl-version-0.99.24-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm-perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm!perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm"perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm#perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm$perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm2perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpmrrperl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm3perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpmsiperl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpmwperl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm]KYm ]hperl-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm7Cperl-Algorithm-Diff-1.1903-10.module+el8.6.0+878+f93dfff7.noarch.rpm3kperl-Archive-Tar-2.30-2.module+el8.6.0+882+2fa1e48f.noarch.rpm perl-Attribute-Handlers-0.99-404.module+el8.6.0+882+2fa1e48f.noarch.rpm4 perl-Archive-Zip-1.59-5.module+el8.6.0+882+2fa1e48f.noarch.rpmvNperl-autodie-2.29-1001.module+el8.6.0+878+f93dfff7.noarch.rpmbperl-B-Debug-1.24-3.module+el8.6.0+882+2fa1e48f.noarch.rpmw perl-bignum-0.49-3.module+el8.6.0+882+2fa1e48f.noarch.rpmCperl-Carp-1.40-367.module+el8.6.0+882+2fa1e48f.noarch.rpmDzperl-Compress-Bzip2-2.26-7.module+el8.6.0+878+f93dfff7.x86_64.rpmE perl-Compress-Raw-Bzip2-2.074-2.module+el8.6.0+882+2fa1e48f.x86_64.rpmF perl-Compress-Raw-Zlib-2.074-2.module+el8.6.0+882+2fa1e48f.x86_64.rpmGperl-Config-Perl-V-0.27-3.module+el8.6.0+882+2fa1e48f.noarch.rpmMFperl-constant-1.33-1001.module+el8.6.0+878+f93dfff7.noarch.rpm bperl-core-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm5\perl-CPAN-2.16-2.module+el8.6.0+882+2fa1e48f.noarch.rpm8Qperl-CPAN-Meta-2.150010-397.module+el8.6.0+878+f93dfff7.noarch.rpm9Pperl-CPAN-Meta-Requirements-2.140-397.module+el8.6.0+878+f93dfff7.noarch.rpm:7perl-CPAN-Meta-YAML-0.018-1001.module+el8.6.0+878+f93dfff7.noarch.rpmIIperl-Data-Dumper-2.161-5.module+el8.6.0+882+2fa1e48f.x86_64.rpm;9perl-Data-OptList-0.110-7.module+el8.6.0+878+f93dfff7.noarch.rpmJzperl-Data-Section-0.200006-9.module+el8.6.0+882+2fa1e48f.noarch.rpmHbperl-DB_File-1.842-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm:hperl-devel-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm58perl-Devel-Peek-1.23-404.module+el8.6.0+882+2fa1e48f.x86_64.rpmK@perl-Devel-PPPort-3.36-6.module+el8.6.0+882+2fa1e48f.x86_64.rpm!Hperl-Devel-SelfStubber-1.05-404.module+el8.6.0+882+2fa1e48f.noarch.rpmLfperl-Devel-Size-0.81-3.module+el8.6.0+882+2fa1e48f.x86_64.rpmMOperl-Digest-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpmN perl-Digest-MD5-2.55-397.module+el8.6.0+878+f93dfff7.x86_64.rpmOjperl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.x86_64.rpmPAperl-Encode-2.88-7.module+el8.6.0+882+2fa1e48f.x86_64.rpmQAperl-Encode-devel-2.88-7.module+el8.6.0+882+2fa1e48f.x86_64.rpmxxperl-encoding-2.19-7.module+el8.6.0+882+2fa1e48f.x86_64.rpm<@perl-Env-1.04-396.module+el8.6.0+878+f93dfff7.noarch.rpmV%perl-Errno-1.25-404.module+el8.6.0+882+2fa1e48f.x86_64.rpmJeperl-experimental-0.019-3.module+el8.6.0+882+2fa1e48f.noarch.rpm6Rperl-Exporter-5.72-1001.module+el8.6.0+882+2fa1e48f.noarch.rpm7,perl-ExtUtils-CBuilder-0.280225-367.module+el8.6.0+882+2fa1e48f.noarch.rpm8_perl-ExtUtils-Command-7.24-4.module+el8.6.0+882+2fa1e48f.noarch.rpm"xperl-ExtUtils-Embed-1.33-404.module+el8.6.0+882+2fa1e48f.noarch.rpm9Pperl-ExtUtils-Install-2.04-368.module+el8.6.0+882+2fa1e48f.noarch.rpm;_perl-ExtUtils-MakeMaker-7.24-4.module+el8.6.0+882+2fa1e48f.noarch.rpm<perl-ExtUtils-Manifest-1.70-396.module+el8.6.0+882+2fa1e48f.noarch.rpm#Hperl-ExtUtils-Miniperl-1.05-404.module+el8.6.0+882+2fa1e48f.noarch.rpm:_perl-ExtUtils-MM-Utils-7.24-4.module+el8.6.0+882+2fa1e48f.noarch.rpmR<perl-ExtUtils-ParseXS-3.31-369.module+el8.6.0+882+2fa1e48f.noarch.rpm=6perl-Fedora-VSP-0.001-10.module+el8.6.0+878+f93dfff7.noarch.rpmS(perl-File-Fetch-0.56-3.module+el8.6.0+878+f93dfff7.noarch.rpmT(perl-File-HomeDir-1.00-14.module+el8.6.0+882+2fa1e48f.noarch.rpmUZperl-File-Path-2.12-368.module+el8.6.0+882+2fa1e48f.noarch.rpm=}perl-File-Temp-0.230.600-2.module+el8.6.0+882+2fa1e48f.noarch.rpmVWperl-File-Which-1.21-4.module+el8.6.0+882+2fa1e48f.noarch.rpmWperl-Filter-1.58-3.module+el8.6.0+882+2fa1e48f.x86_64.rpm>perl-Filter-Simple-0.92-367.module+el8.6.0+882+2fa1e48f.noarch.rpm?perl-generators-1.10-10.module+el8.6.0+882+2fa1e48f.noarch.rpm?sperl-Getopt-Long-2.49.1-3.module+el8.6.0+882+2fa1e48f.noarch.rpmypperl-homedir-2.000023-2.module+el8.6.0+882+2fa1e48f.noarch.rpm@jperl-HTTP-Tiny-0.074-2.module+el8.6.0+882+2fa1e48f.noarch.rpmNVperl-inc-latest-0.500-10.module+el8.6.0+878+f93dfff7.noarch.rpm`hperl-interpreter-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpmX;perl-IO-1.36-404.module+el8.6.0+882+2fa1e48f.x86_64.rpmA perl-IO-Compress-2.074-2.module+el8.6.0+882+2fa1e48f.noarch.rpmX%perl-IO-Socket-IP-0.39-6.module+el8.6.0+878+f93dfff7.noarch.rpm>3perl-IO-Zlib-1.10-404.module+el8.6.0+882+2fa1e48f.noarch.rpmY2perl-IPC-Cmd-0.98-2.module+el8.6.0+882+2fa1e48f.noarch.rpm[:perl-IPC-System-Simple-1.25-18.module+el8.6.0+878+f93dfff7.noarch.rpmZlperl-IPC-SysV-2.07-398.module+el8.6.0+878+f93dfff7.x86_64.rpm\perl-JSON-PP-2.94000-2.module+el8.6.0+882+2fa1e48f.noarch.rpmzWperl-libnet-3.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm+hperl-libnetcfg-5.24.4-404.module+el8.6.0+882+2fa1e48f.noarch.rpmahperl-libs-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm0perl-Locale-Codes-3.42-3.module+el8.6.0+882+2fa1e48f.noarch.rpm]lperl-Locale-Maketext-1.28-397.module+el8.6.0+882+2fa1e48f.noarch.rpm$%perl-Locale-Maketext-Simple-0.21-404.module+el8.6.0+882+2fa1e48f.noarch.rpm{pperl-local-lib-2.000023-2.module+el8.6.0+882+2fa1e48f.noarch.rpmOhperl-macros-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpm_9perl-Math-BigInt-1.9998.11-6.module+el8.6.0+882+2fa1e48f.noarch.rpm`\perl-Math-BigInt-FastCalc-0.500.600-7.module+el8.6.0+882+2fa1e48f.x86_64.rpm@<perl-Math-BigRat-0.2614-2.module+el8.6.0+878+f93dfff7.noarch.rpmA perl-Math-Complex-1.59-404.module+el8.6.0+882+2fa1e48f.noarch.rpm%-perl-Memoize-1.03-404.module+el8.6.0+882+2fa1e48f.noarch.rpm^pperl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.x86_64.rpmBperl-Module-Build-0.42.24-6.module+el8.6.0+882+2fa1e48f.noarch.rpmCmperl-Module-CoreList-5.20180414-2.module+el8.6.0+882+2fa1e48f.noarch.rpmDmperl-Module-CoreList-tools-5.20180414-2.module+el8.6.0+882+2fa1e48f.noarch.rpmE/perl-Module-Load-0.32-396.module+el8.6.0+882+2fa1e48f.noarch.rpmFperl-Module-Load-Conditional-0.68-396.module+el8.6.0+882+2fa1e48f.noarch.rpm&perl-Module-Loaded-0.08-404.module+el8.6.0+882+2fa1e48f.noarch.rpma*perl-Module-Metadata-1.000033-396.module+el8.6.0+882+2fa1e48f.noarch.rpm?:perl-MRO-Compat-0.13-5.module+el8.6.0+878+f93dfff7.noarch.rpm'rperl-Net-Ping-2.43-404.module+el8.6.0+882+2fa1e48f.noarch.rpm,Aperl-open-1.10-404.module+el8.6.0+882+2fa1e48f.noarch.rpmBAperl-Package-Generator-1.106-12.module+el8.6.0+878+f93dfff7.noarch.rpmCIperl-Params-Check-0.38-396.module+el8.6.0+878+f93dfff7.noarch.rpmbperl-Params-Util-1.07-23.module+el8.6.0+878+f93dfff7.x86_64.rpm|Cperl-parent-0.237-2.module+el8.6.0+878+f93dfff7.noarch.rpmcQperl-PathTools-3.63-368.module+el8.6.0+882+2fa1e48f.x86_64.rpmKKperl-perlfaq-5.20180605-2.module+el8.6.0+882+2fa1e48f.noarch.rpmd perl-PerlIO-via-QuotedPrint-0.08-396.module+el8.6.0+878+f93dfff7.noarch.rpmD?perl-Perl-OSType-1.010-397.module+el8.6.0+878+f93dfff7.noarch.rpmeaperl-Pod-Checker-1.73-396.module+el8.6.0+878+f93dfff7.noarch.rpmEJperl-Pod-Escapes-1.07-396.module+el8.6.0+878+f93dfff7.noarch.rpm([perl-Pod-Html-1.22.01-404.module+el8.6.0+882+2fa1e48f.noarch.rpmL;perl-podlators-4.09-4.module+el8.6.0+882+2fa1e48f.noarch.rpmFHperl-Pod-Parser-1.63-1001.module+el8.6.0+878+f93dfff7.noarch.rpmG$perl-Pod-Perldoc-3.28-397.module+el8.6.0+882+2fa1e48f.noarch.rpmH=perl-Pod-Simple-3.35-396.module+el8.6.0+882+2fa1e48f.noarch.rpmf`perl-Pod-Usage-1.69-396.module+el8.6.0+878+f93dfff7.noarch.rpmg\perl-Scalar-List-Utils-1.48-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm)8perl-SelfLoader-1.23-404.module+el8.6.0+882+2fa1e48f.noarch.rpmhvperl-Socket-2.027-4.module+el8.6.0+882+2fa1e48f.x86_64.rpmipperl-Software-License-0.103012-5.module+el8.6.0+882+2fa1e48f.noarch.rpmj perl-Storable-2.56-369.module+el8.6.0+882+2fa1e48f.x86_64.rpmk*perl-Sub-Exporter-0.987-16.module+el8.6.0+878+f93dfff7.noarch.rpmG>perl-Sub-Install-0.928-15.module+el8.6.0+878+f93dfff7.noarch.rpmlKperl-Sys-Syslog-0.35-398.module+el8.6.0+882+2fa1e48f.x86_64.rpmm^perl-Term-ANSIColor-4.06-397.module+el8.6.0+878+f93dfff7.noarch.rpmHOperl-Term-Cap-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm*mperl-Test-1.28-404.module+el8.6.0+882+2fa1e48f.noarch.rpmIMperl-Test-Harness-3.42-2.module+el8.6.0+878+f93dfff7.noarch.rpm}hperl-tests-5.24.4-404.module+el8.6.0+882+2fa1e48f.x86_64.rpmI6perl-Test-Simple-1.302086-2.module+el8.6.0+882+2fa1e48f.noarch.rpmnJperl-Text-Balanced-2.03-396.module+el8.6.0+878+f93dfff7.noarch.rpmoperl-Text-Diff-1.44-4.module+el8.6.0+882+2fa1e48f.noarch.rpmJ8perl-Text-Glob-0.11-5.module+el8.6.0+878+f93dfff7.noarch.rpmK\perl-Text-ParseWords-3.30-396.module+el8.6.0+878+f93dfff7.noarch.rpmLTperl-Text-Tabs+Wrap-2013.0523-396.module+el8.6.0+878+f93dfff7.noarch.rpmpperl-Text-Template-1.47-2.module+el8.6.0+882+2fa1e48f.noarch.rpmqXperl-Thread-Queue-3.13-2.module+el8.6.0+878+f93dfff7.noarch.rpm~perl-threads-2.21-3.module+el8.6.0+882+2fa1e48f.x86_64.rpmKperl-threads-shared-1.58-3.module+el8.6.0+882+2fa1e48f.x86_64.rpm8hperl-Time-HiRes-1.9753-2.module+el8.6.0+882+2fa1e48f.x86_64.rpmrEperl-Time-Local-1.280-2.module+el8.6.0+878+f93dfff7.noarch.rpm96perl-Time-Piece-1.31-404.module+el8.6.0+882+2fa1e48f.x86_64.rpmt!perl-Unicode-Collate-1.20-2.module+el8.6.0+882+2fa1e48f.x86_64.rpmu$perl-Unicode-Normalize-1.25-1001.module+el8.6.0+882+2fa1e48f.x86_64.rpmsperl-URI-1.71-7.module+el8.6.0+882+2fa1e48f.noarch.rpm-bperl-utils-5.24.4-404.module+el8.6.0+882+2fa1e48f.noarch.rpmperl-version-0.99.24-2.module+el8.6.0+882+2fa1e48f.x86_64.rpm-U-perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm!perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm"perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm#perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm$perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm2perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpmr$rrperl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm3fx~3perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpmsCEsiperl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpmwR wperl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm  Hbugfixperl-DBD-SQLite bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=16912431691243https://errata.rockylinux.org/RLBA-2019:3522RLBA-2019:3522RLBA-2019:3522 3fx~3perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm3fx~3perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm *^BBBBBBBBBBsecurityLow: GNOME security, bug fix, and enhancement update~jlohttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11070CVE-2019-11070CVE-2019-11070https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11459CVE-2019-11459CVE-2019-11459https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12795CVE-2019-12795CVE-2019-12795https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3820CVE-2019-3820CVE-2019-3820https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6237CVE-2019-6237CVE-2019-6237https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6251CVE-2019-6251CVE-2019-6251https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8506CVE-2019-8506CVE-2019-8506https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8518CVE-2019-8518CVE-2019-8518https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8523CVE-2019-8523CVE-2019-8523https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8524CVE-2019-8524CVE-2019-8524https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8535CVE-2019-8535CVE-2019-8535https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8536CVE-2019-8536CVE-2019-8536https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8544CVE-2019-8544CVE-2019-8544https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8551CVE-2019-8551CVE-2019-8551https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8558CVE-2019-8558CVE-2019-8558https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8559CVE-2019-8559CVE-2019-8559https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8563CVE-2019-8563CVE-2019-8563https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8571CVE-2019-8571CVE-2019-8571https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8583CVE-2019-8583CVE-2019-8583https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8584CVE-2019-8584CVE-2019-8584https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8586CVE-2019-8586CVE-2019-8586https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8587CVE-2019-8587CVE-2019-8587https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8594CVE-2019-8594CVE-2019-8594https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8595CVE-2019-8595CVE-2019-8595https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8596CVE-2019-8596CVE-2019-8596https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8597CVE-2019-8597CVE-2019-8597https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8601CVE-2019-8601CVE-2019-8601https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8607CVE-2019-8607CVE-2019-8607https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8608CVE-2019-8608CVE-2019-8608https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8609CVE-2019-8609CVE-2019-8609https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8610CVE-2019-8610CVE-2019-8610https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8611CVE-2019-8611CVE-2019-8611https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8615CVE-2019-8615CVE-2019-8615https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8619CVE-2019-8619CVE-2019-8619https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8622CVE-2019-8622CVE-2019-8622https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8623CVE-2019-8623CVE-2019-8623https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666CVE-2019-8666CVE-2019-8666https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671CVE-2019-8671CVE-2019-8671https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672CVE-2019-8672CVE-2019-8672https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673CVE-2019-8673CVE-2019-8673https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676CVE-2019-8676CVE-2019-8676https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677CVE-2019-8677CVE-2019-8677https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679CVE-2019-8679CVE-2019-8679https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681CVE-2019-8681CVE-2019-8681https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686CVE-2019-8686CVE-2019-8686https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687CVE-2019-8687CVE-2019-8687https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689CVE-2019-8689CVE-2019-8689https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690CVE-2019-8690CVE-2019-8690https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8726CVE-2019-8726CVE-2019-8726https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8735CVE-2019-8735CVE-2019-8735https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8768CVE-2019-8768CVE-2019-8768https://bugzilla.redhat.com/show_bug.cgi?id=16621931662193https://bugzilla.redhat.com/show_bug.cgi?id=16671361667136https://bugzilla.redhat.com/show_bug.cgi?id=16730111673011https://bugzilla.redhat.com/show_bug.cgi?id=16743821674382https://bugzilla.redhat.com/show_bug.cgi?id=16791271679127https://bugzilla.redhat.com/show_bug.cgi?id=16801641680164https://bugzilla.redhat.com/show_bug.cgi?id=16858111685811https://bugzilla.redhat.com/show_bug.cgi?id=16879491687949https://bugzilla.redhat.com/show_bug.cgi?id=16905061690506https://bugzilla.redhat.com/show_bug.cgi?id=16967081696708https://bugzilla.redhat.com/show_bug.cgi?id=16985201698520https://bugzilla.redhat.com/show_bug.cgi?id=16988841698884https://bugzilla.redhat.com/show_bug.cgi?id=16989231698923https://bugzilla.redhat.com/show_bug.cgi?id=16989291698929https://bugzilla.redhat.com/show_bug.cgi?id=16989301698930https://bugzilla.redhat.com/show_bug.cgi?id=17043551704355https://bugzilla.redhat.com/show_bug.cgi?id=17043601704360https://bugzilla.redhat.com/show_bug.cgi?id=17043781704378https://bugzilla.redhat.com/show_bug.cgi?id=17055831705583https://bugzilla.redhat.com/show_bug.cgi?id=17067931706793https://bugzilla.redhat.com/show_bug.cgi?id=17099371709937https://bugzilla.redhat.com/show_bug.cgi?id=17130801713080https://bugzilla.redhat.com/show_bug.cgi?id=17133301713330https://bugzilla.redhat.com/show_bug.cgi?id=17134531713453https://bugzilla.redhat.com/show_bug.cgi?id=17136851713685https://bugzilla.redhat.com/show_bug.cgi?id=17157381715738https://bugzilla.redhat.com/show_bug.cgi?id=17157611715761https://bugzilla.redhat.com/show_bug.cgi?id=17157651715765https://bugzilla.redhat.com/show_bug.cgi?id=17162951716295https://bugzilla.redhat.com/show_bug.cgi?id=17167711716771https://bugzilla.redhat.com/show_bug.cgi?id=17181331718133https://bugzilla.redhat.com/show_bug.cgi?id=17192411719241https://bugzilla.redhat.com/show_bug.cgi?id=17192791719279https://bugzilla.redhat.com/show_bug.cgi?id=17197791719779https://bugzilla.redhat.com/show_bug.cgi?id=17204811720481https://bugzilla.redhat.com/show_bug.cgi?id=17211951721195https://bugzilla.redhat.com/show_bug.cgi?id=17215751721575https://bugzilla.redhat.com/show_bug.cgi?id=17220471722047https://bugzilla.redhat.com/show_bug.cgi?id=17228441722844https://bugzilla.redhat.com/show_bug.cgi?id=17234671723467https://bugzilla.redhat.com/show_bug.cgi?id=17238361723836https://bugzilla.redhat.com/show_bug.cgi?id=17245511724551https://bugzilla.redhat.com/show_bug.cgi?id=17251011725101https://bugzilla.redhat.com/show_bug.cgi?id=17251071725107https://bugzilla.redhat.com/show_bug.cgi?id=17251201725120https://bugzilla.redhat.com/show_bug.cgi?id=17255551725555https://bugzilla.redhat.com/show_bug.cgi?id=17257411725741https://bugzilla.redhat.com/show_bug.cgi?id=17257661725766https://bugzilla.redhat.com/show_bug.cgi?id=17258541725854https://bugzilla.redhat.com/show_bug.cgi?id=17260931726093https://bugzilla.redhat.com/show_bug.cgi?id=17265051726505https://bugzilla.redhat.com/show_bug.cgi?id=17266561726656https://bugzilla.redhat.com/show_bug.cgi?id=17282771728277https://bugzilla.redhat.com/show_bug.cgi?id=17313721731372https://bugzilla.redhat.com/show_bug.cgi?id=17353821735382https://bugzilla.redhat.com/show_bug.cgi?id=17373261737326https://bugzilla.redhat.com/show_bug.cgi?id=17391161739116https://bugzilla.redhat.com/show_bug.cgi?id=17391171739117https://bugzilla.redhat.com/show_bug.cgi?id=17415471741547https://errata.rockylinux.org/RLSA-2019:3553RLSA-2019:3553RLSA-2019:3553 gdk-pixbuf2-devel-2.36.12-5.el8.x86_64.rpmgdk-pixbuf2-modules-2.36.12-5.el8.x86_64.rpm)gnome-desktop3-3.32.2-1.el8.x86_64.rpm)gnome-desktop3-devel-3.32.2-1.el8.x86_64.rpm=plibpurple-2.13.0-5.el8.x86_64.rpmppidgin-2.13.0-5.el8.x86_64.rpmgdk-pixbuf2-devel-2.36.12-5.el8.x86_64.rpmgdk-pixbuf2-modules-2.36.12-5.el8.x86_64.rpm)gnome-desktop3-3.32.2-1.el8.x86_64.rpm)gnome-desktop3-devel-3.32.2-1.el8.x86_64.rpm=plibpurple-2.13.0-5.el8.x86_64.rpmppidgin-2.13.0-5.el8.x86_64.rpm! /kBBbugfixlibidn2 bug fix and enhancement updateh https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18224CVE-2019-18224CVE-2019-18224https://bugzilla.redhat.com/show_bug.cgi?id=16742011674201https://errata.rockylinux.org/RLBA-2019:3621RLBA-2019:3621RLBA-2019:3621 ;widn2-2.2.0-1.el8.x86_64.rpmwlibidn2-devel-2.2.0-1.el8.x86_64.rpm;widn2-2.2.0-1.el8.x86_64.rpmwlibidn2-devel-2.2.0-1.el8.x86_64.rpm# 2pbugfixblktrace bug fix and enhancement updateg https://bugzilla.redhat.com/show_bug.cgi?id=17000651700065https://errata.rockylinux.org/RLBA-2019:3634RLBA-2019:3634RLBA-2019:3634 *Aiowatcher-1.2.0-10.el8.x86_64.rpm*Aiowatcher-1.2.0-10.el8.x86_64.rpm$ 5sbugfixmtr bug fix and enhancement updatef https://errata.rockylinux.org/RLBA-2019:3667RLBA-2019:3667RLBA-2019:3667 ?mtr-gtk-0.92-3.el8.x86_64.rpm?mtr-gtk-0.92-3.el8.x86_64.rpmF :vBBbugfixnewt bug fix and enhancement updatee) https://bugzilla.redhat.com/show_bug.cgi?id=17145171714517https://bugzilla.redhat.com/show_bug.cgi?id=17570931757093https://errata.rockylinux.org/RLBA-2020:1759RLBA-2020:1759RLBA-2020:1759 T}newt-devel-0.52.20-11.el8.x86_64.rpm`}python3-newt-0.52.20-11.el8.x86_64.rpmT}newt-devel-0.52.20-11.el8.x86_64.rpm`}python3-newt-0.52.20-11.el8.x86_64.rpm( {BBBBBsecurityModerate: GNOME security, bug fix, and enhancement update;Hhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20337CVE-2018-20337CVE-2018-20337https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12447CVE-2019-12447CVE-2019-12447https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12448CVE-2019-12448CVE-2019-12448https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12449CVE-2019-12449CVE-2019-12449https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3825CVE-2019-3825CVE-2019-3825https://bugzilla.redhat.com/show_bug.cgi?id=13657171365717https://bugzilla.redhat.com/show_bug.cgi?id=16569881656988https://bugzilla.redhat.com/show_bug.cgi?id=16580011658001https://bugzilla.redhat.com/show_bug.cgi?id=16615551661555https://bugzilla.redhat.com/show_bug.cgi?id=16660701666070https://bugzilla.redhat.com/show_bug.cgi?id=16689011668901https://bugzilla.redhat.com/show_bug.cgi?id=16717441671744https://bugzilla.redhat.com/show_bug.cgi?id=16728251672825https://bugzilla.redhat.com/show_bug.cgi?id=16745351674535https://bugzilla.redhat.com/show_bug.cgi?id=16847291684729https://bugzilla.redhat.com/show_bug.cgi?id=16879791687979https://bugzilla.redhat.com/show_bug.cgi?id=16901701690170https://bugzilla.redhat.com/show_bug.cgi?id=16922991692299https://bugzilla.redhat.com/show_bug.cgi?id=17108821710882https://bugzilla.redhat.com/show_bug.cgi?id=17158901715890https://bugzilla.redhat.com/show_bug.cgi?id=17167541716754https://bugzilla.redhat.com/show_bug.cgi?id=17167611716761https://bugzilla.redhat.com/show_bug.cgi?id=17167671716767https://bugzilla.redhat.com/show_bug.cgi?id=17167741716774https://bugzilla.redhat.com/show_bug.cgi?id=17198191719819https://bugzilla.redhat.com/show_bug.cgi?id=17202491720249https://bugzilla.redhat.com/show_bug.cgi?id=17202511720251https://bugzilla.redhat.com/show_bug.cgi?id=17211241721124https://bugzilla.redhat.com/show_bug.cgi?id=17211331721133https://bugzilla.redhat.com/show_bug.cgi?id=17234621723462https://bugzilla.redhat.com/show_bug.cgi?id=17234641723464https://bugzilla.redhat.com/show_bug.cgi?id=17243021724302https://bugzilla.redhat.com/show_bug.cgi?id=17251541725154https://bugzilla.redhat.com/show_bug.cgi?id=17283301728330https://bugzilla.redhat.com/show_bug.cgi?id=17285621728562https://bugzilla.redhat.com/show_bug.cgi?id=17285641728564https://bugzilla.redhat.com/show_bug.cgi?id=17285671728567https://bugzilla.redhat.com/show_bug.cgi?id=17306121730612https://bugzilla.redhat.com/show_bug.cgi?id=17308911730891https://bugzilla.redhat.com/show_bug.cgi?id=17367421736742https://bugzilla.redhat.com/show_bug.cgi?id=17427101742710https://bugzilla.redhat.com/show_bug.cgi?id=17444521744452https://bugzilla.redhat.com/show_bug.cgi?id=17445271744527https://bugzilla.redhat.com/show_bug.cgi?id=17451471745147https://bugzilla.redhat.com/show_bug.cgi?id=17479721747972https://bugzilla.redhat.com/show_bug.cgi?id=17493721749372https://bugzilla.redhat.com/show_bug.cgi?id=17505161750516https://bugzilla.redhat.com/show_bug.cgi?id=17535201753520https://bugzilla.redhat.com/show_bug.cgi?id=17590751759075https://bugzilla.redhat.com/show_bug.cgi?id=17595251759525https://bugzilla.redhat.com/show_bug.cgi?id=17596191759619https://bugzilla.redhat.com/show_bug.cgi?id=17599131759913https://bugzilla.redhat.com/show_bug.cgi?id=17603631760363https://bugzilla.redhat.com/show_bug.cgi?id=17632071763207https://bugzilla.redhat.com/show_bug.cgi?id=17654481765448https://bugzilla.redhat.com/show_bug.cgi?id=17656321765632https://bugzilla.redhat.com/show_bug.cgi?id=17666491766649https://bugzilla.redhat.com/show_bug.cgi?id=17666951766695https://bugzilla.redhat.com/show_bug.cgi?id=17684611768461https://bugzilla.redhat.com/show_bug.cgi?id=17765301776530https://bugzilla.redhat.com/show_bug.cgi?id=17775561777556https://bugzilla.redhat.com/show_bug.cgi?id=17779111777911https://bugzilla.redhat.com/show_bug.cgi?id=17786681778668https://bugzilla.redhat.com/show_bug.cgi?id=17824251782425https://bugzilla.redhat.com/show_bug.cgi?id=17824971782497https://bugzilla.redhat.com/show_bug.cgi?id=17825171782517https://bugzilla.redhat.com/show_bug.cgi?id=17852331785233https://bugzilla.redhat.com/show_bug.cgi?id=17894741789474https://bugzilla.redhat.com/show_bug.cgi?id=17934131793413https://bugzilla.redhat.com/show_bug.cgi?id=18041231804123https://bugzilla.redhat.com/show_bug.cgi?id=18090791809079https://errata.rockylinux.org/RLSA-2020:1766RLSA-2020:1766RLSA-2020:1766 }.baobab-3.28.0-4.el8.x86_64.rpm7(clutter-1.26.2-8.el8.x86_64.rpm"gnome-menus-3.13.3-11.el8.x86_64.rpm=&gnome-tweaks-3.28.1-7.el8.noarch.rpm}.baobab-3.28.0-4.el8.x86_64.rpm7(clutter-1.26.2-8.el8.x86_64.rpm"gnome-menus-3.13.3-11.el8.x86_64.rpm=&gnome-tweaks-3.28.1-7.el8.noarch.rpm7 securityLow: gnome-software and fwupd security, bug fix, and enhancement updateI}lhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10759CVE-2020-10759CVE-2020-10759https://bugzilla.redhat.com/show_bug.cgi?id=17979321797932https://bugzilla.redhat.com/show_bug.cgi?id=18155021815502https://bugzilla.redhat.com/show_bug.cgi?id=18397741839774https://bugzilla.redhat.com/show_bug.cgi?id=18443161844316https://bugzilla.redhat.com/show_bug.cgi?id=18444881844488https://bugzilla.redhat.com/show_bug.cgi?id=18457141845714https://errata.rockylinux.org/RLSA-2020:4436RLSA-2020:4436RLSA-2020:4436 p\appstream-data-8-20200724.el8.noarch.rpmp\appstream-data-8-20200724.el8.noarch.rpm$8 3EBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: GNOME security, bug fix, and enhancement updateF~https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8625CVE-2019-8625CVE-2019-8625https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8710CVE-2019-8710CVE-2019-8710https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8720CVE-2019-8720CVE-2019-8720https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8743CVE-2019-8743CVE-2019-8743https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8764CVE-2019-8764CVE-2019-8764https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8766CVE-2019-8766CVE-2019-8766https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8769CVE-2019-8769CVE-2019-8769https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8771CVE-2019-8771CVE-2019-8771https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8782CVE-2019-8782CVE-2019-8782https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8783CVE-2019-8783CVE-2019-8783https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8808CVE-2019-8808CVE-2019-8808https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8811CVE-2019-8811CVE-2019-8811https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8812CVE-2019-8812CVE-2019-8812https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8813CVE-2019-8813CVE-2019-8813https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8814CVE-2019-8814CVE-2019-8814https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8815CVE-2019-8815CVE-2019-8815https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8816CVE-2019-8816CVE-2019-8816https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8819CVE-2019-8819CVE-2019-8819https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8820CVE-2019-8820CVE-2019-8820https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8823CVE-2019-8823CVE-2019-8823https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8835CVE-2019-8835CVE-2019-8835https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8844CVE-2019-8844CVE-2019-8844https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8846CVE-2019-8846CVE-2019-8846https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10018CVE-2020-10018CVE-2020-10018https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11793CVE-2020-11793CVE-2020-11793https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14391CVE-2020-14391CVE-2020-14391https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15503CVE-2020-15503CVE-2020-15503https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3862CVE-2020-3862CVE-2020-3862https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3864CVE-2020-3864CVE-2020-3864https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3865CVE-2020-3865CVE-2020-3865https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3867CVE-2020-3867CVE-2020-3867https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3868CVE-2020-3868CVE-2020-3868https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885CVE-2020-3885CVE-2020-3885https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894CVE-2020-3894CVE-2020-3894https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895CVE-2020-3895CVE-2020-3895https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897CVE-2020-3897CVE-2020-3897https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899CVE-2020-3899CVE-2020-3899https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900CVE-2020-3900CVE-2020-3900https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901CVE-2020-3901CVE-2020-3901https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902CVE-2020-3902CVE-2020-3902https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802CVE-2020-9802CVE-2020-9802https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803CVE-2020-9803CVE-2020-9803https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805CVE-2020-9805CVE-2020-9805https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806CVE-2020-9806CVE-2020-9806https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807CVE-2020-9807CVE-2020-9807https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843CVE-2020-9843CVE-2020-9843https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850CVE-2020-9850CVE-2020-9850https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862CVE-2020-9862CVE-2020-9862https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893CVE-2020-9893CVE-2020-9893https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894CVE-2020-9894CVE-2020-9894https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895CVE-2020-9895CVE-2020-9895https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915CVE-2020-9915CVE-2020-9915https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925CVE-2020-9925CVE-2020-9925https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952CVE-2020-9952CVE-2020-9952https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30666CVE-2021-30666CVE-2021-30666https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30761CVE-2021-30761CVE-2021-30761https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762CVE-2021-30762CVE-2021-30762https://bugzilla.redhat.com/show_bug.cgi?id=12071791207179https://bugzilla.redhat.com/show_bug.cgi?id=15660271566027https://bugzilla.redhat.com/show_bug.cgi?id=15698681569868https://bugzilla.redhat.com/show_bug.cgi?id=16521781652178https://bugzilla.redhat.com/show_bug.cgi?id=16562621656262https://bugzilla.redhat.com/show_bug.cgi?id=16688951668895https://bugzilla.redhat.com/show_bug.cgi?id=16925361692536https://bugzilla.redhat.com/show_bug.cgi?id=17060081706008https://bugzilla.redhat.com/show_bug.cgi?id=17060761706076https://bugzilla.redhat.com/show_bug.cgi?id=17158451715845https://bugzilla.redhat.com/show_bug.cgi?id=17199371719937https://bugzilla.redhat.com/show_bug.cgi?id=17588911758891https://bugzilla.redhat.com/show_bug.cgi?id=17753451775345The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406)https://bugzilla.redhat.com/show_bug.cgi?id=17785791778579https://bugzilla.redhat.com/show_bug.cgi?id=17796911779691https://bugzilla.redhat.com/show_bug.cgi?id=17940451794045https://bugzilla.redhat.com/show_bug.cgi?id=18047191804719https://bugzilla.redhat.com/show_bug.cgi?id=18059291805929https://bugzilla.redhat.com/show_bug.cgi?id=18117211811721https://bugzilla.redhat.com/show_bug.cgi?id=18148201814820https://bugzilla.redhat.com/show_bug.cgi?id=18160701816070https://bugzilla.redhat.com/show_bug.cgi?id=18166781816678https://bugzilla.redhat.com/show_bug.cgi?id=18166841816684https://bugzilla.redhat.com/show_bug.cgi?id=18166861816686https://bugzilla.redhat.com/show_bug.cgi?id=18171431817143https://bugzilla.redhat.com/show_bug.cgi?id=18207591820759https://bugzilla.redhat.com/show_bug.cgi?id=18207601820760https://bugzilla.redhat.com/show_bug.cgi?id=18243621824362https://bugzilla.redhat.com/show_bug.cgi?id=18270301827030https://bugzilla.redhat.com/show_bug.cgi?id=18293691829369https://bugzilla.redhat.com/show_bug.cgi?id=18323471832347https://bugzilla.redhat.com/show_bug.cgi?id=18331581833158https://bugzilla.redhat.com/show_bug.cgi?id=18373811837381https://bugzilla.redhat.com/show_bug.cgi?id=18374061837406https://bugzilla.redhat.com/show_bug.cgi?id=18374131837413https://bugzilla.redhat.com/show_bug.cgi?id=18376481837648https://bugzilla.redhat.com/show_bug.cgi?id=18400801840080https://bugzilla.redhat.com/show_bug.cgi?id=18407881840788https://bugzilla.redhat.com/show_bug.cgi?id=18434861843486https://bugzilla.redhat.com/show_bug.cgi?id=18445781844578https://bugzilla.redhat.com/show_bug.cgi?id=18461911846191https://bugzilla.redhat.com/show_bug.cgi?id=18470511847051https://bugzilla.redhat.com/show_bug.cgi?id=18470611847061https://bugzilla.redhat.com/show_bug.cgi?id=18470621847062https://bugzilla.redhat.com/show_bug.cgi?id=18472031847203https://bugzilla.redhat.com/show_bug.cgi?id=18534771853477https://bugzilla.redhat.com/show_bug.cgi?id=18547341854734https://bugzilla.redhat.com/show_bug.cgi?id=18663321866332https://bugzilla.redhat.com/show_bug.cgi?id=18682601868260https://bugzilla.redhat.com/show_bug.cgi?id=18722701872270https://bugzilla.redhat.com/show_bug.cgi?id=18730931873093https://bugzilla.redhat.com/show_bug.cgi?id=18739631873963https://bugzilla.redhat.com/show_bug.cgi?id=18764621876462https://bugzilla.redhat.com/show_bug.cgi?id=18764631876463https://bugzilla.redhat.com/show_bug.cgi?id=18764651876465https://bugzilla.redhat.com/show_bug.cgi?id=18764681876468https://bugzilla.redhat.com/show_bug.cgi?id=18764701876470https://bugzilla.redhat.com/show_bug.cgi?id=18764721876472https://bugzilla.redhat.com/show_bug.cgi?id=18764731876473https://bugzilla.redhat.com/show_bug.cgi?id=18764761876476https://bugzilla.redhat.com/show_bug.cgi?id=18765161876516https://bugzilla.redhat.com/show_bug.cgi?id=18765181876518https://bugzilla.redhat.com/show_bug.cgi?id=18765211876521https://bugzilla.redhat.com/show_bug.cgi?id=18765221876522https://bugzilla.redhat.com/show_bug.cgi?id=18765231876523https://bugzilla.redhat.com/show_bug.cgi?id=18765361876536https://bugzilla.redhat.com/show_bug.cgi?id=18765371876537https://bugzilla.redhat.com/show_bug.cgi?id=18765401876540https://bugzilla.redhat.com/show_bug.cgi?id=18765431876543https://bugzilla.redhat.com/show_bug.cgi?id=18765451876545https://bugzilla.redhat.com/show_bug.cgi?id=18765481876548https://bugzilla.redhat.com/show_bug.cgi?id=18765491876549https://bugzilla.redhat.com/show_bug.cgi?id=18765501876550https://bugzilla.redhat.com/show_bug.cgi?id=18765521876552https://bugzilla.redhat.com/show_bug.cgi?id=18765531876553https://bugzilla.redhat.com/show_bug.cgi?id=18765541876554https://bugzilla.redhat.com/show_bug.cgi?id=18765551876555https://bugzilla.redhat.com/show_bug.cgi?id=18765561876556https://bugzilla.redhat.com/show_bug.cgi?id=18765901876590https://bugzilla.redhat.com/show_bug.cgi?id=18765911876591https://bugzilla.redhat.com/show_bug.cgi?id=18765941876594https://bugzilla.redhat.com/show_bug.cgi?id=18766071876607https://bugzilla.redhat.com/show_bug.cgi?id=18766111876611https://bugzilla.redhat.com/show_bug.cgi?id=18766171876617https://bugzilla.redhat.com/show_bug.cgi?id=18766191876619https://bugzilla.redhat.com/show_bug.cgi?id=18778531877853https://bugzilla.redhat.com/show_bug.cgi?id=18795321879532https://bugzilla.redhat.com/show_bug.cgi?id=18795351879535https://bugzilla.redhat.com/show_bug.cgi?id=18795361879536https://bugzilla.redhat.com/show_bug.cgi?id=18795381879538https://bugzilla.redhat.com/show_bug.cgi?id=18795401879540https://bugzilla.redhat.com/show_bug.cgi?id=18795411879541https://bugzilla.redhat.com/show_bug.cgi?id=18795451879545https://bugzilla.redhat.com/show_bug.cgi?id=18795571879557https://bugzilla.redhat.com/show_bug.cgi?id=18795591879559https://bugzilla.redhat.com/show_bug.cgi?id=18795631879563https://bugzilla.redhat.com/show_bug.cgi?id=18795641879564https://bugzilla.redhat.com/show_bug.cgi?id=18795661879566https://bugzilla.redhat.com/show_bug.cgi?id=18795681879568https://bugzilla.redhat.com/show_bug.cgi?id=18803391880339https://errata.rockylinux.org/RLSA-2020:4451RLSA-2020:4451RLSA-2020:4451 Q3dleyna-renderer-0.6.0-3.el8.x86_64.rpm9frei0r-plugins-1.6.1-7.el8.x86_64.rpm 9frei0r-plugins-opencv-1.6.1-7.el8.x86_64.rpm 'gnome-remote-desktop-0.1.8-3.el8.x86_64.rpm;rlibsoup-devel-2.62.3-2.el8.x86_64.rpmqpipewire0.2-devel-0.2.7-6.el8.x86_64.rpmqpipewire0.2-libs-0.2.7-6.el8.x86_64.rpm pipewire-0.3.6-1.el8.x86_64.rpm pipewire-devel-0.3.6-1.el8.x86_64.rpm pipewire-doc-0.3.6-1.el8.x86_64.rpm pipewire-libs-0.3.6-1.el8.x86_64.rpm pipewire-utils-0.3.6-1.el8.x86_64.rpm5 potrace-1.15-3.el8.x86_64.rpmV1python3-gobject-3.28.3-2.el8.x86_64.rpmAtracker-2.1.5-2.el8.x86_64.rpm=~vte291-0.52.4-2.el8.x86_64.rpm<~vte-profile-0.52.4-2.el8.x86_64.rpm?PackageKit-1.1.12-6.el8.0.2.x86_64.rpm@PackageKit-command-not-found-1.1.12-6.el8.0.2.x86_64.rpmAPackageKit-cron-1.1.12-6.el8.0.2.x86_64.rpmBPackageKit-glib-1.1.12-6.el8.0.2.x86_64.rpmCPackageKit-gstreamer-plugin-1.1.12-6.el8.0.2.x86_64.rpmDPackageKit-gtk3-module-1.1.12-6.el8.0.2.x86_64.rpmQ3dleyna-renderer-0.6.0-3.el8.x86_64.rpm9frei0r-plugins-1.6.1-7.el8.x86_64.rpm 9frei0r-plugins-opencv-1.6.1-7.el8.x86_64.rpm 'gnome-remote-desktop-0.1.8-3.el8.x86_64.rpm;rlibsoup-devel-2.62.3-2.el8.x86_64.rpmqpipewire0.2-devel-0.2.7-6.el8.x86_64.rpmqpipewire0.2-libs-0.2.7-6.el8.x86_64.rpm pipewire-0.3.6-1.el8.x86_64.rpm pipewire-devel-0.3.6-1.el8.x86_64.rpm pipewire-doc-0.3.6-1.el8.x86_64.rpm pipewire-libs-0.3.6-1.el8.x86_64.rpm pipewire-utils-0.3.6-1.el8.x86_64.rpm5 potrace-1.15-3.el8.x86_64.rpmV1python3-gobject-3.28.3-2.el8.x86_64.rpmAtracker-2.1.5-2.el8.x86_64.rpm=~vte291-0.52.4-2.el8.x86_64.rpm<~vte-profile-0.52.4-2.el8.x86_64.rpm?PackageKit-1.1.12-6.el8.0.2.x86_64.rpm@PackageKit-command-not-found-1.1.12-6.el8.0.2.x86_64.rpmAPackageKit-cron-1.1.12-6.el8.0.2.x86_64.rpmBPackageKit-glib-1.1.12-6.el8.0.2.x86_64.rpmCPackageKit-gstreamer-plugin-1.1.12-6.el8.0.2.x86_64.rpmDPackageKit-gtk3-module-1.1.12-6.el8.0.2.x86_64.rpm%M 6tbugfixzstd bug fix and enhancement updateD) https://errata.rockylinux.org/RLBA-2020:4557RLBA-2020:4557RLBA-2020:4557 a>zstd-1.4.4-1.el8.x86_64.rpma>zstd-1.4.4-1.el8.x86_64.rpm) 7dBdB[BBBBBKBBBBBSDBBBDFBBBBFBBBBBFBBBDBBBBeBBJBBHDBBBBBBBBBBHBBBHHBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBJBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBenhancementnew module: perl:5.30mQ https://bugzilla.redhat.com/show_bug.cgi?id=17135921713592This enhancement update adds the perl:5.30 module to Red Hat Enterprise Linux 8.https://errata.rockylinux.org/RLEA-2020:4727RLEA-2020:4727RLEA-2020:4727 ]txs-Ur$#+%3fx~sCEwR 7Cperl-Algorithm-Diff-1.1903-10.module+el8.6.0+878+f93dfff7.noarch.rpm3Uperl-Archive-Tar-2.32-440.module+el8.6.0+878+f93dfff7.noarch.rpm4Dperl-Archive-Zip-1.67-1.module+el8.6.0+878+f93dfff7.noarch.rpmvNperl-autodie-2.29-1001.module+el8.6.0+878+f93dfff7.noarch.rpmw'perl-bignum-0.51-439.module+el8.6.0+878+f93dfff7.noarch.rpmC?perl-Carp-1.50-439.module+el8.6.0+878+f93dfff7.noarch.rpmDzperl-Compress-Bzip2-2.26-7.module+el8.6.0+878+f93dfff7.x86_64.rpmEperl-Compress-Raw-Bzip2-2.093-1.module+el8.6.0+878+f93dfff7.x86_64.rpmFperl-Compress-Raw-Zlib-2.093-1.module+el8.6.0+878+f93dfff7.x86_64.rpmG$perl-Config-Perl-V-0.32-441.module+el8.6.0+878+f93dfff7.noarch.rpmMFperl-constant-1.33-1001.module+el8.6.0+878+f93dfff7.noarch.rpm5Tperl-CPAN-2.27-2.module+el8.6.0+878+f93dfff7.noarch.rpm perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm8Qperl-CPAN-Meta-2.150010-397.module+el8.6.0+878+f93dfff7.noarch.rpm9Pperl-CPAN-Meta-Requirements-2.140-397.module+el8.6.0+878+f93dfff7.noarch.rpm:7perl-CPAN-Meta-YAML-0.018-1001.module+el8.6.0+878+f93dfff7.noarch.rpmIvperl-Data-Dumper-2.174-440.module+el8.6.0+878+f93dfff7.x86_64.rpm;9perl-Data-OptList-0.110-7.module+el8.6.0+878+f93dfff7.noarch.rpmJ"perl-Data-Section-0.200007-8.module+el8.6.0+878+f93dfff7.noarch.rpmH]perl-DB_File-1.852-4.module+el8.6.0+878+f93dfff7.x86_64.rpmK perl-Devel-PPPort-3.56-1.module+el8.6.0+878+f93dfff7.x86_64.rpmLperl-Devel-Size-0.83-3.module+el8.6.0+878+f93dfff7.x86_64.rpmMOperl-Digest-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpmN perl-Digest-MD5-2.55-397.module+el8.6.0+878+f93dfff7.x86_64.rpmOjperl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.x86_64.rpmPgperl-Encode-3.01-439.module+el8.6.0+878+f93dfff7.x86_64.rpmQgperl-Encode-devel-3.01-439.module+el8.6.0+878+f93dfff7.x86_64.rpmxperl-encoding-2.22-439.module+el8.6.0+878+f93dfff7.x86_64.rpm<@perl-Env-1.04-396.module+el8.6.0+878+f93dfff7.noarch.rpmJ*perl-experimental-0.020-439.module+el8.6.0+878+f93dfff7.noarch.rpm6fperl-Exporter-5.73-440.module+el8.6.0+878+f93dfff7.noarch.rpm7Iperl-ExtUtils-CBuilder-0.280231-439.module+el8.6.0+878+f93dfff7.noarch.rpm8perl-ExtUtils-Command-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm9Sperl-ExtUtils-Install-2.14-440.module+el8.6.0+878+f93dfff7.noarch.rpm;perl-ExtUtils-MakeMaker-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm0perl-Filter-Simple-0.95-439.module+el8.6.0+878+f93dfff7.noarch.rpm9perl-generators-1.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm?Lperl-Getopt-Long-2.51-1.module+el8.6.0+878+f93dfff7.noarch.rpmyUperl-homedir-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm@+perl-HTTP-Tiny-0.076-439.module+el8.6.0+878+f93dfff7.noarch.rpmperl-Importer-0.025-6.module+el8.6.0+878+f93dfff7.noarch.rpmNVperl-inc-latest-0.500-10.module+el8.6.0+878+f93dfff7.noarch.rpmAperl-IO-Compress-2.093-1.module+el8.6.0+878+f93dfff7.noarch.rpmX%perl-IO-Socket-IP-0.39-6.module+el8.6.0+878+f93dfff7.noarch.rpmYUperl-IPC-Cmd-1.04-2.module+el8.6.0+878+f93dfff7.noarch.rpm[:perl-IPC-System-Simple-1.25-18.module+el8.6.0+878+f93dfff7.noarch.rpmZlperl-IPC-SysV-2.07-398.module+el8.6.0+878+f93dfff7.x86_64.rpm\Iperl-JSON-PP-4.04-2.module+el8.6.0+878+f93dfff7.noarch.rpmzWperl-libnet-3.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm]<perl-Locale-Maketext-1.29-440.module+el8.6.0+878+f93dfff7.noarch.rpm{Uperl-local-lib-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm_Fperl-Math-BigInt-1.9998.18-1.module+el8.6.0+878+f93dfff7.noarch.rpm`|perl-Math-BigInt-FastCalc-0.500.900-1.module+el8.6.0+878+f93dfff7.x86_64.rpm@<perl-Math-BigRat-0.2614-2.module+el8.6.0+878+f93dfff7.noarch.rpm^pperl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.x86_64.rpmBZperl-Module-Build-0.42.29-4.module+el8.6.0+878+f93dfff7.noarch.rpmCiperl-Module-CoreList-5.20191220-1.module+el8.6.0+878+f93dfff7.noarch.rpmDiperl-Module-CoreList-tools-5.20191220-1.module+el8.6.0+878+f93dfff7.noarch.rpmG]perl-Pod-Perldoc-3.28.01-442.module+el8.6.0+878+f93dfff7.noarch.rpmEJperl-Module-Load-0.34-439.module+el8.6.0+878+f93dfff7.noarch.rpmF/perl-Module-Load-Conditional-0.70-1.module+el8.6.0+878+f93dfff7.noarch.rpma,perl-Module-Metadata-1.000037-1.module+el8.6.0+878+f93dfff7.noarch.rpm?:perl-MRO-Compat-0.13-5.module+el8.6.0+878+f93dfff7.noarch.rpmYVperl-Object-HashBase-0.008-1.module+el8.6.0+878+f93dfff7.noarch.rpmZVperl-Object-HashBase-tools-0.008-1.module+el8.6.0+878+f93dfff7.noarch.rpmBAperl-Package-Generator-1.106-12.module+el8.6.0+878+f93dfff7.noarch.rpmCIperl-Params-Check-0.38-396.module+el8.6.0+878+f93dfff7.noarch.rpmbperl-Params-Util-1.07-23.module+el8.6.0+878+f93dfff7.x86_64.rpm|Cperl-parent-0.237-2.module+el8.6.0+878+f93dfff7.noarch.rpmc0perl-PathTools-3.78-439.module+el8.6.0+878+f93dfff7.x86_64.rpmKeperl-perlfaq-5.20191102-1.module+el8.6.0+878+f93dfff7.noarch.rpmd perl-PerlIO-via-QuotedPrint-0.08-396.module+el8.6.0+878+f93dfff7.noarch.rpmD?perl-Perl-OSType-1.010-397.module+el8.6.0+878+f93dfff7.noarch.rpmeaperl-Pod-Checker-1.73-396.module+el8.6.0+878+f93dfff7.noarch.rpmEJperl-Pod-Escapes-1.07-396.module+el8.6.0+878+f93dfff7.noarch.rpmLOperl-podlators-4.12-2.module+el8.6.0+878+f93dfff7.noarch.rpmFHperl-Pod-Parser-1.63-1001.module+el8.6.0+878+f93dfff7.noarch.rpmHNperl-Pod-Simple-3.40-1.module+el8.6.0+878+f93dfff7.noarch.rpmf`perl-Pod-Usage-1.69-396.module+el8.6.0+878+f93dfff7.noarch.rpmg perl-Scalar-List-Utils-1.53-439.module+el8.6.0+878+f93dfff7.x86_64.rpmhperl-Socket-2.029-4.module+el8.6.0+878+f93dfff7.x86_64.rpmi!perl-Software-License-0.103014-5.module+el8.6.0+878+f93dfff7.noarch.rpmjjperl-Storable-3.15-442.module+el8.6.0+878+f93dfff7.x86_64.rpmk*perl-Sub-Exporter-0.987-16.module+el8.6.0+878+f93dfff7.noarch.rpmG>perl-Sub-Install-0.928-15.module+el8.6.0+878+f93dfff7.noarch.rpmlwperl-Sys-Syslog-0.36-1.module+el8.6.0+878+f93dfff7.x86_64.rpmm^perl-Term-ANSIColor-4.06-397.module+el8.6.0+878+f93dfff7.noarch.rpmHOperl-Term-Cap-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm perl-Term-Table-0.015-2.module+el8.6.0+878+f93dfff7.noarch.rpmIMperl-Test-Harness-3.42-2.module+el8.6.0+878+f93dfff7.noarch.rpmI_perl-Test-Simple-1.302170-1.module+el8.6.0+878+f93dfff7.noarch.rpmnJperl-Text-Balanced-2.03-396.module+el8.6.0+878+f93dfff7.noarch.rpmo>perl-Text-Diff-1.45-7.module+el8.6.0+878+f93dfff7.noarch.rpmJ8perl-Text-Glob-0.11-5.module+el8.6.0+878+f93dfff7.noarch.rpmK\perl-Text-ParseWords-3.30-396.module+el8.6.0+878+f93dfff7.noarch.rpmLTperl-Text-Tabs+Wrap-2013.0523-396.module+el8.6.0+878+f93dfff7.noarch.rpmp@perl-Text-Template-1.58-1.module+el8.6.0+878+f93dfff7.noarch.rpmqXperl-Thread-Queue-3.13-2.module+el8.6.0+878+f93dfff7.noarch.rpm~iperl-threads-2.22-439.module+el8.6.0+878+f93dfff7.x86_64.rpmXperl-threads-shared-1.60-440.module+el8.6.0+878+f93dfff7.x86_64.rpm8aperl-Time-HiRes-1.9760-439.module+el8.6.0+878+f93dfff7.x86_64.rpmrEperl-Time-Local-1.280-2.module+el8.6.0+878+f93dfff7.noarch.rpmtTperl-Unicode-Collate-1.27-439.module+el8.6.0+878+f93dfff7.x86_64.rpmuSperl-Unicode-Normalize-1.26-439.module+el8.6.0+878+f93dfff7.x86_64.rpmsAperl-URI-1.76-5.module+el8.6.0+878+f93dfff7.noarch.rpmperl-version-0.99.24-441.module+el8.6.0+878+f93dfff7.x86_64.rpm-perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm!perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm"perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm#perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm$perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm2perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpmrrperl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpmRperl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm3perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpmsiperl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpmwperl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm]txst7Cperl-Algorithm-Diff-1.1903-10.module+el8.6.0+878+f93dfff7.noarch.rpm3Uperl-Archive-Tar-2.32-440.module+el8.6.0+878+f93dfff7.noarch.rpm4Dperl-Archive-Zip-1.67-1.module+el8.6.0+878+f93dfff7.noarch.rpmvNperl-autodie-2.29-1001.module+el8.6.0+878+f93dfff7.noarch.rpmw'perl-bignum-0.51-439.module+el8.6.0+878+f93dfff7.noarch.rpmC?perl-Carp-1.50-439.module+el8.6.0+878+f93dfff7.noarch.rpmDzperl-Compress-Bzip2-2.26-7.module+el8.6.0+878+f93dfff7.x86_64.rpmEperl-Compress-Raw-Bzip2-2.093-1.module+el8.6.0+878+f93dfff7.x86_64.rpmFperl-Compress-Raw-Zlib-2.093-1.module+el8.6.0+878+f93dfff7.x86_64.rpmG$perl-Config-Perl-V-0.32-441.module+el8.6.0+878+f93dfff7.noarch.rpmMFperl-constant-1.33-1001.module+el8.6.0+878+f93dfff7.noarch.rpm5Tperl-CPAN-2.27-2.module+el8.6.0+878+f93dfff7.noarch.rpm perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm8Qperl-CPAN-Meta-2.150010-397.module+el8.6.0+878+f93dfff7.noarch.rpm9Pperl-CPAN-Meta-Requirements-2.140-397.module+el8.6.0+878+f93dfff7.noarch.rpm:7perl-CPAN-Meta-YAML-0.018-1001.module+el8.6.0+878+f93dfff7.noarch.rpmIvperl-Data-Dumper-2.174-440.module+el8.6.0+878+f93dfff7.x86_64.rpm;9perl-Data-OptList-0.110-7.module+el8.6.0+878+f93dfff7.noarch.rpmJ"perl-Data-Section-0.200007-8.module+el8.6.0+878+f93dfff7.noarch.rpmH]perl-DB_File-1.852-4.module+el8.6.0+878+f93dfff7.x86_64.rpmK perl-Devel-PPPort-3.56-1.module+el8.6.0+878+f93dfff7.x86_64.rpmLperl-Devel-Size-0.83-3.module+el8.6.0+878+f93dfff7.x86_64.rpmMOperl-Digest-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpmN perl-Digest-MD5-2.55-397.module+el8.6.0+878+f93dfff7.x86_64.rpmOjperl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.x86_64.rpmPgperl-Encode-3.01-439.module+el8.6.0+878+f93dfff7.x86_64.rpmQgperl-Encode-devel-3.01-439.module+el8.6.0+878+f93dfff7.x86_64.rpmxperl-encoding-2.22-439.module+el8.6.0+878+f93dfff7.x86_64.rpm<@perl-Env-1.04-396.module+el8.6.0+878+f93dfff7.noarch.rpmJ*perl-experimental-0.020-439.module+el8.6.0+878+f93dfff7.noarch.rpm6fperl-Exporter-5.73-440.module+el8.6.0+878+f93dfff7.noarch.rpm7Iperl-ExtUtils-CBuilder-0.280231-439.module+el8.6.0+878+f93dfff7.noarch.rpm8perl-ExtUtils-Command-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm9Sperl-ExtUtils-Install-2.14-440.module+el8.6.0+878+f93dfff7.noarch.rpm;perl-ExtUtils-MakeMaker-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm0perl-Filter-Simple-0.95-439.module+el8.6.0+878+f93dfff7.noarch.rpm9perl-generators-1.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm?Lperl-Getopt-Long-2.51-1.module+el8.6.0+878+f93dfff7.noarch.rpmyUperl-homedir-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm@+perl-HTTP-Tiny-0.076-439.module+el8.6.0+878+f93dfff7.noarch.rpmperl-Importer-0.025-6.module+el8.6.0+878+f93dfff7.noarch.rpmNVperl-inc-latest-0.500-10.module+el8.6.0+878+f93dfff7.noarch.rpmAperl-IO-Compress-2.093-1.module+el8.6.0+878+f93dfff7.noarch.rpmX%perl-IO-Socket-IP-0.39-6.module+el8.6.0+878+f93dfff7.noarch.rpmYUperl-IPC-Cmd-1.04-2.module+el8.6.0+878+f93dfff7.noarch.rpm[:perl-IPC-System-Simple-1.25-18.module+el8.6.0+878+f93dfff7.noarch.rpmZlperl-IPC-SysV-2.07-398.module+el8.6.0+878+f93dfff7.x86_64.rpm\Iperl-JSON-PP-4.04-2.module+el8.6.0+878+f93dfff7.noarch.rpmzWperl-libnet-3.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm]<perl-Locale-Maketext-1.29-440.module+el8.6.0+878+f93dfff7.noarch.rpm{Uperl-local-lib-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm_Fperl-Math-BigInt-1.9998.18-1.module+el8.6.0+878+f93dfff7.noarch.rpm`|perl-Math-BigInt-FastCalc-0.500.900-1.module+el8.6.0+878+f93dfff7.x86_64.rpm@<perl-Math-BigRat-0.2614-2.module+el8.6.0+878+f93dfff7.noarch.rpm^pperl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.x86_64.rpmBZperl-Module-Build-0.42.29-4.module+el8.6.0+878+f93dfff7.noarch.rpmCiperl-Module-CoreList-5.20191220-1.module+el8.6.0+878+f93dfff7.noarch.rpmDiperl-Module-CoreList-tools-5.20191220-1.module+el8.6.0+878+f93dfff7.noarch.rpmG]perl-Pod-Perldoc-3.28.01-442.module+el8.6.0+878+f93dfff7.noarch.rpmEJperl-Module-Load-0.34-439.module+el8.6.0+878+f93dfff7.noarch.rpmF/perl-Module-Load-Conditional-0.70-1.module+el8.6.0+878+f93dfff7.noarch.rpma,perl-Module-Metadata-1.000037-1.module+el8.6.0+878+f93dfff7.noarch.rpm?:perl-MRO-Compat-0.13-5.module+el8.6.0+878+f93dfff7.noarch.rpmYVperl-Object-HashBase-0.008-1.module+el8.6.0+878+f93dfff7.noarch.rpmZVperl-Object-HashBase-tools-0.008-1.module+el8.6.0+878+f93dfff7.noarch.rpmBAperl-Package-Generator-1.106-12.module+el8.6.0+878+f93dfff7.noarch.rpmCIperl-Params-Check-0.38-396.module+el8.6.0+878+f93dfff7.noarch.rpmbperl-Params-Util-1.07-23.module+el8.6.0+878+f93dfff7.x86_64.rpm|Cperl-parent-0.237-2.module+el8.6.0+878+f93dfff7.noarch.rpmc0perl-PathTools-3.78-439.module+el8.6.0+878+f93dfff7.x86_64.rpmKeperl-perlfaq-5.20191102-1.module+el8.6.0+878+f93dfff7.noarch.rpmd perl-PerlIO-via-QuotedPrint-0.08-396.module+el8.6.0+878+f93dfff7.noarch.rpmD?perl-Perl-OSType-1.010-397.module+el8.6.0+878+f93dfff7.noarch.rpmeaperl-Pod-Checker-1.73-396.module+el8.6.0+878+f93dfff7.noarch.rpmEJperl-Pod-Escapes-1.07-396.module+el8.6.0+878+f93dfff7.noarch.rpmLOperl-podlators-4.12-2.module+el8.6.0+878+f93dfff7.noarch.rpmFHperl-Pod-Parser-1.63-1001.module+el8.6.0+878+f93dfff7.noarch.rpmHNperl-Pod-Simple-3.40-1.module+el8.6.0+878+f93dfff7.noarch.rpmf`perl-Pod-Usage-1.69-396.module+el8.6.0+878+f93dfff7.noarch.rpmg perl-Scalar-List-Utils-1.53-439.module+el8.6.0+878+f93dfff7.x86_64.rpmhperl-Socket-2.029-4.module+el8.6.0+878+f93dfff7.x86_64.rpmi!perl-Software-License-0.103014-5.module+el8.6.0+878+f93dfff7.noarch.rpmjjperl-Storable-3.15-442.module+el8.6.0+878+f93dfff7.x86_64.rpmk*perl-Sub-Exporter-0.987-16.module+el8.6.0+878+f93dfff7.noarch.rpmG>perl-Sub-Install-0.928-15.module+el8.6.0+878+f93dfff7.noarch.rpmlwperl-Sys-Syslog-0.36-1.module+el8.6.0+878+f93dfff7.x86_64.rpmm^perl-Term-ANSIColor-4.06-397.module+el8.6.0+878+f93dfff7.noarch.rpmHOperl-Term-Cap-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm perl-Term-Table-0.015-2.module+el8.6.0+878+f93dfff7.noarch.rpmIMperl-Test-Harness-3.42-2.module+el8.6.0+878+f93dfff7.noarch.rpmI_perl-Test-Simple-1.302170-1.module+el8.6.0+878+f93dfff7.noarch.rpmnJperl-Text-Balanced-2.03-396.module+el8.6.0+878+f93dfff7.noarch.rpmo>perl-Text-Diff-1.45-7.module+el8.6.0+878+f93dfff7.noarch.rpmJ8perl-Text-Glob-0.11-5.module+el8.6.0+878+f93dfff7.noarch.rpmK\perl-Text-ParseWords-3.30-396.module+el8.6.0+878+f93dfff7.noarch.rpmLTperl-Text-Tabs+Wrap-2013.0523-396.module+el8.6.0+878+f93dfff7.noarch.rpmp@perl-Text-Template-1.58-1.module+el8.6.0+878+f93dfff7.noarch.rpmqXperl-Thread-Queue-3.13-2.module+el8.6.0+878+f93dfff7.noarch.rpm~iperl-threads-2.22-439.module+el8.6.0+878+f93dfff7.x86_64.rpmXperl-threads-shared-1.60-440.module+el8.6.0+878+f93dfff7.x86_64.rpm8aperl-Time-HiRes-1.9760-439.module+el8.6.0+878+f93dfff7.x86_64.rpmrEperl-Time-Local-1.280-2.module+el8.6.0+878+f93dfff7.noarch.rpmtTperl-Unicode-Collate-1.27-439.module+el8.6.0+878+f93dfff7.x86_64.rpmuSperl-Unicode-Normalize-1.26-439.module+el8.6.0+878+f93dfff7.x86_64.rpmsAperl-URI-1.76-5.module+el8.6.0+878+f93dfff7.noarch.rpmperl-version-0.99.24-441.module+el8.6.0+878+f93dfff7.x86_64.rpm-U-perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm!perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm"perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm#perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm$perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm2perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpmr$rrperl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm#+%Rperl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm3fx~3perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpmsCEsiperl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpmwR wperl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpmQ$ 8dBdB[BBBBenhancementperl:5.30 metadata for the Rocky Linux 8 module matrix (1/3)> https://bugzilla.redhat.com/show_bug.cgi?id=18528731852873https://errata.rockylinux.org/RLEA-2020:4767RLEA-2020:4767RLEA-2020:4767 r$#+%3fx~sCE-UwR rrperl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpmRperl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm3perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpmsiperl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm2perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpmwperl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpmr$rrperl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm#+%Rperl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm3fx~3perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpmsCEsiperl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm-U2perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpmwR wperl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpmY% 9dBdB[BBBBenhancementperl:5.30 metadata for the Rocky Linux 8 module matrix (2/3)= https://bugzilla.redhat.com/show_bug.cgi?id=18528741852874https://errata.rockylinux.org/RLEA-2020:4802RLEA-2020:4802RLEA-2020:4802 r$#+%3fx~sCE-UwR rrperl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpmRperl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm3perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpmsiperl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm2perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpmwperl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpmr$rrperl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm#+%Rperl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm3fx~3perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpmsCEsiperl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm-U2perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpmwR wperl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm`\ LOpenEXR-libs-2.2.0-12.el8.x86_64.rpm{fpangomm-2.40.1-6.el8.x86_64.rpmoisoundtouch-2.0.0-3.el8.x86_64.rpmEuwoff2-1.0.2-5.el8.x86_64.rpm~Cgnome-boxes-3.36.5-8.el8.rocky.0.1.x86_64.rpm!rQatkmm-2.24.2-7.el8.x86_64.rpm, cairomm-1.12.0-8.el8.x86_64.rpm0ichrome-gnome-shell-10.1-7.el8.x86_64.rpmP3dleyna-core-0.6.0-3.el8.x86_64.rpmR3dleyna-server-0.6.0-3.el8.x86_64.rpmmNenchant2-2.2.3-3.el8.x86_64.rpmnYgeoclue2-2.5.5-2.el8.x86_64.rpmoYgeoclue2-demos-2.5.5-2.el8.x86_64.rpmpYgeoclue2-libs-2.5.5-2.el8.x86_64.rpmq geocode-glib-3.26.0-3.el8.x86_64.rpmr geocode-glib-devel-3.26.0-3.el8.x86_64.rpmuJgjs-1.56.2-5.el8.x86_64.rpmvkglibmm24-2.56.0-2.el8.x86_64.rpmagnome-photos-3.28.1-4.el8.x86_64.rpmagnome-photos-tests-3.28.1-4.el8.x86_64.rpm %gnome-terminal-3.28.3-3.el8.x86_64.rpm %gnome-terminal-nautilus-3.28.3-3.el8.x86_64.rpmgtk2-2.24.32-5.el8.x86_64.rpmgtk2-devel-2.24.32-5.el8.x86_64.rpmgtk2-devel-docs-2.24.32-5.el8.x86_64.rpmgtk2-immodules-2.24.32-5.el8.x86_64.rpmgtk2-immodule-xim-2.24.32-5.el8.x86_64.rpmRgtkmm24-2.24.5-6.el8.x86_64.rpm(gtkmm30-3.22.2-3.el8.x86_64.rpmt3libdazzle-3.28.5-2.el8.x86_64.rpm{%libepubgen-0.1.0-3.el8.x86_64.rpm[Elibsigc++20-2.10.0-6.el8.x86_64.rpmilibvisual-0.4.0-25.el8.x86_64.rpm>LOpenEXR-libs-2.2.0-12.el8.x86_64.rpm{fpangomm-2.40.1-6.el8.x86_64.rpmoisoundtouch-2.0.0-3.el8.x86_64.rpmEuwoff2-1.0.2-5.el8.x86_64.rpm~Cgnome-boxes-3.36.5-8.el8.rocky.0.1.x86_64.rpmb ?}bugfixlibxslt bug fix and enhancement updateM) https://bugzilla.redhat.com/show_bug.cgi?id=18604671860467https://errata.rockylinux.org/RLBA-2021:1591RLBA-2021:1591RLBA-2021:1591 libxslt-devel-1.1.32-6.el8.x86_64.rpmlibxslt-devel-1.1.32-6.el8.x86_64.rpmc @bugfixavahi bug fix and enhancement updatev) https://errata.rockylinux.org/RLBA-2021:1612RLBA-2021:1612RLBA-2021:1612 oaavahi-ui-gtk3-0.7-20.el8.x86_64.rpmoaavahi-ui-gtk3-0.7-20.el8.x86_64.rpme bugfixefi-rpm-macros bug fix and enhancement update) https://bugzilla.redhat.com/show_bug.cgi?id=18450521845052https://errata.rockylinux.org/RLBA-2021:1619RLBA-2021:1619RLBA-2021:1619 )efi-srpm-macros-3-3.el8.noarch.rpm)efi-srpm-macros-3-3.el8.noarch.rpme Ebugfixvhostmd bug fix and enhancement updateH) https://bugzilla.redhat.com/show_bug.cgi?id=18971301897130https://errata.rockylinux.org/RLBA-2021:1681RLBA-2021:1681RLBA-2021:1681 .|vhostmd-1.1-5.el8.x86_64.rpm.|vhostmd-1.1-5.el8.x86_64.rpmh bugfixdejavu-fonts bug fix and enhancement updateq) https://errata.rockylinux.org/RLBA-2021:1687RLBA-2021:1687RLBA-2021:1687 ndejavu-lgc-sans-fonts-2.35-7.el8.noarch.rpmndejavu-lgc-sans-fonts-2.35-7.el8.noarch.rpmh] JBBsecurityModerate: brotli security update%https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8927CVE-2020-8927CVE-2020-8927https://bugzilla.redhat.com/show_bug.cgi?id=18792251879225https://errata.rockylinux.org/RLSA-2021:1702RLSA-2021:1702RLSA-2021:1702 &brotli-devel-1.0.6-3.el8.x86_64.rpmOpython3-brotli-1.0.6-3.el8.x86_64.rpm&brotli-devel-1.0.6-3.el8.x86_64.rpmOpython3-brotli-1.0.6-3.el8.x86_64.rpmk? Obugfixlibdb bug fix and enhancement update?{ https://errata.rockylinux.org/RLBA-2021:3594RLBA-2021:3594RLBA-2021:3594 ulibdb-devel-5.3.28-42.el8_4.x86_64.rpmulibdb-devel-5.3.28-42.el8_4.x86_64.rpmmn Rbugfixlm_sensors bug fix and enhancement update:) https://bugzilla.redhat.com/show_bug.cgi?id=17811921781192https://errata.rockylinux.org/RLBA-2021:4353RLBA-2021:4353RLBA-2021:4353 Dlm_sensors-sensord-3.4.0-23.20180522git70f7e08.el8.x86_64.rpmDlm_sensors-sensord-3.4.0-23.20180522git70f7e08.el8.x86_64.rpmn %pBeBBBBBBBBBBBBBBsecurityModerate: GNOME security, bug fix, and enhancement updatecmbhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13558CVE-2020-13558CVE-2020-13558https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24870CVE-2020-24870CVE-2020-24870https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918CVE-2020-27918CVE-2020-27918https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623CVE-2020-29623CVE-2020-29623https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36241CVE-2020-36241CVE-2020-36241https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765CVE-2021-1765CVE-2021-1765https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788CVE-2021-1788CVE-2021-1788https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789CVE-2021-1789CVE-2021-1789https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799CVE-2021-1799CVE-2021-1799https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801CVE-2021-1801CVE-2021-1801https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844CVE-2021-1844CVE-2021-1844https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870CVE-2021-1870CVE-2021-1870https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871CVE-2021-1871CVE-2021-1871https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775CVE-2021-21775CVE-2021-21775https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779CVE-2021-21779CVE-2021-21779https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806CVE-2021-21806CVE-2021-21806https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28650CVE-2021-28650CVE-2021-28650https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663CVE-2021-30663CVE-2021-30663https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665CVE-2021-30665CVE-2021-30665https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682CVE-2021-30682CVE-2021-30682https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689CVE-2021-30689CVE-2021-30689https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720CVE-2021-30720CVE-2021-30720https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734CVE-2021-30734CVE-2021-30734https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744CVE-2021-30744CVE-2021-30744https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749CVE-2021-30749CVE-2021-30749https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758CVE-2021-30758CVE-2021-30758https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795CVE-2021-30795CVE-2021-30795https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797CVE-2021-30797CVE-2021-30797https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799CVE-2021-30799CVE-2021-30799https://bugzilla.redhat.com/show_bug.cgi?id=16513781651378https://bugzilla.redhat.com/show_bug.cgi?id=17703021770302https://bugzilla.redhat.com/show_bug.cgi?id=17914781791478https://bugzilla.redhat.com/show_bug.cgi?id=18137271813727https://bugzilla.redhat.com/show_bug.cgi?id=18546791854679https://bugzilla.redhat.com/show_bug.cgi?id=18732971873297https://bugzilla.redhat.com/show_bug.cgi?id=18734881873488https://bugzilla.redhat.com/show_bug.cgi?id=18884041888404https://bugzilla.redhat.com/show_bug.cgi?id=18946131894613https://bugzilla.redhat.com/show_bug.cgi?id=18979321897932https://bugzilla.redhat.com/show_bug.cgi?id=19041391904139https://bugzilla.redhat.com/show_bug.cgi?id=19050001905000https://bugzilla.redhat.com/show_bug.cgi?id=19093001909300The following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3).https://bugzilla.redhat.com/show_bug.cgi?id=19149251914925https://bugzilla.redhat.com/show_bug.cgi?id=19247251924725https://bugzilla.redhat.com/show_bug.cgi?id=19256401925640https://bugzilla.redhat.com/show_bug.cgi?id=19287941928794https://bugzilla.redhat.com/show_bug.cgi?id=19288861928886https://bugzilla.redhat.com/show_bug.cgi?id=19352611935261https://bugzilla.redhat.com/show_bug.cgi?id=19374161937416https://bugzilla.redhat.com/show_bug.cgi?id=19378661937866https://bugzilla.redhat.com/show_bug.cgi?id=19389371938937https://bugzilla.redhat.com/show_bug.cgi?id=19400261940026https://bugzilla.redhat.com/show_bug.cgi?id=19443231944323https://bugzilla.redhat.com/show_bug.cgi?id=19443291944329https://bugzilla.redhat.com/show_bug.cgi?id=19443331944333https://bugzilla.redhat.com/show_bug.cgi?id=19443371944337https://bugzilla.redhat.com/show_bug.cgi?id=19443401944340https://bugzilla.redhat.com/show_bug.cgi?id=19443431944343https://bugzilla.redhat.com/show_bug.cgi?id=19443501944350https://bugzilla.redhat.com/show_bug.cgi?id=19448591944859https://bugzilla.redhat.com/show_bug.cgi?id=19448621944862https://bugzilla.redhat.com/show_bug.cgi?id=19448671944867https://bugzilla.redhat.com/show_bug.cgi?id=19491761949176https://bugzilla.redhat.com/show_bug.cgi?id=19510861951086https://bugzilla.redhat.com/show_bug.cgi?id=19521361952136https://bugzilla.redhat.com/show_bug.cgi?id=19557541955754https://bugzilla.redhat.com/show_bug.cgi?id=19577051957705https://bugzilla.redhat.com/show_bug.cgi?id=19607051960705https://bugzilla.redhat.com/show_bug.cgi?id=19620491962049https://bugzilla.redhat.com/show_bug.cgi?id=19715071971507https://bugzilla.redhat.com/show_bug.cgi?id=19715341971534https://bugzilla.redhat.com/show_bug.cgi?id=19725451972545https://bugzilla.redhat.com/show_bug.cgi?id=19782871978287https://bugzilla.redhat.com/show_bug.cgi?id=19785051978505https://bugzilla.redhat.com/show_bug.cgi?id=19786121978612https://bugzilla.redhat.com/show_bug.cgi?id=19804411980441https://bugzilla.redhat.com/show_bug.cgi?id=19806611980661https://bugzilla.redhat.com/show_bug.cgi?id=19814201981420https://bugzilla.redhat.com/show_bug.cgi?id=19868631986863https://bugzilla.redhat.com/show_bug.cgi?id=19868661986866https://bugzilla.redhat.com/show_bug.cgi?id=19868721986872https://bugzilla.redhat.com/show_bug.cgi?id=19868741986874https://bugzilla.redhat.com/show_bug.cgi?id=19868791986879https://bugzilla.redhat.com/show_bug.cgi?id=19868811986881https://bugzilla.redhat.com/show_bug.cgi?id=19868831986883https://bugzilla.redhat.com/show_bug.cgi?id=19868861986886https://bugzilla.redhat.com/show_bug.cgi?id=19868881986888https://bugzilla.redhat.com/show_bug.cgi?id=19868901986890https://bugzilla.redhat.com/show_bug.cgi?id=19868921986892https://bugzilla.redhat.com/show_bug.cgi?id=19869001986900https://bugzilla.redhat.com/show_bug.cgi?id=19869021986902https://bugzilla.redhat.com/show_bug.cgi?id=19869061986906https://bugzilla.redhat.com/show_bug.cgi?id=19872331987233https://bugzilla.redhat.com/show_bug.cgi?id=19890351989035https://bugzilla.redhat.com/show_bug.cgi?id=19989891998989https://bugzilla.redhat.com/show_bug.cgi?id=19991201999120https://bugzilla.redhat.com/show_bug.cgi?id=20041702004170https://errata.rockylinux.org/RLSA-2021:4381RLSA-2021:4381RLSA-2021:4381 {:gnome-autoar-0.2.3-2.el8.x86_64.rpm0gnome-calculator-3.28.2-2.el8.x86_64.rpm#gnome-online-accounts-3.28.2-3.el8.x86_64.rpm#gnome-online-accounts-devel-3.28.2-3.el8.x86_64.rpmAgnome-software-3.36.1-10.el8.x86_64.rpm6gsettings-desktop-schemas-devel-3.32.0-6.el8.x86_64.rpm%7LibRaw-0.19.5-3.el8.x86_64.rpm3&vino-3.22.0-11.el8.x86_64.rpm(gnome-settings-daemon-3.32.0-16.el8_6.1.x86_64.rpm {:gnome-autoar-0.2.3-2.el8.x86_64.rpm0gnome-calculator-3.28.2-2.el8.x86_64.rpm#gnome-online-accounts-3.28.2-3.el8.x86_64.rpm#gnome-online-accounts-devel-3.28.2-3.el8.x86_64.rpmAgnome-software-3.36.1-10.el8.x86_64.rpm6gsettings-desktop-schemas-devel-3.32.0-6.el8.x86_64.rpm%7LibRaw-0.19.5-3.el8.x86_64.rpm3&vino-3.22.0-11.el8.x86_64.rpm(gnome-settings-daemon-3.32.0-16.el8_6.1.x86_64.rpmpL (fenhancementlibmodulemd bug fix and enhancement updateP) https://bugzilla.redhat.com/show_bug.cgi?id=18945731894573https://bugzilla.redhat.com/show_bug.cgi?id=19844021984402https://errata.rockylinux.org/RLEA-2021:4405RLEA-2021:4405RLEA-2021:4405 [Fpython3-libmodulemd-2.13.0-1.el8.x86_64.rpm[Fpython3-libmodulemd-2.13.0-1.el8.x86_64.rpmqo 5iBBBBBBBBBBbugfixRDMA stack bug fix and enhancement updatey) https://bugzilla.redhat.com/show_bug.cgi?id=19246651924665https://bugzilla.redhat.com/show_bug.cgi?id=19286311928631https://bugzilla.redhat.com/show_bug.cgi?id=19459971945997https://bugzilla.redhat.com/show_bug.cgi?id=19466061946606https://bugzilla.redhat.com/show_bug.cgi?id=19600711960071https://bugzilla.redhat.com/show_bug.cgi?id=19600731960073https://bugzilla.redhat.com/show_bug.cgi?id=19600741960074https://bugzilla.redhat.com/show_bug.cgi?id=19600761960076https://bugzilla.redhat.com/show_bug.cgi?id=19600781960078https://bugzilla.redhat.com/show_bug.cgi?id=19619611961961https://bugzilla.redhat.com/show_bug.cgi?id=19717711971771https://bugzilla.redhat.com/show_bug.cgi?id=19747801974780https://errata.rockylinux.org/RLBA-2021:4412RLBA-2021:4412RLBA-2021:4412 BGmvapich2-2.3.6-1.el8.x86_64.rpmCGmvapich2-devel-2.3.6-1.el8.x86_64.rpmwGmvapich2-doc-2.3.6-1.el8.noarch.rpmDGmvapich2-psm2-2.3.6-1.el8.x86_64.rpmEGmvapich2-psm2-devel-2.3.6-1.el8.x86_64.rpmNqperf-0.4.11-2.el8.x86_64.rpm[rpm-mpi-hooks-8-2.el8.noarch.rpmBGmvapich2-2.3.6-1.el8.x86_64.rpmCGmvapich2-devel-2.3.6-1.el8.x86_64.rpmwGmvapich2-doc-2.3.6-1.el8.noarch.rpmDGmvapich2-psm2-2.3.6-1.el8.x86_64.rpmEGmvapich2-psm2-devel-2.3.6-1.el8.x86_64.rpmNqperf-0.4.11-2.el8.x86_64.rpm[rpm-mpi-hooks-8-2.el8.noarch.rpmrp 8vbugfixlshw bug fix and enhancement update") https://bugzilla.redhat.com/show_bug.cgi?id=19552501955250https://errata.rockylinux.org/RLBA-2021:4442RLBA-2021:4442RLBA-2021:4442 :lshw-gui-B.02.19.2-6.el8.x86_64.rpm:lshw-gui-B.02.19.2-6.el8.x86_64.rpmt ;ysecurityModerate: gnutls and nettle security, bug fix, and enhancement updateKO https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231CVE-2021-20231CVE-2021-20231https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232CVE-2021-20232CVE-2021-20232https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580CVE-2021-3580CVE-2021-3580https://bugzilla.redhat.com/show_bug.cgi?id=17762501776250https://bugzilla.redhat.com/show_bug.cgi?id=19081101908110https://bugzilla.redhat.com/show_bug.cgi?id=19083341908334https://bugzilla.redhat.com/show_bug.cgi?id=19222751922275https://bugzilla.redhat.com/show_bug.cgi?id=19222761922276https://bugzilla.redhat.com/show_bug.cgi?id=19654451965445https://bugzilla.redhat.com/show_bug.cgi?id=19679831967983https://errata.rockylinux.org/RLSA-2021:4451RLSA-2021:4451RLSA-2021:4451 RJnettle-devel-3.4.1-7.el8.x86_64.rpmRJnettle-devel-3.4.1-7.el8.x86_64.rpmuM |BBenhancementhwloc bug fix and enhancement update) https://bugzilla.redhat.com/show_bug.cgi?id=19791501979150https://errata.rockylinux.org/RLEA-2021:4488RLEA-2021:4488RLEA-2021:4488 4xhwloc-gui-2.2.0-3.el8.x86_64.rpm5xhwloc-plugins-2.2.0-3.el8.x86_64.rpm4xhwloc-gui-2.2.0-3.el8.x86_64.rpm5xhwloc-plugins-2.2.0-3.el8.x86_64.rpmxq ABBBBBBBbugfixemacs bug fix and enhancement updateC) https://bugzilla.redhat.com/show_bug.cgi?id=18107291810729https://errata.rockylinux.org/RLBA-2021:4501RLBA-2021:4501RLBA-2021:4501 ]Eemacs-26.1-7.el8.x86_64.rpm^Eemacs-common-26.1-7.el8.x86_64.rpm_Eemacs-lucid-26.1-7.el8.x86_64.rpm`Eemacs-nox-26.1-7.el8.x86_64.rpmaEemacs-terminal-26.1-7.el8.noarch.rpm]Eemacs-26.1-7.el8.x86_64.rpm^Eemacs-common-26.1-7.el8.x86_64.rpm_Eemacs-lucid-26.1-7.el8.x86_64.rpm`Eemacs-nox-26.1-7.el8.x86_64.rpmaEemacs-terminal-26.1-7.el8.noarch.rpmx KsecurityLow: lua security updatellhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24370CVE-2020-24370CVE-2020-24370https://bugzilla.redhat.com/show_bug.cgi?id=18702901870290https://errata.rockylinux.org/RLSA-2021:4510RLSA-2021:4510RLSA-2021:4510  lua-5.3.4-12.el8.x86_64.rpm lua-5.3.4-12.el8.x86_64.rpmzr Nbugfixusermode bug fix and enhancement updateq) https://bugzilla.redhat.com/show_bug.cgi?id=17759311775931https://errata.rockylinux.org/RLBA-2021:4516RLBA-2021:4516RLBA-2021:4516 *usermode-gtk-1.113-2.el8.x86_64.rpm*usermode-gtk-1.113-2.el8.x86_64.rpm{2 QsecurityImportant: cyrus-sasl security update https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407CVE-2022-24407CVE-2022-24407https://bugzilla.redhat.com/show_bug.cgi?id=20553262055326https://errata.rockylinux.org/RLSA-2022:0658RLSA-2022:0658RLSA-2022:0658 M>cyrus-sasl-sql-2.1.27-6.el8_5.x86_64.rpmM>cyrus-sasl-sql-2.1.27-6.el8_5.x86_64.rpm{U dBdB[BBBBBKBBBBBAenhancementperl:5.32 metadata for the Rocky Linux 8 module matrix (1/4)$ https://bugzilla.redhat.com/show_bug.cgi?id=20551252055125https://errata.rockylinux.org/RLEA-2022:1954RLEA-2022:1954RLEA-2022:1954 -U]txsr$#+%3fx~;d}sCEwR  -perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm!perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm"perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm#perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm$perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm2perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpmrrperl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpmRperl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm3perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpmeperl-DBI-1.641-4.module+el8.6.0+891+677074cb.x86_64.rpmsiperl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpmwperl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm-U-perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm!perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm"perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm#perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm$perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm2perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm]txs perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpmr$rrperl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm#+%Rperl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm3fx~3perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm;d}eperl-DBI-1.641-4.module+el8.6.0+891+677074cb.x86_64.rpmsCEsiperl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpmwR wperl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpmW dBdB[BBBBBKBBBBBAenhancementperl:5.32 metadata for the Rocky Linux 8 module matrix (3/4)# https://bugzilla.redhat.com/show_bug.cgi?id=20551332055133https://errata.rockylinux.org/RLEA-2022:1956RLEA-2022:1956RLEA-2022:1956 -U]txsr$#+%3fx~;d}sCEwR  -perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm!perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm"perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm#perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm$perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm2perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpmrrperl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpmRperl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm3perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpmeperl-DBI-1.641-4.module+el8.6.0+891+677074cb.x86_64.rpmsiperl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpmwperl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm-U-perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm!perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm"perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm#perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm$perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm2perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm]txs perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpmr$rrperl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm#+%Rperl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm3fx~3perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm;d}eperl-DBI-1.641-4.module+el8.6.0+891+677074cb.x86_64.rpmsCEsiperl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpmwR wperl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpmZ )VBBBBBBBBBBBBBBBBBenhancementRDMA stack bug fix and enhancement update" https://bugzilla.redhat.com/show_bug.cgi?id=20085092008509https://bugzilla.redhat.com/show_bug.cgi?id=20085102008510https://bugzilla.redhat.com/show_bug.cgi?id=20085132008513https://bugzilla.redhat.com/show_bug.cgi?id=20085152008515https://bugzilla.redhat.com/show_bug.cgi?id=20085172008517https://bugzilla.redhat.com/show_bug.cgi?id=20200622020062https://bugzilla.redhat.com/show_bug.cgi?id=20248652024865https://bugzilla.redhat.com/show_bug.cgi?id=20551832055183https://errata.rockylinux.org/RLEA-2022:2014RLEA-2022:2014RLEA-2022:2014 9!mpich-3.4.2-1.el8.x86_64.rpm:!mpich-devel-3.4.2-1.el8.x86_64.rpmv!mpich-doc-3.4.2-1.el8.noarch.rpm;mpitests-mpich-5.8-1.el8.x86_64.rpm<mpitests-mvapich2-5.8-1.el8.x86_64.rpm=mpitests-mvapich2-psm2-5.8-1.el8.x86_64.rpm>mpitests-openmpi-5.8-1.el8.x86_64.rpmjeopenmpi-4.1.1-3.el8.x86_64.rpmkeopenmpi-devel-4.1.1-3.el8.x86_64.rpm~Mpmix-2.2.5-1.el8.x86_64.rpm 9!mpich-3.4.2-1.el8.x86_64.rpm:!mpich-devel-3.4.2-1.el8.x86_64.rpmv!mpich-doc-3.4.2-1.el8.noarch.rpm;mpitests-mpich-5.8-1.el8.x86_64.rpm<mpitests-mvapich2-5.8-1.el8.x86_64.rpm=mpitests-mvapich2-psm2-5.8-1.el8.x86_64.rpm>mpitests-openmpi-5.8-1.el8.x86_64.rpmjeopenmpi-4.1.1-3.el8.x86_64.rpmkeopenmpi-devel-4.1.1-3.el8.x86_64.rpm~Mpmix-2.2.5-1.el8.x86_64.rpmA 4jBBBBBBBBbugfixnet-snmp bug fix and enhancement update! https://bugzilla.redhat.com/show_bug.cgi?id=19083311908331https://errata.rockylinux.org/RLBA-2022:2023RLBA-2022:2023RLBA-2022:2023 onet-snmp-5.8-25.el8.x86_64.rpmpnet-snmp-agent-libs-5.8-25.el8.x86_64.rpmqnet-snmp-devel-5.8-25.el8.x86_64.rpmrnet-snmp-perl-5.8-25.el8.x86_64.rpmsnet-snmp-utils-5.8-25.el8.x86_64.rpmonet-snmp-5.8-25.el8.x86_64.rpmpnet-snmp-agent-libs-5.8-25.el8.x86_64.rpmqnet-snmp-devel-5.8-25.el8.x86_64.rpmrnet-snmp-perl-5.8-25.el8.x86_64.rpmsnet-snmp-utils-5.8-25.el8.x86_64.rpmB 7ubugfixjson-c bug fix and enhancement update  https://bugzilla.redhat.com/show_bug.cgi?id=20010632001063https://errata.rockylinux.org/RLBA-2022:2027RLBA-2022:2027RLBA-2022:2027 M.json-c-devel-0.13.1-3.el8.x86_64.rpmM.json-c-devel-0.13.1-3.el8.x86_64.rpm[ :xenhancementlibseccomp bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=20198932019893https://errata.rockylinux.org/RLEA-2022:2029RLEA-2022:2029RLEA-2022:2029 Yilibseccomp-devel-2.5.2-1.el8.x86_64.rpmYilibseccomp-devel-2.5.2-1.el8.x86_64.rpmP dBdB[BBBBBKBBBBBSDBBBDFBBBBFBBBBBFBBBDBBBBDBDWBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBDBBBBBBBBBBBBBBBBBBBBvB@BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBenhancementnew module: perl:5.32Q https://bugzilla.redhat.com/show_bug.cgi?id=20214712021471This enhancement update adds the perl:5.32 module to Red Hat Enterprise Linux 8.https://errata.rockylinux.org/RLEA-2022:1869RLEA-2022:1869RLEA-2022:1869 ] .f-U%#\r$#+%3fx~;d}sCE1ke}wR ]Vperl-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm7Cperl-Algorithm-Diff-1.1903-10.module+el8.6.0+878+f93dfff7.noarch.rpm3operl-Archive-Tar-2.38-3.module+el8.6.0+879+823e3012.noarch.rpm4perl-Archive-Zip-1.68-3.module+el8.6.0+879+823e3012.noarch.rpm ,perl-Attribute-Handlers-1.01-471.module+el8.6.0+879+823e3012.noarch.rpmvlperl-autodie-2.34-1.module+el8.6.0+879+823e3012.noarch.rpmperl-AutoLoader-5.74-471.module+el8.6.0+879+823e3012.noarch.rpmperl-AutoSplit-5.74-471.module+el8.6.0+879+823e3012.noarch.rpm/Pperl-autouse-1.11-471.module+el8.6.0+879+823e3012.noarch.rpm}aperl-B-1.80-471.module+el8.6.0+879+823e3012.x86_64.rpm0Sperl-base-2.27-471.module+el8.6.0+879+823e3012.noarch.rpmvperl-Benchmark-1.23-471.module+el8.6.0+879+823e3012.noarch.rpmw'perl-bignum-0.51-439.module+el8.6.0+878+f93dfff7.noarch.rpm1Mperl-blib-1.07-471.module+el8.6.0+879+823e3012.noarch.rpmC?perl-Carp-1.50-439.module+el8.6.0+878+f93dfff7.noarch.rpmperl-Class-Struct-0.66-471.module+el8.6.0+879+823e3012.noarch.rpmDSperl-Compress-Bzip2-2.28-2.module+el8.6.0+879+823e3012.x86_64.rpmEkperl-Compress-Raw-Bzip2-2.096-1.module+el8.6.0+879+823e3012.x86_64.rpm~kperl-Compress-Raw-Lzma-2.096-1.module+el8.6.0+879+823e3012.x86_64.rpmFkperl-Compress-Raw-Zlib-2.096-1.module+el8.6.0+879+823e3012.x86_64.rpm;perl-Config-Extensions-0.03-471.module+el8.6.0+879+823e3012.noarch.rpmG$perl-Config-Perl-V-0.32-441.module+el8.6.0+878+f93dfff7.noarch.rpmMFperl-constant-1.33-1001.module+el8.6.0+878+f93dfff7.noarch.rpmLperl-Devel-Size-0.83-3.module+el8.6.0+878+f93dfff7.x86_64.rpm5dperl-CPAN-2.28-5.module+el8.6.0+879+823e3012.noarch.rpm perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm8Qperl-CPAN-Meta-2.150010-397.module+el8.6.0+878+f93dfff7.noarch.rpm9Pperl-CPAN-Meta-Requirements-2.140-397.module+el8.6.0+878+f93dfff7.noarch.rpm:7perl-CPAN-Meta-YAML-0.018-1001.module+el8.6.0+878+f93dfff7.noarch.rpmIvperl-Data-Dumper-2.174-440.module+el8.6.0+878+f93dfff7.x86_64.rpm;9perl-Data-OptList-0.110-7.module+el8.6.0+878+f93dfff7.noarch.rpmJ"perl-Data-Section-0.200007-8.module+el8.6.0+878+f93dfff7.noarch.rpmHcperl-DB_File-1.855-1.module+el8.6.0+879+823e3012.x86_64.rpmiperl-DBM_Filter-0.06-471.module+el8.6.0+879+823e3012.noarch.rpm2perl-debugger-1.56-471.module+el8.6.0+879+823e3012.noarch.rpm3hperl-deprecate-0.04-471.module+el8.6.0+879+823e3012.noarch.rpm:Vperl-devel-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm5+perl-Devel-Peek-1.28-471.module+el8.6.0+879+823e3012.x86_64.rpmKPperl-Devel-PPPort-3.62-1.module+el8.6.0+879+823e3012.x86_64.rpm!Lperl-Devel-SelfStubber-1.06-471.module+el8.6.0+879+823e3012.noarch.rpm4Wperl-diagnostics-1.37-471.module+el8.6.0+879+823e3012.noarch.rpmMTperl-Digest-1.20-1.module+el8.6.0+879+823e3012.noarch.rpmNlperl-Digest-MD5-2.58-1.module+el8.6.0+879+823e3012.x86_64.rpmOjperl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.x86_64.rpmIperl-DirHandle-1.05-471.module+el8.6.0+879+823e3012.noarch.rpm5perl-doc-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpm Sperl-Dumpvalue-2.27-471.module+el8.6.0+879+823e3012.noarch.rpmCperl-DynaLoader-1.47-471.module+el8.6.0+879+823e3012.x86_64.rpmPBperl-Encode-3.08-461.module+el8.6.0+879+823e3012.x86_64.rpmQBperl-Encode-devel-3.08-461.module+el8.6.0+879+823e3012.x86_64.rpm0perl-Encode-Locale-1.05-10.module+el8.6.0+879+823e3012.noarch.rpmxyperl-encoding-3.00-461.module+el8.6.0+879+823e3012.x86_64.rpm6sperl-encoding-warnings-0.13-471.module+el8.6.0+879+823e3012.noarch.rpm Pperl-English-1.11-471.module+el8.6.0+879+823e3012.noarch.rpm<@perl-Env-1.04-396.module+el8.6.0+878+f93dfff7.noarch.rpmV4perl-Errno-1.30-471.module+el8.6.0+879+823e3012.x86_64.rpmJgperl-experimental-0.025-1.module+el8.6.0+879+823e3012.noarch.rpm6Sperl-Exporter-5.74-458.module+el8.6.0+879+823e3012.noarch.rpm7-perl-ExtUtils-CBuilder-0.280236-1.module+el8.6.0+879+823e3012.noarch.rpm8Xperl-ExtUtils-Command-7.46-3.module+el8.6.0+879+823e3012.noarch.rpm ~perl-ExtUtils-Constant-0.25-471.module+el8.6.0+879+823e3012.noarch.rpm"|perl-ExtUtils-Embed-1.35-471.module+el8.6.0+879+823e3012.noarch.rpm9aperl-ExtUtils-Install-2.20-1.module+el8.6.0+879+823e3012.noarch.rpm;Xperl-ExtUtils-MakeMaker-7.46-3.module+el8.6.0+879+823e3012.noarch.rpm<8perl-ExtUtils-Manifest-1.73-1.module+el8.6.0+879+823e3012.noarch.rpm#=perl-ExtUtils-Miniperl-1.09-471.module+el8.6.0+879+823e3012.noarch.rpm:Xperl-ExtUtils-MM-Utils-7.46-3.module+el8.6.0+879+823e3012.noarch.rpmRHperl-ExtUtils-ParseXS-3.40-439.module+el8.6.0+878+f93dfff7.noarch.rpm6perl-Fcntl-1.13-471.module+el8.6.0+879+823e3012.x86_64.rpm=6perl-Fedora-VSP-0.001-10.module+el8.6.0+878+f93dfff7.noarch.rpm7Sperl-fields-2.27-471.module+el8.6.0+879+823e3012.noarch.rpm perl-File-Basename-2.85-471.module+el8.6.0+879+823e3012.noarch.rpmBperl-FileCache-1.10-471.module+el8.6.0+879+823e3012.noarch.rpm Dperl-File-Compare-1.100.600-471.module+el8.6.0+879+823e3012.noarch.rpmmperl-File-Copy-2.34-471.module+el8.6.0+879+823e3012.noarch.rpmaperl-File-DosGlob-1.12-471.module+el8.6.0+879+823e3012.x86_64.rpmS'perl-File-Fetch-1.00-1.module+el8.6.0+879+823e3012.noarch.rpmWperl-File-Find-1.37-471.module+el8.6.0+879+823e3012.noarch.rpmNperl-FileHandle-2.03-471.module+el8.6.0+879+823e3012.noarch.rpmT.perl-File-HomeDir-1.004-6.module+el8.6.0+878+f93dfff7.noarch.rpmULperl-File-Path-2.16-439.module+el8.6.0+878+f93dfff7.noarch.rpm=perl-File-stat-1.09-471.module+el8.6.0+879+823e3012.noarch.rpm=*perl-File-Temp-0.231.100-1.module+el8.6.0+879+823e3012.noarch.rpm8wperl-filetest-1.03-471.module+el8.6.0+879+823e3012.noarch.rpmV7perl-File-Which-1.23-4.module+el8.6.0+878+f93dfff7.noarch.rpmWperl-Filter-1.60-1.module+el8.6.0+879+823e3012.x86_64.rpm>perl-Filter-Simple-0.96-457.module+el8.6.0+879+823e3012.noarch.rpmperl-FindBin-1.51-471.module+el8.6.0+879+823e3012.noarch.rpmperl-GDBM_File-1.18-471.module+el8.6.0+879+823e3012.x86_64.rpmHperl-generators-1.13-1.module+el8.6.0+879+823e3012.noarch.rpm?;perl-Getopt-Long-2.52-1.module+el8.6.0+879+823e3012.noarch.rpmaperl-Getopt-Std-1.12-471.module+el8.6.0+879+823e3012.noarch.rpm=perl-Hash-Util-0.23-471.module+el8.6.0+879+823e3012.x86_64.rpm"perl-Hash-Util-FieldHash-1.20-471.module+el8.6.0+879+823e3012.x86_64.rpmyUperl-homedir-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm@kperl-HTTP-Tiny-0.078-1.module+el8.6.0+879+823e3012.noarch.rpm<perl-I18N-Collate-1.02-471.module+el8.6.0+879+823e3012.noarch.rpm6perl-I18N-Langinfo-0.19-471.module+el8.6.0+879+823e3012.x86_64.rpm perl-I18N-LangTags-0.44-471.module+el8.6.0+879+823e3012.noarch.rpm9perl-if-0.60.800-471.module+el8.6.0+879+823e3012.noarch.rpmperl-Importer-0.025-6.module+el8.6.0+878+f93dfff7.noarch.rpmNVperl-inc-latest-0.500-10.module+el8.6.0+878+f93dfff7.noarch.rpm`Vperl-interpreter-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpmXBperl-IO-1.43-471.module+el8.6.0+879+823e3012.x86_64.rpmAkperl-IO-Compress-2.096-1.module+el8.6.0+879+823e3012.noarch.rpmkperl-IO-Compress-Lzma-2.096-1.module+el8.6.0+879+823e3012.noarch.rpmXperl-IO-Socket-IP-0.41-2.module+el8.6.0+879+823e3012.noarch.rpm>5perl-IO-Zlib-1.10-471.module+el8.6.0+879+823e3012.noarch.rpmYUperl-IPC-Cmd-1.04-2.module+el8.6.0+878+f93dfff7.noarch.rpmXperl-IPC-Open3-1.21-471.module+el8.6.0+879+823e3012.noarch.rpm[rperl-IPC-System-Simple-1.30-3.module+el8.6.0+879+823e3012.noarch.rpmZ5perl-IPC-SysV-2.09-1.module+el8.6.0+879+823e3012.x86_64.rpm\Iperl-JSON-PP-4.04-2.module+el8.6.0+878+f93dfff7.noarch.rpm:;perl-less-0.03-471.module+el8.6.0+879+823e3012.noarch.rpm _perl-lib-0.65-471.module+el8.6.0+879+823e3012.x86_64.rpmzperl-libnet-3.13-1.module+el8.6.0+879+823e3012.noarch.rpm+Vperl-libnetcfg-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpmaVperl-libs-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm;=perl-locale-1.09-471.module+el8.6.0+879+823e3012.noarch.rpm]<perl-Locale-Maketext-1.29-440.module+el8.6.0+878+f93dfff7.noarch.rpm$)perl-Locale-Maketext-Simple-0.21-471.module+el8.6.0+879+823e3012.noarch.rpm{Uperl-local-lib-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpmOVperl-macros-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpm_Fperl-Math-BigInt-1.9998.18-1.module+el8.6.0+878+f93dfff7.noarch.rpm`|perl-Math-BigInt-FastCalc-0.500.900-1.module+el8.6.0+878+f93dfff7.x86_64.rpm@<perl-Math-BigRat-0.2614-2.module+el8.6.0+878+f93dfff7.noarch.rpmA perl-Math-Complex-1.59-471.module+el8.6.0+879+823e3012.noarch.rpm%wperl-Memoize-1.03-471.module+el8.6.0+879+823e3012.noarch.rpm<perl-meta-notation-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpm^pperl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.x86_64.rpmBperl-Module-Build-0.42.31-5.module+el8.6.0+879+823e3012.noarch.rpmCnperl-Module-CoreList-5.20211020-1.module+el8.6.0+879+823e3012.noarch.rpmDnperl-Module-CoreList-tools-5.20211020-1.module+el8.6.0+879+823e3012.noarch.rpmE0perl-Module-Load-0.36-1.module+el8.6.0+879+823e3012.noarch.rpmFperl-Module-Load-Conditional-0.74-1.module+el8.6.0+879+823e3012.noarch.rpm&#perl-Module-Loaded-0.08-471.module+el8.6.0+879+823e3012.noarch.rpma,perl-Module-Metadata-1.000037-1.module+el8.6.0+878+f93dfff7.noarch.rpmvperl-mro-1.23-471.module+el8.6.0+879+823e3012.x86_64.rpm?:perl-MRO-Compat-0.13-5.module+el8.6.0+878+f93dfff7.noarch.rpmperl-NDBM_File-1.15-471.module+el8.6.0+879+823e3012.x86_64.rpm<perl-Net-1.02-471.module+el8.6.0+879+823e3012.noarch.rpm'|perl-Net-Ping-2.72-471.module+el8.6.0+879+823e3012.noarch.rpmperl-NEXT-0.67-471.module+el8.6.0+879+823e3012.noarch.rpmY:perl-Object-HashBase-0.009-4.module+el8.6.0+879+823e3012.noarch.rpmZ:perl-Object-HashBase-tools-0.009-4.module+el8.6.0+879+823e3012.noarch.rpmperl-ODBM_File-1.16-471.module+el8.6.0+879+823e3012.x86_64.rpm Dperl-Opcode-1.48-471.module+el8.6.0+879+823e3012.x86_64.rpm,aperl-open-1.12-471.module+el8.6.0+879+823e3012.noarch.rpm=Vperl-overload-1.31-471.module+el8.6.0+879+823e3012.noarch.rpm>fperl-overloading-0.02-471.module+el8.6.0+879+823e3012.noarch.rpmBAperl-Package-Generator-1.106-12.module+el8.6.0+878+f93dfff7.noarch.rpmc0perl-PathTools-3.78-439.module+el8.6.0+878+f93dfff7.x86_64.rpmCIperl-Params-Check-0.38-396.module+el8.6.0+878+f93dfff7.noarch.rpmbperl-Params-Util-1.102-2.module+el8.6.0+879+823e3012.x86_64.rpm|+perl-parent-0.238-457.module+el8.6.0+879+823e3012.noarch.rpmKLperl-perlfaq-5.20210520-1.module+el8.6.0+879+823e3012.noarch.rpmdlperl-PerlIO-via-QuotedPrint-0.09-1.module+el8.6.0+879+823e3012.noarch.rpmD?perl-Perl-OSType-1.010-397.module+el8.6.0+878+f93dfff7.noarch.rpmperl-ph-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpmeBperl-Pod-Checker-1.74-1.module+el8.6.0+879+823e3012.noarch.rpmEJperl-Pod-Escapes-1.07-396.module+el8.6.0+878+f93dfff7.noarch.rpm6perl-Pod-Functions-1.13-471.module+el8.6.0+879+823e3012.noarch.rpm(fperl-Pod-Html-1.25-471.module+el8.6.0+879+823e3012.noarch.rpmL@perl-podlators-4.14-457.module+el8.6.0+879+823e3012.noarch.rpmFHperl-Pod-Parser-1.63-1001.module+el8.6.0+878+f93dfff7.noarch.rpmG%perl-Pod-Perldoc-3.28.01-443.module+el8.6.0+879+823e3012.noarch.rpmH>perl-Pod-Simple-3.42-1.module+el8.6.0+879+823e3012.noarch.rpmfCperl-Pod-Usage-2.01-1.module+el8.6.0+879+823e3012.noarch.rpm gperl-POSIX-1.94-471.module+el8.6.0+879+823e3012.x86_64.rpmqperl-Safe-2.41-471.module+el8.6.0+879+823e3012.noarch.rpmgsperl-Scalar-List-Utils-1.55-457.module+el8.6.0+879+823e3012.x86_64.rpm Mperl-Search-Dict-1.07-471.module+el8.6.0+879+823e3012.noarch.rpm!<perl-SelectSaver-1.02-471.module+el8.6.0+879+823e3012.noarch.rpm)hperl-SelfLoader-1.26-471.module+el8.6.0+879+823e3012.noarch.rpm?=perl-sigtrap-1.09-471.module+el8.6.0+879+823e3012.noarch.rpmhwperl-Socket-2.031-1.module+el8.6.0+879+823e3012.x86_64.rpmi!perl-Software-License-0.103014-5.module+el8.6.0+878+f93dfff7.noarch.rpm@Qperl-sort-2.04-471.module+el8.6.0+879+823e3012.noarch.rpmj"perl-Storable-3.21-457.module+el8.6.0+879+823e3012.x86_64.rpmkperl-Sub-Exporter-0.987-17.module+el8.6.0+879+823e3012.noarch.rpmG>perl-Sub-Install-0.928-15.module+el8.6.0+878+f93dfff7.noarch.rpmAwperl-subs-1.03-471.module+el8.6.0+879+823e3012.noarch.rpm"4perl-Symbol-1.08-471.module+el8.6.0+879+823e3012.noarch.rpm vperl-Sys-Hostname-1.23-471.module+el8.6.0+879+823e3012.x86_64.rpmlwperl-Sys-Syslog-0.36-1.module+el8.6.0+878+f93dfff7.x86_64.rpmmEperl-Term-ANSIColor-5.01-458.module+el8.6.0+879+823e3012.noarch.rpmHOperl-Term-Cap-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm#perl-Term-Complete-1.403-471.module+el8.6.0+879+823e3012.noarch.rpm$Kperl-Term-ReadLine-1.17-471.module+el8.6.0+879+823e3012.noarch.rpm perl-Term-Table-0.015-2.module+el8.6.0+878+f93dfff7.noarch.rpm*Vperl-Test-1.31-471.module+el8.6.0+879+823e3012.noarch.rpmIMperl-Test-Harness-3.42-2.module+el8.6.0+878+f93dfff7.noarch.rpmI5perl-Test-Simple-1.302181-2.module+el8.6.0+879+823e3012.noarch.rpm%<perl-Text-Abbrev-1.02-471.module+el8.6.0+879+823e3012.noarch.rpmnOperl-Text-Balanced-2.04-1.module+el8.6.0+879+823e3012.noarch.rpmo>perl-Text-Diff-1.45-7.module+el8.6.0+878+f93dfff7.noarch.rpmJ8perl-Text-Glob-0.11-5.module+el8.6.0+878+f93dfff7.noarch.rpmK\perl-Text-ParseWords-3.30-396.module+el8.6.0+878+f93dfff7.noarch.rpmLTperl-Text-Tabs+Wrap-2013.0523-396.module+el8.6.0+878+f93dfff7.noarch.rpmp@perl-Text-Template-1.58-1.module+el8.6.0+878+f93dfff7.noarch.rpm&perl-Thread-3.05-471.module+el8.6.0+879+823e3012.noarch.rpmqperl-Thread-Queue-3.14-457.module+el8.6.0+879+823e3012.noarch.rpm~perl-threads-2.25-457.module+el8.6.0+879+823e3012.x86_64.rpm'[perl-Thread-Semaphore-2.13-471.module+el8.6.0+879+823e3012.noarch.rpmVperl-threads-shared-1.61-457.module+el8.6.0+879+823e3012.x86_64.rpm(?perl-Tie-4.6-471.module+el8.6.0+879+823e3012.noarch.rpm)Lperl-Tie-File-1.06-471.module+el8.6.0+879+823e3012.noarch.rpm*7perl-Tie-Memoize-1.1-471.module+el8.6.0+879+823e3012.noarch.rpm+}perl-Tie-RefHash-1.39-471.module+el8.6.0+879+823e3012.noarch.rpm,wperl-Time-1.03-471.module+el8.6.0+879+823e3012.noarch.rpm8uperl-Time-HiRes-1.9764-459.module+el8.6.0+879+823e3012.x86_64.rpmrperl-Time-Local-1.300-4.module+el8.6.0+879+823e3012.noarch.rpm9:perl-Time-Piece-1.3401-471.module+el8.6.0+879+823e3012.x86_64.rpmt/perl-Unicode-Collate-1.29-1.module+el8.6.0+879+823e3012.x86_64.rpmu)perl-Unicode-Normalize-1.27-458.module+el8.6.0+879+823e3012.x86_64.rpm-perl-Unicode-UCD-0.75-471.module+el8.6.0+879+823e3012.noarch.rpmsAperl-URI-1.76-5.module+el8.6.0+878+f93dfff7.noarch.rpm.wperl-User-pwent-1.03-471.module+el8.6.0+879+823e3012.noarch.rpm-perl-utils-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpmBIperl-vars-1.05-471.module+el8.6.0+879+823e3012.noarch.rpm perl-version-0.99.29-1.module+el8.6.0+879+823e3012.x86_64.rpmC1perl-vmsish-1.04-471.module+el8.6.0+879+823e3012.noarch.rpm-perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm!perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm"perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm#perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm$perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm2perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm}9perl-Data-Dump-1.23-7.module+el8.6.0+965+5d46f3c6.noarch.rpm~/perl-Digest-HMAC-1.03-17.module+el8.6.0+965+5d46f3c6.noarch.rpmjperl-File-Listing-6.04-17.module+el8.6.0+965+5d46f3c6.noarch.rpmW/perl-HTML-Parser-3.72-15.module+el8.6.0+965+5d46f3c6.x86_64.rpmYperl-HTML-Tagset-3.20-34.module+el8.6.0+965+5d46f3c6.noarch.rpmkperl-HTTP-Cookies-6.04-2.module+el8.6.0+965+5d46f3c6.noarch.rpmiperl-HTTP-Date-6.02-19.module+el8.6.0+965+5d46f3c6.noarch.rpmnperl-HTTP-Message-6.18-1.module+el8.6.0+965+5d46f3c6.noarch.rpmfperl-HTTP-Negotiate-6.01-19.module+el8.6.0+965+5d46f3c6.noarch.rpm-perl-IO-HTML-1.001-11.module+el8.6.0+965+5d46f3c6.noarch.rpm%operl-libwww-perl-6.34-1.module+el8.6.0+965+5d46f3c6.noarch.rpmgperl-LWP-MediaTypes-6.02-15.module+el8.6.0+965+5d46f3c6.noarch.rpm lperl-LWP-Protocol-https-6.07-4.module+el8.6.0+965+5d46f3c6.noarch.rpm Tperl-Mozilla-CA-20160104-7.module+el8.6.0+965+5d46f3c6.noarch.rpm mperl-Net-HTTP-6.17-2.module+el8.6.0+965+5d46f3c6.noarch.rpm 1perl-NTLM-1.09-17.module+el8.6.0+965+5d46f3c6.noarch.rpmGperl-TimeDate-2.30-15.module+el8.6.0+965+5d46f3c6.noarch.rpm#perl-Try-Tiny-0.30-7.module+el8.6.0+965+5d46f3c6.noarch.rpmhperl-WWW-RobotRules-6.02-18.module+el8.6.0+965+5d46f3c6.noarch.rpmrrperl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpmRperl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm3perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpmeperl-DBI-1.641-4.module+el8.6.0+891+677074cb.x86_64.rpmsiperl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm1Operl-IO-Socket-SSL-2.066-4.module+el8.6.0+957+15d660ad.noarch.rpmw^perl-Net-SSLeay-1.88-2.module+el8.6.0+957+15d660ad.x86_64.rpmwperl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm ] .f^]Vperl-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm7Cperl-Algorithm-Diff-1.1903-10.module+el8.6.0+878+f93dfff7.noarch.rpm3operl-Archive-Tar-2.38-3.module+el8.6.0+879+823e3012.noarch.rpm4perl-Archive-Zip-1.68-3.module+el8.6.0+879+823e3012.noarch.rpm ,perl-Attribute-Handlers-1.01-471.module+el8.6.0+879+823e3012.noarch.rpmvlperl-autodie-2.34-1.module+el8.6.0+879+823e3012.noarch.rpmperl-AutoLoader-5.74-471.module+el8.6.0+879+823e3012.noarch.rpmperl-AutoSplit-5.74-471.module+el8.6.0+879+823e3012.noarch.rpm/Pperl-autouse-1.11-471.module+el8.6.0+879+823e3012.noarch.rpm}aperl-B-1.80-471.module+el8.6.0+879+823e3012.x86_64.rpm0Sperl-base-2.27-471.module+el8.6.0+879+823e3012.noarch.rpmvperl-Benchmark-1.23-471.module+el8.6.0+879+823e3012.noarch.rpmw'perl-bignum-0.51-439.module+el8.6.0+878+f93dfff7.noarch.rpm1Mperl-blib-1.07-471.module+el8.6.0+879+823e3012.noarch.rpmC?perl-Carp-1.50-439.module+el8.6.0+878+f93dfff7.noarch.rpmperl-Class-Struct-0.66-471.module+el8.6.0+879+823e3012.noarch.rpmDSperl-Compress-Bzip2-2.28-2.module+el8.6.0+879+823e3012.x86_64.rpmEkperl-Compress-Raw-Bzip2-2.096-1.module+el8.6.0+879+823e3012.x86_64.rpm~kperl-Compress-Raw-Lzma-2.096-1.module+el8.6.0+879+823e3012.x86_64.rpmFkperl-Compress-Raw-Zlib-2.096-1.module+el8.6.0+879+823e3012.x86_64.rpm;perl-Config-Extensions-0.03-471.module+el8.6.0+879+823e3012.noarch.rpmG$perl-Config-Perl-V-0.32-441.module+el8.6.0+878+f93dfff7.noarch.rpmMFperl-constant-1.33-1001.module+el8.6.0+878+f93dfff7.noarch.rpmLperl-Devel-Size-0.83-3.module+el8.6.0+878+f93dfff7.x86_64.rpm5dperl-CPAN-2.28-5.module+el8.6.0+879+823e3012.noarch.rpm perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm8Qperl-CPAN-Meta-2.150010-397.module+el8.6.0+878+f93dfff7.noarch.rpm9Pperl-CPAN-Meta-Requirements-2.140-397.module+el8.6.0+878+f93dfff7.noarch.rpm:7perl-CPAN-Meta-YAML-0.018-1001.module+el8.6.0+878+f93dfff7.noarch.rpmIvperl-Data-Dumper-2.174-440.module+el8.6.0+878+f93dfff7.x86_64.rpm;9perl-Data-OptList-0.110-7.module+el8.6.0+878+f93dfff7.noarch.rpmJ"perl-Data-Section-0.200007-8.module+el8.6.0+878+f93dfff7.noarch.rpmHcperl-DB_File-1.855-1.module+el8.6.0+879+823e3012.x86_64.rpmiperl-DBM_Filter-0.06-471.module+el8.6.0+879+823e3012.noarch.rpm2perl-debugger-1.56-471.module+el8.6.0+879+823e3012.noarch.rpm3hperl-deprecate-0.04-471.module+el8.6.0+879+823e3012.noarch.rpm:Vperl-devel-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm5+perl-Devel-Peek-1.28-471.module+el8.6.0+879+823e3012.x86_64.rpmKPperl-Devel-PPPort-3.62-1.module+el8.6.0+879+823e3012.x86_64.rpm!Lperl-Devel-SelfStubber-1.06-471.module+el8.6.0+879+823e3012.noarch.rpm4Wperl-diagnostics-1.37-471.module+el8.6.0+879+823e3012.noarch.rpmMTperl-Digest-1.20-1.module+el8.6.0+879+823e3012.noarch.rpmNlperl-Digest-MD5-2.58-1.module+el8.6.0+879+823e3012.x86_64.rpmOjperl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.x86_64.rpmIperl-DirHandle-1.05-471.module+el8.6.0+879+823e3012.noarch.rpm5perl-doc-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpm Sperl-Dumpvalue-2.27-471.module+el8.6.0+879+823e3012.noarch.rpmCperl-DynaLoader-1.47-471.module+el8.6.0+879+823e3012.x86_64.rpmPBperl-Encode-3.08-461.module+el8.6.0+879+823e3012.x86_64.rpmQBperl-Encode-devel-3.08-461.module+el8.6.0+879+823e3012.x86_64.rpm0perl-Encode-Locale-1.05-10.module+el8.6.0+879+823e3012.noarch.rpmxyperl-encoding-3.00-461.module+el8.6.0+879+823e3012.x86_64.rpm6sperl-encoding-warnings-0.13-471.module+el8.6.0+879+823e3012.noarch.rpm Pperl-English-1.11-471.module+el8.6.0+879+823e3012.noarch.rpm<@perl-Env-1.04-396.module+el8.6.0+878+f93dfff7.noarch.rpmV4perl-Errno-1.30-471.module+el8.6.0+879+823e3012.x86_64.rpmJgperl-experimental-0.025-1.module+el8.6.0+879+823e3012.noarch.rpm6Sperl-Exporter-5.74-458.module+el8.6.0+879+823e3012.noarch.rpm7-perl-ExtUtils-CBuilder-0.280236-1.module+el8.6.0+879+823e3012.noarch.rpm8Xperl-ExtUtils-Command-7.46-3.module+el8.6.0+879+823e3012.noarch.rpm ~perl-ExtUtils-Constant-0.25-471.module+el8.6.0+879+823e3012.noarch.rpm"|perl-ExtUtils-Embed-1.35-471.module+el8.6.0+879+823e3012.noarch.rpm9aperl-ExtUtils-Install-2.20-1.module+el8.6.0+879+823e3012.noarch.rpm;Xperl-ExtUtils-MakeMaker-7.46-3.module+el8.6.0+879+823e3012.noarch.rpm<8perl-ExtUtils-Manifest-1.73-1.module+el8.6.0+879+823e3012.noarch.rpm#=perl-ExtUtils-Miniperl-1.09-471.module+el8.6.0+879+823e3012.noarch.rpm:Xperl-ExtUtils-MM-Utils-7.46-3.module+el8.6.0+879+823e3012.noarch.rpmRHperl-ExtUtils-ParseXS-3.40-439.module+el8.6.0+878+f93dfff7.noarch.rpm6perl-Fcntl-1.13-471.module+el8.6.0+879+823e3012.x86_64.rpm=6perl-Fedora-VSP-0.001-10.module+el8.6.0+878+f93dfff7.noarch.rpm7Sperl-fields-2.27-471.module+el8.6.0+879+823e3012.noarch.rpm perl-File-Basename-2.85-471.module+el8.6.0+879+823e3012.noarch.rpmBperl-FileCache-1.10-471.module+el8.6.0+879+823e3012.noarch.rpm Dperl-File-Compare-1.100.600-471.module+el8.6.0+879+823e3012.noarch.rpmmperl-File-Copy-2.34-471.module+el8.6.0+879+823e3012.noarch.rpmaperl-File-DosGlob-1.12-471.module+el8.6.0+879+823e3012.x86_64.rpmS'perl-File-Fetch-1.00-1.module+el8.6.0+879+823e3012.noarch.rpmWperl-File-Find-1.37-471.module+el8.6.0+879+823e3012.noarch.rpmNperl-FileHandle-2.03-471.module+el8.6.0+879+823e3012.noarch.rpmT.perl-File-HomeDir-1.004-6.module+el8.6.0+878+f93dfff7.noarch.rpmULperl-File-Path-2.16-439.module+el8.6.0+878+f93dfff7.noarch.rpm=perl-File-stat-1.09-471.module+el8.6.0+879+823e3012.noarch.rpm=*perl-File-Temp-0.231.100-1.module+el8.6.0+879+823e3012.noarch.rpm8wperl-filetest-1.03-471.module+el8.6.0+879+823e3012.noarch.rpmV7perl-File-Which-1.23-4.module+el8.6.0+878+f93dfff7.noarch.rpmWperl-Filter-1.60-1.module+el8.6.0+879+823e3012.x86_64.rpm>perl-Filter-Simple-0.96-457.module+el8.6.0+879+823e3012.noarch.rpmperl-FindBin-1.51-471.module+el8.6.0+879+823e3012.noarch.rpmperl-GDBM_File-1.18-471.module+el8.6.0+879+823e3012.x86_64.rpmHperl-generators-1.13-1.module+el8.6.0+879+823e3012.noarch.rpm?;perl-Getopt-Long-2.52-1.module+el8.6.0+879+823e3012.noarch.rpmaperl-Getopt-Std-1.12-471.module+el8.6.0+879+823e3012.noarch.rpm=perl-Hash-Util-0.23-471.module+el8.6.0+879+823e3012.x86_64.rpm"perl-Hash-Util-FieldHash-1.20-471.module+el8.6.0+879+823e3012.x86_64.rpmyUperl-homedir-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm@kperl-HTTP-Tiny-0.078-1.module+el8.6.0+879+823e3012.noarch.rpm<perl-I18N-Collate-1.02-471.module+el8.6.0+879+823e3012.noarch.rpm6perl-I18N-Langinfo-0.19-471.module+el8.6.0+879+823e3012.x86_64.rpm perl-I18N-LangTags-0.44-471.module+el8.6.0+879+823e3012.noarch.rpm9perl-if-0.60.800-471.module+el8.6.0+879+823e3012.noarch.rpmperl-Importer-0.025-6.module+el8.6.0+878+f93dfff7.noarch.rpmNVperl-inc-latest-0.500-10.module+el8.6.0+878+f93dfff7.noarch.rpm`Vperl-interpreter-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpmXBperl-IO-1.43-471.module+el8.6.0+879+823e3012.x86_64.rpmAkperl-IO-Compress-2.096-1.module+el8.6.0+879+823e3012.noarch.rpmkperl-IO-Compress-Lzma-2.096-1.module+el8.6.0+879+823e3012.noarch.rpmXperl-IO-Socket-IP-0.41-2.module+el8.6.0+879+823e3012.noarch.rpm>5perl-IO-Zlib-1.10-471.module+el8.6.0+879+823e3012.noarch.rpmYUperl-IPC-Cmd-1.04-2.module+el8.6.0+878+f93dfff7.noarch.rpmXperl-IPC-Open3-1.21-471.module+el8.6.0+879+823e3012.noarch.rpm[rperl-IPC-System-Simple-1.30-3.module+el8.6.0+879+823e3012.noarch.rpmZ5perl-IPC-SysV-2.09-1.module+el8.6.0+879+823e3012.x86_64.rpm\Iperl-JSON-PP-4.04-2.module+el8.6.0+878+f93dfff7.noarch.rpm:;perl-less-0.03-471.module+el8.6.0+879+823e3012.noarch.rpm _perl-lib-0.65-471.module+el8.6.0+879+823e3012.x86_64.rpmzperl-libnet-3.13-1.module+el8.6.0+879+823e3012.noarch.rpm+Vperl-libnetcfg-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpmaVperl-libs-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpm;=perl-locale-1.09-471.module+el8.6.0+879+823e3012.noarch.rpm]<perl-Locale-Maketext-1.29-440.module+el8.6.0+878+f93dfff7.noarch.rpm$)perl-Locale-Maketext-Simple-0.21-471.module+el8.6.0+879+823e3012.noarch.rpm{Uperl-local-lib-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpmOVperl-macros-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpm_Fperl-Math-BigInt-1.9998.18-1.module+el8.6.0+878+f93dfff7.noarch.rpm`|perl-Math-BigInt-FastCalc-0.500.900-1.module+el8.6.0+878+f93dfff7.x86_64.rpm@<perl-Math-BigRat-0.2614-2.module+el8.6.0+878+f93dfff7.noarch.rpmA perl-Math-Complex-1.59-471.module+el8.6.0+879+823e3012.noarch.rpm%wperl-Memoize-1.03-471.module+el8.6.0+879+823e3012.noarch.rpm<perl-meta-notation-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpm^pperl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.x86_64.rpmBperl-Module-Build-0.42.31-5.module+el8.6.0+879+823e3012.noarch.rpmCnperl-Module-CoreList-5.20211020-1.module+el8.6.0+879+823e3012.noarch.rpmDnperl-Module-CoreList-tools-5.20211020-1.module+el8.6.0+879+823e3012.noarch.rpmE0perl-Module-Load-0.36-1.module+el8.6.0+879+823e3012.noarch.rpmFperl-Module-Load-Conditional-0.74-1.module+el8.6.0+879+823e3012.noarch.rpm&#perl-Module-Loaded-0.08-471.module+el8.6.0+879+823e3012.noarch.rpma,perl-Module-Metadata-1.000037-1.module+el8.6.0+878+f93dfff7.noarch.rpmvperl-mro-1.23-471.module+el8.6.0+879+823e3012.x86_64.rpm?:perl-MRO-Compat-0.13-5.module+el8.6.0+878+f93dfff7.noarch.rpmperl-NDBM_File-1.15-471.module+el8.6.0+879+823e3012.x86_64.rpm<perl-Net-1.02-471.module+el8.6.0+879+823e3012.noarch.rpm'|perl-Net-Ping-2.72-471.module+el8.6.0+879+823e3012.noarch.rpmperl-NEXT-0.67-471.module+el8.6.0+879+823e3012.noarch.rpmY:perl-Object-HashBase-0.009-4.module+el8.6.0+879+823e3012.noarch.rpmZ:perl-Object-HashBase-tools-0.009-4.module+el8.6.0+879+823e3012.noarch.rpmperl-ODBM_File-1.16-471.module+el8.6.0+879+823e3012.x86_64.rpm Dperl-Opcode-1.48-471.module+el8.6.0+879+823e3012.x86_64.rpm,aperl-open-1.12-471.module+el8.6.0+879+823e3012.noarch.rpm=Vperl-overload-1.31-471.module+el8.6.0+879+823e3012.noarch.rpm>fperl-overloading-0.02-471.module+el8.6.0+879+823e3012.noarch.rpmBAperl-Package-Generator-1.106-12.module+el8.6.0+878+f93dfff7.noarch.rpmc0perl-PathTools-3.78-439.module+el8.6.0+878+f93dfff7.x86_64.rpmCIperl-Params-Check-0.38-396.module+el8.6.0+878+f93dfff7.noarch.rpmbperl-Params-Util-1.102-2.module+el8.6.0+879+823e3012.x86_64.rpm|+perl-parent-0.238-457.module+el8.6.0+879+823e3012.noarch.rpmKLperl-perlfaq-5.20210520-1.module+el8.6.0+879+823e3012.noarch.rpmdlperl-PerlIO-via-QuotedPrint-0.09-1.module+el8.6.0+879+823e3012.noarch.rpmD?perl-Perl-OSType-1.010-397.module+el8.6.0+878+f93dfff7.noarch.rpmperl-ph-5.32.1-471.module+el8.6.0+879+823e3012.x86_64.rpmeBperl-Pod-Checker-1.74-1.module+el8.6.0+879+823e3012.noarch.rpmEJperl-Pod-Escapes-1.07-396.module+el8.6.0+878+f93dfff7.noarch.rpm6perl-Pod-Functions-1.13-471.module+el8.6.0+879+823e3012.noarch.rpm(fperl-Pod-Html-1.25-471.module+el8.6.0+879+823e3012.noarch.rpmL@perl-podlators-4.14-457.module+el8.6.0+879+823e3012.noarch.rpmFHperl-Pod-Parser-1.63-1001.module+el8.6.0+878+f93dfff7.noarch.rpmG%perl-Pod-Perldoc-3.28.01-443.module+el8.6.0+879+823e3012.noarch.rpmH>perl-Pod-Simple-3.42-1.module+el8.6.0+879+823e3012.noarch.rpmfCperl-Pod-Usage-2.01-1.module+el8.6.0+879+823e3012.noarch.rpm gperl-POSIX-1.94-471.module+el8.6.0+879+823e3012.x86_64.rpmqperl-Safe-2.41-471.module+el8.6.0+879+823e3012.noarch.rpmgsperl-Scalar-List-Utils-1.55-457.module+el8.6.0+879+823e3012.x86_64.rpm Mperl-Search-Dict-1.07-471.module+el8.6.0+879+823e3012.noarch.rpm!<perl-SelectSaver-1.02-471.module+el8.6.0+879+823e3012.noarch.rpm)hperl-SelfLoader-1.26-471.module+el8.6.0+879+823e3012.noarch.rpm?=perl-sigtrap-1.09-471.module+el8.6.0+879+823e3012.noarch.rpmhwperl-Socket-2.031-1.module+el8.6.0+879+823e3012.x86_64.rpmi!perl-Software-License-0.103014-5.module+el8.6.0+878+f93dfff7.noarch.rpm@Qperl-sort-2.04-471.module+el8.6.0+879+823e3012.noarch.rpmj"perl-Storable-3.21-457.module+el8.6.0+879+823e3012.x86_64.rpmkperl-Sub-Exporter-0.987-17.module+el8.6.0+879+823e3012.noarch.rpmG>perl-Sub-Install-0.928-15.module+el8.6.0+878+f93dfff7.noarch.rpmAwperl-subs-1.03-471.module+el8.6.0+879+823e3012.noarch.rpm"4perl-Symbol-1.08-471.module+el8.6.0+879+823e3012.noarch.rpm vperl-Sys-Hostname-1.23-471.module+el8.6.0+879+823e3012.x86_64.rpmlwperl-Sys-Syslog-0.36-1.module+el8.6.0+878+f93dfff7.x86_64.rpmmEperl-Term-ANSIColor-5.01-458.module+el8.6.0+879+823e3012.noarch.rpmHOperl-Term-Cap-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm#perl-Term-Complete-1.403-471.module+el8.6.0+879+823e3012.noarch.rpm$Kperl-Term-ReadLine-1.17-471.module+el8.6.0+879+823e3012.noarch.rpm perl-Term-Table-0.015-2.module+el8.6.0+878+f93dfff7.noarch.rpm*Vperl-Test-1.31-471.module+el8.6.0+879+823e3012.noarch.rpmIMperl-Test-Harness-3.42-2.module+el8.6.0+878+f93dfff7.noarch.rpmI5perl-Test-Simple-1.302181-2.module+el8.6.0+879+823e3012.noarch.rpm%<perl-Text-Abbrev-1.02-471.module+el8.6.0+879+823e3012.noarch.rpmnOperl-Text-Balanced-2.04-1.module+el8.6.0+879+823e3012.noarch.rpmo>perl-Text-Diff-1.45-7.module+el8.6.0+878+f93dfff7.noarch.rpmJ8perl-Text-Glob-0.11-5.module+el8.6.0+878+f93dfff7.noarch.rpmK\perl-Text-ParseWords-3.30-396.module+el8.6.0+878+f93dfff7.noarch.rpmLTperl-Text-Tabs+Wrap-2013.0523-396.module+el8.6.0+878+f93dfff7.noarch.rpmp@perl-Text-Template-1.58-1.module+el8.6.0+878+f93dfff7.noarch.rpm&perl-Thread-3.05-471.module+el8.6.0+879+823e3012.noarch.rpmqperl-Thread-Queue-3.14-457.module+el8.6.0+879+823e3012.noarch.rpm~perl-threads-2.25-457.module+el8.6.0+879+823e3012.x86_64.rpm'[perl-Thread-Semaphore-2.13-471.module+el8.6.0+879+823e3012.noarch.rpmVperl-threads-shared-1.61-457.module+el8.6.0+879+823e3012.x86_64.rpm(?perl-Tie-4.6-471.module+el8.6.0+879+823e3012.noarch.rpm)Lperl-Tie-File-1.06-471.module+el8.6.0+879+823e3012.noarch.rpm*7perl-Tie-Memoize-1.1-471.module+el8.6.0+879+823e3012.noarch.rpm+}perl-Tie-RefHash-1.39-471.module+el8.6.0+879+823e3012.noarch.rpm,wperl-Time-1.03-471.module+el8.6.0+879+823e3012.noarch.rpm8uperl-Time-HiRes-1.9764-459.module+el8.6.0+879+823e3012.x86_64.rpmrperl-Time-Local-1.300-4.module+el8.6.0+879+823e3012.noarch.rpm9:perl-Time-Piece-1.3401-471.module+el8.6.0+879+823e3012.x86_64.rpmt/perl-Unicode-Collate-1.29-1.module+el8.6.0+879+823e3012.x86_64.rpmu)perl-Unicode-Normalize-1.27-458.module+el8.6.0+879+823e3012.x86_64.rpm-perl-Unicode-UCD-0.75-471.module+el8.6.0+879+823e3012.noarch.rpmsAperl-URI-1.76-5.module+el8.6.0+878+f93dfff7.noarch.rpm.wperl-User-pwent-1.03-471.module+el8.6.0+879+823e3012.noarch.rpm-perl-utils-5.32.1-471.module+el8.6.0+879+823e3012.noarch.rpmBIperl-vars-1.05-471.module+el8.6.0+879+823e3012.noarch.rpm perl-version-0.99.29-1.module+el8.6.0+879+823e3012.x86_64.rpmC1perl-vmsish-1.04-471.module+el8.6.0+879+823e3012.noarch.rpm-U-perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm!perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm"perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm#perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm$perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm2perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm%#\}9perl-Data-Dump-1.23-7.module+el8.6.0+965+5d46f3c6.noarch.rpm~/perl-Digest-HMAC-1.03-17.module+el8.6.0+965+5d46f3c6.noarch.rpmjperl-File-Listing-6.04-17.module+el8.6.0+965+5d46f3c6.noarch.rpmW/perl-HTML-Parser-3.72-15.module+el8.6.0+965+5d46f3c6.x86_64.rpmYperl-HTML-Tagset-3.20-34.module+el8.6.0+965+5d46f3c6.noarch.rpmkperl-HTTP-Cookies-6.04-2.module+el8.6.0+965+5d46f3c6.noarch.rpmiperl-HTTP-Date-6.02-19.module+el8.6.0+965+5d46f3c6.noarch.rpmnperl-HTTP-Message-6.18-1.module+el8.6.0+965+5d46f3c6.noarch.rpmfperl-HTTP-Negotiate-6.01-19.module+el8.6.0+965+5d46f3c6.noarch.rpm-perl-IO-HTML-1.001-11.module+el8.6.0+965+5d46f3c6.noarch.rpm%operl-libwww-perl-6.34-1.module+el8.6.0+965+5d46f3c6.noarch.rpmgperl-LWP-MediaTypes-6.02-15.module+el8.6.0+965+5d46f3c6.noarch.rpm lperl-LWP-Protocol-https-6.07-4.module+el8.6.0+965+5d46f3c6.noarch.rpm Tperl-Mozilla-CA-20160104-7.module+el8.6.0+965+5d46f3c6.noarch.rpm mperl-Net-HTTP-6.17-2.module+el8.6.0+965+5d46f3c6.noarch.rpm 1perl-NTLM-1.09-17.module+el8.6.0+965+5d46f3c6.noarch.rpmGperl-TimeDate-2.30-15.module+el8.6.0+965+5d46f3c6.noarch.rpm#perl-Try-Tiny-0.30-7.module+el8.6.0+965+5d46f3c6.noarch.rpmhperl-WWW-RobotRules-6.02-18.module+el8.6.0+965+5d46f3c6.noarch.rpmr$rrperl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm#+%Rperl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm3fx~3perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm;d}eperl-DBI-1.641-4.module+el8.6.0+891+677074cb.x86_64.rpmsCEsiperl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm1ke}1Operl-IO-Socket-SSL-2.066-4.module+el8.6.0+957+15d660ad.noarch.rpmw^perl-Net-SSLeay-1.88-2.module+el8.6.0+957+15d660ad.x86_64.rpmwR wperl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm:V dBdB[BBBBBKBBBBBABDxBBBBBBBBBBBBBBBBBBBBvenhancementperl:5.32 metadata for the Rocky Linux 8 module matrix (2/4)o https://bugzilla.redhat.com/show_bug.cgi?id=20551312055131https://errata.rockylinux.org/RLEA-2022:1955RLEA-2022:1955RLEA-2022:1955 -U]txs%#\r$#+%3fx~;d}sCE1ke}wR #-perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm!perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm"perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm#perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm$perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm2perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm0perl-Encode-Locale-1.05-10.module+el8.6.0+879+823e3012.noarch.rpm}9perl-Data-Dump-1.23-7.module+el8.6.0+965+5d46f3c6.noarch.rpm~/perl-Digest-HMAC-1.03-17.module+el8.6.0+965+5d46f3c6.noarch.rpmjperl-File-Listing-6.04-17.module+el8.6.0+965+5d46f3c6.noarch.rpmW/perl-HTML-Parser-3.72-15.module+el8.6.0+965+5d46f3c6.x86_64.rpmYperl-HTML-Tagset-3.20-34.module+el8.6.0+965+5d46f3c6.noarch.rpmkperl-HTTP-Cookies-6.04-2.module+el8.6.0+965+5d46f3c6.noarch.rpmiperl-HTTP-Date-6.02-19.module+el8.6.0+965+5d46f3c6.noarch.rpmnperl-HTTP-Message-6.18-1.module+el8.6.0+965+5d46f3c6.noarch.rpmfperl-HTTP-Negotiate-6.01-19.module+el8.6.0+965+5d46f3c6.noarch.rpm-perl-IO-HTML-1.001-11.module+el8.6.0+965+5d46f3c6.noarch.rpm%operl-libwww-perl-6.34-1.module+el8.6.0+965+5d46f3c6.noarch.rpmgperl-LWP-MediaTypes-6.02-15.module+el8.6.0+965+5d46f3c6.noarch.rpm lperl-LWP-Protocol-https-6.07-4.module+el8.6.0+965+5d46f3c6.noarch.rpm Tperl-Mozilla-CA-20160104-7.module+el8.6.0+965+5d46f3c6.noarch.rpm mperl-Net-HTTP-6.17-2.module+el8.6.0+965+5d46f3c6.noarch.rpm 1perl-NTLM-1.09-17.module+el8.6.0+965+5d46f3c6.noarch.rpmGperl-TimeDate-2.30-15.module+el8.6.0+965+5d46f3c6.noarch.rpm#perl-Try-Tiny-0.30-7.module+el8.6.0+965+5d46f3c6.noarch.rpmhperl-WWW-RobotRules-6.02-18.module+el8.6.0+965+5d46f3c6.noarch.rpmrrperl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpmRperl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm3perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpmeperl-DBI-1.641-4.module+el8.6.0+891+677074cb.x86_64.rpmsiperl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm1Operl-IO-Socket-SSL-2.066-4.module+el8.6.0+957+15d660ad.noarch.rpmw^perl-Net-SSLeay-1.88-2.module+el8.6.0+957+15d660ad.x86_64.rpmwperl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpm -U-perl-App-cpanminus-1.7044-5.module+el8.6.0+961+4779e2d2.noarch.rpm!perl-CPAN-Meta-Check-0.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm"perl-File-pushd-1.014-6.module+el8.6.0+961+4779e2d2.noarch.rpm#perl-Module-CPANfile-1.1002-7.module+el8.6.0+961+4779e2d2.noarch.rpm$perl-Parse-PMFile-0.41-7.module+el8.6.0+961+4779e2d2.noarch.rpm2perl-String-ShellQuote-1.04-24.module+el8.6.0+961+4779e2d2.noarch.rpm]txs perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm0perl-Encode-Locale-1.05-10.module+el8.6.0+879+823e3012.noarch.rpm%#\}9perl-Data-Dump-1.23-7.module+el8.6.0+965+5d46f3c6.noarch.rpm~/perl-Digest-HMAC-1.03-17.module+el8.6.0+965+5d46f3c6.noarch.rpmjperl-File-Listing-6.04-17.module+el8.6.0+965+5d46f3c6.noarch.rpmW/perl-HTML-Parser-3.72-15.module+el8.6.0+965+5d46f3c6.x86_64.rpmYperl-HTML-Tagset-3.20-34.module+el8.6.0+965+5d46f3c6.noarch.rpmkperl-HTTP-Cookies-6.04-2.module+el8.6.0+965+5d46f3c6.noarch.rpmiperl-HTTP-Date-6.02-19.module+el8.6.0+965+5d46f3c6.noarch.rpmnperl-HTTP-Message-6.18-1.module+el8.6.0+965+5d46f3c6.noarch.rpmfperl-HTTP-Negotiate-6.01-19.module+el8.6.0+965+5d46f3c6.noarch.rpm-perl-IO-HTML-1.001-11.module+el8.6.0+965+5d46f3c6.noarch.rpm%operl-libwww-perl-6.34-1.module+el8.6.0+965+5d46f3c6.noarch.rpmgperl-LWP-MediaTypes-6.02-15.module+el8.6.0+965+5d46f3c6.noarch.rpm lperl-LWP-Protocol-https-6.07-4.module+el8.6.0+965+5d46f3c6.noarch.rpm Tperl-Mozilla-CA-20160104-7.module+el8.6.0+965+5d46f3c6.noarch.rpm mperl-Net-HTTP-6.17-2.module+el8.6.0+965+5d46f3c6.noarch.rpm 1perl-NTLM-1.09-17.module+el8.6.0+965+5d46f3c6.noarch.rpmGperl-TimeDate-2.30-15.module+el8.6.0+965+5d46f3c6.noarch.rpm#perl-Try-Tiny-0.30-7.module+el8.6.0+965+5d46f3c6.noarch.rpmhperl-WWW-RobotRules-6.02-18.module+el8.6.0+965+5d46f3c6.noarch.rpmr$rrperl-DBD-MySQL-4.046-3.module+el8.6.0+904+791e07d4.x86_64.rpm#+%Rperl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm3fx~3perl-DBD-SQLite-1.58-2.module+el8.6.0+896+21008253.x86_64.rpm;d}eperl-DBI-1.641-4.module+el8.6.0+891+677074cb.x86_64.rpmsCEsiperl-FCGI-0.78-11.module+el8.6.0+916+1765b8a0.x86_64.rpm1ke}1Operl-IO-Socket-SSL-2.066-4.module+el8.6.0+957+15d660ad.noarch.rpmw^perl-Net-SSLeay-1.88-2.module+el8.6.0+957+15d660ad.x86_64.rpmwR wperl-YAML-1.24-3.module+el8.6.0+953+2c10460a.noarch.rpmJ> Ubugfixtrace-cmd bug fix and enhancement updaten https://bugzilla.redhat.com/show_bug.cgi?id=19742841974284https://errata.rockylinux.org/RLBA-2022:1999RLBA-2022:1999RLBA-2022:1999 Pvkernelshark-2.7-10.el8.x86_64.rpmPvkernelshark-2.7-10.el8.x86_64.rpmK@ 0XBBBBBBBBBBBBBBBBBBBBBBbugfixperl bug fix and enhancement updatem https://bugzilla.redhat.com/show_bug.cgi?id=20149812014981https://errata.rockylinux.org/RLBA-2022:2018RLBA-2022:2018RLBA-2022:2018 ]perl-5.26.3-421.el8.x86_64.rpm perl-Attribute-Handlers-0.99-421.el8.noarch.rpm:perl-devel-5.26.3-421.el8.x86_64.rpm5&perl-Devel-Peek-1.26-421.el8.x86_64.rpm!Jperl-Devel-SelfStubber-1.06-421.el8.noarch.rpm"yperl-ExtUtils-Embed-1.34-421.el8.noarch.rpm#Jperl-ExtUtils-Miniperl-1.06-421.el8.noarch.rpm+perl-libnetcfg-5.26.3-421.el8.noarch.rpm$&perl-Locale-Maketext-Simple-0.21-421.el8.noarch.rpm%.perl-Memoize-1.03-421.el8.noarch.rpm& perl-Module-Loaded-0.08-421.el8.noarch.rpm'vperl-Net-Ping-2.55-421.el8.noarch.rpm,Eperl-open-1.11-421.el8.noarch.rpm(\perl-Pod-Html-1.22.02-421.el8.noarch.rpm)^perl-SelfLoader-1.23-421.el8.noarch.rpm*sperl-Test-1.30-421.el8.noarch.rpm}perl-tests-5.26.3-421.el8.x86_64.rpm97perl-Time-Piece-1.31-421.el8.x86_64.rpm-Mperl-utils-5.26.3-421.el8.noarch.rpm]perl-5.26.3-421.el8.x86_64.rpm perl-Attribute-Handlers-0.99-421.el8.noarch.rpm:perl-devel-5.26.3-421.el8.x86_64.rpm5&perl-Devel-Peek-1.26-421.el8.x86_64.rpm!Jperl-Devel-SelfStubber-1.06-421.el8.noarch.rpm"yperl-ExtUtils-Embed-1.34-421.el8.noarch.rpm#Jperl-ExtUtils-Miniperl-1.06-421.el8.noarch.rpm+perl-libnetcfg-5.26.3-421.el8.noarch.rpm$&perl-Locale-Maketext-Simple-0.21-421.el8.noarch.rpm%.perl-Memoize-1.03-421.el8.noarch.rpm& perl-Module-Loaded-0.08-421.el8.noarch.rpm'vperl-Net-Ping-2.55-421.el8.noarch.rpm,Eperl-open-1.11-421.el8.noarch.rpm(\perl-Pod-Html-1.22.02-421.el8.noarch.rpm)^perl-SelfLoader-1.23-421.el8.noarch.rpm*sperl-Test-1.30-421.el8.noarch.rpm}perl-tests-5.26.3-421.el8.x86_64.rpm97perl-Time-Piece-1.31-421.el8.x86_64.rpm-Mperl-utils-5.26.3-421.el8.noarch.rpmKS 3qsecurityLow: libssh security, bug fix, and enhancement updatel lhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3634CVE-2021-3634CVE-2021-3634https://bugzilla.redhat.com/show_bug.cgi?id=18966511896651The following packages have been upgraded to a later upstream version: libssh (0.9.6).https://bugzilla.redhat.com/show_bug.cgi?id=19788101978810https://bugzilla.redhat.com/show_bug.cgi?id=20201592020159https://errata.rockylinux.org/RLSA-2022:2031RLSA-2022:2031RLSA-2022:2031 Iklibssh-devel-0.9.6-3.el8.x86_64.rpmIklibssh-devel-0.9.6-3.el8.x86_64.rpmLC 6tbugfixjansson bug fix and enhancement updatew https://bugzilla.redhat.com/show_bug.cgi?id=20010622001062https://errata.rockylinux.org/RLBA-2022:2061RLBA-2022:2061RLBA-2022:2061 Isjansson-devel-2.14-1.el8.x86_64.rpmIsjansson-devel-2.14-1.el8.x86_64.rpmMD 9wbugfixfirewalld bug fix and enhancement updatev https://bugzilla.redhat.com/show_bug.cgi?id=19177661917766https://bugzilla.redhat.com/show_bug.cgi?id=19458331945833https://bugzilla.redhat.com/show_bug.cgi?id=20143832014383https://errata.rockylinux.org/RLBA-2022:2063RLBA-2022:2063RLBA-2022:2063 1Efirewall-applet-0.9.3-13.el8.noarch.rpm2Efirewall-config-0.9.3-13.el8.noarch.rpm1Efirewall-applet-0.9.3-13.el8.noarch.rpm2Efirewall-config-0.9.3-13.el8.noarch.rpmNE zBBBBbugfixsetools bug fix and enhancement updateu https://bugzilla.redhat.com/show_bug.cgi?id=20199612019961https://errata.rockylinux.org/RLBA-2022:2079RLBA-2022:2079RLBA-2022:2079 ifsetools-4.3.0-3.el8.x86_64.rpmjfsetools-console-analyses-4.3.0-3.el8.x86_64.rpmkfsetools-gui-4.3.0-3.el8.x86_64.rpmifsetools-4.3.0-3.el8.x86_64.rpmjfsetools-console-analyses-4.3.0-3.el8.x86_64.rpmkfsetools-gui-4.3.0-3.el8.x86_64.rpmOF ABBBBBBBBBBBBbugfixpostfix bug fix and enhancement updatet https://bugzilla.redhat.com/show_bug.cgi?id=19314031931403https://bugzilla.redhat.com/show_bug.cgi?id=20280152028015https://errata.rockylinux.org/RLBA-2022:2091RLBA-2022:2091RLBA-2022:2091 ,;postfix-cdb-3.5.8-4.el8.x86_64.rpm-;postfix-ldap-3.5.8-4.el8.x86_64.rpm.;postfix-mysql-3.5.8-4.el8.x86_64.rpm/;postfix-pcre-3.5.8-4.el8.x86_64.rpm0;postfix-perl-scripts-3.5.8-4.el8.x86_64.rpm1;postfix-pgsql-3.5.8-4.el8.x86_64.rpm2;postfix-sqlite-3.5.8-4.el8.x86_64.rpm,;postfix-cdb-3.5.8-4.el8.x86_64.rpm-;postfix-ldap-3.5.8-4.el8.x86_64.rpm.;postfix-mysql-3.5.8-4.el8.x86_64.rpm/;postfix-pcre-3.5.8-4.el8.x86_64.rpm0;postfix-perl-scripts-3.5.8-4.el8.x86_64.rpm1;postfix-pgsql-3.5.8-4.el8.x86_64.rpm2;postfix-sqlite-3.5.8-4.el8.x86_64.rpmPG Pbugfixcryptsetup bug fix and enhancement updates https://bugzilla.redhat.com/show_bug.cgi?id=20218152021815https://bugzilla.redhat.com/show_bug.cgi?id=20580092058009https://errata.rockylinux.org/RLBA-2022:2097RLBA-2022:2097RLBA-2022:2097 PWcryptsetup-devel-2.3.7-2.el8.x86_64.rpmPWcryptsetup-devel-2.3.7-2.el8.x86_64.rpmPH Sbugfixsysfsutils bug fix and enhancement updater https://bugzilla.redhat.com/show_bug.cgi?id=20464262046426https://errata.rockylinux.org/RLBA-2022:2099RLBA-2022:2099RLBA-2022:2099 ;sysfsutils-2.1.0-25.el8.x86_64.rpm;sysfsutils-2.1.0-25.el8.x86_64.rpmXI Vbugfixgpgme bug fix and enhancement updateq https://bugzilla.redhat.com/show_bug.cgi?id=19539051953905https://errata.rockylinux.org/RLBA-2022:2117RLBA-2022:2117RLBA-2022:2117  qgpgme-1.13.1-11.el8.x86_64.rpm qgpgme-1.13.1-11.el8.x86_64.rpmYf YBBBBBsecurityModerate: vim security updatepWhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785CVE-2022-1785CVE-2022-1785https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1897CVE-2022-1897CVE-2022-1897https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927CVE-2022-1927CVE-2022-1927https://bugzilla.redhat.com/show_bug.cgi?id=20886892088689https://bugzilla.redhat.com/show_bug.cgi?id=20916822091682https://bugzilla.redhat.com/show_bug.cgi?id=20916872091687https://errata.rockylinux.org/RLSA-2022:5813RLSA-2022:5813RLSA-2022:5813 0vim-common-8.0.1763-19.el8_6.4.x86_64.rpm1vim-enhanced-8.0.1763-19.el8_6.4.x86_64.rpm3vim-filesystem-8.0.1763-19.el8_6.4.noarch.rpm/vim-X11-8.0.1763-19.el8_6.4.x86_64.rpm0vim-common-8.0.1763-19.el8_6.4.x86_64.rpm1vim-enhanced-8.0.1763-19.el8_6.4.x86_64.rpm3vim-filesystem-8.0.1763-19.el8_6.4.noarch.rpm/vim-X11-8.0.1763-19.el8_6.4.x86_64.rpm[z )aBBBBBBsecurityModerate: gnutls security updateG7https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2509CVE-2022-2509CVE-2022-2509https://bugzilla.redhat.com/show_bug.cgi?id=21089772108977https://errata.rockylinux.org/RLSA-2022:7105RLSA-2022:7105RLSA-2022:7105 &zgnutls-c++-3.6.16-5.el8_6.x86_64.rpm'zgnutls-dane-3.6.16-5.el8_6.x86_64.rpm(zgnutls-devel-3.6.16-5.el8_6.x86_64.rpm)zgnutls-utils-3.6.16-5.el8_6.x86_64.rpm&zgnutls-c++-3.6.16-5.el8_6.x86_64.rpm'zgnutls-dane-3.6.16-5.el8_6.x86_64.rpm(zgnutls-devel-3.6.16-5.el8_6.x86_64.rpm)zgnutls-utils-3.6.16-5.el8_6.x86_64.rpm\{ ,jsecurityModerate: sqlite security update~Thttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35525CVE-2020-35525CVE-2020-35525https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35527CVE-2020-35527CVE-2020-35527https://bugzilla.redhat.com/show_bug.cgi?id=21223242122324https://bugzilla.redhat.com/show_bug.cgi?id=21223292122329https://errata.rockylinux.org/RLSA-2022:7108RLSA-2022:7108RLSA-2022:7108 6)lemon-3.26.0-16.el8_6.x86_64.rpm6)lemon-3.26.0-16.el8_6.x86_64.rpm]R -mBBbugfixrpm bug fix and enhancement updateR# https://bugzilla.redhat.com/show_bug.cgi?id=21245232124523* rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state.https://errata.rockylinux.org/RLBA-2022:7115RLBA-2022:7115RLBA-2022:7115 Fdrpm-build-4.14.3-24.el8_7.x86_64.rpmGdrpm-plugin-fapolicyd-4.14.3-24.el8_7.x86_64.rpmFdrpm-build-4.14.3-24.el8_7.x86_64.rpmGdrpm-plugin-fapolicyd-4.14.3-24.el8_7.x86_64.rpm]Z .1bugfixtzdata bug fix and enhancement updateuj https://errata.rockylinux.org/RLBA-2022:7404RLBA-2022:7404RLBA-2022:7404 >Ytzdata-java-2022f-1.el8.noarch.rpm>Ytzdata-java-2022f-1.el8.noarch.rpm^ 3oBBbugfixglibc bug fix and enhancement update_ https://bugzilla.redhat.com/show_bug.cgi?id=18886601888660https://bugzilla.redhat.com/show_bug.cgi?id=19611091961109https://bugzilla.redhat.com/show_bug.cgi?id=19826081982608https://bugzilla.redhat.com/show_bug.cgi?id=20547902054790https://bugzilla.redhat.com/show_bug.cgi?id=20575132057513https://bugzilla.redhat.com/show_bug.cgi?id=20637122063712https://bugzilla.redhat.com/show_bug.cgi?id=20655882065588https://bugzilla.redhat.com/show_bug.cgi?id=20717452071745https://bugzilla.redhat.com/show_bug.cgi?id=20723292072329https://bugzilla.redhat.com/show_bug.cgi?id=20803492080349https://bugzilla.redhat.com/show_bug.cgi?id=20868532086853https://bugzilla.redhat.com/show_bug.cgi?id=20892472089247https://bugzilla.redhat.com/show_bug.cgi?id=20915532091553https://bugzilla.redhat.com/show_bug.cgi?id=20961892096189https://bugzilla.redhat.com/show_bug.cgi?id=21049072104907https://bugzilla.redhat.com/show_bug.cgi?id=21193042119304https://errata.rockylinux.org/RLBA-2022:7684RLBA-2022:7684RLBA-2022:7684 {compat-libpthread-nonshared-2.28-211.el8.x86_64.rpm{glibc-utils-2.28-211.el8.x86_64.rpm{compat-libpthread-nonshared-2.28-211.el8.x86_64.rpm{glibc-utils-2.28-211.el8.x86_64.rpm_ tBBBBBBBBBBBBBBBBBBBBbugfixgcc bug fix and enhancement update^ https://bugzilla.redhat.com/show_bug.cgi?id=20671502067150https://bugzilla.redhat.com/show_bug.cgi?id=20746142074614https://bugzilla.redhat.com/show_bug.cgi?id=21087212108721https://errata.rockylinux.org/RLBA-2022:7688RLBA-2022:7688RLBA-2022:7688  cpp-8.5.0-15.el8.x86_64.rpmgcc-8.5.0-15.el8.x86_64.rpmgcc-c++-8.5.0-15.el8.x86_64.rpmgcc-gdb-plugin-8.5.0-15.el8.x86_64.rpmgcc-gfortran-8.5.0-15.el8.x86_64.rpmgcc-offload-nvptx-8.5.0-15.el8.x86_64.rpm gcc-plugin-annobin-8.5.0-15.el8.x86_64.rpm8libitm-devel-8.5.0-15.el8.x86_64.rpm9libquadmath-devel-8.5.0-15.el8.x86_64.rpm<libstdc++-devel-8.5.0-15.el8.x86_64.rpm=libstdc++-docs-8.5.0-15.el8.x86_64.rpm  cpp-8.5.0-15.el8.x86_64.rpmgcc-8.5.0-15.el8.x86_64.rpmgcc-c++-8.5.0-15.el8.x86_64.rpmgcc-gdb-plugin-8.5.0-15.el8.x86_64.rpmgcc-gfortran-8.5.0-15.el8.x86_64.rpmgcc-offload-nvptx-8.5.0-15.el8.x86_64.rpm gcc-plugin-annobin-8.5.0-15.el8.x86_64.rpm8libitm-devel-8.5.0-15.el8.x86_64.rpm9libquadmath-devel-8.5.0-15.el8.x86_64.rpm<libstdc++-devel-8.5.0-15.el8.x86_64.rpm=libstdc++-docs-8.5.0-15.el8.x86_64.rpm` Kbugfixbinutils bug fix and enhancement update] https://bugzilla.redhat.com/show_bug.cgi?id=20551792055179https://bugzilla.redhat.com/show_bug.cgi?id=20566912056691https://errata.rockylinux.org/RLBA-2022:7693RLBA-2022:7693RLBA-2022:7693 BZbinutils-devel-2.30-117.el8.x86_64.rpmBZbinutils-devel-2.30-117.el8.x86_64.rpma Nbugfixsamba bug fix and enhancement update\ https://bugzilla.redhat.com/show_bug.cgi?id=20591512059151https://bugzilla.redhat.com/show_bug.cgi?id=20652122065212https://bugzilla.redhat.com/show_bug.cgi?id=20705222070522https://bugzilla.redhat.com/show_bug.cgi?id=20765052076505https://bugzilla.redhat.com/show_bug.cgi?id=20774682077468https://bugzilla.redhat.com/show_bug.cgi?id=20841622084162https://bugzilla.redhat.com/show_bug.cgi?id=21062632106263https://bugzilla.redhat.com/show_bug.cgi?id=21066722106672https://bugzilla.redhat.com/show_bug.cgi?id=21209562120956https://errata.rockylinux.org/RLBA-2022:7698RLBA-2022:7698RLBA-2022:7698 (csamba-vfs-iouring-4.16.4-2.el8.x86_64.rpm(csamba-vfs-iouring-4.16.4-2.el8.x86_64.rpma" QsecurityModerate: libxml2 security update[https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3709CVE-2016-3709CVE-2016-3709https://bugzilla.redhat.com/show_bug.cgi?id=21127662112766https://errata.rockylinux.org/RLSA-2022:7715RLSA-2022:7715RLSA-2022:7715 .libxml2-devel-2.9.7-15.el8.x86_64.rpm.libxml2-devel-2.9.7-15.el8.x86_64.rpmc TBBBBBBBBBbugfixcups bug fix and enhancement updatew https://bugzilla.redhat.com/show_bug.cgi?id=19104151910415https://bugzilla.redhat.com/show_bug.cgi?id=20747362074736https://bugzilla.redhat.com/show_bug.cgi?id=20842572084257https://errata.rockylinux.org/RLBA-2022:7716RLBA-2022:7716RLBA-2022:7716  =cups-2.2.6-50.el8.x86_64.rpm =cups-client-2.2.6-50.el8.x86_64.rpm =cups-devel-2.2.6-50.el8.x86_64.rpm=cups-filesystem-2.2.6-50.el8.noarch.rpm =cups-ipptool-2.2.6-50.el8.x86_64.rpm=cups-lpd-2.2.6-50.el8.x86_64.rpm =cups-2.2.6-50.el8.x86_64.rpm =cups-client-2.2.6-50.el8.x86_64.rpm =cups-devel-2.2.6-50.el8.x86_64.rpm=cups-filesystem-2.2.6-50.el8.noarch.rpm =cups-ipptool-2.2.6-50.el8.x86_64.rpm=cups-lpd-2.2.6-50.el8.x86_64.rpmdl "`enhancementsubscription-manager bug fix and enhancement updatev https://bugzilla.redhat.com/show_bug.cgi?id=18222421822242https://bugzilla.redhat.com/show_bug.cgi?id=18592321859232https://bugzilla.redhat.com/show_bug.cgi?id=20182152018215https://bugzilla.redhat.com/show_bug.cgi?id=20568962056896https://bugzilla.redhat.com/show_bug.cgi?id=20570532057053https://bugzilla.redhat.com/show_bug.cgi?id=20577322057732https://bugzilla.redhat.com/show_bug.cgi?id=20630172063017https://bugzilla.redhat.com/show_bug.cgi?id=20652092065209https://bugzilla.redhat.com/show_bug.cgi?id=20741112074111https://bugzilla.redhat.com/show_bug.cgi?id=20742282074228https://bugzilla.redhat.com/show_bug.cgi?id=20765222076522https://errata.rockylinux.org/RLEA-2022:7719RLEA-2022:7719RLEA-2022:7719  ,subscription-manager-migration-1.28.32-1.el8.x86_64.rpm ,subscription-manager-migration-1.28.32-1.el8.x86_64.rpmd %cbugfixbluez bug fix and enhancement updateu https://errata.rockylinux.org/RLBA-2022:7735RLBA-2022:7735RLBA-2022:7735  bluez-cups-5.63-1.el8.x86_64.rpm bluez-cups-5.63-1.el8.x86_64.rpmf  (fbugfixauthselect bug fix and enhancement updatet https://bugzilla.redhat.com/show_bug.cgi?id=20637502063750https://bugzilla.redhat.com/show_bug.cgi?id=20665352066535https://bugzilla.redhat.com/show_bug.cgi?id=20703252070325https://bugzilla.redhat.com/show_bug.cgi?id=20802382080238https://errata.rockylinux.org/RLBA-2022:7738RLBA-2022:7738RLBA-2022:7738 =authselect-compat-1.2.5-1.el8.x86_64.rpm=authselect-compat-1.2.5-1.el8.x86_64.rpmg  *)bugfixzsh bug fix and enhancement updates https://bugzilla.redhat.com/show_bug.cgi?id=20703422070342https://errata.rockylinux.org/RLBA-2022:7746RLBA-2022:7746RLBA-2022:7746 >Pzsh-html-5.5.1-10.el8.noarch.rpm>Pzsh-html-5.5.1-10.el8.noarch.rpmh  /kBBbugfixtuned bug fix and enhancement updater https://bugzilla.redhat.com/show_bug.cgi?id=18910361891036https://bugzilla.redhat.com/show_bug.cgi?id=18967171896717https://bugzilla.redhat.com/show_bug.cgi?id=19580141958014https://bugzilla.redhat.com/show_bug.cgi?id=20502462050246https://bugzilla.redhat.com/show_bug.cgi?id=20576022057602https://bugzilla.redhat.com/show_bug.cgi?id=20601382060138https://errata.rockylinux.org/RLBA-2022:7747RLBA-2022:7747RLBA-2022:7747 cNtuned-gtk-2.19.0-1.el8.noarch.rpmdNtuned-profiles-postgresql-2.19.0-1.el8.noarch.rpmeNtuned-utils-2.19.0-1.el8.noarch.rpmfNtuned-utils-systemtap-2.19.0-1.el8.noarch.rpmcNtuned-gtk-2.19.0-1.el8.noarch.rpmdNtuned-profiles-postgresql-2.19.0-1.el8.noarch.rpmeNtuned-utils-2.19.0-1.el8.noarch.rpmfNtuned-utils-systemtap-2.19.0-1.el8.noarch.rpmh  10bugfixdnf-plugins-core bug fix and enhancement updateq https://bugzilla.redhat.com/show_bug.cgi?id=20236522023652https://bugzilla.redhat.com/show_bug.cgi?id=20246292024629https://bugzilla.redhat.com/show_bug.cgi?id=20347362034736https://bugzilla.redhat.com/show_bug.cgi?id=20627002062700https://bugzilla.redhat.com/show_bug.cgi?id=20724412072441https://errata.rockylinux.org/RLBA-2022:7759RLBA-2022:7759RLBA-2022:7759  7python3-dnf-plugin-modulesync-4.0.21-14.1.el8.noarch.rpm 7python3-dnf-plugin-modulesync-4.0.21-14.1.el8.noarch.rpmi 6rBBbugfixndctl bug fix and enhancement updatep https://errata.rockylinux.org/RLBA-2022:7760RLBA-2022:7760RLBA-2022:7760 N]daxctl-devel-71.1-4.el8.x86_64.rpmO]ndctl-devel-71.1-4.el8.x86_64.rpmN]daxctl-devel-71.1-4.el8.x86_64.rpmO]ndctl-devel-71.1-4.el8.x86_64.rpmi 9wbugfixopenssh bug fix and enhancement updateo https://bugzilla.redhat.com/show_bug.cgi?id=19538071953807https://bugzilla.redhat.com/show_bug.cgi?id=20505112050511https://bugzilla.redhat.com/show_bug.cgi?id=20642492064249https://bugzilla.redhat.com/show_bug.cgi?id=20938972093897https://errata.rockylinux.org/RLBA-2022:7763RLBA-2022:7763RLBA-2022:7763 t"openssh-askpass-8.0p1-16.el8.x86_64.rpmt"openssh-askpass-8.0p1-16.el8.x86_64.rpmj >zBBbugfixdbus bug fix and enhancement updaten https://bugzilla.redhat.com/show_bug.cgi?id=20893622089362https://bugzilla.redhat.com/show_bug.cgi?id=20903972090397https://errata.rockylinux.org/RLBA-2022:7769RLBA-2022:7769RLBA-2022:7769 tUdbus-devel-1.12.8-23.el8.x86_64.rpmuUdbus-x11-1.12.8-23.el8.x86_64.rpmtUdbus-devel-1.12.8-23.el8.x86_64.rpmuUdbus-x11-1.12.8-23.el8.x86_64.rpmk BBBBbugfixsanlock bug fix and enhancement updatem https://bugzilla.redhat.com/show_bug.cgi?id=20584382058438https://errata.rockylinux.org/RLBA-2022:7774RLBA-2022:7774RLBA-2022:7774 jcpython3-sanlock-3.8.4-4.el8.x86_64.rpmYcsanlk-reset-3.8.4-4.el8.x86_64.rpmZcsanlock-3.8.4-4.el8.x86_64.rpmjcpython3-sanlock-3.8.4-4.el8.x86_64.rpmYcsanlk-reset-3.8.4-4.el8.x86_64.rpmZcsanlock-3.8.4-4.el8.x86_64.rpml Fbugfixlibverto bug fix and enhancement updatel https://bugzilla.redhat.com/show_bug.cgi?id=21009162100916https://errata.rockylinux.org/RLBA-2022:7776RLBA-2022:7776RLBA-2022:7776 eHlibverto-libev-0.3.2-2.el8.x86_64.rpmeHlibverto-libev-0.3.2-2.el8.x86_64.rpml Ibugfixutil-linux bug fix and enhancement updatek https://bugzilla.redhat.com/show_bug.cgi?id=20445922044592https://bugzilla.redhat.com/show_bug.cgi?id=20592412059241https://bugzilla.redhat.com/show_bug.cgi?id=20600302060030https://bugzilla.redhat.com/show_bug.cgi?id=20691872069187https://bugzilla.redhat.com/show_bug.cgi?id=20931662093166https://errata.rockylinux.org/RLBA-2022:7783RLBA-2022:7783RLBA-2022:7783 H\python3-libmount-2.32.1-38.el8.x86_64.rpmH\python3-libmount-2.32.1-38.el8.x86_64.rpmm Lbugfixlibselinux bug fix and enhancement updatej https://bugzilla.redhat.com/show_bug.cgi?id=20121452012145https://errata.rockylinux.org/RLBA-2022:7786RLBA-2022:7786RLBA-2022:7786 Z|libselinux-ruby-2.9-6.el8.x86_64.rpmZ|libselinux-ruby-2.9-6.el8.x86_64.rpmmm #OBBBBBBBBBBBBBBBBBBenhancementRDMA stack bug fix and enhancement updatei https://errata.rockylinux.org/RLEA-2022:7797RLEA-2022:7797RLEA-2022:7797 p\eth-tools-basic-11.3.0.0-1.el8.x86_64.rpmq\eth-tools-fastfabric-11.3.0.0-1.el8.x86_64.rpm}fabtests-1.15.1-1.el8.x86_64.rpmj9libvma-9.6.4-1.el8.x86_64.rpmikmstflint-4.21.0-1.el8.x86_64.rpmucx-1.13.0-1.el8.x86_64.rpmucx-cma-1.13.0-1.el8.x86_64.rpmucx-devel-1.13.0-1.el8.x86_64.rpmucx-ib-1.13.0-1.el8.x86_64.rpmucx-rdmacm-1.13.0-1.el8.x86_64.rpm p\eth-tools-basic-11.3.0.0-1.el8.x86_64.rpmq\eth-tools-fastfabric-11.3.0.0-1.el8.x86_64.rpm}fabtests-1.15.1-1.el8.x86_64.rpmj9libvma-9.6.4-1.el8.x86_64.rpmikmstflint-4.21.0-1.el8.x86_64.rpmucx-1.13.0-1.el8.x86_64.rpmucx-cma-1.13.0-1.el8.x86_64.rpmucx-devel-1.13.0-1.el8.x86_64.rpmucx-ib-1.13.0-1.el8.x86_64.rpmucx-rdmacm-1.13.0-1.el8.x86_64.rpmo 'dBbugfixpolicycoreutils bug fix and enhancement updateh https://bugzilla.redhat.com/show_bug.cgi?id=20633532063353https://bugzilla.redhat.com/show_bug.cgi?id=20931332093133https://errata.rockylinux.org/RLBA-2022:7805RLBA-2022:7805RLBA-2022:7805 FSpolicycoreutils-gui-2.9-20.el8.noarch.rpm+Spolicycoreutils-sandbox-2.9-20.el8.x86_64.rpmFSpolicycoreutils-gui-2.9-20.el8.noarch.rpm+Spolicycoreutils-sandbox-2.9-20.el8.x86_64.rpmp (mBBbugfixrpm bug fix and enhancement updateg https://bugzilla.redhat.com/show_bug.cgi?id=21245222124522* rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung statehttps://errata.rockylinux.org/RLBA-2022:7819RLBA-2022:7819RLBA-2022:7819 Fdrpm-build-4.14.3-24.el8_7.x86_64.rpmGdrpm-plugin-fapolicyd-4.14.3-24.el8_7.x86_64.rpmFdrpm-build-4.14.3-24.el8_7.x86_64.rpmGdrpm-plugin-fapolicyd-4.14.3-24.el8_7.x86_64.rpmq )JBBBBBBBBBBBBBBBBBBBBBBBBBBbugfixbind bug fix and enhancement updatev+ https://bugzilla.redhat.com/show_bug.cgi?id=21302722130272* named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind rhel-8.7.0.z]https://errata.rockylinux.org/RLBA-2022:7825RLBA-2022:7825RLBA-2022:7825 e4bind-9.11.36-5.el8_7.2.x86_64.rpmf4bind-chroot-9.11.36-5.el8_7.2.x86_64.rpmg4bind-devel-9.11.36-5.el8_7.2.x86_64.rpmh4bind-libs-9.11.36-5.el8_7.2.x86_64.rpmi4bind-libs-lite-9.11.36-5.el8_7.2.x86_64.rpm&4bind-license-9.11.36-5.el8_7.2.noarch.rpmj4bind-lite-devel-9.11.36-5.el8_7.2.x86_64.rpmk4bind-pkcs11-9.11.36-5.el8_7.2.x86_64.rpml4bind-pkcs11-devel-9.11.36-5.el8_7.2.x86_64.rpmm4bind-pkcs11-libs-9.11.36-5.el8_7.2.x86_64.rpmn4bind-pkcs11-utils-9.11.36-5.el8_7.2.x86_64.rpmo4bind-sdb-9.11.36-5.el8_7.2.x86_64.rpmp4bind-sdb-chroot-9.11.36-5.el8_7.2.x86_64.rpmq4bind-utils-9.11.36-5.el8_7.2.x86_64.rpm44python3-bind-9.11.36-5.el8_7.2.noarch.rpme4bind-9.11.36-5.el8_7.2.x86_64.rpmf4bind-chroot-9.11.36-5.el8_7.2.x86_64.rpmg4bind-devel-9.11.36-5.el8_7.2.x86_64.rpmh4bind-libs-9.11.36-5.el8_7.2.x86_64.rpmi4bind-libs-lite-9.11.36-5.el8_7.2.x86_64.rpm&4bind-license-9.11.36-5.el8_7.2.noarch.rpmj4bind-lite-devel-9.11.36-5.el8_7.2.x86_64.rpmk4bind-pkcs11-9.11.36-5.el8_7.2.x86_64.rpml4bind-pkcs11-devel-9.11.36-5.el8_7.2.x86_64.rpmm4bind-pkcs11-libs-9.11.36-5.el8_7.2.x86_64.rpmn4bind-pkcs11-utils-9.11.36-5.el8_7.2.x86_64.rpmo4bind-sdb-9.11.36-5.el8_7.2.x86_64.rpmp4bind-sdb-chroot-9.11.36-5.el8_7.2.x86_64.rpmq4bind-utils-9.11.36-5.el8_7.2.x86_64.rpm44python3-bind-9.11.36-5.el8_7.2.noarch.rpmq ,jbugfixNetworkManager bug fix and enhancement update! https://bugzilla.redhat.com/show_bug.cgi?id=21322852132285* Host ip changed when start vmhttps://errata.rockylinux.org/RLBA-2022:7828RLBA-2022:7828RLBA-2022:7828 dNetworkManager-cloud-setup-1.40.0-2.el8_7.x86_64.rpmdNetworkManager-cloud-setup-1.40.0-2.el8_7.x86_64.rpmr -hbugfixsssd bug fix and enhancement update9l https://bugzilla.redhat.com/show_bug.cgi?id=21285442128544* Cannot SSH with AD user to ipa-client (`krb5_validate` and `pac_check` settings conflict)https://errata.rockylinux.org/RLBA-2022:7829RLBA-2022:7829RLBA-2022:7829 rxsssd-idp-2.7.3-4.el8_7.1.x86_64.rpmrxsssd-idp-2.7.3-4.el8_7.1.x86_64.rpmr! .1bugfixtzdata bug fix and enhancement update%d https://errata.rockylinux.org/RLBA-2022:7884RLBA-2022:7884RLBA-2022:7884 >Ytzdata-java-2022f-1.el8.noarch.rpm>Ytzdata-java-2022f-1.el8.noarch.rpmr" 0/bugfixtzdata bug fix and enhancement update  https://bugzilla.redhat.com/show_bug.cgi?id=21494132149413https://bugzilla.redhat.com/show_bug.cgi?id=21494142149414https://bugzilla.redhat.com/show_bug.cgi?id=21494762149476https://bugzilla.redhat.com/show_bug.cgi?id=21494792149479https://errata.rockylinux.org/RLBA-2022:8785RLBA-2022:8785RLBA-2022:8785 >tzdata-java-2022g-1.el8.noarch.rpm>tzdata-java-2022g-1.el8.noarch.rpms( ;qBBBBBBBBbugfixnet-snmp bug fix and enhancement updatej https://bugzilla.redhat.com/show_bug.cgi?id=21347642134764* backport two memory leak fixes in snmplib - missed for RHEL 8https://errata.rockylinux.org/RLBA-2023:0085RLBA-2023:0085RLBA-2023:0085 onet-snmp-5.8-25.el8_7.1.x86_64.rpmpnet-snmp-agent-libs-5.8-25.el8_7.1.x86_64.rpmqnet-snmp-devel-5.8-25.el8_7.1.x86_64.rpmrnet-snmp-perl-5.8-25.el8_7.1.x86_64.rpmsnet-snmp-utils-5.8-25.el8_7.1.x86_64.rpmonet-snmp-5.8-25.el8_7.1.x86_64.rpmpnet-snmp-agent-libs-5.8-25.el8_7.1.x86_64.rpmqnet-snmp-devel-5.8-25.el8_7.1.x86_64.rpmrnet-snmp-perl-5.8-25.el8_7.1.x86_64.rpmsnet-snmp-utils-5.8-25.el8_7.1.x86_64.rpmt5 |BBsecurityModerate: dbus security update`https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010CVE-2022-42010CVE-2022-42010https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011CVE-2022-42011CVE-2022-42011https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012CVE-2022-42012CVE-2022-42012https://bugzilla.redhat.com/show_bug.cgi?id=21336162133616https://bugzilla.redhat.com/show_bug.cgi?id=21336172133617https://bugzilla.redhat.com/show_bug.cgi?id=21336182133618https://errata.rockylinux.org/RLSA-2023:0096RLSA-2023:0096RLSA-2023:0096 tVdbus-devel-1.12.8-23.el8_7.1.x86_64.rpmuVdbus-x11-1.12.8-23.el8_7.1.x86_64.rpmtVdbus-devel-1.12.8-23.el8_7.1.x86_64.rpmuVdbus-x11-1.12.8-23.el8_7.1.x86_64.rpmt, AbugfixNetworkManager bug fix and enhancement updateh https://bugzilla.redhat.com/show_bug.cgi?id=21322812132281* crio occasionally fails to start during deploymenthttps://bugzilla.redhat.com/show_bug.cgi?id=21357332135733* DNS servers are not sorted according to priority in resolv.confhttps://bugzilla.redhat.com/show_bug.cgi?id=21528912152891* Hostname is not configured during IPI installation of OpenShift 4.10.3 on baremetal when using NMState and static IP config for a bond network interface.https://bugzilla.redhat.com/show_bug.cgi?id=21534292153429* NMCLI OVS connections intermittently get stuck in "activating" state after power cycle or crashhttps://errata.rockylinux.org/RLBA-2023:0098RLBA-2023:0098RLBA-2023:0098 dNetworkManager-cloud-setup-1.40.0-5.el8_7.x86_64.rpmdNetworkManager-cloud-setup-1.40.0-5.el8_7.x86_64.rpmu. Dbugfixutil-linux bug fix and enhancement update# https://bugzilla.redhat.com/show_bug.cgi?id=21432522143252* Add --cont-clock feature for libuuid and uuidd [rhel-8]https://errata.rockylinux.org/RLBA-2023:0105RLBA-2023:0105RLBA-2023:0105 H]python3-libmount-2.32.1-39.el8_7.x86_64.rpmH]python3-libmount-2.32.1-39.el8_7.x86_64.rpmu/ GBBBBBBBBBBBBBBBBBBBBbugfixgcc bug fix and enhancement update"x https://errata.rockylinux.org/RLBA-2023:0106RLBA-2023:0106RLBA-2023:0106  cpp-8.5.0-16.el8_7.x86_64.rpmgcc-8.5.0-16.el8_7.x86_64.rpmgcc-c++-8.5.0-16.el8_7.x86_64.rpmgcc-gdb-plugin-8.5.0-16.el8_7.x86_64.rpmgcc-gfortran-8.5.0-16.el8_7.x86_64.rpmgcc-offload-nvptx-8.5.0-16.el8_7.x86_64.rpm gcc-plugin-annobin-8.5.0-16.el8_7.x86_64.rpm8libitm-devel-8.5.0-16.el8_7.x86_64.rpm9libquadmath-devel-8.5.0-16.el8_7.x86_64.rpm<libstdc++-devel-8.5.0-16.el8_7.x86_64.rpm=libstdc++-docs-8.5.0-16.el8_7.x86_64.rpm  cpp-8.5.0-16.el8_7.x86_64.rpmgcc-8.5.0-16.el8_7.x86_64.rpmgcc-c++-8.5.0-16.el8_7.x86_64.rpmgcc-gdb-plugin-8.5.0-16.el8_7.x86_64.rpmgcc-gfortran-8.5.0-16.el8_7.x86_64.rpmgcc-offload-nvptx-8.5.0-16.el8_7.x86_64.rpm gcc-plugin-annobin-8.5.0-16.el8_7.x86_64.rpm8libitm-devel-8.5.0-16.el8_7.x86_64.rpm9libquadmath-devel-8.5.0-16.el8_7.x86_64.rpm<libstdc++-devel-8.5.0-16.el8_7.x86_64.rpm=libstdc++-docs-8.5.0-16.el8_7.x86_64.rpmv7 ^securityModerate: sqlite security update<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35737CVE-2022-35737CVE-2022-35737https://bugzilla.redhat.com/show_bug.cgi?id=21102912110291https://errata.rockylinux.org/RLSA-2023:0110RLSA-2023:0110RLSA-2023:0110 6*lemon-3.26.0-17.el8_7.x86_64.rpm6*lemon-3.26.0-17.el8_7.x86_64.rpmv9 %aBBsecurityModerate: libtasn1 security updateVuhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46848CVE-2021-46848CVE-2021-46848https://bugzilla.redhat.com/show_bug.cgi?id=21400582140058https://errata.rockylinux.org/RLSA-2023:0116RLSA-2023:0116RLSA-2023:0116 ^<libtasn1-devel-4.13-4.el8_7.x86_64.rpm_<libtasn1-tools-4.13-4.el8_7.x86_64.rpm^<libtasn1-devel-4.13-4.el8_7.x86_64.rpm_<libtasn1-tools-4.13-4.el8_7.x86_64.rpmv4 (fbugfixauthselect bug fix and enhancement updateKO https://bugzilla.redhat.com/show_bug.cgi?id=21512292151229* Change the default password encryption algorithm back to sha512.https://errata.rockylinux.org/RLBA-2023:0120RLBA-2023:0120RLBA-2023:0120 =authselect-compat-1.2.5-2.el8_7.x86_64.rpm=authselect-compat-1.2.5-2.el8_7.x86_64.rpmw6 +ibugfixsssd bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=21398712139871* Analyzer: Optimize and remove duplicate messages in verbose listhttps://bugzilla.redhat.com/show_bug.cgi?id=21429612142961* SSSD: `sssctl analyze` command shouldn't require 'root' privilegedhttps://bugzilla.redhat.com/show_bug.cgi?id=21489892148989* UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-aroundhttps://bugzilla.redhat.com/show_bug.cgi?id=21528832152883* authenticating against external IdP services okta (native app) with OAuth client secret failedhttps://errata.rockylinux.org/RLBA-2023:0124RLBA-2023:0124RLBA-2023:0124 rwsssd-idp-2.7.3-4.el8_7.3.x86_64.rpmrwsssd-idp-2.7.3-4.el8_7.3.x86_64.rpmw; .lsecurityModerate: libxml2 security updateGhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40303CVE-2022-40303CVE-2022-40303https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40304CVE-2022-40304CVE-2022-40304https://bugzilla.redhat.com/show_bug.cgi?id=21362662136266https://bugzilla.redhat.com/show_bug.cgi?id=21362882136288https://errata.rockylinux.org/RLSA-2023:0173RLSA-2023:0173RLSA-2023:0173 .libxml2-devel-2.9.7-15.el8_7.1.x86_64.rpm.libxml2-devel-2.9.7-15.el8_7.1.x86_64.rpmwo /cBBbugfixcontainer-tools bug fix updatecW https://bugzilla.redhat.com/show_bug.cgi?id=16902861690286https://bugzilla.redhat.com/show_bug.cgi?id=16938061693806https://errata.rockylinux.org/RLBA-2019:0973RLBA-2019:0973RLBA-2019:0973  YR#oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm$oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm YR#oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm$oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm|~ 0cBBsecurityImportant: container-tools:rhel8 security and bug fix update: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5736CVE-2019-5736CVE-2019-5736https://bugzilla.redhat.com/show_bug.cgi?id=16649081664908https://bugzilla.redhat.com/show_bug.cgi?id=16936751693675* [stream rhel8] rebase container-selinux to 2.94https://bugzilla.redhat.com/show_bug.cgi?id=16956691695669* [stream rhel8] unable to mount disk at `/var/lib/containers` via `systemd` unit when `container-selinux` policy installedhttps://bugzilla.redhat.com/show_bug.cgi?id=16956891695689* [stream rhel8] don't allow a container to connect to random serviceshttps://errata.rockylinux.org/RLSA-2019:0975RLSA-2019:0975RLSA-2019:0975  YR#oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm$oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm YR#oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm$oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm 1fBBBBBBBBBBBBBBBBBBBBsecurityImportant: python27:2.7 security updateEhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7164CVE-2019-7164CVE-2019-7164https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7548CVE-2019-7548CVE-2019-7548https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9636CVE-2019-9636CVE-2019-9636https://bugzilla.redhat.com/show_bug.cgi?id=16740591674059https://bugzilla.redhat.com/show_bug.cgi?id=16785201678520https://bugzilla.redhat.com/show_bug.cgi?id=16885431688543https://errata.rockylinux.org/RLSA-2019:0981RLSA-2019:0981RLSA-2019:0981 u9pqwipython2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpmxopython2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm\Upython2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm[Ipython2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpmy_python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpmzcpython2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm{kpython2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm|bpython2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm}jpython2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm~`python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpmepython2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpmvapython2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpmfpython2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpmqpython2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpmgpython2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpmlpython2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm]Mpython2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpmnpython2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpmdpython2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpmu9pqwipython2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpmxopython2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm\Upython2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm[Ipython2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpmy_python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpmzcpython2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm{kpython2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm|bpython2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm}jpython2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm~`python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpmepython2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpmvapython2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpmfpython2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpmqpython2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpmgpython2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpmlpython2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm]Mpython2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpmnpython2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpmdpython2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm 2xsecurityModerate: python36:3.6 security updateU https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7164CVE-2019-7164CVE-2019-7164https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7548CVE-2019-7548CVE-2019-7548https://bugzilla.redhat.com/show_bug.cgi?id=16740591674059https://bugzilla.redhat.com/show_bug.cgi?id=16785201678520https://errata.rockylinux.org/RLSA-2019:0984RLSA-2019:0984RLSA-2019:0984 ^Ehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8324CVE-2019-8324CVE-2019-8324https://bugzilla.redhat.com/show_bug.cgi?id=16925201692520https://errata.rockylinux.org/RLSA-2019:1972RLSA-2019:1972RLSA-2019:1972 , 4 rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm5 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpmy rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpmzrubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm{rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm6rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm)rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm7rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm*rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm, 4 rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm5 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpmy rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpmzrubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm{rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm6rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm)rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm7rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm*rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpmCs ;fBBBBBBBBBBBBBBBBBBBBbugfixpython27:2.7 bug fix updater https://errata.rockylinux.org/RLBA-2019:1954RLBA-2019:1954RLBA-2019:1954 u9pqwipython2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpmxopython2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm\Upython2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm[Ipython2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpmy_python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpmzcpython2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm{kpython2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm|bpython2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm}jpython2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm~`python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpmepython2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpmvapython2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpmfpython2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpmqpython2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpmgpython2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpmlpython2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm]Mpython2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpmnpython2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpmdpython2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpmu9pqwipython2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpmxopython2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm\Upython2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm[Ipython2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpmy_python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpmzcpython2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm{kpython2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm|bpython2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm}jpython2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm~`python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpmepython2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpmvapython2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpmfpython2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpmqpython2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpmgpython2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpmlpython2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm]Mpython2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpmnpython2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpmdpython2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpmYt file for every exec in tmpfshttps://errata.rockylinux.org/RLBA-2019:1956RLBA-2019:1956RLBA-2019:1956  YR#oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm$oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm YR#oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm$oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm` >|BBsecurityImportant: mysql:8.0 security updateapChttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2420CVE-2019-2420CVE-2019-2420https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2434CVE-2019-2434CVE-2019-2434https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2436CVE-2019-2436CVE-2019-2436https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2455CVE-2019-2455CVE-2019-2455https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2481CVE-2019-2481CVE-2019-2481https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2482CVE-2019-2482CVE-2019-2482https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2486CVE-2019-2486CVE-2019-2486https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2494CVE-2019-2494CVE-2019-2494https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2495CVE-2019-2495CVE-2019-2495https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2502CVE-2019-2502CVE-2019-2502https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503CVE-2019-2503CVE-2019-2503https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2507CVE-2019-2507CVE-2019-2507https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2510CVE-2019-2510CVE-2019-2510https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2528CVE-2019-2528CVE-2019-2528https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2529CVE-2019-2529CVE-2019-2529https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2530CVE-2019-2530CVE-2019-2530https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2531CVE-2019-2531CVE-2019-2531https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2532CVE-2019-2532CVE-2019-2532https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2533CVE-2019-2533CVE-2019-2533https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2534CVE-2019-2534CVE-2019-2534https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2535CVE-2019-2535CVE-2019-2535https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2536CVE-2019-2536CVE-2019-2536https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2537CVE-2019-2537CVE-2019-2537https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2539CVE-2019-2539CVE-2019-2539https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2580CVE-2019-2580CVE-2019-2580https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2581CVE-2019-2581CVE-2019-2581https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2584CVE-2019-2584CVE-2019-2584https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2585CVE-2019-2585CVE-2019-2585https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2587CVE-2019-2587CVE-2019-2587https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2589CVE-2019-2589CVE-2019-2589https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2592CVE-2019-2592CVE-2019-2592https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2593CVE-2019-2593CVE-2019-2593https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2596CVE-2019-2596CVE-2019-2596https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2606CVE-2019-2606CVE-2019-2606https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2607CVE-2019-2607CVE-2019-2607https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2614CVE-2019-2614CVE-2019-2614https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2617CVE-2019-2617CVE-2019-2617https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2620CVE-2019-2620CVE-2019-2620https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2623CVE-2019-2623CVE-2019-2623https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2624CVE-2019-2624CVE-2019-2624https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2625CVE-2019-2625CVE-2019-2625https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2626CVE-2019-2626CVE-2019-2626https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2627CVE-2019-2627CVE-2019-2627https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2628CVE-2019-2628CVE-2019-2628https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2630CVE-2019-2630CVE-2019-2630https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2631CVE-2019-2631CVE-2019-2631https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2634CVE-2019-2634CVE-2019-2634https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2635CVE-2019-2635CVE-2019-2635https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2636CVE-2019-2636CVE-2019-2636https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2644CVE-2019-2644CVE-2019-2644https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2681CVE-2019-2681CVE-2019-2681https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2683CVE-2019-2683CVE-2019-2683https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2685CVE-2019-2685CVE-2019-2685https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2686CVE-2019-2686CVE-2019-2686https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2687CVE-2019-2687CVE-2019-2687https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2688CVE-2019-2688CVE-2019-2688https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2689CVE-2019-2689CVE-2019-2689https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2691CVE-2019-2691CVE-2019-2691https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2693CVE-2019-2693CVE-2019-2693https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2694CVE-2019-2694CVE-2019-2694https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2695CVE-2019-2695CVE-2019-2695https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2737CVE-2019-2737CVE-2019-2737https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2738CVE-2019-2738CVE-2019-2738https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2739CVE-2019-2739CVE-2019-2739https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2740CVE-2019-2740CVE-2019-2740https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2752CVE-2019-2752CVE-2019-2752https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2755CVE-2019-2755CVE-2019-2755https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2757CVE-2019-2757CVE-2019-2757https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2758CVE-2019-2758CVE-2019-2758https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2774CVE-2019-2774CVE-2019-2774https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2778CVE-2019-2778CVE-2019-2778https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2780CVE-2019-2780CVE-2019-2780https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2784CVE-2019-2784CVE-2019-2784https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2785CVE-2019-2785CVE-2019-2785https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2789CVE-2019-2789CVE-2019-2789https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2795CVE-2019-2795CVE-2019-2795https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2796CVE-2019-2796CVE-2019-2796https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2797CVE-2019-2797CVE-2019-2797https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2798CVE-2019-2798CVE-2019-2798https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2800CVE-2019-2800CVE-2019-2800https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2801CVE-2019-2801CVE-2019-2801https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2802CVE-2019-2802CVE-2019-2802https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2803CVE-2019-2803CVE-2019-2803https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2805CVE-2019-2805CVE-2019-2805https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2808CVE-2019-2808CVE-2019-2808https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2810CVE-2019-2810CVE-2019-2810https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2811CVE-2019-2811CVE-2019-2811https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2812CVE-2019-2812CVE-2019-2812https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2814CVE-2019-2814CVE-2019-2814https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2815CVE-2019-2815CVE-2019-2815https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2819CVE-2019-2819CVE-2019-2819https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2826CVE-2019-2826CVE-2019-2826https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2830CVE-2019-2830CVE-2019-2830https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2834CVE-2019-2834CVE-2019-2834https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2879CVE-2019-2879CVE-2019-2879https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2948CVE-2019-2948CVE-2019-2948https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2950CVE-2019-2950CVE-2019-2950https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2969CVE-2019-2969CVE-2019-2969https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3003CVE-2019-3003CVE-2019-3003https://bugzilla.redhat.com/show_bug.cgi?id=16667381666738https://bugzilla.redhat.com/show_bug.cgi?id=16667401666740https://bugzilla.redhat.com/show_bug.cgi?id=16667411666741https://bugzilla.redhat.com/show_bug.cgi?id=16667421666742https://bugzilla.redhat.com/show_bug.cgi?id=16667431666743https://bugzilla.redhat.com/show_bug.cgi?id=16667441666744https://bugzilla.redhat.com/show_bug.cgi?id=16667451666745https://bugzilla.redhat.com/show_bug.cgi?id=16667461666746https://bugzilla.redhat.com/show_bug.cgi?id=16667471666747https://bugzilla.redhat.com/show_bug.cgi?id=16667481666748https://bugzilla.redhat.com/show_bug.cgi?id=16667491666749https://bugzilla.redhat.com/show_bug.cgi?id=16667501666750https://bugzilla.redhat.com/show_bug.cgi?id=16667511666751https://bugzilla.redhat.com/show_bug.cgi?id=16667531666753https://bugzilla.redhat.com/show_bug.cgi?id=16667551666755https://bugzilla.redhat.com/show_bug.cgi?id=16667561666756https://bugzilla.redhat.com/show_bug.cgi?id=16667571666757https://bugzilla.redhat.com/show_bug.cgi?id=16667581666758https://bugzilla.redhat.com/show_bug.cgi?id=16667591666759https://bugzilla.redhat.com/show_bug.cgi?id=16667601666760https://bugzilla.redhat.com/show_bug.cgi?id=16667611666761https://bugzilla.redhat.com/show_bug.cgi?id=16667621666762https://bugzilla.redhat.com/show_bug.cgi?id=16667631666763https://bugzilla.redhat.com/show_bug.cgi?id=16667641666764https://bugzilla.redhat.com/show_bug.cgi?id=17029581702958https://bugzilla.redhat.com/show_bug.cgi?id=17029591702959https://bugzilla.redhat.com/show_bug.cgi?id=17029601702960https://bugzilla.redhat.com/show_bug.cgi?id=17029611702961https://bugzilla.redhat.com/show_bug.cgi?id=17029621702962https://bugzilla.redhat.com/show_bug.cgi?id=17029631702963https://bugzilla.redhat.com/show_bug.cgi?id=17029641702964https://bugzilla.redhat.com/show_bug.cgi?id=17029651702965https://bugzilla.redhat.com/show_bug.cgi?id=17029661702966https://bugzilla.redhat.com/show_bug.cgi?id=17029671702967https://bugzilla.redhat.com/show_bug.cgi?id=17029681702968https://bugzilla.redhat.com/show_bug.cgi?id=17029691702969https://bugzilla.redhat.com/show_bug.cgi?id=17029701702970https://bugzilla.redhat.com/show_bug.cgi?id=17029711702971https://bugzilla.redhat.com/show_bug.cgi?id=17029721702972https://bugzilla.redhat.com/show_bug.cgi?id=17029731702973https://bugzilla.redhat.com/show_bug.cgi?id=17029741702974https://bugzilla.redhat.com/show_bug.cgi?id=17029751702975https://bugzilla.redhat.com/show_bug.cgi?id=17029761702976https://bugzilla.redhat.com/show_bug.cgi?id=17029771702977https://bugzilla.redhat.com/show_bug.cgi?id=17029781702978https://bugzilla.redhat.com/show_bug.cgi?id=17029791702979https://bugzilla.redhat.com/show_bug.cgi?id=17029811702981https://bugzilla.redhat.com/show_bug.cgi?id=17029821702982https://bugzilla.redhat.com/show_bug.cgi?id=17029831702983https://bugzilla.redhat.com/show_bug.cgi?id=17029841702984https://bugzilla.redhat.com/show_bug.cgi?id=17029851702985https://bugzilla.redhat.com/show_bug.cgi?id=17029861702986https://bugzilla.redhat.com/show_bug.cgi?id=17029871702987https://bugzilla.redhat.com/show_bug.cgi?id=17029891702989https://bugzilla.redhat.com/show_bug.cgi?id=17029901702990https://bugzilla.redhat.com/show_bug.cgi?id=17029911702991https://bugzilla.redhat.com/show_bug.cgi?id=17029921702992https://bugzilla.redhat.com/show_bug.cgi?id=17029931702993https://bugzilla.redhat.com/show_bug.cgi?id=17029941702994https://bugzilla.redhat.com/show_bug.cgi?id=17029951702995https://bugzilla.redhat.com/show_bug.cgi?id=17029971702997https://bugzilla.redhat.com/show_bug.cgi?id=17319971731997https://bugzilla.redhat.com/show_bug.cgi?id=17319981731998https://bugzilla.redhat.com/show_bug.cgi?id=17319991731999https://bugzilla.redhat.com/show_bug.cgi?id=17320001732000https://bugzilla.redhat.com/show_bug.cgi?id=17320051732005https://bugzilla.redhat.com/show_bug.cgi?id=17320061732006https://bugzilla.redhat.com/show_bug.cgi?id=17320071732007https://bugzilla.redhat.com/show_bug.cgi?id=17320081732008https://bugzilla.redhat.com/show_bug.cgi?id=17320091732009https://bugzilla.redhat.com/show_bug.cgi?id=17320101732010https://bugzilla.redhat.com/show_bug.cgi?id=17320111732011https://bugzilla.redhat.com/show_bug.cgi?id=17320121732012https://bugzilla.redhat.com/show_bug.cgi?id=17320131732013https://bugzilla.redhat.com/show_bug.cgi?id=17320151732015https://bugzilla.redhat.com/show_bug.cgi?id=17320171732017https://bugzilla.redhat.com/show_bug.cgi?id=17320181732018https://bugzilla.redhat.com/show_bug.cgi?id=17320191732019https://bugzilla.redhat.com/show_bug.cgi?id=17320201732020https://bugzilla.redhat.com/show_bug.cgi?id=17320211732021https://bugzilla.redhat.com/show_bug.cgi?id=17320221732022https://bugzilla.redhat.com/show_bug.cgi?id=17320231732023https://bugzilla.redhat.com/show_bug.cgi?id=17320241732024https://bugzilla.redhat.com/show_bug.cgi?id=17320251732025https://bugzilla.redhat.com/show_bug.cgi?id=17320261732026https://bugzilla.redhat.com/show_bug.cgi?id=17320271732027https://bugzilla.redhat.com/show_bug.cgi?id=17320281732028https://bugzilla.redhat.com/show_bug.cgi?id=17320291732029https://bugzilla.redhat.com/show_bug.cgi?id=17320301732030https://bugzilla.redhat.com/show_bug.cgi?id=17320311732031https://bugzilla.redhat.com/show_bug.cgi?id=17320321732032https://bugzilla.redhat.com/show_bug.cgi?id=17320341732034https://bugzilla.redhat.com/show_bug.cgi?id=17320351732035https://bugzilla.redhat.com/show_bug.cgi?id=17320361732036https://bugzilla.redhat.com/show_bug.cgi?id=17320371732037https://errata.rockylinux.org/RLSA-2019:2511RLSA-2019:2511RLSA-2019:2511 0`f?mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm@mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm0`f?mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm@mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpmb ?IsecurityImportant: subversion:1.10 security updateQhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0203CVE-2019-0203CVE-2019-0203https://bugzilla.redhat.com/show_bug.cgi?id=17330731733073https://errata.rockylinux.org/RLSA-2019:2512RLSA-2019:2512RLSA-2019:2512 xGelibserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpmxGelibserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpmd UBBsecurityImportant: squid:4 security updateahttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12527CVE-2019-12527CVE-2019-12527https://bugzilla.redhat.com/show_bug.cgi?id=17305331730533https://errata.rockylinux.org/RLSA-2019:2593RLSA-2019:2593RLSA-2019:2593 &SY3libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm4libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm&SY3libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm4libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpmgx xbugfixpython36:3.6 bug fix updatep{ https://errata.rockylinux.org/RLBA-2019:2716RLBA-2019:2716RLBA-2019:2716 ^alsa-plugins-arcamav-1.1.9-1.el8.x86_64.rpma>alsa-plugins-maemo-1.1.9-1.el8.x86_64.rpmb>alsa-plugins-oss-1.1.9-1.el8.x86_64.rpmc>alsa-plugins-pulseaudio-1.1.9-1.el8.x86_64.rpmd>alsa-plugins-samplerate-1.1.9-1.el8.x86_64.rpme>alsa-plugins-speex-1.1.9-1.el8.x86_64.rpmf>alsa-plugins-upmix-1.1.9-1.el8.x86_64.rpmg>alsa-plugins-usbstream-1.1.9-1.el8.x86_64.rpmh>alsa-plugins-vdownmix-1.1.9-1.el8.x86_64.rpm `>alsa-plugins-arcamav-1.1.9-1.el8.x86_64.rpma>alsa-plugins-maemo-1.1.9-1.el8.x86_64.rpmb>alsa-plugins-oss-1.1.9-1.el8.x86_64.rpmc>alsa-plugins-pulseaudio-1.1.9-1.el8.x86_64.rpmd>alsa-plugins-samplerate-1.1.9-1.el8.x86_64.rpme>alsa-plugins-speex-1.1.9-1.el8.x86_64.rpmf>alsa-plugins-upmix-1.1.9-1.el8.x86_64.rpmg>alsa-plugins-usbstream-1.1.9-1.el8.x86_64.rpmh>alsa-plugins-vdownmix-1.1.9-1.el8.x86_64.rpm  (cBBsecurityImportant: container-tools:rhel8 security, bug fix, and enhancement update"<$https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10214CVE-2019-10214CVE-2019-10214https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14378CVE-2019-14378CVE-2019-14378https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9946CVE-2019-9946CVE-2019-9946https://bugzilla.redhat.com/show_bug.cgi?id=16552111655211https://bugzilla.redhat.com/show_bug.cgi?id=16615971661597https://bugzilla.redhat.com/show_bug.cgi?id=16710231671023https://bugzilla.redhat.com/show_bug.cgi?id=16725811672581https://bugzilla.redhat.com/show_bug.cgi?id=16745191674519https://bugzilla.redhat.com/show_bug.cgi?id=16772511677251https://bugzilla.redhat.com/show_bug.cgi?id=16772641677264https://bugzilla.redhat.com/show_bug.cgi?id=16892551689255https://bugzilla.redhat.com/show_bug.cgi?id=16905141690514https://bugzilla.redhat.com/show_bug.cgi?id=16915431691543https://bugzilla.redhat.com/show_bug.cgi?id=16925131692513https://bugzilla.redhat.com/show_bug.cgi?id=16931541693154https://bugzilla.redhat.com/show_bug.cgi?id=16934241693424https://bugzilla.redhat.com/show_bug.cgi?id=17072201707220https://bugzilla.redhat.com/show_bug.cgi?id=17196261719626https://bugzilla.redhat.com/show_bug.cgi?id=17199941719994https://bugzilla.redhat.com/show_bug.cgi?id=17206461720646https://bugzilla.redhat.com/show_bug.cgi?id=17206541720654https://bugzilla.redhat.com/show_bug.cgi?id=17212471721247https://bugzilla.redhat.com/show_bug.cgi?id=17216381721638https://bugzilla.redhat.com/show_bug.cgi?id=17238791723879https://bugzilla.redhat.com/show_bug.cgi?id=17287001728700https://bugzilla.redhat.com/show_bug.cgi?id=17302811730281https://bugzilla.redhat.com/show_bug.cgi?id=17311171731117https://bugzilla.redhat.com/show_bug.cgi?id=17325081732508https://bugzilla.redhat.com/show_bug.cgi?id=17347451734745https://bugzilla.redhat.com/show_bug.cgi?id=17348091734809https://bugzilla.redhat.com/show_bug.cgi?id=17370771737077https://bugzilla.redhat.com/show_bug.cgi?id=17399611739961https://bugzilla.redhat.com/show_bug.cgi?id=17400791740079https://bugzilla.redhat.com/show_bug.cgi?id=17411571741157https://bugzilla.redhat.com/show_bug.cgi?id=17436851743685https://errata.rockylinux.org/RLSA-2019:3403RLSA-2019:3403RLSA-2019:3403  YR#oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm$oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm YR#oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm$oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm +ibugfixpython-gssapi bug fix and enhancement update^ https://bugzilla.redhat.com/show_bug.cgi?id=17150401715040https://errata.rockylinux.org/RLBA-2019:3406RLBA-2019:3406RLBA-2019:3406 XFpython3-gssapi-1.5.1-5.el8.x86_64.rpmXFpython3-gssapi-1.5.1-5.el8.x86_64.rpm   .lbugfixlttng-ust bug fix and enhancement update]? https://bugzilla.redhat.com/show_bug.cgi?id=16739901673990https://bugzilla.redhat.com/show_bug.cgi?id=17508411750841https://errata.rockylinux.org/RLBA-2019:3411RLBA-2019:3411RLBA-2019:3411 ylttng-ust-2.8.1-11.el8.x86_64.rpmylttng-ust-2.8.1-11.el8.x86_64.rpm   7oBBBBBBbugfixX libraries bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=17159491715949https://errata.rockylinux.org/RLBA-2019:3412RLBA-2019:3412RLBA-2019:3412 UlibICE-1.0.9-15.el8.x86_64.rpmVlibICE-devel-1.0.9-15.el8.x86_64.rpmdlibXt-1.1.5-12.el8.x86_64.rpmelibXt-devel-1.1.5-12.el8.x86_64.rpmUlibICE-1.0.9-15.el8.x86_64.rpmVlibICE-devel-1.0.9-15.el8.x86_64.rpmdlibXt-1.1.5-12.el8.x86_64.rpmelibXt-devel-1.1.5-12.el8.x86_64.rpm   8~lBBBBBBBBBBBBBBBBBBBBBBBBBxbugfixpki-core:10.6 and pki-deps:10:6 bug fix and enhancement update https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086CVE-2019-12086CVE-2019-12086https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12814CVE-2019-12814CVE-2019-12814https://bugzilla.redhat.com/show_bug.cgi?id=16668591666859https://bugzilla.redhat.com/show_bug.cgi?id=16669211666921https://bugzilla.redhat.com/show_bug.cgi?id=16732961673296https://bugzilla.redhat.com/show_bug.cgi?id=16794801679480https://bugzilla.redhat.com/show_bug.cgi?id=16953021695302https://bugzilla.redhat.com/show_bug.cgi?id=16968491696849https://bugzilla.redhat.com/show_bug.cgi?id=16980591698059https://bugzilla.redhat.com/show_bug.cgi?id=17159501715950https://bugzilla.redhat.com/show_bug.cgi?id=17211351721135https://errata.rockylinux.org/RLBA-2019:3416RLBA-2019:3416RLBA-2019:3416 <* #"apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm$apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm%bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm'glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm(glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm)wglassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm*wglassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm+wglassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpmjackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpmjackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm, jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm-jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm.njavassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm/njavassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm <python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm <python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm5!relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpmm.slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm6.slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm7stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm8velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm9xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm:xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm?xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm;xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm<xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm=xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm<* #"apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm$apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm%bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm'glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm(glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm)wglassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm*wglassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm+wglassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpmjackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpmjackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm, jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm-jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm.njavassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm/njavassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm <python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm <python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm5!relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpmm.slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm6.slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm7stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm8velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm9xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm:xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm?xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm;xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm<xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm=xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm"~ ;yenhancementenscript bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=16643661664366https://errata.rockylinux.org/RLEA-2019:3420RLEA-2019:3420RLEA-2019:3420 nUenscript-1.6.6-17.el8.x86_64.rpmnUenscript-1.6.6-17.el8.x86_64.rpm# >|enhancementcompat-libtiff3 bug fix and enhancement update https://errata.rockylinux.org/RLEA-2019:3425RLEA-2019:3425RLEA-2019:3425   UBBsecurityModerate: squid:4 security and bug fix update1&https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13345CVE-2019-13345CVE-2019-13345https://bugzilla.redhat.com/show_bug.cgi?id=16795261679526https://bugzilla.redhat.com/show_bug.cgi?id=16835271683527https://bugzilla.redhat.com/show_bug.cgi?id=17031171703117https://bugzilla.redhat.com/show_bug.cgi?id=17170461717046https://bugzilla.redhat.com/show_bug.cgi?id=17277441727744https://errata.rockylinux.org/RLSA-2019:3476RLSA-2019:3476RLSA-2019:3476 &SY3libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm4libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm&SY3libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm4libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm@ bugfixinkscape:0.92.3 bug fix and enhancement updateW https://errata.rockylinux.org/RLBA-2019:3480RLBA-2019:3480RLBA-2019:3480 , bpS=python2-scour-0.35-9.module+el8.4.0+533+773bb730.noarch.rpm, bpS=python2-scour-0.35-9.module+el8.4.0+533+773bb730.noarch.rpmA Wbugfixabrt-java-connector bug fix and enhancement updateV https://bugzilla.redhat.com/show_bug.cgi?id=17213931721393https://errata.rockylinux.org/RLBA-2019:3487RLBA-2019:3487RLBA-2019:3487 U~abrt-java-connector-1.1.0-16.el8.x86_64.rpmU~abrt-java-connector-1.1.0-16.el8.x86_64.rpmB Zbugfixldns bug fix and enhancement updateU https://errata.rockylinux.org/RLBA-2019:3490RLBA-2019:3490RLBA-2019:3490 SYldns-1.7.0-21.el8.x86_64.rpmSYldns-1.7.0-21.el8.x86_64.rpmC ]bugfixjna bug fix and enhancement updateT https://bugzilla.redhat.com/show_bug.cgi?id=17204741720474https://errata.rockylinux.org/RLBA-2019:3492RLBA-2019:3492RLBA-2019:3492 Lnjna-4.5.1-5.el8.x86_64.rpmLnjna-4.5.1-5.el8.x86_64.rpmC cBBBfsecurityImportant: container-tools:1.0 security and bug fix updateS<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10214CVE-2019-10214CVE-2019-10214https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14378CVE-2019-14378CVE-2019-14378https://bugzilla.redhat.com/show_bug.cgi?id=17008771700877https://bugzilla.redhat.com/show_bug.cgi?id=17325081732508https://bugzilla.redhat.com/show_bug.cgi?id=17347451734745https://errata.rockylinux.org/RLSA-2019:3494RLSA-2019:3494RLSA-2019:3494  YRLdfuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm#oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm$oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm YRLdfuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm#oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm$oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpmJ 'aBBBBbugfixvolume_key bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=16651351665135https://errata.rockylinux.org/RLBA-2019:3500RLBA-2019:3500RLBA-2019:3500 80volume_key-0.3.11-5.el8.x86_64.rpm90volume_key-devel-0.3.11-5.el8.x86_64.rpm:0volume_key-libs-0.3.11-5.el8.x86_64.rpm80volume_key-0.3.11-5.el8.x86_64.rpm90volume_key-devel-0.3.11-5.el8.x86_64.rpm:0volume_key-libs-0.3.11-5.el8.x86_64.rpmJ -hBBBbugfixqpdf bug fix and enhancement update https://errata.rockylinux.org/RLBA-2019:3507RLBA-2019:3507RLBA-2019:3507 +qpdf-7.1.1-10.el8.x86_64.rpmx+qpdf-doc-7.1.1-10.el8.noarch.rpm+qpdf-libs-7.1.1-10.el8.x86_64.rpm+qpdf-7.1.1-10.el8.x86_64.rpmx+qpdf-doc-7.1.1-10.el8.noarch.rpm+qpdf-libs-7.1.1-10.el8.x86_64.rpmK 0nenhancementlibtalloc bug fix and enhancement update  https://bugzilla.redhat.com/show_bug.cgi?id=16845771684577https://errata.rockylinux.org/RLEA-2019:3557RLEA-2019:3557RLEA-2019:3557 _nss_wrapper-1.1.5-3.el8.x86_64.rpm_nss_wrapper-1.1.5-3.el8.x86_64.rpmL" 5qBBbugfixNetworkManager bug fix and enhancement update A https://bugzilla.redhat.com/show_bug.cgi?id=15410131541013https://bugzilla.redhat.com/show_bug.cgi?id=16125031612503https://bugzilla.redhat.com/show_bug.cgi?id=16379851637985https://bugzilla.redhat.com/show_bug.cgi?id=16438411643841https://bugzilla.redhat.com/show_bug.cgi?id=16595141659514https://bugzilla.redhat.com/show_bug.cgi?id=16656491665649https://bugzilla.redhat.com/show_bug.cgi?id=16678741667874https://bugzilla.redhat.com/show_bug.cgi?id=16745451674545https://bugzilla.redhat.com/show_bug.cgi?id=16745501674550https://bugzilla.redhat.com/show_bug.cgi?id=16770681677068https://bugzilla.redhat.com/show_bug.cgi?id=16770701677070https://bugzilla.redhat.com/show_bug.cgi?id=16792301679230https://bugzilla.redhat.com/show_bug.cgi?id=16836441683644https://bugzilla.redhat.com/show_bug.cgi?id=16890551689055https://bugzilla.redhat.com/show_bug.cgi?id=16916191691619https://bugzilla.redhat.com/show_bug.cgi?id=16931421693142https://bugzilla.redhat.com/show_bug.cgi?id=16973291697329https://bugzilla.redhat.com/show_bug.cgi?id=17097411709741https://bugzilla.redhat.com/show_bug.cgi?id=17169871716987https://bugzilla.redhat.com/show_bug.cgi?id=17181731718173https://bugzilla.redhat.com/show_bug.cgi?id=17193181719318https://bugzilla.redhat.com/show_bug.cgi?id=17233951723395https://bugzilla.redhat.com/show_bug.cgi?id=17298541729854https://bugzilla.redhat.com/show_bug.cgi?id=17340321734032https://bugzilla.redhat.com/show_bug.cgi?id=17343831734383https://bugzilla.redhat.com/show_bug.cgi?id=17379451737945https://bugzilla.redhat.com/show_bug.cgi?id=17437301743730https://errata.rockylinux.org/RLBA-2019:3623RLBA-2019:3623RLBA-2019:3623 <'NetworkManager-libreswan-1.2.10-4.el8.x86_64.rpm='NetworkManager-libreswan-gnome-1.2.10-4.el8.x86_64.rpm<'NetworkManager-libreswan-1.2.10-4.el8.x86_64.rpm='NetworkManager-libreswan-gnome-1.2.10-4.el8.x86_64.rpmM 8vsecurityLow: libvorbis security updateMylhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10392CVE-2018-10392CVE-2018-10392https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10393CVE-2018-10393CVE-2018-10393https://bugzilla.redhat.com/show_bug.cgi?id=15741931574193https://bugzilla.redhat.com/show_bug.cgi?id=15741941574194https://errata.rockylinux.org/RLSA-2019:3703RLSA-2019:3703RLSA-2019:3703 qlibvorbis-1.3.6-2.el8.x86_64.rpmqlibvorbis-1.3.6-2.el8.x86_64.rpmM 9LsecurityModerate: mariadb:10.3 security and bug fix updateFhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2510CVE-2019-2510CVE-2019-2510https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2537CVE-2019-2537CVE-2019-2537https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2614CVE-2019-2614CVE-2019-2614https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2627CVE-2019-2627CVE-2019-2627https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2628CVE-2019-2628CVE-2019-2628https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2737CVE-2019-2737CVE-2019-2737https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2739CVE-2019-2739CVE-2019-2739https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2740CVE-2019-2740CVE-2019-2740https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2758CVE-2019-2758CVE-2019-2758https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2805CVE-2019-2805CVE-2019-2805https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2922CVE-2020-2922CVE-2020-2922https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2007CVE-2021-2007CVE-2021-2007https://bugzilla.redhat.com/show_bug.cgi?id=16572201657220https://bugzilla.redhat.com/show_bug.cgi?id=16599201659920https://bugzilla.redhat.com/show_bug.cgi?id=16667511666751https://bugzilla.redhat.com/show_bug.cgi?id=16667631666763https://bugzilla.redhat.com/show_bug.cgi?id=16868181686818https://bugzilla.redhat.com/show_bug.cgi?id=16878791687879https://bugzilla.redhat.com/show_bug.cgi?id=16932451693245https://bugzilla.redhat.com/show_bug.cgi?id=17027071702707https://bugzilla.redhat.com/show_bug.cgi?id=17027091702709https://bugzilla.redhat.com/show_bug.cgi?id=17029691702969https://bugzilla.redhat.com/show_bug.cgi?id=17029761702976https://bugzilla.redhat.com/show_bug.cgi?id=17029771702977https://bugzilla.redhat.com/show_bug.cgi?id=17319971731997https://bugzilla.redhat.com/show_bug.cgi?id=17319991731999https://bugzilla.redhat.com/show_bug.cgi?id=17320001732000https://bugzilla.redhat.com/show_bug.cgi?id=17320081732008https://bugzilla.redhat.com/show_bug.cgi?id=17320251732025https://errata.rockylinux.org/RLSA-2019:3708RLSA-2019:3708RLSA-2019:3708 5W.Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm5W.Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpmP :eBBBBBBBBBBBBsecurityCritical: php:7.2 security update`iehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11043CVE-2019-11043CVE-2019-11043https://bugzilla.redhat.com/show_bug.cgi?id=17663781766378https://errata.rockylinux.org/RLSA-2019:3735RLSA-2019:3735RLSA-2019:3735  D0Dapcu-panel-5.1.12-2.module+el8.4.0+413+c9202dda.noarch.rpmblibzip-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpmclibzip-devel-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpmdlibzip-tools-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpmjDphp-pear-1.10.5-9.module+el8.4.0+413+c9202dda.noarch.rpmeDphp-pecl-apcu-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpmfDphp-pecl-apcu-devel-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpmgphp-pecl-zip-1.15.3-1.module+el8.4.0+413+c9202dda.x86_64.rpm D0Dapcu-panel-5.1.12-2.module+el8.4.0+413+c9202dda.noarch.rpmblibzip-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpmclibzip-devel-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpmdlibzip-tools-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpmjDphp-pear-1.10.5-9.module+el8.4.0+413+c9202dda.noarch.rpmeDphp-pecl-apcu-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpmfDphp-pecl-apcu-devel-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpmgphp-pecl-zip-1.15.3-1.module+el8.4.0+413+c9202dda.x86_64.rpmS ;ABBBBBBBBBBBBsecurityCritical: php:7.3 security updateIiehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11043CVE-2019-11043CVE-2019-11043https://bugzilla.redhat.com/show_bug.cgi?id=17663781766378https://errata.rockylinux.org/RLSA-2019:3736RLSA-2019:3736RLSA-2019:3736 \aD0+apcu-panel-5.1.17-1.module+el8.4.0+414+2e7afcdd.noarch.rpmblibzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmclibzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmdlibzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmjKphp-pear-1.10.9-1.module+el8.4.0+414+2e7afcdd.noarch.rpme+php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmf+php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmgbphp-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm\aD0+apcu-panel-5.1.17-1.module+el8.4.0+414+2e7afcdd.noarch.rpmblibzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmclibzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmdlibzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmjKphp-pear-1.10.9-1.module+el8.4.0+414+2e7afcdd.noarch.rpme+php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmf+php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmgbphp-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmW% |BBbugfixlibcacard bug fix and enhancement update2* https://bugzilla.redhat.com/show_bug.cgi?id=17504771750477* Backport the patch removing key caching to unbreak libcacard for CI usage .https://errata.rockylinux.org/RLBA-2019:3785RLBA-2019:3785RLBA-2019:3785 l3libcacard-2.7.0-2.el8_1.x86_64.rpmm3libcacard-devel-2.7.0-2.el8_1.x86_64.rpml3libcacard-2.7.0-2.el8_1.x86_64.rpmm3libcacard-devel-2.7.0-2.el8_1.x86_64.rpmW& bugfixinkscape:0.92.3 bug fix update\O https://bugzilla.redhat.com/show_bug.cgi?id=17736551773655* New inkscape (rpm) is actually older than currenthttps://errata.rockylinux.org/RLBA-2019:4266RLBA-2019:4266RLBA-2019:4266 , bpS=python2-scour-0.35-9.module+el8.4.0+533+773bb730.noarch.rpm, bpS=python2-scour-0.35-9.module+el8.4.0+533+773bb730.noarch.rpmX' vBEbugfixidm:DL1 bug fix update+` https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10195CVE-2019-10195CVE-2019-10195https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14867CVE-2019-14867CVE-2019-14867https://bugzilla.redhat.com/show_bug.cgi?id=17735161773516* IPA upgrade fails for latest ipa package when adtrust is installedhttps://errata.rockylinux.org/RLBA-2019:4268RLBA-2019:4268RLBA-2019:4268 2/oq9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm2/oq9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm` cBBsecurityImportant: container-tools:rhel8 security and bug fix update 0 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16884CVE-2019-16884CVE-2019-16884https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18466CVE-2019-18466CVE-2019-18466https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512CVE-2019-9512CVE-2019-9512https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514CVE-2019-9514CVE-2019-9514https://bugzilla.redhat.com/show_bug.cgi?id=17356451735645https://bugzilla.redhat.com/show_bug.cgi?id=17357441735744https://bugzilla.redhat.com/show_bug.cgi?id=17572141757214https://bugzilla.redhat.com/show_bug.cgi?id=17643181764318* avc: podman run --security-opt label=type:svirt_qemu_net_thttps://bugzilla.redhat.com/show_bug.cgi?id=17701761770176* backport json-file logging support to 1.4.2https://bugzilla.redhat.com/show_bug.cgi?id=17743821774382* Selinux won't allow SCTP inter pod communicationhttps://errata.rockylinux.org/RLSA-2019:4269RLSA-2019:4269RLSA-2019:4269  YR#oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm$oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm YR#oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm$oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpme cBBBfBoByBBBBsecurityImportant: container-tools:1.0 security update;rhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512CVE-2019-9512CVE-2019-9512https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514CVE-2019-9514CVE-2019-9514https://bugzilla.redhat.com/show_bug.cgi?id=17356451735645https://bugzilla.redhat.com/show_bug.cgi?id=17357441735744https://errata.rockylinux.org/RLSA-2019:4273RLSA-2019:4273RLSA-2019:4273  YR94containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm1containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpmLdfuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm#oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm$oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm8Erunc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpmhskopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm YR94containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm1containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpmLdfuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm#oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm$oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm8Erunc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpmhskopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpmn( ZBBBBBBBBBBbugfixvirt:rhel bug fix update-< https://bugzilla.redhat.com/show_bug.cgi?id=17751341775134* Failed to create a VM via virt-manager or web console in RHEL8.1 snapshot-2.1https://errata.rockylinux.org/RLBA-2019:4274RLBA-2019:4274RLBA-2019:4274 tspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmtspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm) i$bugfixnodejs:12 bug fix updateif https://bugzilla.redhat.com/show_bug.cgi?id=17761161776116The following packages have been upgraded to a later upstream version: nodejs (12.13.1).https://errata.rockylinux.org/RLBA-2019:4275RLBA-2019:4275RLBA-2019:4275 /ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm/ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm ZBBBBBBBBBBsecurityModerate: virt:rhel security updateOYhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135CVE-2019-11135CVE-2019-11135https://bugzilla.redhat.com/show_bug.cgi?id=17530621753062https://errata.rockylinux.org/RLSA-2020:0279RLSA-2020:0279RLSA-2020:0279 tspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmtspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm i$enhancementnodejs:12 enhancement update(f https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16775CVE-2019-16775CVE-2019-16775https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16776CVE-2019-16776CVE-2019-16776https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16777CVE-2019-16777CVE-2019-16777https://bugzilla.redhat.com/show_bug.cgi?id=17910671791067The following packages have been upgraded to a later upstream version: nodejs (12.14.1).https://errata.rockylinux.org/RLEA-2020:0330RLEA-2020:0330RLEA-2020:0330 /ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm/ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm"  genhancementnew module: postgresql:12\ https://errata.rockylinux.org/RLEA-2020:0346RLEA-2020:0346RLEA-2020:0346 gy% postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpmgy% postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm$* dbugfixperl-DBD-Pg:3.7 bug fix and enhancement updatej https://bugzilla.redhat.com/show_bug.cgi?id=17728051772805https://errata.rockylinux.org/RLBA-2020:0347RLBA-2020:0347RLBA-2020:0347 #+%Rperl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm#+%Rperl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm& hQ_BsecurityImportant: container-tools:rhel8 security, bug fix, and enhancement updatei5https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15890CVE-2019-15890CVE-2019-15890https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7039CVE-2020-7039CVE-2020-7039https://bugzilla.redhat.com/show_bug.cgi?id=17317471731747https://bugzilla.redhat.com/show_bug.cgi?id=17322801732280https://bugzilla.redhat.com/show_bug.cgi?id=17328111732811https://bugzilla.redhat.com/show_bug.cgi?id=17525991752599https://bugzilla.redhat.com/show_bug.cgi?id=17797871779787https://bugzilla.redhat.com/show_bug.cgi?id=17797891779789https://bugzilla.redhat.com/show_bug.cgi?id=17832771783277https://bugzilla.redhat.com/show_bug.cgi?id=17832781783278https://bugzilla.redhat.com/show_bug.cgi?id=17832791783279https://bugzilla.redhat.com/show_bug.cgi?id=17832801783280https://bugzilla.redhat.com/show_bug.cgi?id=17832811783281https://bugzilla.redhat.com/show_bug.cgi?id=17875231787523https://bugzilla.redhat.com/show_bug.cgi?id=17875241787524https://bugzilla.redhat.com/show_bug.cgi?id=17915511791551https://errata.rockylinux.org/RLSA-2020:0348RLSA-2020:0348RLSA-2020:0348 ~RScockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm~RScockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm. i$securityImportant: nodejs:10 security updaten https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15604CVE-2019-15604CVE-2019-15604https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15605CVE-2019-15605CVE-2019-15605https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15606CVE-2019-15606CVE-2019-15606https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16775CVE-2019-16775CVE-2019-16775https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16776CVE-2019-16776CVE-2019-16776https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16777CVE-2019-16777CVE-2019-16777https://bugzilla.redhat.com/show_bug.cgi?id=17883011788301https://bugzilla.redhat.com/show_bug.cgi?id=17883051788305https://bugzilla.redhat.com/show_bug.cgi?id=17883101788310https://bugzilla.redhat.com/show_bug.cgi?id=18003641800364https://bugzilla.redhat.com/show_bug.cgi?id=18003661800366https://bugzilla.redhat.com/show_bug.cgi?id=18003671800367https://errata.rockylinux.org/RLSA-2020:0579RLSA-2020:0579RLSA-2020:0579 /ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm/ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm1 i$securityImportant: nodejs:12 security update \https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15604CVE-2019-15604CVE-2019-15604https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15605CVE-2019-15605CVE-2019-15605https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15606CVE-2019-15606CVE-2019-15606https://bugzilla.redhat.com/show_bug.cgi?id=18003641800364https://bugzilla.redhat.com/show_bug.cgi?id=18003661800366https://bugzilla.redhat.com/show_bug.cgi?id=18003671800367https://errata.rockylinux.org/RLSA-2020:0598RLSA-2020:0598RLSA-2020:0598 /ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm/ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm; i$securityImportant: nodejs:12 security updatehhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10531CVE-2020-10531CVE-2020-10531https://bugzilla.redhat.com/show_bug.cgi?id=18073491807349https://errata.rockylinux.org/RLSA-2020:1293RLSA-2020:1293RLSA-2020:1293 /ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm/ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm? i$securityImportant: nodejs:10 security update https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10531CVE-2020-10531CVE-2020-10531https://bugzilla.redhat.com/show_bug.cgi?id=18073491807349https://errata.rockylinux.org/RLSA-2020:1317RLSA-2020:1317RLSA-2020:1317 /ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm/ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpmB hQLBSBsecurityImportant: container-tools:rhel8 security and bug fix update'\https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8608CVE-2020-8608CVE-2020-8608https://bugzilla.redhat.com/show_bug.cgi?id=17984531798453https://bugzilla.redhat.com/show_bug.cgi?id=18034951803495* useradd and groupadd fail under rootless Buildah and podman [stream-container-tools-rhel8-rhel-8.1.1]https://bugzilla.redhat.com/show_bug.cgi?id=18041881804188* Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-rhel8-rhel-8.1.1/buildah]https://bugzilla.redhat.com/show_bug.cgi?id=18041941804194* Podman support for FIPS Mode requires a bind mount inside the container [stream-container-tools-rhel8-rhel-8.1.1/podman]https://bugzilla.redhat.com/show_bug.cgi?id=18050161805016* fuse-overlayfs segfault [stream-container-tools-rhel8-rhel-8.1.1/fuse-overlayfs]https://bugzilla.redhat.com/show_bug.cgi?id=18061191806119* buildah COPY command is slow when .dockerignore file is not present [stream-container-tools-rhel8-rhel-8.1.1/buildah]https://errata.rockylinux.org/RLSA-2020:1379RLSA-2020:1379RLSA-2020:1379 ~RScockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm~RScockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpmL+ oBBbugfixgcc-toolset-9-binutils bug fix updateb https://errata.rockylinux.org/RLBA-2020:1354RLBA-2020:1354RLBA-2020:1354 Vgcc-toolset-9-binutils-2.32-17.el8_1.x86_64.rpmVgcc-toolset-9-binutils-devel-2.32-17.el8_1.x86_64.rpmVgcc-toolset-9-binutils-2.32-17.el8_1.x86_64.rpmVgcc-toolset-9-binutils-devel-2.32-17.el8_1.x86_64.rpmL ZBBBBBBBBBBsecurityImportant: virt:rhel security and bug fix updateevhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1711CVE-2020-1711CVE-2020-1711https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7039CVE-2020-7039CVE-2020-7039https://bugzilla.redhat.com/show_bug.cgi?id=17915511791551https://bugzilla.redhat.com/show_bug.cgi?id=17942901794290https://bugzilla.redhat.com/show_bug.cgi?id=18095101809510* libvirtd: error : virCPUx86UpdateLive:3110 : operation failed: guest CPU doesn't match specification: missing features: fxsr_opthttps://errata.rockylinux.org/RLSA-2020:1358RLSA-2020:1358RLSA-2020:1358 tspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmtspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmc cBBBfBoByBBBBsecurityImportant: container-tools:1.0 security update[ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7039CVE-2020-7039CVE-2020-7039https://bugzilla.redhat.com/show_bug.cgi?id=17915511791551https://errata.rockylinux.org/RLSA-2020:1360RLSA-2020:1360RLSA-2020:1360  YR94containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm1containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpmLdfuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm#oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm$oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm8Erunc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpmhskopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm YR94containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm1containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpmLdfuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm#oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm$oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm8Erunc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpmhskopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpml  Tenhancementperl-Convert-ASN1 and perl-LDAP bug fix and enhancement update{ https://bugzilla.redhat.com/show_bug.cgi?id=16630631663063https://bugzilla.redhat.com/show_bug.cgi?id=17468981746898https://errata.rockylinux.org/RLEA-2020:1575RLEA-2020:1575RLEA-2020:1575 vperl-Convert-ASN1-0.27-17.el8.noarch.rpm1perl-LDAP-0.66-7.el8.noarch.rpmvperl-Convert-ASN1-0.27-17.el8.noarch.rpm1perl-LDAP-0.66-7.el8.noarch.rpml WBBBBsecurityModerate: exiv2 security, bug fix, and enhancement updatezz?https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18005CVE-2017-18005CVE-2017-18005https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10772CVE-2018-10772CVE-2018-10772https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11037CVE-2018-11037CVE-2018-11037https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14338CVE-2018-14338CVE-2018-14338https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17229CVE-2018-17229CVE-2018-17229https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17230CVE-2018-17230CVE-2018-17230https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17282CVE-2018-17282CVE-2018-17282https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17581CVE-2018-17581CVE-2018-17581https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18915CVE-2018-18915CVE-2018-18915https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19107CVE-2018-19107CVE-2018-19107https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19108CVE-2018-19108CVE-2018-19108https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19535CVE-2018-19535CVE-2018-19535https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19607CVE-2018-19607CVE-2018-19607https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20096CVE-2018-20096CVE-2018-20096https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20097CVE-2018-20097CVE-2018-20097https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20098CVE-2018-20098CVE-2018-20098https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20099CVE-2018-20099CVE-2018-20099https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4868CVE-2018-4868CVE-2018-4868https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9303CVE-2018-9303CVE-2018-9303https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9304CVE-2018-9304CVE-2018-9304https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9305CVE-2018-9305CVE-2018-9305https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9306CVE-2018-9306CVE-2018-9306https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13109CVE-2019-13109CVE-2019-13109https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13111CVE-2019-13111CVE-2019-13111https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13112CVE-2019-13112CVE-2019-13112https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13113CVE-2019-13113CVE-2019-13113https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13114CVE-2019-13114CVE-2019-13114https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20421CVE-2019-20421CVE-2019-20421https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9143CVE-2019-9143CVE-2019-9143https://bugzilla.redhat.com/show_bug.cgi?id=15311711531171https://bugzilla.redhat.com/show_bug.cgi?id=15317241531724https://bugzilla.redhat.com/show_bug.cgi?id=15667251566725https://bugzilla.redhat.com/show_bug.cgi?id=15667311566731https://bugzilla.redhat.com/show_bug.cgi?id=15667351566735https://bugzilla.redhat.com/show_bug.cgi?id=15667371566737https://bugzilla.redhat.com/show_bug.cgi?id=15795441579544https://bugzilla.redhat.com/show_bug.cgi?id=15946271594627https://bugzilla.redhat.com/show_bug.cgi?id=16093961609396https://bugzilla.redhat.com/show_bug.cgi?id=16324811632481https://bugzilla.redhat.com/show_bug.cgi?id=16324841632484https://bugzilla.redhat.com/show_bug.cgi?id=16324901632490https://bugzilla.redhat.com/show_bug.cgi?id=16350451635045https://bugzilla.redhat.com/show_bug.cgi?id=16465551646555https://bugzilla.redhat.com/show_bug.cgi?id=16490941649094https://bugzilla.redhat.com/show_bug.cgi?id=16491011649101https://bugzilla.redhat.com/show_bug.cgi?id=16519171651917The following packages have been upgraded to a later upstream version: exiv2 (0.27.2).https://bugzilla.redhat.com/show_bug.cgi?id=16561871656187https://bugzilla.redhat.com/show_bug.cgi?id=16561951656195https://bugzilla.redhat.com/show_bug.cgi?id=16604231660423https://bugzilla.redhat.com/show_bug.cgi?id=16604241660424https://bugzilla.redhat.com/show_bug.cgi?id=16604251660425https://bugzilla.redhat.com/show_bug.cgi?id=16604261660426https://bugzilla.redhat.com/show_bug.cgi?id=16843811684381https://bugzilla.redhat.com/show_bug.cgi?id=17284841728484https://bugzilla.redhat.com/show_bug.cgi?id=17284881728488https://bugzilla.redhat.com/show_bug.cgi?id=17284901728490https://bugzilla.redhat.com/show_bug.cgi?id=17284921728492https://bugzilla.redhat.com/show_bug.cgi?id=17284941728494https://bugzilla.redhat.com/show_bug.cgi?id=17574441757444https://bugzilla.redhat.com/show_bug.cgi?id=17574451757445https://bugzilla.redhat.com/show_bug.cgi?id=17677481767748https://bugzilla.redhat.com/show_bug.cgi?id=18004721800472https://errata.rockylinux.org/RLSA-2020:1577RLSA-2020:1577RLSA-2020:1577 l9gegl-0.2.0-39.el8.x86_64.rpmqgnome-color-manager-3.28.0-3.el8.x86_64.rpm(libgexiv2-0.10.8-4.el8.x86_64.rpml9gegl-0.2.0-39.el8.x86_64.rpmqgnome-color-manager-3.28.0-3.el8.x86_64.rpm(libgexiv2-0.10.8-4.el8.x86_64.rpmm  !^Benhancementwhois bug fix and enhancement updatet) https://errata.rockylinux.org/RLEA-2020:1579RLEA-2020:1579RLEA-2020:1579 Bdwhois-5.5.1-2.el8.x86_64.rpm8dwhois-nls-5.5.1-2.el8.noarch.rpmBdwhois-5.5.1-2.el8.x86_64.rpm8dwhois-nls-5.5.1-2.el8.noarch.rpmn  "ZBBBBBBBBBBenhancementvirt:rhel bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=16743241674324https://bugzilla.redhat.com/show_bug.cgi?id=16931401693140https://bugzilla.redhat.com/show_bug.cgi?id=17084591708459https://bugzilla.redhat.com/show_bug.cgi?id=17084801708480https://bugzilla.redhat.com/show_bug.cgi?id=17309691730969https://bugzilla.redhat.com/show_bug.cgi?id=17384401738440https://bugzilla.redhat.com/show_bug.cgi?id=17446021744602https://bugzilla.redhat.com/show_bug.cgi?id=17463611746361https://bugzilla.redhat.com/show_bug.cgi?id=17490221749022https://bugzilla.redhat.com/show_bug.cgi?id=17496721749672https://bugzilla.redhat.com/show_bug.cgi?id=17523201752320https://bugzilla.redhat.com/show_bug.cgi?id=17574821757482https://bugzilla.redhat.com/show_bug.cgi?id=17729411772941https://bugzilla.redhat.com/show_bug.cgi?id=17768081776808https://bugzilla.redhat.com/show_bug.cgi?id=17779241777924https://bugzilla.redhat.com/show_bug.cgi?id=17804981780498https://bugzilla.redhat.com/show_bug.cgi?id=17880961788096https://bugzilla.redhat.com/show_bug.cgi?id=17916771791677https://bugzilla.redhat.com/show_bug.cgi?id=17948681794868https://bugzilla.redhat.com/show_bug.cgi?id=18042241804224https://bugzilla.redhat.com/show_bug.cgi?id=18083881808388https://bugzilla.redhat.com/show_bug.cgi?id=18083991808399https://errata.rockylinux.org/RLEA-2020:1587RLEA-2020:1587RLEA-2020:1587 tspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmtspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm- %cbugfixlibselinux-python:2.8 bug fix and enhancement update https://errata.rockylinux.org/RLBA-2020:1599RLBA-2020:1599RLBA-2020:1599 JFQNJ{libselinux-python-2.9-2.1.module+el8.4.0+532+c114ce35.x86_64.rpmJFQNJ{libselinux-python-2.9-2.1.module+el8.4.0+532+c114ce35.x86_64.rpm  &fBBBBBBBBBBBBBBBBBBBBBABBsecurityModerate: python27:2.7 security, bug fix, and enhancement updatekhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18074CVE-2018-18074CVE-2018-18074https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20060CVE-2018-20060CVE-2018-20060https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20852CVE-2018-20852CVE-2018-20852https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11236CVE-2019-11236CVE-2019-11236https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11324CVE-2019-11324CVE-2019-11324https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16056CVE-2019-16056CVE-2019-16056https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935CVE-2019-16935CVE-2019-16935https://bugzilla.redhat.com/show_bug.cgi?id=17024731702473https://bugzilla.redhat.com/show_bug.cgi?id=16438291643829https://bugzilla.redhat.com/show_bug.cgi?id=16491531649153https://bugzilla.redhat.com/show_bug.cgi?id=16595511659551https://bugzilla.redhat.com/show_bug.cgi?id=17008241700824https://bugzilla.redhat.com/show_bug.cgi?id=17403471740347https://bugzilla.redhat.com/show_bug.cgi?id=17498391749839https://bugzilla.redhat.com/show_bug.cgi?id=17624221762422https://errata.rockylinux.org/RLSA-2020:1605RLSA-2020:1605RLSA-2020:1605 u9pqwipython2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpmxopython2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm\Upython2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm[Ipython2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm.{python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm/python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm0python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpmy_python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpmzcpython2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm{kpython2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm|bpython2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm}jpython2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm~`python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpmepython2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpmvapython2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpmfpython2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpmqpython2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpmgpython2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpmlpython2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm]Mpython2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm&python2-requests-2.20.0-3.module+el8.5.0+706+735ec4b3.noarch.rpmnpython2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpmdpython2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpmu9pqwipython2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpmxopython2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm\Upython2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm[Ipython2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm.{python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm/python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm0python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpmy_python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpmzcpython2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm{kpython2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm|bpython2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm}jpython2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm~`python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpmepython2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpmvapython2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpmfpython2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpmqpython2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpmgpython2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpmlpython2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm]Mpython2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm&python2-requests-2.20.0-3.module+el8.5.0+706+735ec4b3.noarch.rpmnpython2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpmdpython2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpm. ('bugfixpython-dbus-python-client-gen bug fix and enhancement update) https://bugzilla.redhat.com/show_bug.cgi?id=17643441764344https://errata.rockylinux.org/RLBA-2020:1606RLBA-2020:1606RLBA-2020:1606 Opython3-dbus-python-client-gen-0.7-3.el8.noarch.rpmOpython3-dbus-python-client-gen-0.7-3.el8.noarch.rpm   +ienhancementhttp-parser bug fix and enhancement update/) https://bugzilla.redhat.com/show_bug.cgi?id=17487651748765https://errata.rockylinux.org/RLEA-2020:1607RLEA-2020:1607RLEA-2020:1607 1xhttp-parser-2.8.0-9.el8.x86_64.rpm1xhttp-parser-2.8.0-9.el8.x86_64.rpm  4lBBBBBBenhancementinput stack bug fix and enhancement updateX) https://bugzilla.redhat.com/show_bug.cgi?id=17287901728790https://bugzilla.redhat.com/show_bug.cgi?id=17288011728801https://bugzilla.redhat.com/show_bug.cgi?id=17288171728817https://bugzilla.redhat.com/show_bug.cgi?id=17288211728821https://bugzilla.redhat.com/show_bug.cgi?id=17414231741423https://errata.rockylinux.org/RLEA-2020:1611RLEA-2020:1611RLEA-2020:1611 }6libxkbcommon-0.9.1-1.el8.x86_64.rpm~6libxkbcommon-devel-0.9.1-1.el8.x86_64.rpm6libxkbcommon-x11-0.9.1-1.el8.x86_64.rpm9txkeyboard-config-2.28-1.el8.noarch.rpm:txkeyboard-config-devel-2.28-1.el8.noarch.rpm}6libxkbcommon-0.9.1-1.el8.x86_64.rpm~6libxkbcommon-devel-0.9.1-1.el8.x86_64.rpm6libxkbcommon-x11-0.9.1-1.el8.x86_64.rpm9txkeyboard-config-2.28-1.el8.noarch.rpm:txkeyboard-config-devel-2.28-1.el8.noarch.rpm!! 7usecurityLow: irssi security updateflhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13045CVE-2019-13045CVE-2019-13045https://bugzilla.redhat.com/show_bug.cgi?id=17276831727683https://errata.rockylinux.org/RLSA-2020:1616RLSA-2020:1616RLSA-2020:1616 H3irssi-1.1.1-3.el8.x86_64.rpmH3irssi-1.1.1-3.el8.x86_64.rpm"/ xBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbugfixpmdk bug fix and enhancement updateg) https://errata.rockylinux.org/RLBA-2020:1617RLBA-2020:1617RLBA-2020:1617 R>daxio-1.6.1-1.el8.x86_64.rpm:>libpmem-1.6.1-1.el8.x86_64.rpm<>libpmemblk-1.6.1-1.el8.x86_64.rpm=>libpmemblk-devel-1.6.1-1.el8.x86_64.rpm;>libpmem-devel-1.6.1-1.el8.x86_64.rpm>>libpmemlog-1.6.1-1.el8.x86_64.rpm?>libpmemlog-devel-1.6.1-1.el8.x86_64.rpm@>libpmemobj-1.6.1-1.el8.x86_64.rpmC>libpmemobj-devel-1.6.1-1.el8.x86_64.rpmD>libpmempool-1.6.1-1.el8.x86_64.rpmE>libpmempool-devel-1.6.1-1.el8.x86_64.rpmH>librpmem-1.6.1-1.el8.x86_64.rpmI>librpmem-devel-1.6.1-1.el8.x86_64.rpmk>libvmem-1.6.1-1.el8.x86_64.rpml>libvmem-devel-1.6.1-1.el8.x86_64.rpmm>libvmmalloc-1.6.1-1.el8.x86_64.rpmn>libvmmalloc-devel-1.6.1-1.el8.x86_64.rpm}>pmempool-1.6.1-1.el8.x86_64.rpm>pmreorder-1.6.1-1.el8.x86_64.rpmH>rpmemd-1.6.1-1.el8.x86_64.rpmR>daxio-1.6.1-1.el8.x86_64.rpm:>libpmem-1.6.1-1.el8.x86_64.rpm<>libpmemblk-1.6.1-1.el8.x86_64.rpm=>libpmemblk-devel-1.6.1-1.el8.x86_64.rpm;>libpmem-devel-1.6.1-1.el8.x86_64.rpm>>libpmemlog-1.6.1-1.el8.x86_64.rpm?>libpmemlog-devel-1.6.1-1.el8.x86_64.rpm@>libpmemobj-1.6.1-1.el8.x86_64.rpmC>libpmemobj-devel-1.6.1-1.el8.x86_64.rpmD>libpmempool-1.6.1-1.el8.x86_64.rpmE>libpmempool-devel-1.6.1-1.el8.x86_64.rpmH>librpmem-1.6.1-1.el8.x86_64.rpmI>librpmem-devel-1.6.1-1.el8.x86_64.rpmk>libvmem-1.6.1-1.el8.x86_64.rpml>libvmem-devel-1.6.1-1.el8.x86_64.rpmm>libvmmalloc-1.6.1-1.el8.x86_64.rpmn>libvmmalloc-devel-1.6.1-1.el8.x86_64.rpm}>pmempool-1.6.1-1.el8.x86_64.rpm>pmreorder-1.6.1-1.el8.x86_64.rpmH>rpmemd-1.6.1-1.el8.x86_64.rpm" #aenhancementpmdk-convert bug fix and enhancement update) https://bugzilla.redhat.com/show_bug.cgi?id=17686261768626https://errata.rockylinux.org/RLEA-2020:1618RLEA-2020:1618RLEA-2020:1618 *Wpmdk-convert-1.7-1.el8.x86_64.rpm*Wpmdk-convert-1.7-1.el8.x86_64.rpm"0 &dbugfixpython-greenlet bug fix and enhancement update9) https://errata.rockylinux.org/RLBA-2020:1622RLBA-2020:1622RLBA-2020:1622 WOpython3-greenlet-0.4.13-4.el8.x86_64.rpmWOpython3-greenlet-0.4.13-4.el8.x86_64.rpm#1 ('bugfixpython-flask bug fix and enhancement updateb) https://errata.rockylinux.org/RLBA-2020:1623RLBA-2020:1623RLBA-2020:1623 P$python3-flask-0.12.2-4.el8.noarch.rpmP$python3-flask-0.12.2-4.el8.noarch.rpm#" eBBBBBBBBBBBBBxBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:7.2 security, bug fix, and enhancement update }#https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20783CVE-2018-20783CVE-2018-20783https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11034CVE-2019-11034CVE-2019-11034https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11035CVE-2019-11035CVE-2019-11035https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11036CVE-2019-11036CVE-2019-11036https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11039CVE-2019-11039CVE-2019-11039https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11040CVE-2019-11040CVE-2019-11040https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11041CVE-2019-11041CVE-2019-11041https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11042CVE-2019-11042CVE-2019-11042https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9020CVE-2019-9020CVE-2019-9020https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9021CVE-2019-9021CVE-2019-9021https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9022CVE-2019-9022CVE-2019-9022https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9023CVE-2019-9023CVE-2019-9023https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9024CVE-2019-9024CVE-2019-9024https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9637CVE-2019-9637CVE-2019-9637https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9638CVE-2019-9638CVE-2019-9638https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9639CVE-2019-9639CVE-2019-9639https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9640CVE-2019-9640CVE-2019-9640https://bugzilla.redhat.com/show_bug.cgi?id=16805451680545https://bugzilla.redhat.com/show_bug.cgi?id=16851231685123https://bugzilla.redhat.com/show_bug.cgi?id=16851321685132https://bugzilla.redhat.com/show_bug.cgi?id=16853981685398https://bugzilla.redhat.com/show_bug.cgi?id=16854041685404https://bugzilla.redhat.com/show_bug.cgi?id=16854121685412https://bugzilla.redhat.com/show_bug.cgi?id=16888971688897https://bugzilla.redhat.com/show_bug.cgi?id=16889221688922https://bugzilla.redhat.com/show_bug.cgi?id=16889341688934https://bugzilla.redhat.com/show_bug.cgi?id=16889391688939https://bugzilla.redhat.com/show_bug.cgi?id=17022461702246https://bugzilla.redhat.com/show_bug.cgi?id=17022561702256https://bugzilla.redhat.com/show_bug.cgi?id=17072991707299https://bugzilla.redhat.com/show_bug.cgi?id=17241521724152https://bugzilla.redhat.com/show_bug.cgi?id=17241541724154https://bugzilla.redhat.com/show_bug.cgi?id=17394591739459https://bugzilla.redhat.com/show_bug.cgi?id=17394651739465https://errata.rockylinux.org/RLSA-2020:1624RLSA-2020:1624RLSA-2020:1624  D#0Dapcu-panel-5.1.12-2.module+el8.4.0+413+c9202dda.noarch.rpmblibzip-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpmclibzip-devel-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpmdlibzip-tools-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm&php-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-bcmath-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-cli-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-common-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-dba-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-dbg-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-devel-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-embedded-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-enchant-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm &php-fpm-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm &php-gd-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm &php-gmp-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm &php-intl-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpmb&php-json-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm &php-ldap-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-mbstring-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-mysqlnd-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-odbc-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-opcache-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-pdo-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpmjDphp-pear-1.10.5-9.module+el8.4.0+413+c9202dda.noarch.rpmeDphp-pecl-apcu-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpmfDphp-pecl-apcu-devel-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpmgphp-pecl-zip-1.15.3-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-pgsql-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-process-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpmz&php-recode-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-snmp-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-soap-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-xml-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpmd&php-xmlrpc-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm D#0Dapcu-panel-5.1.12-2.module+el8.4.0+413+c9202dda.noarch.rpmblibzip-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpmclibzip-devel-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpmdlibzip-tools-1.5.1-2.module+el8.4.0+413+c9202dda.x86_64.rpm&php-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-bcmath-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-cli-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-common-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-dba-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-dbg-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-devel-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-embedded-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-enchant-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm &php-fpm-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm &php-gd-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm &php-gmp-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm &php-intl-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpmb&php-json-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm &php-ldap-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-mbstring-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-mysqlnd-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-odbc-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-opcache-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-pdo-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpmjDphp-pear-1.10.5-9.module+el8.4.0+413+c9202dda.noarch.rpmeDphp-pecl-apcu-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpmfDphp-pecl-apcu-devel-5.1.12-2.module+el8.4.0+413+c9202dda.x86_64.rpmgphp-pecl-zip-1.15.3-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-pgsql-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-process-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpmz&php-recode-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-snmp-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-soap-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm&php-xml-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpmd&php-xmlrpc-7.2.24-1.module+el8.4.0+413+c9202dda.x86_64.rpm(2 "`bugfixltrace bug fix and enhancement update) https://errata.rockylinux.org/RLBA-2020:1626RLBA-2020:1626RLBA-2020:1626 cltrace-0.7.91-28.el8.x86_64.rpmcltrace-0.7.91-28.el8.x86_64.rpm)# 3cBBBBBBBBBBBBBBsecurityLow: GStreamer, libmad, and SDL security, bug fix, and enhancement update1olhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7263CVE-2018-7263CVE-2018-7263https://bugzilla.redhat.com/show_bug.cgi?id=14885851488585https://bugzilla.redhat.com/show_bug.cgi?id=15475041547504https://bugzilla.redhat.com/show_bug.cgi?id=16932921693292https://bugzilla.redhat.com/show_bug.cgi?id=17246771724677https://bugzilla.redhat.com/show_bug.cgi?id=17517801751780https://bugzilla.redhat.com/show_bug.cgi?id=17562991756299https://errata.rockylinux.org/RLSA-2020:1631RLSA-2020:1631RLSA-2020:1631 Jgstreamer1-1.16.1-2.el8.x86_64.rpmJgstreamer1-devel-1.16.1-2.el8.x86_64.rpmgstreamer1-plugins-bad-free-1.16.1-1.el8.x86_64.rpmgstreamer1-plugins-ugly-free-1.16.1-1.el8.x86_64.rpm2libmad-0.15.1b-25.el8.x86_64.rpmp1orc-0.4.28-3.el8.x86_64.rpmq1orc-compiler-0.4.28-3.el8.x86_64.rpmr1orc-devel-0.4.28-3.el8.x86_64.rpmJgstreamer1-1.16.1-2.el8.x86_64.rpmJgstreamer1-devel-1.16.1-2.el8.x86_64.rpmgstreamer1-plugins-bad-free-1.16.1-1.el8.x86_64.rpmgstreamer1-plugins-ugly-free-1.16.1-1.el8.x86_64.rpm2libmad-0.15.1b-25.el8.x86_64.rpmp1orc-0.4.28-3.el8.x86_64.rpmq1orc-compiler-0.4.28-3.el8.x86_64.rpmr1orc-devel-0.4.28-3.el8.x86_64.rpm*3 tBBBBBBBBBBBBBBBBbugfixxorg X11 server and driver bug fix and enhancement update  https://bugzilla.redhat.com/show_bug.cgi?id=17045131704513https://bugzilla.redhat.com/show_bug.cgi?id=17287561728756https://bugzilla.redhat.com/show_bug.cgi?id=17287571728757https://bugzilla.redhat.com/show_bug.cgi?id=17287851728785https://bugzilla.redhat.com/show_bug.cgi?id=17287871728787https://bugzilla.redhat.com/show_bug.cgi?id=17287881728788https://bugzilla.redhat.com/show_bug.cgi?id=17287911728791https://bugzilla.redhat.com/show_bug.cgi?id=17287961728796https://bugzilla.redhat.com/show_bug.cgi?id=17288071728807https://bugzilla.redhat.com/show_bug.cgi?id=17288081728808https://bugzilla.redhat.com/show_bug.cgi?id=17288091728809https://bugzilla.redhat.com/show_bug.cgi?id=17288101728810https://bugzilla.redhat.com/show_bug.cgi?id=17288151728815https://bugzilla.redhat.com/show_bug.cgi?id=17288161728816https://bugzilla.redhat.com/show_bug.cgi?id=17288201728820https://bugzilla.redhat.com/show_bug.cgi?id=17288221728822https://bugzilla.redhat.com/show_bug.cgi?id=17471101747110https://bugzilla.redhat.com/show_bug.cgi?id=17533271753327https://bugzilla.redhat.com/show_bug.cgi?id=17690801769080https://bugzilla.redhat.com/show_bug.cgi?id=17754681775468https://bugzilla.redhat.com/show_bug.cgi?id=17953281795328https://bugzilla.redhat.com/show_bug.cgi?id=17959311795931https://bugzilla.redhat.com/show_bug.cgi?id=17987021798702https://bugzilla.redhat.com/show_bug.cgi?id=18010431801043https://errata.rockylinux.org/RLBA-2020:1633RLBA-2020:1633RLBA-2020:1633 zlibxcb-1.13.1-1.el8.x86_64.rpm{libxcb-devel-1.13.1-1.el8.x86_64.rpm&-libXpm-3.5.12-8.el8.x86_64.rpm'-libXpm-devel-3.5.12-8.el8.x86_64.rpm'_mesa-libGLw-8.0.0-18.el8.x86_64.rpm(_mesa-libGLw-devel-8.0.0-18.el8.x86_64.rpmSCxorg-x11-drv-libinput-0.29.0-1.el8.x86_64.rpmUxxorg-x11-drv-wacom-0.38.0-1.el8.x86_64.rpmVxxorg-x11-drv-wacom-serial-support-0.38.0-1.el8.x86_64.rpm zlibxcb-1.13.1-1.el8.x86_64.rpm{libxcb-devel-1.13.1-1.el8.x86_64.rpm&-libXpm-3.5.12-8.el8.x86_64.rpm'-libXpm-devel-3.5.12-8.el8.x86_64.rpm'_mesa-libGLw-8.0.0-18.el8.x86_64.rpm(_mesa-libGLw-devel-8.0.0-18.el8.x86_64.rpmSCxorg-x11-drv-libinput-0.29.0-1.el8.x86_64.rpmUxxorg-x11-drv-wacom-0.38.0-1.el8.x86_64.rpmVxxorg-x11-drv-wacom-serial-support-0.38.0-1.el8.x86_64.rpm+ vBEBenhancementidm:DL1 bug fix and enhancement update /https://bugzilla.redhat.com/show_bug.cgi?id=12296571229657https://bugzilla.redhat.com/show_bug.cgi?id=16650511665051https://bugzilla.redhat.com/show_bug.cgi?id=16800391680039https://bugzilla.redhat.com/show_bug.cgi?id=16951251695125https://bugzilla.redhat.com/show_bug.cgi?id=17270651727065https://bugzilla.redhat.com/show_bug.cgi?id=17279001727900https://bugzilla.redhat.com/show_bug.cgi?id=17290431729043https://bugzilla.redhat.com/show_bug.cgi?id=17328981732898https://bugzilla.redhat.com/show_bug.cgi?id=17465581746558https://bugzilla.redhat.com/show_bug.cgi?id=17469511746951https://bugzilla.redhat.com/show_bug.cgi?id=17471441747144https://bugzilla.redhat.com/show_bug.cgi?id=17489871748987https://bugzilla.redhat.com/show_bug.cgi?id=17528491752849https://bugzilla.redhat.com/show_bug.cgi?id=17564321756432https://bugzilla.redhat.com/show_bug.cgi?id=17570641757064https://bugzilla.redhat.com/show_bug.cgi?id=17584041758404https://bugzilla.redhat.com/show_bug.cgi?id=17592811759281https://bugzilla.redhat.com/show_bug.cgi?id=17627231762723https://bugzilla.redhat.com/show_bug.cgi?id=17627291762729https://bugzilla.redhat.com/show_bug.cgi?id=17628131762813https://bugzilla.redhat.com/show_bug.cgi?id=17680151768015https://bugzilla.redhat.com/show_bug.cgi?id=17689591768959https://bugzilla.redhat.com/show_bug.cgi?id=17703461770346https://bugzilla.redhat.com/show_bug.cgi?id=17717101771710https://bugzilla.redhat.com/show_bug.cgi?id=17735121773512https://bugzilla.redhat.com/show_bug.cgi?id=17735651773565https://bugzilla.redhat.com/show_bug.cgi?id=17740321774032https://bugzilla.redhat.com/show_bug.cgi?id=17775641777564https://bugzilla.redhat.com/show_bug.cgi?id=17778091777809https://bugzilla.redhat.com/show_bug.cgi?id=17778111777811https://bugzilla.redhat.com/show_bug.cgi?id=17779201777920https://bugzilla.redhat.com/show_bug.cgi?id=17801211780121https://bugzilla.redhat.com/show_bug.cgi?id=17817991781799https://bugzilla.redhat.com/show_bug.cgi?id=17821691782169https://bugzilla.redhat.com/show_bug.cgi?id=17825721782572https://bugzilla.redhat.com/show_bug.cgi?id=17826581782658https://bugzilla.redhat.com/show_bug.cgi?id=17830461783046https://bugzilla.redhat.com/show_bug.cgi?id=17840031784003https://bugzilla.redhat.com/show_bug.cgi?id=17840371784037https://bugzilla.redhat.com/show_bug.cgi?id=17847611784761https://bugzilla.redhat.com/show_bug.cgi?id=17906631790663https://bugzilla.redhat.com/show_bug.cgi?id=17908861790886https://bugzilla.redhat.com/show_bug.cgi?id=17928481792848https://bugzilla.redhat.com/show_bug.cgi?id=17988771798877https://bugzilla.redhat.com/show_bug.cgi?id=18031651803165https://bugzilla.redhat.com/show_bug.cgi?id=18037861803786https://errata.rockylinux.org/RLEA-2020:1640RLEA-2020:1640RLEA-2020:1640 2/oq9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm2/oq9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm4$ ~lBBBBBBBBBBBBBBBBBBBBBBBBBxB@BsecurityModerate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement updateW!https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540CVE-2019-14540CVE-2019-14540https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16335CVE-2019-16335CVE-2019-16335https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942CVE-2019-16942CVE-2019-16942https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943CVE-2019-16943CVE-2019-16943https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531CVE-2019-17531CVE-2019-17531https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20330CVE-2019-20330CVE-2019-20330https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10672CVE-2020-10672CVE-2020-10672https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10673CVE-2020-10673CVE-2020-10673https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8840CVE-2020-8840CVE-2020-8840https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546CVE-2020-9546CVE-2020-9546https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547CVE-2020-9547CVE-2020-9547https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548CVE-2020-9548CVE-2020-9548https://bugzilla.redhat.com/show_bug.cgi?id=15353131535313https://bugzilla.redhat.com/show_bug.cgi?id=16554381655438https://bugzilla.redhat.com/show_bug.cgi?id=16567861656786https://bugzilla.redhat.com/show_bug.cgi?id=16980841698084https://bugzilla.redhat.com/show_bug.cgi?id=17440951744095https://bugzilla.redhat.com/show_bug.cgi?id=17558311755831https://bugzilla.redhat.com/show_bug.cgi?id=17558491755849https://bugzilla.redhat.com/show_bug.cgi?id=17581871758187https://bugzilla.redhat.com/show_bug.cgi?id=17581911758191https://bugzilla.redhat.com/show_bug.cgi?id=17671251767125https://bugzilla.redhat.com/show_bug.cgi?id=17671311767131https://bugzilla.redhat.com/show_bug.cgi?id=17752931775293https://bugzilla.redhat.com/show_bug.cgi?id=17770321777032https://bugzilla.redhat.com/show_bug.cgi?id=17824861782486https://bugzilla.redhat.com/show_bug.cgi?id=17952151795215https://bugzilla.redhat.com/show_bug.cgi?id=18020061802006https://bugzilla.redhat.com/show_bug.cgi?id=18068401806840https://bugzilla.redhat.com/show_bug.cgi?id=18073711807371https://bugzilla.redhat.com/show_bug.cgi?id=18074211807421https://bugzilla.redhat.com/show_bug.cgi?id=18092101809210https://errata.rockylinux.org/RLSA-2020:1644RLSA-2020:1644RLSA-2020:1644 <* #"apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm$apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm%bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm'glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm(glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm)wglassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm*wglassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm+wglassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm.vjackson-annotations-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm/vjackson-core-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm0vjackson-databind-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpmjackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpmjackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm, jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm-jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm.njavassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm/njavassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm <python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm <python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm5!relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpmm.slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm6.slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm7stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm8velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm9xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm:xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm?xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm;xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm<xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm=xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm<* #"apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm$apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm%bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm'glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm(glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm)wglassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm*wglassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm+wglassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm.vjackson-annotations-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm/vjackson-core-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm0vjackson-databind-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpmjackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpmjackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm, jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm-jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm.njavassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm/njavassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm <python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm <python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm5!relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpmm.slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm6.slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm7stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm8velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm9xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm:xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm?xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm;xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm<xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm=xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpmL% hCBFBBBFLBsecurityModerate: container-tools:rhel8 security, bug fix, and enhancement updateu+1https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19921CVE-2019-19921CVE-2019-19921https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1702CVE-2020-1702CVE-2020-1702https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1726CVE-2020-1726CVE-2020-1726https://bugzilla.redhat.com/show_bug.cgi?id=17032451703245https://bugzilla.redhat.com/show_bug.cgi?id=17173571717357https://bugzilla.redhat.com/show_bug.cgi?id=17311071731107https://bugzilla.redhat.com/show_bug.cgi?id=17327041732704https://bugzilla.redhat.com/show_bug.cgi?id=17327131732713https://bugzilla.redhat.com/show_bug.cgi?id=17485191748519https://bugzilla.redhat.com/show_bug.cgi?id=17499991749999https://bugzilla.redhat.com/show_bug.cgi?id=17547441754744https://bugzilla.redhat.com/show_bug.cgi?id=17547631754763https://bugzilla.redhat.com/show_bug.cgi?id=17551191755119https://bugzilla.redhat.com/show_bug.cgi?id=17569191756919https://bugzilla.redhat.com/show_bug.cgi?id=17576931757693https://bugzilla.redhat.com/show_bug.cgi?id=17578451757845https://bugzilla.redhat.com/show_bug.cgi?id=17634541763454https://bugzilla.redhat.com/show_bug.cgi?id=17667741766774https://bugzilla.redhat.com/show_bug.cgi?id=17689301768930https://bugzilla.redhat.com/show_bug.cgi?id=17694691769469https://bugzilla.redhat.com/show_bug.cgi?id=17719901771990https://bugzilla.redhat.com/show_bug.cgi?id=17747551774755https://bugzilla.redhat.com/show_bug.cgi?id=17753071775307https://bugzilla.redhat.com/show_bug.cgi?id=17761121776112https://bugzilla.redhat.com/show_bug.cgi?id=17798341779834https://bugzilla.redhat.com/show_bug.cgi?id=17832671783267https://bugzilla.redhat.com/show_bug.cgi?id=17832681783268https://bugzilla.redhat.com/show_bug.cgi?id=17832701783270https://bugzilla.redhat.com/show_bug.cgi?id=17832721783272https://bugzilla.redhat.com/show_bug.cgi?id=17832741783274https://bugzilla.redhat.com/show_bug.cgi?id=17842671784267https://bugzilla.redhat.com/show_bug.cgi?id=17849521784952https://bugzilla.redhat.com/show_bug.cgi?id=17885391788539https://bugzilla.redhat.com/show_bug.cgi?id=17927961792796https://bugzilla.redhat.com/show_bug.cgi?id=17930841793084https://bugzilla.redhat.com/show_bug.cgi?id=17935981793598https://bugzilla.redhat.com/show_bug.cgi?id=17961071796107https://bugzilla.redhat.com/show_bug.cgi?id=18011521801152https://bugzilla.redhat.com/show_bug.cgi?id=18029071802907https://bugzilla.redhat.com/show_bug.cgi?id=18034961803496https://bugzilla.redhat.com/show_bug.cgi?id=18048491804849https://bugzilla.redhat.com/show_bug.cgi?id=18050171805017https://bugzilla.redhat.com/show_bug.cgi?id=18052121805212https://bugzilla.redhat.com/show_bug.cgi?id=18069011806901https://bugzilla.redhat.com/show_bug.cgi?id=18087071808707https://bugzilla.redhat.com/show_bug.cgi?id=18100531810053https://bugzilla.redhat.com/show_bug.cgi?id=18115141811514https://bugzilla.redhat.com/show_bug.cgi?id=18132951813295https://errata.rockylinux.org/RLSA-2020:1650RLSA-2020:1650RLSA-2020:1650  YR- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm YR- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpmY4 JBBbugfixxorg-x11-drv-qxl bug fix and enhancement update ) https://bugzilla.redhat.com/show_bug.cgi?id=17545841754584https://errata.rockylinux.org/RLBA-2020:1661RLBA-2020:1661RLBA-2020:1661 Tkxorg-x11-drv-qxl-0.1.5-11.el8.x86_64.rpmXkxorg-x11-server-Xspice-0.1.5-11.el8.x86_64.rpmTkxorg-x11-drv-qxl-0.1.5-11.el8.x86_64.rpmXkxorg-x11-server-Xspice-0.1.5-11.el8.x86_64.rpmZ5 OBBBBBBBBbugfixgcc-toolset-9 bug fix and enhancement updateI https://bugzilla.redhat.com/show_bug.cgi?id=17741181774118https://errata.rockylinux.org/RLBA-2020:1666RLBA-2020:1666RLBA-2020:1666 ,-gcc-toolset-9-9.0-4.el8.x86_64.rpm.-gcc-toolset-9-build-9.0-4.el8.x86_64.rpmH-gcc-toolset-9-perftools-9.0-4.el8.x86_64.rpmI-gcc-toolset-9-runtime-9.0-4.el8.x86_64.rpmR-gcc-toolset-9-toolchain-9.0-4.el8.x86_64.rpm,-gcc-toolset-9-9.0-4.el8.x86_64.rpm.-gcc-toolset-9-build-9.0-4.el8.x86_64.rpmH-gcc-toolset-9-perftools-9.0-4.el8.x86_64.rpmI-gcc-toolset-9-runtime-9.0-4.el8.x86_64.rpmR-gcc-toolset-9-toolchain-9.0-4.el8.x86_64.rpmZ6 Zbugfixpython-networkx bug fix and enhancement updateb) https://errata.rockylinux.org/RLBA-2020:1669RLBA-2020:1669RLBA-2020:1669 [Opython3-networkx-1.11-16.1.el8.noarch.rpm\Opython3-networkx-core-1.11-16.1.el8.noarch.rpm[Opython3-networkx-1.11-16.1.el8.noarch.rpm\Opython3-networkx-core-1.11-16.1.el8.noarch.rpm[7 ;bugfixperl-IO-Socket-SSL bug fix and enhancement update ) https://bugzilla.redhat.com/show_bug.cgi?id=17751671775167https://errata.rockylinux.org/RLBA-2020:1673RLBA-2020:1673RLBA-2020:1673 1ke}1Operl-IO-Socket-SSL-2.066-4.module+el8.6.0+957+15d660ad.noarch.rpm1ke}1Operl-IO-Socket-SSL-2.066-4.module+el8.6.0+957+15d660ad.noarch.rpm\ hCBFBBBFLBBRBenhancementnew module: container-tools:2.04A https://bugzilla.redhat.com/show_bug.cgi?id=17763091776309https://bugzilla.redhat.com/show_bug.cgi?id=17832601783260https://bugzilla.redhat.com/show_bug.cgi?id=17832611783261https://bugzilla.redhat.com/show_bug.cgi?id=17832621783262https://bugzilla.redhat.com/show_bug.cgi?id=17832641783264https://bugzilla.redhat.com/show_bug.cgi?id=17832651783265https://bugzilla.redhat.com/show_bug.cgi?id=18034941803494https://bugzilla.redhat.com/show_bug.cgi?id=18050151805015https://bugzilla.redhat.com/show_bug.cgi?id=18068991806899https://bugzilla.redhat.com/show_bug.cgi?id=18087051808705https://bugzilla.redhat.com/show_bug.cgi?id=18100561810056https://bugzilla.redhat.com/show_bug.cgi?id=18162871816287https://errata.rockylinux.org/RLEA-2020:1675RLEA-2020:1675RLEA-2020:1675 ~R Scockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm~R Scockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpml& !_securityLow: libmspack security and bug fix updateu9lhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010305CVE-2019-1010305CVE-2019-1010305https://bugzilla.redhat.com/show_bug.cgi?id=17305681730568https://bugzilla.redhat.com/show_bug.cgi?id=17367431736743https://errata.rockylinux.org/RLSA-2020:1686RLSA-2020:1686RLSA-2020:1686 $`libmspack-0.7-0.3.alpha.el8.4.x86_64.rpm$`libmspack-0.7-0.3.alpha.el8.4.x86_64.rpmm8 &bBBbugfixgtk-vnc bug fix and enhancement update.) https://bugzilla.redhat.com/show_bug.cgi?id=16658371665837https://bugzilla.redhat.com/show_bug.cgi?id=16882751688275https://errata.rockylinux.org/RLBA-2020:1690RLBA-2020:1690RLBA-2020:1690 gtk-vnc2-0.9.0-2.el8.x86_64.rpmgvnc-0.9.0-2.el8.x86_64.rpmgtk-vnc2-0.9.0-2.el8.x86_64.rpmgvnc-0.9.0-2.el8.x86_64.rpmm 'XBiBBBBBBBBBBBBBTenhancementphp:7.3 enhancement updateW https://errata.rockylinux.org/RLEA-2020:1692RLEA-2020:1692RLEA-2020:1692 \aD 0+apcu-panel-5.1.17-1.module+el8.4.0+414+2e7afcdd.noarch.rpmblibzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmclibzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmdlibzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmjKphp-pear-1.10.9-1.module+el8.4.0+414+2e7afcdd.noarch.rpme+php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmf+php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmtphp-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm;zphp-pecl-xdebug-2.8.0-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmgbphp-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm\aD 0+apcu-panel-5.1.17-1.module+el8.4.0+414+2e7afcdd.noarch.rpmblibzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmclibzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmdlibzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmjKphp-pear-1.10.9-1.module+el8.4.0+414+2e7afcdd.noarch.rpme+php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmf+php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmtphp-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm;zphp-pecl-xdebug-2.8.0-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmgbphp-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmr (@BBBBBBBBBBBBBBBBBBBBBenhancementnew module: python38:3.8VT https://bugzilla.redhat.com/show_bug.cgi?id=18070411807041https://errata.rockylinux.org/RLEA-2020:1694RLEA-2020:1694RLEA-2020:1694 b^1|python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpmhHpython38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm2python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpmilpython38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpmg?python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm3 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpmjFpython38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpmkpython38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmlpython38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmmpython38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm4 python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm5python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm6python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm7 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpmnSpython38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpmb^1|python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpmhHpython38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm2python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpmilpython38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpmg?python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm3 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpmjFpython38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpmkpython38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmlpython38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmmpython38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm4 python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm5python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm6python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm7 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpmnSpython38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm9 /iBBBBbugfixluksmeta bug fix and enhancement update*) https://bugzilla.redhat.com/show_bug.cgi?id=17703951770395https://errata.rockylinux.org/RLBA-2020:1695RLBA-2020:1695RLBA-2020:1695 slibluksmeta-devel-9-4.el8.x86_64.rpmslibluksmeta-9-4.el8.x86_64.rpmsluksmeta-9-4.el8.x86_64.rpmslibluksmeta-devel-9-4.el8.x86_64.rpmslibluksmeta-9-4.el8.x86_64.rpmsluksmeta-9-4.el8.x86_64.rpm: 4pBBbugfixlibbytesize bug fix and enhancement updateS) https://bugzilla.redhat.com/show_bug.cgi?id=17338101733810https://bugzilla.redhat.com/show_bug.cgi?id=17738851773885https://errata.rockylinux.org/RLBA-2020:1700RLBA-2020:1700RLBA-2020:1700 k2libbytesize-1.4-3.el8.x86_64.rpmP2python3-bytesize-1.4-3.el8.x86_64.rpmk2libbytesize-1.4-3.el8.x86_64.rpmP2python3-bytesize-1.4-3.el8.x86_64.rpm 7uenhancementspice-streaming-agent bug fix and enhancement update|) https://bugzilla.redhat.com/show_bug.cgi?id=17741231774123https://bugzilla.redhat.com/show_bug.cgi?id=17741291774129https://errata.rockylinux.org/RLEA-2020:1707RLEA-2020:1707RLEA-2020:1707 zEspice-streaming-agent-0.3-2.el8.x86_64.rpmzEspice-streaming-agent-0.3-2.el8.x86_64.rpm' ;xBsecurityModerate: liblouis security and bug fix update%  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11577CVE-2018-11577CVE-2018-11577https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11684CVE-2018-11684CVE-2018-11684https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11685CVE-2018-11685CVE-2018-11685https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12085CVE-2018-12085CVE-2018-12085https://bugzilla.redhat.com/show_bug.cgi?id=15859051585905https://bugzilla.redhat.com/show_bug.cgi?id=15886311588631https://bugzilla.redhat.com/show_bug.cgi?id=15886361588636https://bugzilla.redhat.com/show_bug.cgi?id=15899401589940https://errata.rockylinux.org/RLSA-2020:1708RLSA-2020:1708RLSA-2020:1708 Oliblouis-2.6.2-21.el8.x86_64.rpmZOpython3-louis-2.6.2-21.el8.noarch.rpmOliblouis-2.6.2-21.el8.x86_64.rpmZOpython3-louis-2.6.2-21.el8.noarch.rpm >|enhancementnew package: virt-p2v0f https://errata.rockylinux.org/RLEA-2020:1709RLEA-2020:1709RLEA-2020:1709 4virt-p2v-maker-1.42.0-5.el8.x86_64.rpm4virt-p2v-maker-1.42.0-5.el8.x86_64.rpm ?|BBBBBBBBBBBBBBBBBBBBBBBenhancementnew module: maven:3.6Q https://errata.rockylinux.org/RLEA-2020:1711RLEA-2020:1711RLEA-2020:1711 , Gbugfixgcc-toolset-9-strace bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=17472131747213https://bugzilla.redhat.com/show_bug.cgi?id=17900541790054https://bugzilla.redhat.com/show_bug.cgi?id=17944901794490https://errata.rockylinux.org/RLBA-2020:1737RLBA-2020:1737RLBA-2020:1737 Jgcc-toolset-9-strace-5.1-6.el8.x86_64.rpmJgcc-toolset-9-strace-5.1-6.el8.x86_64.rpm? Jbugfixpython-reportlab bug fix and enhancement update2) https://errata.rockylinux.org/RLBA-2020:1741RLBA-2020:1741RLBA-2020:1741 Epython3-reportlab-3.4.0-8.el8.x86_64.rpmEpython3-reportlab-3.4.0-8.el8.x86_64.rpm@ MBBbugfixgcc-toolset-9-make bug fix and enhancement update[ https://bugzilla.redhat.com/show_bug.cgi?id=17891161789116https://errata.rockylinux.org/RLBA-2020:1742RLBA-2020:1742RLBA-2020:1742 Fggcc-toolset-9-make-4.2.1-2.el8.x86_64.rpmGggcc-toolset-9-make-devel-4.2.1-2.el8.x86_64.rpmFggcc-toolset-9-make-4.2.1-2.el8.x86_64.rpmGggcc-toolset-9-make-devel-4.2.1-2.el8.x86_64.rpmA RBBbugfixlibrevenge bug fix and enhancement updatet) https://bugzilla.redhat.com/show_bug.cgi?id=17864661786466https://errata.rockylinux.org/RLBA-2020:1743RLBA-2020:1743RLBA-2020:1743 Rilibrevenge-0.0.4-12.el8.x86_64.rpmSilibrevenge-gdb-0.0.4-12.el8.x86_64.rpmRilibrevenge-0.0.4-12.el8.x86_64.rpmSilibrevenge-gdb-0.0.4-12.el8.x86_64.rpmB Wbugfixpython-pycurl bug fix and enhancement update) https://errata.rockylinux.org/RLBA-2020:1745RLBA-2020:1745RLBA-2020:1745 dpython3-pycurl-7.43.0.2-4.el8.x86_64.rpmdpython3-pycurl-7.43.0.2-4.el8.x86_64.rpmC Zbugfixsblim-cmpi-base bug fix and enhancement updateF) https://errata.rockylinux.org/RLBA-2020:1750RLBA-2020:1750RLBA-2020:1750 ]Tsblim-cmpi-base-1.6.4-14.el8.x86_64.rpm]Tsblim-cmpi-base-1.6.4-14.el8.x86_64.rpmD bugfixdriverctl bug fix and enhancement updateo) https://bugzilla.redhat.com/show_bug.cgi?id=16570201657020https://errata.rockylinux.org/RLBA-2020:1752RLBA-2020:1752RLBA-2020:1752 [qdriverctl-0.111-1.el8.noarch.rpm[qdriverctl-0.111-1.el8.noarch.rpmE !_bugfixgcc-toolset-9-annobin bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=17941591794159https://bugzilla.redhat.com/show_bug.cgi?id=18038081803808https://bugzilla.redhat.com/show_bug.cgi?id=18038141803814https://errata.rockylinux.org/RLBA-2020:1754RLBA-2020:1754RLBA-2020:1754 -6gcc-toolset-9-annobin-9.08-4.el8.x86_64.rpm-6gcc-toolset-9-annobin-9.08-4.el8.x86_64.rpm) "jBFBBBqBBBfBoBaBsecurityImportant: container-tools:1.0 security and bug fix update1Hhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10696CVE-2020-10696CVE-2020-10696https://bugzilla.redhat.com/show_bug.cgi?id=17763131776313https://bugzilla.redhat.com/show_bug.cgi?id=18137761813776* conflicting requests: failed to install container-tools:1.0https://bugzilla.redhat.com/show_bug.cgi?id=18165411816541* podman run container error with avc deniedhttps://bugzilla.redhat.com/show_bug.cgi?id=18176511817651https://errata.rockylinux.org/RLSA-2020:1926RLSA-2020:1926RLSA-2020:1926  YR Wcontainer-selinux-2.124.0-1.gitf958d0c.module+el8.5.0+681+c9a1951f.noarch.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmLdfuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm#oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm$oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm8Erunc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm+Wslirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.x86_64.rpm YR Wcontainer-selinux-2.124.0-1.gitf958d0c.module+el8.5.0+681+c9a1951f.noarch.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmLdfuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm#oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm$oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm8Erunc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpm+Wslirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.x86_64.rpm"G #i$bugfixnodejs:12 bug fix updateyV https://errata.rockylinux.org/RLBA-2020:1928RLBA-2020:1928RLBA-2020:1928 /ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm/ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm%H $i$bugfixnodejs:10 bug fix updateOV https://errata.rockylinux.org/RLBA-2020:1929RLBA-2020:1929RLBA-2020:1929 /ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm/ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm)* %hCBFBBBFLBBRBsecurityImportant: container-tools:2.0 security update%3https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10696CVE-2020-10696CVE-2020-10696https://bugzilla.redhat.com/show_bug.cgi?id=18176511817651https://errata.rockylinux.org/RLSA-2020:1931RLSA-2020:1931RLSA-2020:1931 ~R Scockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm~R Scockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm7+ &hCBFBBBFLBsecurityImportant: container-tools:rhel8 security updateX3https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10696CVE-2020-10696CVE-2020-10696https://bugzilla.redhat.com/show_bug.cgi?id=18176511817651https://errata.rockylinux.org/RLSA-2020:1932RLSA-2020:1932RLSA-2020:1932  YR- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm YR- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpmD, 'UBBsecurityImportant: squid:4 security update https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12519CVE-2019-12519CVE-2019-12519https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12525CVE-2019-12525CVE-2019-12525https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11945CVE-2020-11945CVE-2020-11945https://bugzilla.redhat.com/show_bug.cgi?id=17305351730535https://bugzilla.redhat.com/show_bug.cgi?id=18275521827552https://bugzilla.redhat.com/show_bug.cgi?id=18275631827563https://errata.rockylinux.org/RLSA-2020:2041RLSA-2020:2041RLSA-2020:2041 &SY3libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm4libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm&SY3libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm4libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpmGI (hCBFBBBFLBbugfixcontainer-tools:rhel8 bug fix update"_ https://bugzilla.redhat.com/show_bug.cgi?id=18343461834346* podman: Please backport correction patch for the native container healthcheckshttps://errata.rockylinux.org/RLBA-2020:2456RLBA-2020:2456RLBA-2020:2456  YR- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm YR- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpmTJ )hCBFBBBFLBBRBbugfixcontainer-tools:2.0 bug fix update_ https://bugzilla.redhat.com/show_bug.cgi?id=18369781836978* podman: Please backport correction patch for the native container healthcheckshttps://errata.rockylinux.org/RLBA-2020:2457RLBA-2020:2457RLBA-2020:2457 ~R Scockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm~R Scockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpmd- *ZBBBBBBBBBBsecurityImportant: virt:rhel security update`+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20382CVE-2019-20382CVE-2019-20382https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8608CVE-2020-8608CVE-2020-8608https://bugzilla.redhat.com/show_bug.cgi?id=17984531798453https://bugzilla.redhat.com/show_bug.cgi?id=18103901810390https://errata.rockylinux.org/RLSA-2020:2774RLSA-2020:2774RLSA-2020:2774 tspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmtspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm{. +i$securityImportant: nodejs:10 security update jhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11080CVE-2020-11080CVE-2020-11080https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7598CVE-2020-7598CVE-2020-7598https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8174CVE-2020-8174CVE-2020-8174https://bugzilla.redhat.com/show_bug.cgi?id=18133441813344https://bugzilla.redhat.com/show_bug.cgi?id=18449291844929https://bugzilla.redhat.com/show_bug.cgi?id=18452561845256https://errata.rockylinux.org/RLSA-2020:2848RLSA-2020:2848RLSA-2020:2848 /ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm/ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm/ ,i$securityImportant: nodejs:12 security updateu@ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11080CVE-2020-11080CVE-2020-11080https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7598CVE-2020-7598CVE-2020-7598https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8172CVE-2020-8172CVE-2020-8172https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8174CVE-2020-8174CVE-2020-8174https://bugzilla.redhat.com/show_bug.cgi?id=18133441813344https://bugzilla.redhat.com/show_bug.cgi?id=18449291844929https://bugzilla.redhat.com/show_bug.cgi?id=18452471845247https://bugzilla.redhat.com/show_bug.cgi?id=18452561845256https://errata.rockylinux.org/RLSA-2020:2852RLSA-2020:2852RLSA-2020:2852 /ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm/ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm0 -^BBsecurityModerate: mod_auth_openidc:2.3 security and bug fix update5Jhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14857CVE-2019-14857CVE-2019-14857https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20479CVE-2019-20479CVE-2019-20479https://bugzilla.redhat.com/show_bug.cgi?id=17606131760613https://bugzilla.redhat.com/show_bug.cgi?id=18051021805102https://bugzilla.redhat.com/show_bug.cgi?id=18441071844107* Module stream mod_auth_openidc:2.3 does not have correct module.md filehttps://errata.rockylinux.org/RLSA-2020:3032RLSA-2020:3032RLSA-2020:3032 /c cjose-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm/c cjose-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpmK .hCBFBBBFLBBRBbugfixcontainer-tools:2.0 bug fix updateY https://bugzilla.redhat.com/show_bug.cgi?id=18463641846364* podman 1.6.4 is not honouring --security-opt when --privileged is passedhttps://errata.rockylinux.org/RLBA-2020:3036RLBA-2020:3036RLBA-2020:3036 ~R Scockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm~R Scockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm1 /hQNssecurityModerate: container-tools:rhel8 security, bug fix, and enhancement updateX,https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1983CVE-2020-1983CVE-2020-1983https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20188CVE-2021-20188CVE-2021-20188https://bugzilla.redhat.com/show_bug.cgi?id=17032611703261https://bugzilla.redhat.com/show_bug.cgi?id=17824081782408https://bugzilla.redhat.com/show_bug.cgi?id=17849501784950https://bugzilla.redhat.com/show_bug.cgi?id=17854801785480https://bugzilla.redhat.com/show_bug.cgi?id=18060441806044https://bugzilla.redhat.com/show_bug.cgi?id=18073791807379https://bugzilla.redhat.com/show_bug.cgi?id=18084831808483https://bugzilla.redhat.com/show_bug.cgi?id=18096481809648https://bugzilla.redhat.com/show_bug.cgi?id=18108741810874https://bugzilla.redhat.com/show_bug.cgi?id=18117791811779https://bugzilla.redhat.com/show_bug.cgi?id=18151701815170https://bugzilla.redhat.com/show_bug.cgi?id=18159911815991https://bugzilla.redhat.com/show_bug.cgi?id=18220371822037https://bugzilla.redhat.com/show_bug.cgi?id=18264861826486https://bugzilla.redhat.com/show_bug.cgi?id=18290611829061https://bugzilla.redhat.com/show_bug.cgi?id=18298251829825https://bugzilla.redhat.com/show_bug.cgi?id=18333901833390https://bugzilla.redhat.com/show_bug.cgi?id=18364401836440https://bugzilla.redhat.com/show_bug.cgi?id=18389911838991https://bugzilla.redhat.com/show_bug.cgi?id=18390651839065https://errata.rockylinux.org/RLSA-2020:3053RLSA-2020:3053RLSA-2020:3053 ~Rpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm8 runc-1.0.0-66.rc10.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm~Rpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm8 runc-1.0.0-66.rc10.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm 0Renhancementnew module: eclipse:rhel8 https://errata.rockylinux.org/RLEA-2020:3054RLEA-2020:3054RLEA-2020:3054 gv-]o@glassfish-annotation-api-1.3.2-3.module+el8.6.0+852+cc16a686.noarch.rpmsPicu4j-65.1-3.module+el8.6.0+852+cc16a686.noarch.rpmgv-]o@glassfish-annotation-api-1.3.2-3.module+el8.6.0+852+cc16a686.noarch.rpmsPicu4j-65.1-3.module+el8.6.0+852+cc16a686.noarch.rpm2 1UBBsecurityImportant: squid:4 security updatefhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15810CVE-2020-15810CVE-2020-15810https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15811CVE-2020-15811CVE-2020-15811https://bugzilla.redhat.com/show_bug.cgi?id=18717001871700https://bugzilla.redhat.com/show_bug.cgi?id=18717021871702https://errata.rockylinux.org/RLSA-2020:3623RLSA-2020:3623RLSA-2020:3623 &SY3libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm4libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm&SY3libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm4libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm3 (XBiBBBBBBBBBBBBBTBQBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:7.3 security, bug fix, and enhancement updatej-https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11039CVE-2019-11039CVE-2019-11039https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11040CVE-2019-11040CVE-2019-11040https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11041CVE-2019-11041CVE-2019-11041https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11042CVE-2019-11042CVE-2019-11042https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11045CVE-2019-11045CVE-2019-11045https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11047CVE-2019-11047CVE-2019-11047https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11048CVE-2019-11048CVE-2019-11048https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11050CVE-2019-11050CVE-2019-11050https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13224CVE-2019-13224CVE-2019-13224https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13225CVE-2019-13225CVE-2019-13225https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16163CVE-2019-16163CVE-2019-16163https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19203CVE-2019-19203CVE-2019-19203https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19204CVE-2019-19204CVE-2019-19204https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19246CVE-2019-19246CVE-2019-19246https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20454CVE-2019-20454CVE-2019-20454https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7059CVE-2020-7059CVE-2020-7059https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7060CVE-2020-7060CVE-2020-7060https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062CVE-2020-7062CVE-2020-7062https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063CVE-2020-7063CVE-2020-7063https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7064CVE-2020-7064CVE-2020-7064https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7065CVE-2020-7065CVE-2020-7065https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7066CVE-2020-7066CVE-2020-7066https://bugzilla.redhat.com/show_bug.cgi?id=17241521724152https://bugzilla.redhat.com/show_bug.cgi?id=17241541724154https://bugzilla.redhat.com/show_bug.cgi?id=17289651728965https://bugzilla.redhat.com/show_bug.cgi?id=17289701728970https://bugzilla.redhat.com/show_bug.cgi?id=17354941735494https://bugzilla.redhat.com/show_bug.cgi?id=17394591739459https://bugzilla.redhat.com/show_bug.cgi?id=17394651739465https://bugzilla.redhat.com/show_bug.cgi?id=17689971768997https://bugzilla.redhat.com/show_bug.cgi?id=17775371777537https://bugzilla.redhat.com/show_bug.cgi?id=17865701786570https://bugzilla.redhat.com/show_bug.cgi?id=17865721786572https://bugzilla.redhat.com/show_bug.cgi?id=17882581788258https://bugzilla.redhat.com/show_bug.cgi?id=17977761797776https://bugzilla.redhat.com/show_bug.cgi?id=17977791797779https://bugzilla.redhat.com/show_bug.cgi?id=18020611802061https://bugzilla.redhat.com/show_bug.cgi?id=18020681802068https://bugzilla.redhat.com/show_bug.cgi?id=18085321808532https://bugzilla.redhat.com/show_bug.cgi?id=18085361808536https://bugzilla.redhat.com/show_bug.cgi?id=18206011820601https://bugzilla.redhat.com/show_bug.cgi?id=18206041820604https://bugzilla.redhat.com/show_bug.cgi?id=18206271820627https://bugzilla.redhat.com/show_bug.cgi?id=18378421837842https://errata.rockylinux.org/RLSA-2020:3662RLSA-2020:3662RLSA-2020:3662 \aD%0+apcu-panel-5.1.17-1.module+el8.4.0+414+2e7afcdd.noarch.rpmblibzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmclibzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmdlibzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-bcmath-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-cli-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-common-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-dba-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-dbg-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-devel-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-embedded-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-enchant-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 'php-fpm-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 'php-gd-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 'php-gmp-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 'php-intl-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmb'php-json-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 'php-ldap-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-mbstring-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-mysqlnd-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-odbc-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-opcache-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-pdo-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmjKphp-pear-1.10.9-1.module+el8.4.0+414+2e7afcdd.noarch.rpme+php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmf+php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmtphp-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm;zphp-pecl-xdebug-2.8.0-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmgbphp-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-pgsql-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-process-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmz'php-recode-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-snmp-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-soap-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-xml-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmd'php-xmlrpc-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm\aD%0+apcu-panel-5.1.17-1.module+el8.4.0+414+2e7afcdd.noarch.rpmblibzip-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmclibzip-devel-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmdlibzip-tools-1.5.2-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-bcmath-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-cli-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-common-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-dba-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-dbg-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-devel-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-embedded-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-enchant-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 'php-fpm-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 'php-gd-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 'php-gmp-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 'php-intl-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmb'php-json-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm 'php-ldap-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-mbstring-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-mysqlnd-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-odbc-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-opcache-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-pdo-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmjKphp-pear-1.10.9-1.module+el8.4.0+414+2e7afcdd.noarch.rpme+php-pecl-apcu-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmf+php-pecl-apcu-devel-5.1.17-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmtphp-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm;zphp-pecl-xdebug-2.8.0-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmgbphp-pecl-zip-1.15.4-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-pgsql-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-process-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmz'php-recode-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-snmp-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-soap-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm'php-xml-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpmd'php-xmlrpc-7.3.20-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm!4 )|BBsecurityImportant: mysql:8.0 security updatelUQhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2911CVE-2019-2911CVE-2019-2911https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2914CVE-2019-2914CVE-2019-2914https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2938CVE-2019-2938CVE-2019-2938https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2946CVE-2019-2946CVE-2019-2946https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2957CVE-2019-2957CVE-2019-2957https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2960CVE-2019-2960CVE-2019-2960https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2963CVE-2019-2963CVE-2019-2963https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2966CVE-2019-2966CVE-2019-2966https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2967CVE-2019-2967CVE-2019-2967https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2968CVE-2019-2968CVE-2019-2968https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2974CVE-2019-2974CVE-2019-2974https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2982CVE-2019-2982CVE-2019-2982https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2991CVE-2019-2991CVE-2019-2991https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2993CVE-2019-2993CVE-2019-2993https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2997CVE-2019-2997CVE-2019-2997https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2998CVE-2019-2998CVE-2019-2998https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3004CVE-2019-3004CVE-2019-3004https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3009CVE-2019-3009CVE-2019-3009https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3011CVE-2019-3011CVE-2019-3011https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3018CVE-2019-3018CVE-2019-3018https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14539CVE-2020-14539CVE-2020-14539https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14540CVE-2020-14540CVE-2020-14540https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14547CVE-2020-14547CVE-2020-14547https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14550CVE-2020-14550CVE-2020-14550https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14553CVE-2020-14553CVE-2020-14553https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14559CVE-2020-14559CVE-2020-14559https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14567CVE-2020-14567CVE-2020-14567https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14568CVE-2020-14568CVE-2020-14568https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14575CVE-2020-14575CVE-2020-14575https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14576CVE-2020-14576CVE-2020-14576https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14586CVE-2020-14586CVE-2020-14586https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14597CVE-2020-14597CVE-2020-14597https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14614CVE-2020-14614CVE-2020-14614https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14619CVE-2020-14619CVE-2020-14619https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14620CVE-2020-14620CVE-2020-14620https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14623CVE-2020-14623CVE-2020-14623https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14624CVE-2020-14624CVE-2020-14624https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14631CVE-2020-14631CVE-2020-14631https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14632CVE-2020-14632CVE-2020-14632https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14633CVE-2020-14633CVE-2020-14633https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14634CVE-2020-14634CVE-2020-14634https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14641CVE-2020-14641CVE-2020-14641https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14643CVE-2020-14643CVE-2020-14643https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14651CVE-2020-14651CVE-2020-14651https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14654CVE-2020-14654CVE-2020-14654https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14656CVE-2020-14656CVE-2020-14656https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14663CVE-2020-14663CVE-2020-14663https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14678CVE-2020-14678CVE-2020-14678https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14680CVE-2020-14680CVE-2020-14680https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14697CVE-2020-14697CVE-2020-14697https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14702CVE-2020-14702CVE-2020-14702https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14725CVE-2020-14725CVE-2020-14725https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14799CVE-2020-14799CVE-2020-14799https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2570CVE-2020-2570CVE-2020-2570https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2573CVE-2020-2573CVE-2020-2573https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2574CVE-2020-2574CVE-2020-2574https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2577CVE-2020-2577CVE-2020-2577https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2579CVE-2020-2579CVE-2020-2579https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2580CVE-2020-2580CVE-2020-2580https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2584CVE-2020-2584CVE-2020-2584https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2588CVE-2020-2588CVE-2020-2588https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2589CVE-2020-2589CVE-2020-2589https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2627CVE-2020-2627CVE-2020-2627https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2660CVE-2020-2660CVE-2020-2660https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2679CVE-2020-2679CVE-2020-2679https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2686CVE-2020-2686CVE-2020-2686https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2694CVE-2020-2694CVE-2020-2694https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2752CVE-2020-2752CVE-2020-2752https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2759CVE-2020-2759CVE-2020-2759https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2760CVE-2020-2760CVE-2020-2760https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2761CVE-2020-2761CVE-2020-2761https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2762CVE-2020-2762CVE-2020-2762https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2763CVE-2020-2763CVE-2020-2763https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2765CVE-2020-2765CVE-2020-2765https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2770CVE-2020-2770CVE-2020-2770https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2774CVE-2020-2774CVE-2020-2774https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2779CVE-2020-2779CVE-2020-2779https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2780CVE-2020-2780CVE-2020-2780https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2804CVE-2020-2804CVE-2020-2804https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2812CVE-2020-2812CVE-2020-2812https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2814CVE-2020-2814CVE-2020-2814https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2853CVE-2020-2853CVE-2020-2853https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2892CVE-2020-2892CVE-2020-2892https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2893CVE-2020-2893CVE-2020-2893https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2895CVE-2020-2895CVE-2020-2895https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2896CVE-2020-2896CVE-2020-2896https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2897CVE-2020-2897CVE-2020-2897https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2898CVE-2020-2898CVE-2020-2898https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2901CVE-2020-2901CVE-2020-2901https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2903CVE-2020-2903CVE-2020-2903https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2904CVE-2020-2904CVE-2020-2904https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2921CVE-2020-2921CVE-2020-2921https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2922CVE-2020-2922CVE-2020-2922https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2923CVE-2020-2923CVE-2020-2923https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2924CVE-2020-2924CVE-2020-2924https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2925CVE-2020-2925CVE-2020-2925https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2926CVE-2020-2926CVE-2020-2926https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2928CVE-2020-2928CVE-2020-2928https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2930CVE-2020-2930CVE-2020-2930https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1998CVE-2021-1998CVE-2021-1998https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2006CVE-2021-2006CVE-2021-2006https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2007CVE-2021-2007CVE-2021-2007https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2009CVE-2021-2009CVE-2021-2009https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2012CVE-2021-2012CVE-2021-2012https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2016CVE-2021-2016CVE-2021-2016https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2019CVE-2021-2019CVE-2021-2019https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2020CVE-2021-2020CVE-2021-2020https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2144CVE-2021-2144CVE-2021-2144https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2160CVE-2021-2160CVE-2021-2160https://bugzilla.redhat.com/show_bug.cgi?id=17646751764675https://bugzilla.redhat.com/show_bug.cgi?id=17646761764676https://bugzilla.redhat.com/show_bug.cgi?id=17646801764680https://bugzilla.redhat.com/show_bug.cgi?id=17646811764681https://bugzilla.redhat.com/show_bug.cgi?id=17646841764684https://bugzilla.redhat.com/show_bug.cgi?id=17646851764685https://bugzilla.redhat.com/show_bug.cgi?id=17646861764686https://bugzilla.redhat.com/show_bug.cgi?id=17646871764687https://bugzilla.redhat.com/show_bug.cgi?id=17646881764688https://bugzilla.redhat.com/show_bug.cgi?id=17646891764689https://bugzilla.redhat.com/show_bug.cgi?id=17646911764691https://bugzilla.redhat.com/show_bug.cgi?id=17646921764692https://bugzilla.redhat.com/show_bug.cgi?id=17646931764693https://bugzilla.redhat.com/show_bug.cgi?id=17646941764694https://bugzilla.redhat.com/show_bug.cgi?id=17646951764695https://bugzilla.redhat.com/show_bug.cgi?id=17646961764696https://bugzilla.redhat.com/show_bug.cgi?id=17646981764698https://bugzilla.redhat.com/show_bug.cgi?id=17646991764699https://bugzilla.redhat.com/show_bug.cgi?id=17647001764700https://bugzilla.redhat.com/show_bug.cgi?id=17647011764701https://bugzilla.redhat.com/show_bug.cgi?id=17968801796880https://bugzilla.redhat.com/show_bug.cgi?id=17968811796881https://bugzilla.redhat.com/show_bug.cgi?id=17968821796882https://bugzilla.redhat.com/show_bug.cgi?id=17968831796883https://bugzilla.redhat.com/show_bug.cgi?id=17968841796884https://bugzilla.redhat.com/show_bug.cgi?id=17968851796885https://bugzilla.redhat.com/show_bug.cgi?id=17968861796886https://bugzilla.redhat.com/show_bug.cgi?id=17968871796887https://bugzilla.redhat.com/show_bug.cgi?id=17968881796888https://bugzilla.redhat.com/show_bug.cgi?id=17968891796889https://bugzilla.redhat.com/show_bug.cgi?id=17969051796905https://bugzilla.redhat.com/show_bug.cgi?id=17985591798559https://bugzilla.redhat.com/show_bug.cgi?id=17985761798576https://bugzilla.redhat.com/show_bug.cgi?id=17985871798587https://bugzilla.redhat.com/show_bug.cgi?id=18300481830048https://bugzilla.redhat.com/show_bug.cgi?id=18300491830049https://bugzilla.redhat.com/show_bug.cgi?id=18300501830050https://bugzilla.redhat.com/show_bug.cgi?id=18300511830051https://bugzilla.redhat.com/show_bug.cgi?id=18300521830052https://bugzilla.redhat.com/show_bug.cgi?id=18300531830053https://bugzilla.redhat.com/show_bug.cgi?id=18300541830054https://bugzilla.redhat.com/show_bug.cgi?id=18300551830055https://bugzilla.redhat.com/show_bug.cgi?id=18300561830056https://bugzilla.redhat.com/show_bug.cgi?id=18300581830058https://bugzilla.redhat.com/show_bug.cgi?id=18300591830059https://bugzilla.redhat.com/show_bug.cgi?id=18300601830060https://bugzilla.redhat.com/show_bug.cgi?id=18300611830061https://bugzilla.redhat.com/show_bug.cgi?id=18300621830062https://bugzilla.redhat.com/show_bug.cgi?id=18300641830064https://bugzilla.redhat.com/show_bug.cgi?id=18300661830066https://bugzilla.redhat.com/show_bug.cgi?id=18300671830067https://bugzilla.redhat.com/show_bug.cgi?id=18300681830068https://bugzilla.redhat.com/show_bug.cgi?id=18300691830069https://bugzilla.redhat.com/show_bug.cgi?id=18300701830070https://bugzilla.redhat.com/show_bug.cgi?id=18300711830071https://bugzilla.redhat.com/show_bug.cgi?id=18300721830072https://bugzilla.redhat.com/show_bug.cgi?id=18300731830073https://bugzilla.redhat.com/show_bug.cgi?id=18300741830074https://bugzilla.redhat.com/show_bug.cgi?id=18300751830075https://bugzilla.redhat.com/show_bug.cgi?id=18300761830076https://bugzilla.redhat.com/show_bug.cgi?id=18300771830077https://bugzilla.redhat.com/show_bug.cgi?id=18300781830078https://bugzilla.redhat.com/show_bug.cgi?id=18300791830079https://bugzilla.redhat.com/show_bug.cgi?id=18300821830082https://bugzilla.redhat.com/show_bug.cgi?id=18358491835849https://bugzilla.redhat.com/show_bug.cgi?id=18358501835850https://bugzilla.redhat.com/show_bug.cgi?id=18659451865945https://bugzilla.redhat.com/show_bug.cgi?id=18659471865947https://bugzilla.redhat.com/show_bug.cgi?id=18659481865948https://bugzilla.redhat.com/show_bug.cgi?id=18659491865949https://bugzilla.redhat.com/show_bug.cgi?id=18659501865950https://bugzilla.redhat.com/show_bug.cgi?id=18659511865951https://bugzilla.redhat.com/show_bug.cgi?id=18659521865952https://bugzilla.redhat.com/show_bug.cgi?id=18659531865953https://bugzilla.redhat.com/show_bug.cgi?id=18659541865954https://bugzilla.redhat.com/show_bug.cgi?id=18659551865955https://bugzilla.redhat.com/show_bug.cgi?id=18659561865956https://bugzilla.redhat.com/show_bug.cgi?id=18659581865958https://bugzilla.redhat.com/show_bug.cgi?id=18659591865959https://bugzilla.redhat.com/show_bug.cgi?id=18659601865960https://bugzilla.redhat.com/show_bug.cgi?id=18659611865961https://bugzilla.redhat.com/show_bug.cgi?id=18659621865962https://bugzilla.redhat.com/show_bug.cgi?id=18659631865963https://bugzilla.redhat.com/show_bug.cgi?id=18659641865964https://bugzilla.redhat.com/show_bug.cgi?id=18659651865965https://bugzilla.redhat.com/show_bug.cgi?id=18659661865966https://bugzilla.redhat.com/show_bug.cgi?id=18659671865967https://bugzilla.redhat.com/show_bug.cgi?id=18659681865968https://bugzilla.redhat.com/show_bug.cgi?id=18659691865969https://bugzilla.redhat.com/show_bug.cgi?id=18659701865970https://bugzilla.redhat.com/show_bug.cgi?id=18659711865971https://bugzilla.redhat.com/show_bug.cgi?id=18659721865972https://bugzilla.redhat.com/show_bug.cgi?id=18659731865973https://bugzilla.redhat.com/show_bug.cgi?id=18659741865974https://bugzilla.redhat.com/show_bug.cgi?id=18659751865975https://bugzilla.redhat.com/show_bug.cgi?id=18659761865976https://bugzilla.redhat.com/show_bug.cgi?id=18659771865977https://bugzilla.redhat.com/show_bug.cgi?id=18659821865982https://bugzilla.redhat.com/show_bug.cgi?id=18740401874040https://errata.rockylinux.org/RLSA-2020:3732RLSA-2020:3732RLSA-2020:3732 0`f?mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm@mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm0`f?mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm@mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm"5 *ZBBBBBBBBBBsecurityImportant: virt:rhel security updateAWhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756CVE-2020-10756CVE-2020-10756https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364CVE-2020-14364CVE-2020-14364https://bugzilla.redhat.com/show_bug.cgi?id=18359861835986https://bugzilla.redhat.com/show_bug.cgi?id=18692011869201https://errata.rockylinux.org/RLSA-2020:4059RLSA-2020:4059RLSA-2020:4059 tspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmtspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm86 +i$securityModerate: nodejs:12 security and bug fix update  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15095CVE-2020-15095CVE-2020-15095https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8116CVE-2020-8116CVE-2020-8116https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8201CVE-2020-8201CVE-2020-8201https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8252CVE-2020-8252CVE-2020-8252https://bugzilla.redhat.com/show_bug.cgi?id=18568751856875https://bugzilla.redhat.com/show_bug.cgi?id=18681961868196https://bugzilla.redhat.com/show_bug.cgi?id=18793111879311https://bugzilla.redhat.com/show_bug.cgi?id=18793151879315https://bugzilla.redhat.com/show_bug.cgi?id=18839661883966* The nodejs:12/development module is not installablehttps://errata.rockylinux.org/RLSA-2020:4272RLSA-2020:4272RLSA-2020:4272 /ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm/ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm;L lBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbugfixabrt bug fix and enhancement update! https://bugzilla.redhat.com/show_bug.cgi?id=17916551791655https://bugzilla.redhat.com/show_bug.cgi?id=17984941798494https://bugzilla.redhat.com/show_bug.cgi?id=18057281805728https://bugzilla.redhat.com/show_bug.cgi?id=18099491809949https://bugzilla.redhat.com/show_bug.cgi?id=18220921822092https://bugzilla.redhat.com/show_bug.cgi?id=18353881835388https://bugzilla.redhat.com/show_bug.cgi?id=18462721846272https://bugzilla.redhat.com/show_bug.cgi?id=18489031848903https://errata.rockylinux.org/RLBA-2020:4435RLBA-2020:4435RLBA-2020:4435 zgnome-abrt-1.2.6-6.el8.x86_64.rpmBPlibreport-2.9.5-15.el8.rocky.6.3.x86_64.rpmCPlibreport-anaconda-2.9.5-15.el8.rocky.6.3.x86_64.rpmDPlibreport-cli-2.9.5-15.el8.rocky.6.3.x86_64.rpmEPlibreport-gtk-2.9.5-15.el8.rocky.6.3.x86_64.rpmFPlibreport-newt-2.9.5-15.el8.rocky.6.3.x86_64.rpmGPlibreport-plugin-bugzilla-2.9.5-15.el8.rocky.6.3.x86_64.rpmHPlibreport-plugin-kerneloops-2.9.5-15.el8.rocky.6.3.x86_64.rpmIPlibreport-plugin-logger-2.9.5-15.el8.rocky.6.3.x86_64.rpmJPlibreport-plugin-mailx-2.9.5-15.el8.rocky.6.3.x86_64.rpmKPlibreport-plugin-reportuploader-2.9.5-15.el8.rocky.6.3.x86_64.rpmLPlibreport-plugin-rhtsupport-2.9.5-15.el8.rocky.6.3.x86_64.rpmMPlibreport-plugin-ureport-2.9.5-15.el8.rocky.6.3.x86_64.rpmNPlibreport-rhel-2.9.5-15.el8.rocky.6.3.x86_64.rpmOPlibreport-rhel-anaconda-bugzilla-2.9.5-15.el8.rocky.6.3.x86_64.rpmPPlibreport-rhel-bugzilla-2.9.5-15.el8.rocky.6.3.x86_64.rpmQPlibreport-web-2.9.5-15.el8.rocky.6.3.x86_64.rpm\Ppython3-libreport-2.9.5-15.el8.rocky.6.3.x86_64.rpmzgnome-abrt-1.2.6-6.el8.x86_64.rpmBPlibreport-2.9.5-15.el8.rocky.6.3.x86_64.rpmCPlibreport-anaconda-2.9.5-15.el8.rocky.6.3.x86_64.rpmDPlibreport-cli-2.9.5-15.el8.rocky.6.3.x86_64.rpmEPlibreport-gtk-2.9.5-15.el8.rocky.6.3.x86_64.rpmFPlibreport-newt-2.9.5-15.el8.rocky.6.3.x86_64.rpmGPlibreport-plugin-bugzilla-2.9.5-15.el8.rocky.6.3.x86_64.rpmHPlibreport-plugin-kerneloops-2.9.5-15.el8.rocky.6.3.x86_64.rpmIPlibreport-plugin-logger-2.9.5-15.el8.rocky.6.3.x86_64.rpmJPlibreport-plugin-mailx-2.9.5-15.el8.rocky.6.3.x86_64.rpmKPlibreport-plugin-reportuploader-2.9.5-15.el8.rocky.6.3.x86_64.rpmLPlibreport-plugin-rhtsupport-2.9.5-15.el8.rocky.6.3.x86_64.rpmMPlibreport-plugin-ureport-2.9.5-15.el8.rocky.6.3.x86_64.rpmNPlibreport-rhel-2.9.5-15.el8.rocky.6.3.x86_64.rpmOPlibreport-rhel-anaconda-bugzilla-2.9.5-15.el8.rocky.6.3.x86_64.rpmPPlibreport-rhel-bugzilla-2.9.5-15.el8.rocky.6.3.x86_64.rpmQPlibreport-web-2.9.5-15.el8.rocky.6.3.x86_64.rpm\Ppython3-libreport-2.9.5-15.el8.rocky.6.3.x86_64.rpm;N Qbugfixiperf3 bug fix and enhancement update ) https://bugzilla.redhat.com/show_bug.cgi?id=16564291656429https://bugzilla.redhat.com/show_bug.cgi?id=17004971700497https://errata.rockylinux.org/RLBA-2020:4621RLBA-2020:4621RLBA-2020:4621 #Niperf3-3.5-6.el8.x86_64.rpm#Niperf3-3.5-6.el8.x86_64.rpm<9 TsecurityLow: libreoffice security, bug fix, and enhancement updateIvl https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12802CVE-2020-12802CVE-2020-12802https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12803CVE-2020-12803CVE-2020-12803https://bugzilla.redhat.com/show_bug.cgi?id=17968931796893The following packages have been upgraded to a later upstream version: libreoffice (6.3.6.2), libcmis (0.5.2), liborcus (0.14.1).https://bugzilla.redhat.com/show_bug.cgi?id=18197981819798https://bugzilla.redhat.com/show_bug.cgi?id=18248761824876https://bugzilla.redhat.com/show_bug.cgi?id=18419071841907https://bugzilla.redhat.com/show_bug.cgi?id=18483461848346https://bugzilla.redhat.com/show_bug.cgi?id=18502261850226https://errata.rockylinux.org/RLSA-2020:4628RLSA-2020:4628RLSA-2020:4628 sYlibcmis-0.5.2-1.el8.x86_64.rpmsYlibcmis-0.5.2-1.el8.x86_64.rpm<: WsecurityModerate: libvpx security update?G https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2126CVE-2019-2126CVE-2019-2126https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9232CVE-2019-9232CVE-2019-9232https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9371CVE-2019-9371CVE-2019-9371https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9433CVE-2019-9433CVE-2019-9433https://bugzilla.redhat.com/show_bug.cgi?id=17889661788966https://bugzilla.redhat.com/show_bug.cgi?id=17889941788994https://bugzilla.redhat.com/show_bug.cgi?id=17890041789004https://bugzilla.redhat.com/show_bug.cgi?id=17890081789008https://errata.rockylinux.org/RLSA-2020:4629RLSA-2020:4629RLSA-2020:4629 LZlibvpx-1.7.0-8.el8.x86_64.rpmLZlibvpx-1.7.0-8.el8.x86_64.rpm=O Zbugfixwget bug fix and enhancement update) https://bugzilla.redhat.com/show_bug.cgi?id=17637021763702https://bugzilla.redhat.com/show_bug.cgi?id=18072671807267https://errata.rockylinux.org/RLBA-2020:4630RLBA-2020:4630RLBA-2020:4630 Awget-1.19.5-10.el8.x86_64.rpmAwget-1.19.5-10.el8.x86_64.rpm=P ]bugfixgom bug fix and enhancement update/) https://bugzilla.redhat.com/show_bug.cgi?id=18041711804171https://errata.rockylinux.org/RLBA-2020:4631RLBA-2020:4631RLBA-2020:4631  Lgom-0.4-1.el8.x86_64.rpm Lgom-0.4-1.el8.x86_64.rpm>Q %`BBBbugfixswig:3.0 bug fix and enhancement updateX) https://bugzilla.redhat.com/show_bug.cgi?id=17801061780106https://bugzilla.redhat.com/show_bug.cgi?id=18046251804625https://errata.rockylinux.org/RLBA-2020:4633RLBA-2020:4633RLBA-2020:4633 /Oy/swig-3.0.12-19.module+el8.4.0+385+82b6e804.x86_64.rpmSswig-doc-3.0.12-19.module+el8.4.0+385+82b6e804.noarch.rpmTswig-gdb-3.0.12-19.module+el8.4.0+385+82b6e804.x86_64.rpm/Oy/swig-3.0.12-19.module+el8.4.0+385+82b6e804.x86_64.rpmSswig-doc-3.0.12-19.module+el8.4.0+385+82b6e804.noarch.rpmTswig-gdb-3.0.12-19.module+el8.4.0+385+82b6e804.x86_64.rpm?R (fbugfixradvd bug fix and enhancement update) https://bugzilla.redhat.com/show_bug.cgi?id=16691771669177https://errata.rockylinux.org/RLBA-2020:4640RLBA-2020:4640RLBA-2020:4640 5Jradvd-2.17-15.el8.x86_64.rpm5Jradvd-2.17-15.el8.x86_64.rpm?; )@BBBBBBBBBBBBBBBBBBBBBsecurityModerate: python38:3.8 security, bug fix, and enhancement update*E https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20477CVE-2019-20477CVE-2019-20477https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907CVE-2019-20907CVE-2019-20907https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14422CVE-2020-14422CVE-2020-14422https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1747CVE-2020-1747CVE-2020-1747https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492CVE-2020-8492CVE-2020-8492https://bugzilla.redhat.com/show_bug.cgi?id=18060051806005https://bugzilla.redhat.com/show_bug.cgi?id=18073671807367https://bugzilla.redhat.com/show_bug.cgi?id=18090651809065https://bugzilla.redhat.com/show_bug.cgi?id=18156431815643https://bugzilla.redhat.com/show_bug.cgi?id=18474161847416The following packages have been upgraded to a later upstream version: python38 (3.8.3).https://bugzilla.redhat.com/show_bug.cgi?id=18549261854926https://bugzilla.redhat.com/show_bug.cgi?id=18564811856481https://errata.rockylinux.org/RLSA-2020:4641RLSA-2020:4641RLSA-2020:4641 b^1|python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpmhHpython38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm2python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpmilpython38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpmg?python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm3 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpmjFpython38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpmkpython38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmlpython38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmmpython38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm4 python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm5python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm6python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm7 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpmnSpython38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpmb^1|python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpmhHpython38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm2python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpmilpython38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpmg?python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm3 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpmjFpython38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpmkpython38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmlpython38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmmpython38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm4 python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpm5python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm6python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm7 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpmnSpython38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpmK< ,jsecurityModerate: freerdp and vinagre security, bug fix, and enhancement updateo7https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11018CVE-2020-11018CVE-2020-11018https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11019CVE-2020-11019CVE-2020-11019https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11038CVE-2020-11038CVE-2020-11038https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11039CVE-2020-11039CVE-2020-11039https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11040CVE-2020-11040CVE-2020-11040https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11041CVE-2020-11041CVE-2020-11041https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11042CVE-2020-11042CVE-2020-11042https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11043CVE-2020-11043CVE-2020-11043https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11044CVE-2020-11044CVE-2020-11044https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11045CVE-2020-11045CVE-2020-11045https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11046CVE-2020-11046CVE-2020-11046https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11047CVE-2020-11047CVE-2020-11047https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11048CVE-2020-11048CVE-2020-11048https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11049CVE-2020-11049CVE-2020-11049https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11058CVE-2020-11058CVE-2020-11058https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11085CVE-2020-11085CVE-2020-11085https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11086CVE-2020-11086CVE-2020-11086https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11087CVE-2020-11087CVE-2020-11087https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11088CVE-2020-11088CVE-2020-11088https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11089CVE-2020-11089CVE-2020-11089https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11522CVE-2020-11522CVE-2020-11522https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11525CVE-2020-11525CVE-2020-11525https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11526CVE-2020-11526CVE-2020-11526https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13396CVE-2020-13396CVE-2020-13396https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13397CVE-2020-13397CVE-2020-13397https://bugzilla.redhat.com/show_bug.cgi?id=17611441761144https://bugzilla.redhat.com/show_bug.cgi?id=18030541803054https://bugzilla.redhat.com/show_bug.cgi?id=18342871834287The following packages have been upgraded to a later upstream version: freerdp (2.1.1).https://bugzilla.redhat.com/show_bug.cgi?id=18353821835382https://bugzilla.redhat.com/show_bug.cgi?id=18353911835391https://bugzilla.redhat.com/show_bug.cgi?id=18353991835399https://bugzilla.redhat.com/show_bug.cgi?id=18354031835403https://bugzilla.redhat.com/show_bug.cgi?id=18357621835762https://bugzilla.redhat.com/show_bug.cgi?id=18357661835766https://bugzilla.redhat.com/show_bug.cgi?id=18357721835772https://bugzilla.redhat.com/show_bug.cgi?id=18357791835779https://bugzilla.redhat.com/show_bug.cgi?id=18362231836223https://bugzilla.redhat.com/show_bug.cgi?id=18362391836239https://bugzilla.redhat.com/show_bug.cgi?id=18362471836247https://bugzilla.redhat.com/show_bug.cgi?id=18397441839744https://bugzilla.redhat.com/show_bug.cgi?id=18411891841189https://bugzilla.redhat.com/show_bug.cgi?id=18411961841196https://bugzilla.redhat.com/show_bug.cgi?id=18441611844161https://bugzilla.redhat.com/show_bug.cgi?id=18441661844166https://bugzilla.redhat.com/show_bug.cgi?id=18441711844171https://bugzilla.redhat.com/show_bug.cgi?id=18441771844177https://bugzilla.redhat.com/show_bug.cgi?id=18441841844184https://bugzilla.redhat.com/show_bug.cgi?id=18480081848008https://bugzilla.redhat.com/show_bug.cgi?id=18480121848012https://bugzilla.redhat.com/show_bug.cgi?id=18480181848018https://bugzilla.redhat.com/show_bug.cgi?id=18480221848022https://bugzilla.redhat.com/show_bug.cgi?id=18480291848029https://bugzilla.redhat.com/show_bug.cgi?id=18480341848034https://bugzilla.redhat.com/show_bug.cgi?id=18480381848038https://errata.rockylinux.org/RLSA-2020:4647RLSA-2020:4647RLSA-2020:4647 2'vinagre-3.22.0-23.el8.x86_64.rpm2'vinagre-3.22.0-23.el8.x86_64.rpmL= /msecurityLow: evolution security and bug fix update Olhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14928CVE-2020-14928CVE-2020-14928https://bugzilla.redhat.com/show_bug.cgi?id=18254471825447https://bugzilla.redhat.com/show_bug.cgi?id=18361651836165https://bugzilla.redhat.com/show_bug.cgi?id=18362791836279https://bugzilla.redhat.com/show_bug.cgi?id=18574701857470https://errata.rockylinux.org/RLSA-2020:4649RLSA-2020:4649RLSA-2020:4649 bogofilter-1.2.5-2.el8.x86_64.rpmbogofilter-1.2.5-2.el8.x86_64.rpmL> 0fBBBBBBBBBBBBBBBBBBBBBqQBB@^securityModerate: python27:2.7 security update[thttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907CVE-2019-20907CVE-2019-20907https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20916CVE-2019-20916CVE-2019-20916https://bugzilla.redhat.com/show_bug.cgi?id=18564811856481https://bugzilla.redhat.com/show_bug.cgi?id=18681351868135https://errata.rockylinux.org/RLSA-2020:4654RLSA-2020:4654RLSA-2020:4654 u9pqwipython2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpmxopython2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm\Upython2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm[Ipython2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm.{python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm/python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm0python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpmy_python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpmzcpython2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm{kpython2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm|bpython2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm}jpython2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm~`python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpmepython2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpmvapython2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpmfpython2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpmqpython2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpmgpython2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpmlpython2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm]Mpython2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm&python2-requests-2.20.0-3.module+el8.5.0+706+735ec4b3.noarch.rpmnpython2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpmdpython2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpmF(python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.x86_64.rpm3(python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpmu9pqwipython2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpmxopython2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm\Upython2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm[Ipython2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm.{python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm/python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm0python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpmy_python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpmzcpython2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm{kpython2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm|bpython2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm}jpython2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm~`python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpmepython2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpmvapython2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpmfpython2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpmqpython2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpmgpython2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpmlpython2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm]Mpython2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm&python2-requests-2.20.0-3.module+el8.5.0+706+735ec4b3.noarch.rpmnpython2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpmdpython2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpmF(python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.x86_64.rpm3(python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpmdS 5qBBbugfixmunge bug fix and enhancement updateO) https://bugzilla.redhat.com/show_bug.cgi?id=18059561805956https://errata.rockylinux.org/RLBA-2020:4658RLBA-2020:4658RLBA-2020:4658 @{munge-0.5.13-2.el8.x86_64.rpmA{munge-libs-0.5.13-2.el8.x86_64.rpm@{munge-0.5.13-2.el8.x86_64.rpmA{munge-libs-0.5.13-2.el8.x86_64.rpme? :vBBsecurityModerate: gd security updatexhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14553CVE-2018-14553CVE-2018-14553https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977CVE-2019-6977CVE-2019-6977https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978CVE-2019-6978CVE-2019-6978https://bugzilla.redhat.com/show_bug.cgi?id=16007271600727https://bugzilla.redhat.com/show_bug.cgi?id=16713901671390https://bugzilla.redhat.com/show_bug.cgi?id=16722071672207https://errata.rockylinux.org/RLSA-2020:4659RLSA-2020:4659RLSA-2020:4659 Uygd-2.2.5-7.el8.x86_64.rpmVygd-devel-2.2.5-7.el8.x86_64.rpmUygd-2.2.5-7.el8.x86_64.rpmVygd-devel-2.2.5-7.el8.x86_64.rpme ={enhancementmemcached bug fix and enhancement updatey) https://bugzilla.redhat.com/show_bug.cgi?id=18095361809536https://errata.rockylinux.org/RLEA-2020:4664RLEA-2020:4664RLEA-2020:4664 Hmemcached-1.5.22-2.el8.x86_64.rpmHmemcached-1.5.22-2.el8.x86_64.rpmfT ~Bbugfixlftp bug fix and enhancement update") https://errata.rockylinux.org/RLBA-2020:4665RLBA-2020:4665RLBA-2020:4665 T_lftp-4.8.4-2.el8.x86_64.rpmc_lftp-scripts-4.8.4-2.el8.noarch.rpmT_lftp-4.8.4-2.el8.x86_64.rpmc_lftp-scripts-4.8.4-2.el8.noarch.rpmg@ vBEBsecurityModerate: idm:DL1 and idm:client security, bug fix, and enhancement updateK[Ghttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9251CVE-2015-9251CVE-2015-9251https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10735CVE-2016-10735CVE-2016-10735https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14040CVE-2018-14040CVE-2018-14040https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14042CVE-2018-14042CVE-2018-14042https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20676CVE-2018-20676CVE-2018-20676https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20677CVE-2018-20677CVE-2018-20677https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358CVE-2019-11358CVE-2019-11358https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8331CVE-2019-8331CVE-2019-8331https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11022CVE-2020-11022CVE-2020-11022https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1722CVE-2020-1722CVE-2020-1722https://bugzilla.redhat.com/show_bug.cgi?id=13995461399546https://bugzilla.redhat.com/show_bug.cgi?id=14303651430365https://bugzilla.redhat.com/show_bug.cgi?id=14887321488732https://bugzilla.redhat.com/show_bug.cgi?id=15850201585020https://bugzilla.redhat.com/show_bug.cgi?id=16016141601614https://bugzilla.redhat.com/show_bug.cgi?id=16016171601617https://bugzilla.redhat.com/show_bug.cgi?id=16515771651577https://bugzilla.redhat.com/show_bug.cgi?id=16680821668082https://bugzilla.redhat.com/show_bug.cgi?id=16680891668089https://bugzilla.redhat.com/show_bug.cgi?id=16680971668097https://bugzilla.redhat.com/show_bug.cgi?id=16864541686454https://bugzilla.redhat.com/show_bug.cgi?id=17012331701233https://bugzilla.redhat.com/show_bug.cgi?id=17019721701972https://bugzilla.redhat.com/show_bug.cgi?id=17468301746830https://bugzilla.redhat.com/show_bug.cgi?id=17508931750893https://bugzilla.redhat.com/show_bug.cgi?id=17512951751295https://bugzilla.redhat.com/show_bug.cgi?id=17570451757045https://bugzilla.redhat.com/show_bug.cgi?id=17598881759888The following packages have been upgraded to a later upstream version: ipa (4.8.7), softhsm (2.6.0), opendnssec (2.1.6). (BZ#1759888, BZ#1818765, BZ#1818877)https://bugzilla.redhat.com/show_bug.cgi?id=17681561768156https://bugzilla.redhat.com/show_bug.cgi?id=17778061777806https://bugzilla.redhat.com/show_bug.cgi?id=17930711793071https://bugzilla.redhat.com/show_bug.cgi?id=18016981801698https://bugzilla.redhat.com/show_bug.cgi?id=18024711802471https://bugzilla.redhat.com/show_bug.cgi?id=18098351809835https://bugzilla.redhat.com/show_bug.cgi?id=18101541810154https://bugzilla.redhat.com/show_bug.cgi?id=18101791810179https://bugzilla.redhat.com/show_bug.cgi?id=18133301813330https://bugzilla.redhat.com/show_bug.cgi?id=18167841816784https://bugzilla.redhat.com/show_bug.cgi?id=18187651818765https://bugzilla.redhat.com/show_bug.cgi?id=18188771818877https://bugzilla.redhat.com/show_bug.cgi?id=18284061828406https://bugzilla.redhat.com/show_bug.cgi?id=18317321831732https://bugzilla.redhat.com/show_bug.cgi?id=18319351831935https://bugzilla.redhat.com/show_bug.cgi?id=18323311832331https://bugzilla.redhat.com/show_bug.cgi?id=18332661833266https://bugzilla.redhat.com/show_bug.cgi?id=18342641834264https://bugzilla.redhat.com/show_bug.cgi?id=18349091834909https://bugzilla.redhat.com/show_bug.cgi?id=18452111845211https://bugzilla.redhat.com/show_bug.cgi?id=18455371845537https://bugzilla.redhat.com/show_bug.cgi?id=18455961845596https://bugzilla.redhat.com/show_bug.cgi?id=18463521846352https://bugzilla.redhat.com/show_bug.cgi?id=18464341846434https://bugzilla.redhat.com/show_bug.cgi?id=18479991847999https://bugzilla.redhat.com/show_bug.cgi?id=18499141849914https://bugzilla.redhat.com/show_bug.cgi?id=18514111851411https://bugzilla.redhat.com/show_bug.cgi?id=18522441852244https://bugzilla.redhat.com/show_bug.cgi?id=18532631853263https://bugzilla.redhat.com/show_bug.cgi?id=18571571857157https://bugzilla.redhat.com/show_bug.cgi?id=18583181858318https://bugzilla.redhat.com/show_bug.cgi?id=18592131859213https://bugzilla.redhat.com/show_bug.cgi?id=18630791863079https://bugzilla.redhat.com/show_bug.cgi?id=18636161863616https://bugzilla.redhat.com/show_bug.cgi?id=18662911866291https://bugzilla.redhat.com/show_bug.cgi?id=18669381866938https://bugzilla.redhat.com/show_bug.cgi?id=18684321868432https://bugzilla.redhat.com/show_bug.cgi?id=18693111869311https://bugzilla.redhat.com/show_bug.cgi?id=18702021870202https://bugzilla.redhat.com/show_bug.cgi?id=18740151874015https://bugzilla.redhat.com/show_bug.cgi?id=18753481875348https://bugzilla.redhat.com/show_bug.cgi?id=18796041879604https://errata.rockylinux.org/RLSA-2020:4670RLSA-2020:4670RLSA-2020:4670 2/oq9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm2/oq9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpmoA ZBBBBBBBBBBBUsecurityModerate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update&b!https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15890CVE-2019-15890CVE-2019-15890https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20485CVE-2019-20485CVE-2019-20485https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10703CVE-2020-10703CVE-2020-10703https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14301CVE-2020-14301CVE-2020-14301https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14339CVE-2020-14339CVE-2020-14339https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1983CVE-2020-1983CVE-2020-1983https://bugzilla.redhat.com/show_bug.cgi?id=15180421518042https://bugzilla.redhat.com/show_bug.cgi?id=16643241664324https://bugzilla.redhat.com/show_bug.cgi?id=17150391715039https://bugzilla.redhat.com/show_bug.cgi?id=17173941717394https://bugzilla.redhat.com/show_bug.cgi?id=17278651727865https://bugzilla.redhat.com/show_bug.cgi?id=17497161749716https://bugzilla.redhat.com/show_bug.cgi?id=17569461756946https://bugzilla.redhat.com/show_bug.cgi?id=17598491759849https://bugzilla.redhat.com/show_bug.cgi?id=17631911763191https://bugzilla.redhat.com/show_bug.cgi?id=17901891790189https://bugzilla.redhat.com/show_bug.cgi?id=18059981805998https://bugzilla.redhat.com/show_bug.cgi?id=18070571807057https://bugzilla.redhat.com/show_bug.cgi?id=18097401809740https://bugzilla.redhat.com/show_bug.cgi?id=18101931810193The following packages have been upgraded to a later upstream version: hivex (1.3.18), libguestfs (1.40.2), libguestfs-winsupport (8.2), libvirt (6.0.0), libvirt-dbus (1.3.0), libvirt-python (6.0.0), nbdkit (1.16.2), perl-Sys-Virt (6.0.0), qemu-kvm (4.2.0), seabios (1.13.0), SLOF (20191022). (BZ#1810193, BZ#1844296)https://bugzilla.redhat.com/show_bug.cgi?id=18115391811539https://bugzilla.redhat.com/show_bug.cgi?id=18166501816650https://bugzilla.redhat.com/show_bug.cgi?id=18286811828681https://bugzilla.redhat.com/show_bug.cgi?id=18298251829825https://bugzilla.redhat.com/show_bug.cgi?id=18442961844296https://bugzilla.redhat.com/show_bug.cgi?id=18454591845459https://bugzilla.redhat.com/show_bug.cgi?id=18486401848640https://bugzilla.redhat.com/show_bug.cgi?id=18499971849997https://bugzilla.redhat.com/show_bug.cgi?id=18543801854380https://bugzilla.redhat.com/show_bug.cgi?id=18577791857779https://bugzilla.redhat.com/show_bug.cgi?id=18600691860069https://bugzilla.redhat.com/show_bug.cgi?id=18678471867847https://errata.rockylinux.org/RLSA-2020:4676RLSA-2020:4676RLSA-2020:4676 tspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmtspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmU DBBbugfixtog-pegasus bug fix and enhancement update) https://bugzilla.redhat.com/show_bug.cgi?id=18059771805977https://bugzilla.redhat.com/show_bug.cgi?id=18428381842838https://errata.rockylinux.org/RLBA-2020:4678RLBA-2020:4678RLBA-2020:4678 tog-pegasus-2.14.1-46.el8.x86_64.rpmtog-pegasus-libs-2.14.1-46.el8.x86_64.rpmtog-pegasus-2.14.1-46.el8.x86_64.rpmtog-pegasus-libs-2.14.1-46.el8.x86_64.rpmV Ibugfixpptp bug fix and enhancement update1) https://bugzilla.redhat.com/show_bug.cgi?id=18059721805972https://errata.rockylinux.org/RLBA-2020:4679RLBA-2020:4679RLBA-2020:4679 6pptp-1.10.0-4.el8.x86_64.rpm6pptp-1.10.0-4.el8.x86_64.rpmW Lbugfixncompress bug fix and enhancement updateZ) https://bugzilla.redhat.com/show_bug.cgi?id=18308691830869https://errata.rockylinux.org/RLBA-2020:4681RLBA-2020:4681RLBA-2020:4681 Njncompress-4.2.4.4-13.el8.x86_64.rpmNjncompress-4.2.4.4-13.el8.x86_64.rpmX bugfixitstool bug fix and enhancement update) https://bugzilla.redhat.com/show_bug.cgi?id=18005481800548https://bugzilla.redhat.com/show_bug.cgi?id=18361521836152https://errata.rockylinux.org/RLBA-2020:4688RLBA-2020:4688RLBA-2020:4688 LIitstool-2.0.6-2.el8.noarch.rpmLIitstool-2.0.6-2.el8.noarch.rpmB h_BBsecurityModerate: container-tools:rhel8 security, bug fix, and enhancement update,'$https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10749CVE-2020-10749CVE-2020-10749https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756CVE-2020-10756CVE-2020-10756https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14040CVE-2020-14040CVE-2020-14040https://bugzilla.redhat.com/show_bug.cgi?id=16829701682970https://bugzilla.redhat.com/show_bug.cgi?id=17520791752079https://bugzilla.redhat.com/show_bug.cgi?id=17852421785242https://bugzilla.redhat.com/show_bug.cgi?id=18008151800815https://bugzilla.redhat.com/show_bug.cgi?id=18018741801874https://bugzilla.redhat.com/show_bug.cgi?id=18041931804193https://bugzilla.redhat.com/show_bug.cgi?id=18041951804195https://bugzilla.redhat.com/show_bug.cgi?id=18138451813845https://bugzilla.redhat.com/show_bug.cgi?id=18149281814928https://bugzilla.redhat.com/show_bug.cgi?id=18186941818694https://bugzilla.redhat.com/show_bug.cgi?id=18211931821193https://bugzilla.redhat.com/show_bug.cgi?id=18220381822038https://bugzilla.redhat.com/show_bug.cgi?id=18257891825789https://bugzilla.redhat.com/show_bug.cgi?id=18277941827794https://bugzilla.redhat.com/show_bug.cgi?id=18332201833220https://bugzilla.redhat.com/show_bug.cgi?id=18359861835986https://bugzilla.redhat.com/show_bug.cgi?id=18377551837755https://bugzilla.redhat.com/show_bug.cgi?id=18475441847544https://bugzilla.redhat.com/show_bug.cgi?id=18495571849557https://bugzilla.redhat.com/show_bug.cgi?id=18502301850230https://bugzilla.redhat.com/show_bug.cgi?id=18532301853230https://bugzilla.redhat.com/show_bug.cgi?id=18536521853652https://bugzilla.redhat.com/show_bug.cgi?id=18576061857606https://bugzilla.redhat.com/show_bug.cgi?id=18588621858862https://bugzilla.redhat.com/show_bug.cgi?id=18601261860126https://bugzilla.redhat.com/show_bug.cgi?id=18661531866153https://bugzilla.redhat.com/show_bug.cgi?id=18668331866833https://bugzilla.redhat.com/show_bug.cgi?id=18674471867447https://bugzilla.redhat.com/show_bug.cgi?id=18686121868612https://bugzilla.redhat.com/show_bug.cgi?id=18722631872263https://bugzilla.redhat.com/show_bug.cgi?id=18774631877463https://bugzilla.redhat.com/show_bug.cgi?id=18796221879622https://errata.rockylinux.org/RLSA-2020:4694RLSA-2020:4694RLSA-2020:4694 pWTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpmpWTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm Renhancementcreaterepo_c bug fix and enhancement updateS https://bugzilla.redhat.com/show_bug.cgi?id=16868121686812https://bugzilla.redhat.com/show_bug.cgi?id=17797511779751https://bugzilla.redhat.com/show_bug.cgi?id=17897071789707https://bugzilla.redhat.com/show_bug.cgi?id=18043081804308https://bugzilla.redhat.com/show_bug.cgi?id=18167531816753https://bugzilla.redhat.com/show_bug.cgi?id=18205161820516https://bugzilla.redhat.com/show_bug.cgi?id=18217811821781https://bugzilla.redhat.com/show_bug.cgi?id=18420361842036https://bugzilla.redhat.com/show_bug.cgi?id=18596891859689https://bugzilla.redhat.com/show_bug.cgi?id=18667861866786https://errata.rockylinux.org/RLEA-2020:4700RLEA-2020:4700RLEA-2020:4700 cMdrpm-0.4.1-3.el8.x86_64.rpmcMdrpm-0.4.1-3.el8.x86_64.rpmY kNBHzbugfixpython36:3.6 bug fix and enhancement updateR https://bugzilla.redhat.com/show_bug.cgi?id=18299321829932https://errata.rockylinux.org/RLBA-2020:4704RLBA-2020:4704RLBA-2020:4704 ^libXdmcp-1.1.3-1.el8.x86_64.rpmZ1libXext-1.3.4-1.el8.x86_64.rpm[1libXext-devel-1.3.4-1.el8.x86_64.rpm\libXft-2.3.3-1.el8.x86_64.rpm]libXft-devel-2.3.3-1.el8.x86_64.rpm^<libXi-1.7.10-1.el8.x86_64.rpm_<libXi-devel-1.7.10-1.el8.x86_64.rpm}libxkbfile-1.1.0-1.el8.x86_64.rpm`>libXmu-1.1.3-1.el8.x86_64.rpma>libXmu-devel-1.1.3-1.el8.x86_64.rpmb6libXrandr-1.5.2-1.el8.x86_64.rpmc6libXrandr-devel-1.5.2-1.el8.x86_64.rpmfqlibXvMC-1.0.12-1.el8.x86_64.rpmglibXxf86dga-1.1.5-1.el8.x86_64.rpmhlibXxf86dga-devel-1.1.5-1.el8.x86_64.rpmQxorg-x11-drv-ati-19.1.0-1.el8.x86_64.rpmRxorg-x11-drv-intel-2.99.917-39.20200205.el8.x86_64.rpm<xorg-x11-proto-devel-2020.1-3.el8.noarch.rpmYxorg-x11-xkb-utils-7.7-28.el8.x86_64.rpmy%glx-utils-8.4.0-5.20181118git1830dcb.el8.x86_64.rpmDintel-gpu-tools-2.99.917-39.20200205.el8.x86_64.rpmd<libvdpau-1.4-2.el8.x86_64.rpmWlibXau-1.0.9-3.el8.x86_64.rpmXlibXau-devel-1.0.9-3.el8.x86_64.rpmY>libXdmcp-1.1.3-1.el8.x86_64.rpmZ1libXext-1.3.4-1.el8.x86_64.rpm[1libXext-devel-1.3.4-1.el8.x86_64.rpm\libXft-2.3.3-1.el8.x86_64.rpm]libXft-devel-2.3.3-1.el8.x86_64.rpm^<libXi-1.7.10-1.el8.x86_64.rpm_<libXi-devel-1.7.10-1.el8.x86_64.rpm}libxkbfile-1.1.0-1.el8.x86_64.rpm`>libXmu-1.1.3-1.el8.x86_64.rpma>libXmu-devel-1.1.3-1.el8.x86_64.rpmb6libXrandr-1.5.2-1.el8.x86_64.rpmc6libXrandr-devel-1.5.2-1.el8.x86_64.rpmfqlibXvMC-1.0.12-1.el8.x86_64.rpmglibXxf86dga-1.1.5-1.el8.x86_64.rpmhlibXxf86dga-devel-1.1.5-1.el8.x86_64.rpmQxorg-x11-drv-ati-19.1.0-1.el8.x86_64.rpmRxorg-x11-drv-intel-2.99.917-39.20200205.el8.x86_64.rpm<xorg-x11-proto-devel-2020.1-3.el8.noarch.rpmYxorg-x11-xkb-utils-7.7-28.el8.x86_64.rpmSE UBBsecurityModerate: squid:4 security, bug fix, and enhancement updateZb%https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12520CVE-2019-12520CVE-2019-12520https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12521CVE-2019-12521CVE-2019-12521https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12523CVE-2019-12523CVE-2019-12523https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12524CVE-2019-12524CVE-2019-12524https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12526CVE-2019-12526CVE-2019-12526https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12528CVE-2019-12528CVE-2019-12528https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12529CVE-2019-12529CVE-2019-12529https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12854CVE-2019-12854CVE-2019-12854https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18676CVE-2019-18676CVE-2019-18676https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18677CVE-2019-18677CVE-2019-18677https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18678CVE-2019-18678CVE-2019-18678https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18679CVE-2019-18679CVE-2019-18679https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18860CVE-2019-18860CVE-2019-18860https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14058CVE-2020-14058CVE-2020-14058https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15049CVE-2020-15049CVE-2020-15049https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24606CVE-2020-24606CVE-2020-24606https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8449CVE-2020-8449CVE-2020-8449https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8450CVE-2020-8450CVE-2020-8450https://bugzilla.redhat.com/show_bug.cgi?id=17305231730523https://bugzilla.redhat.com/show_bug.cgi?id=17305281730528https://bugzilla.redhat.com/show_bug.cgi?id=17703491770349https://bugzilla.redhat.com/show_bug.cgi?id=17703561770356https://bugzilla.redhat.com/show_bug.cgi?id=17703601770360https://bugzilla.redhat.com/show_bug.cgi?id=17703651770365https://bugzilla.redhat.com/show_bug.cgi?id=17703711770371https://bugzilla.redhat.com/show_bug.cgi?id=17703751770375https://bugzilla.redhat.com/show_bug.cgi?id=17985341798534https://bugzilla.redhat.com/show_bug.cgi?id=17985401798540https://bugzilla.redhat.com/show_bug.cgi?id=17985521798552https://bugzilla.redhat.com/show_bug.cgi?id=18171211817121https://bugzilla.redhat.com/show_bug.cgi?id=18275581827558https://bugzilla.redhat.com/show_bug.cgi?id=18275621827562https://bugzilla.redhat.com/show_bug.cgi?id=18275701827570https://bugzilla.redhat.com/show_bug.cgi?id=18525501852550https://bugzilla.redhat.com/show_bug.cgi?id=18525541852554https://bugzilla.redhat.com/show_bug.cgi?id=18717051871705https://errata.rockylinux.org/RLSA-2020:4743RLSA-2020:4743RLSA-2020:4743 &SY3libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm4libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm&SY3libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm4libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpmUc bugfixjulietaula-montserrat-fonts bug fix and enhancement update<) https://bugzilla.redhat.com/show_bug.cgi?id=17778431777843https://errata.rockylinux.org/RLBA-2020:4747RLBA-2020:4747RLBA-2020:4747 [Ajulietaula-montserrat-fonts-7.200-2.el8.2.noarch.rpm[Ajulietaula-montserrat-fonts-7.200-2.el8.2.noarch.rpmV" |BBBBBBBBBBBBBBBBBBBBBBBenhancementmaven:3.6 bug fix and enhancement updatee https://errata.rockylinux.org/RLEA-2020:4748RLEA-2020:4748RLEA-2020:4748 ,qgcc-toolset-9-libitm-devel-9.2.1-2.3.el8.x86_64.rpm?qgcc-toolset-9-liblsan-devel-9.2.1-2.3.el8.x86_64.rpm@qgcc-toolset-9-libquadmath-devel-9.2.1-2.3.el8.x86_64.rpmAqgcc-toolset-9-libstdc++-devel-9.2.1-2.3.el8.x86_64.rpmBqgcc-toolset-9-libstdc++-docs-9.2.1-2.3.el8.x86_64.rpmCqgcc-toolset-9-libtsan-devel-9.2.1-2.3.el8.x86_64.rpmDqgcc-toolset-9-libubsan-devel-9.2.1-2.3.el8.x86_64.rpm 6qgcc-toolset-9-gcc-9.2.1-2.3.el8.x86_64.rpm7qgcc-toolset-9-gcc-c++-9.2.1-2.3.el8.x86_64.rpm8qgcc-toolset-9-gcc-gdb-plugin-9.2.1-2.3.el8.x86_64.rpm9qgcc-toolset-9-gcc-gfortran-9.2.1-2.3.el8.x86_64.rpmqgcc-toolset-9-libitm-devel-9.2.1-2.3.el8.x86_64.rpm?qgcc-toolset-9-liblsan-devel-9.2.1-2.3.el8.x86_64.rpm@qgcc-toolset-9-libquadmath-devel-9.2.1-2.3.el8.x86_64.rpmAqgcc-toolset-9-libstdc++-devel-9.2.1-2.3.el8.x86_64.rpmBqgcc-toolset-9-libstdc++-docs-9.2.1-2.3.el8.x86_64.rpmCqgcc-toolset-9-libtsan-devel-9.2.1-2.3.el8.x86_64.rpmDqgcc-toolset-9-libubsan-devel-9.2.1-2.3.el8.x86_64.rpmv vBEBbugfixidm:DL1 bug fix update] https://bugzilla.redhat.com/show_bug.cgi?id=18824721882472* nsslapd-db-locks patching no longer workshttps://errata.rockylinux.org/RLBA-2020:4857RLBA-2020:4857RLBA-2020:4857 2/oq9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm2/oq9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm'w hCBFBBBFLBBRBBCBBBBOBBBBbugfixcontainer-tools:2.0 bug fix updatesq https://bugzilla.redhat.com/show_bug.cgi?id=18864431886443* container-tools:2.0/skopeo: docker.io needs to be listed in search registries in registries.confhttps://errata.rockylinux.org/RLBA-2020:4859RLBA-2020:4859RLBA-2020:4859 ~RScockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm1acontainers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmHcontainer-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmLfuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpmhaskopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmwaskopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm~RScockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm1acontainers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmHcontainer-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmLfuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpmhaskopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmwaskopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm;x RB~BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbugfixeclipse:rhel8 bug fix updated~ https://errata.rockylinux.org/RLBA-2020:5097RLBA-2020:5097RLBA-2020:5097 gv-]6#eclipse-ecf-runtime-3.14.8-1.module+el8.6.0+852+cc16a686.noarch.rpmmUapache-commons-compress-1.20-3.module+el8.6.0+852+cc16a686.noarch.rpmnnapache-commons-jxpath-1.3-36.module+el8.6.0+852+cc16a686.noarch.rpmo8apiguardian-1.1.0-4.module+el8.6.0+852+cc16a686.noarch.rpmtQbatik-css-1.11-6.module+el8.6.0+852+cc16a686.noarch.rpmuQbatik-util-1.11-6.module+el8.6.0+852+cc16a686.noarch.rpm"eclipse-ecf-core-3.14.8-1.module+el8.6.0+852+cc16a686.noarch.rpm$Leclipse-emf-core-2.22.0-1.module+el8.6.0+852+cc16a686.noarch.rpm%Leclipse-emf-runtime-2.22.0-1.module+el8.6.0+852+cc16a686.noarch.rpm&Leclipse-emf-xsd-2.22.0-1.module+el8.6.0+852+cc16a686.noarch.rpmhKeclipse-equinox-osgi-4.16-7.module+el8.6.0+852+cc16a686.x86_64.rpm'Keclipse-jdt-4.16-7.module+el8.6.0+852+cc16a686.noarch.rpm(Keclipse-p2-discovery-4.16-7.module+el8.6.0+852+cc16a686.noarch.rpmiKeclipse-pde-4.16-7.module+el8.6.0+852+cc16a686.x86_64.rpmjKeclipse-platform-4.16-7.module+el8.6.0+852+cc16a686.x86_64.rpmkKeclipse-swt-4.16-7.module+el8.6.0+852+cc16a686.x86_64.rpm-$felix-gogo-command-1.0.2-11.module+el8.6.0+852+cc16a686.noarch.rpm.:felix-gogo-runtime-1.1.0-7.module+el8.6.0+852+cc16a686.noarch.rpm/9felix-gogo-shell-1.1.0-5.module+el8.6.0+852+cc16a686.noarch.rpm0Sfelix-scr-2.1.16-6.module+el8.6.0+852+cc16a686.noarch.rpmo@glassfish-annotation-api-1.3.2-3.module+el8.6.0+852+cc16a686.noarch.rpm9glassfish-el-3.0.1-0.14.b08.module+el8.6.0+852+cc16a686.noarch.rpmglassfish-el-api-3.0.1-0.14.b08.module+el8.6.0+852+cc16a686.noarch.rpm:hglassfish-jsp-2.3.4-6.module+el8.6.0+852+cc16a686.noarch.rpm;gglassfish-jsp-api-2.3.3-3.module+el8.6.0+852+cc16a686.noarch.rpm<glassfish-servlet-api-3.1.0-19.module+el8.6.0+852+cc16a686.noarch.rpm?~google-gson-2.8.6-5.module+el8.6.0+852+cc16a686.noarch.rpm=Uhamcrest-1.3-29.module+el8.6.0+852+cc16a686.noarch.rpm>Uhamcrest-core-1.3-29.module+el8.6.0+852+cc16a686.noarch.rpmsPicu4j-65.1-3.module+el8.6.0+852+cc16a686.noarch.rpmOtjetty-continuation-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpmPtjetty-http-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpmQtjetty-io-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpmRtjetty-security-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpmStjetty-server-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpmTtjetty-servlet-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpmUtjetty-util-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpmZnjsch-0.1.54-12.module+el8.6.0+852+cc16a686.noarch.rpm\?junit-4.12-14.module+el8.6.0+852+cc16a686.noarch.rpm]Qjunit5-5.6.2-2.module+el8.6.0+852+cc16a686.noarch.rpm^=jzlib-1.1.3-14.module+el8.6.0+852+cc16a686.noarch.rpmjvlucene-8.4.1-5.module+el8.6.0+852+cc16a686.noarch.rpmkvlucene-analysis-8.4.1-5.module+el8.6.0+852+cc16a686.noarch.rpmlvlucene-analyzers-smartcn-8.4.1-5.module+el8.6.0+852+cc16a686.noarch.rpmmvlucene-queries-8.4.1-5.module+el8.6.0+852+cc16a686.noarch.rpmnvlucene-queryparser-8.4.1-5.module+el8.6.0+852+cc16a686.noarch.rpmovlucene-sandbox-8.4.1-5.module+el8.6.0+852+cc16a686.noarch.rpmxZobjectweb-asm-7.3.1-3.module+el8.6.0+852+cc16a686.noarch.rpmzPopentest4j-1.2.0-2.module+el8.6.0+852+cc16a686.noarch.rpm#isat4j-2.3.5-19.module+el8.6.0+852+cc16a686.noarch.rpm2}univocity-parsers-2.8.4-3.module+el8.6.0+852+cc16a686.noarch.rpm?xml-commons-apis-1.4.01-31.module+el8.6.0+852+cc16a686.noarch.rpm;fxmlgraphics-commons-2.3-4.module+el8.6.0+852+cc16a686.noarch.rpm=xz-java-1.8-8.module+el8.6.0+852+cc16a686.noarch.rpmgv-]6#eclipse-ecf-runtime-3.14.8-1.module+el8.6.0+852+cc16a686.noarch.rpmmUapache-commons-compress-1.20-3.module+el8.6.0+852+cc16a686.noarch.rpmnnapache-commons-jxpath-1.3-36.module+el8.6.0+852+cc16a686.noarch.rpmo8apiguardian-1.1.0-4.module+el8.6.0+852+cc16a686.noarch.rpmtQbatik-css-1.11-6.module+el8.6.0+852+cc16a686.noarch.rpmuQbatik-util-1.11-6.module+el8.6.0+852+cc16a686.noarch.rpm"eclipse-ecf-core-3.14.8-1.module+el8.6.0+852+cc16a686.noarch.rpm$Leclipse-emf-core-2.22.0-1.module+el8.6.0+852+cc16a686.noarch.rpm%Leclipse-emf-runtime-2.22.0-1.module+el8.6.0+852+cc16a686.noarch.rpm&Leclipse-emf-xsd-2.22.0-1.module+el8.6.0+852+cc16a686.noarch.rpmhKeclipse-equinox-osgi-4.16-7.module+el8.6.0+852+cc16a686.x86_64.rpm'Keclipse-jdt-4.16-7.module+el8.6.0+852+cc16a686.noarch.rpm(Keclipse-p2-discovery-4.16-7.module+el8.6.0+852+cc16a686.noarch.rpmiKeclipse-pde-4.16-7.module+el8.6.0+852+cc16a686.x86_64.rpmjKeclipse-platform-4.16-7.module+el8.6.0+852+cc16a686.x86_64.rpmkKeclipse-swt-4.16-7.module+el8.6.0+852+cc16a686.x86_64.rpm-$felix-gogo-command-1.0.2-11.module+el8.6.0+852+cc16a686.noarch.rpm.:felix-gogo-runtime-1.1.0-7.module+el8.6.0+852+cc16a686.noarch.rpm/9felix-gogo-shell-1.1.0-5.module+el8.6.0+852+cc16a686.noarch.rpm0Sfelix-scr-2.1.16-6.module+el8.6.0+852+cc16a686.noarch.rpmo@glassfish-annotation-api-1.3.2-3.module+el8.6.0+852+cc16a686.noarch.rpm9glassfish-el-3.0.1-0.14.b08.module+el8.6.0+852+cc16a686.noarch.rpmglassfish-el-api-3.0.1-0.14.b08.module+el8.6.0+852+cc16a686.noarch.rpm:hglassfish-jsp-2.3.4-6.module+el8.6.0+852+cc16a686.noarch.rpm;gglassfish-jsp-api-2.3.3-3.module+el8.6.0+852+cc16a686.noarch.rpm<glassfish-servlet-api-3.1.0-19.module+el8.6.0+852+cc16a686.noarch.rpm?~google-gson-2.8.6-5.module+el8.6.0+852+cc16a686.noarch.rpm=Uhamcrest-1.3-29.module+el8.6.0+852+cc16a686.noarch.rpm>Uhamcrest-core-1.3-29.module+el8.6.0+852+cc16a686.noarch.rpmsPicu4j-65.1-3.module+el8.6.0+852+cc16a686.noarch.rpmOtjetty-continuation-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpmPtjetty-http-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpmQtjetty-io-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpmRtjetty-security-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpmStjetty-server-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpmTtjetty-servlet-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpmUtjetty-util-9.4.30-2.v20200611.module+el8.6.0+852+cc16a686.noarch.rpmZnjsch-0.1.54-12.module+el8.6.0+852+cc16a686.noarch.rpm\?junit-4.12-14.module+el8.6.0+852+cc16a686.noarch.rpm]Qjunit5-5.6.2-2.module+el8.6.0+852+cc16a686.noarch.rpm^=jzlib-1.1.3-14.module+el8.6.0+852+cc16a686.noarch.rpmjvlucene-8.4.1-5.module+el8.6.0+852+cc16a686.noarch.rpmkvlucene-analysis-8.4.1-5.module+el8.6.0+852+cc16a686.noarch.rpmlvlucene-analyzers-smartcn-8.4.1-5.module+el8.6.0+852+cc16a686.noarch.rpmmvlucene-queries-8.4.1-5.module+el8.6.0+852+cc16a686.noarch.rpmnvlucene-queryparser-8.4.1-5.module+el8.6.0+852+cc16a686.noarch.rpmovlucene-sandbox-8.4.1-5.module+el8.6.0+852+cc16a686.noarch.rpmxZobjectweb-asm-7.3.1-3.module+el8.6.0+852+cc16a686.noarch.rpmzPopentest4j-1.2.0-2.module+el8.6.0+852+cc16a686.noarch.rpm#isat4j-2.3.5-19.module+el8.6.0+852+cc16a686.noarch.rpm2}univocity-parsers-2.8.4-3.module+el8.6.0+852+cc16a686.noarch.rpm?xml-commons-apis-1.4.01-31.module+el8.6.0+852+cc16a686.noarch.rpm;fxmlgraphics-commons-2.3-4.module+el8.6.0+852+cc16a686.noarch.rpm=xz-java-1.8-8.module+el8.6.0+852+cc16a686.noarch.rpm<( Y)enhancementnodejs:14 bug fix and enhancement updatebz https://bugzilla.redhat.com/show_bug.cgi?id=18918091891809The following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.15.0).https://errata.rockylinux.org/RLEA-2020:5101RLEA-2020:5101RLEA-2020:5101 /}WCAnodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm:mnodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm/}WCAnodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm:mnodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm>I JsecurityImportant: libexif security update\https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0452CVE-2020-0452CVE-2020-0452https://bugzilla.redhat.com/show_bug.cgi?id=19020041902004https://errata.rockylinux.org/RLSA-2020:5393RLSA-2020:5393RLSA-2020:5393 ~^libexif-0.6.22-5.el8_3.x86_64.rpm~^libexif-0.6.22-5.el8_3.x86_64.rpm?y ZBBBBBBBBBBBUbugfixvirt:rhel bug fix updatebG https://bugzilla.redhat.com/show_bug.cgi?id=18908851890885https://errata.rockylinux.org/RLBA-2020:5494RLBA-2020:5494RLBA-2020:5494 tspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmtspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmkz h_BBbugfixcontainer-tools:rhel8 bug fix update)T https://bugzilla.redhat.com/show_bug.cgi?id=18982041898204* update description and summary for container-tools module for 8.3.0https://errata.rockylinux.org/RLBA-2020:5496RLBA-2020:5496RLBA-2020:5496 pWTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpmpWTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpmq{ hCBFBBBFLBBRBBCBBBBOBBBBbugfixcontainer-tools:2.0 bug fix update}T https://bugzilla.redhat.com/show_bug.cgi?id=18982511898251* update description and summary for container-tools module for 8.3.0https://errata.rockylinux.org/RLBA-2020:5497RLBA-2020:5497RLBA-2020:5497 ~RScockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm1acontainers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmHcontainer-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmLfuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpmhaskopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmwaskopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm~RScockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm1acontainers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmHcontainer-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmLfuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpmhaskopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmwaskopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm| jBFBBBqBBBfBoByBBBBBdBB_bugfixcontainer-tools:1.0 bug fix and enhancement updateQ https://bugzilla.redhat.com/show_bug.cgi?id=18982501898250https://errata.rockylinux.org/RLBA-2020:5498RLBA-2020:5498RLBA-2020:5498  YR 5buildah-1.5-8.gite94b4f9.module+el8.5.0+681+c9a1951f.x86_64.rpm94containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm1containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpmWcontainer-selinux-2.124.0-1.gitf958d0c.module+el8.5.0+681+c9a1951f.noarch.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmLdfuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm#oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm$oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm8Erunc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpmhskopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm+Wslirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.x86_64.rpm YR 5buildah-1.5-8.gite94b4f9.module+el8.5.0+681+c9a1951f.x86_64.rpm94containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm1containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpmWcontainer-selinux-2.124.0-1.gitf958d0c.module+el8.5.0+681+c9a1951f.noarch.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmLdfuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm#oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm$oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm8Erunc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpmhskopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm+Wslirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.x86_64.rpmJ i$securityModerate: nodejs:12 security and bug fix updateP*https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15366CVE-2020-15366CVE-2020-15366https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7608CVE-2020-7608CVE-2020-7608https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7774CVE-2020-7774CVE-2020-7774https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8277CVE-2020-8277CVE-2020-8277https://bugzilla.redhat.com/show_bug.cgi?id=18579771857977https://bugzilla.redhat.com/show_bug.cgi?id=18985541898554https://bugzilla.redhat.com/show_bug.cgi?id=18986801898680https://errata.rockylinux.org/RLSA-2020:5499RLSA-2020:5499RLSA-2020:5499 /ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm/ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpmK LsecurityImportant: mariadb:10.3 security, bug fix, and enhancement updatez.%https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2938CVE-2019-2938CVE-2019-2938https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2974CVE-2019-2974CVE-2019-2974https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13249CVE-2020-13249CVE-2020-13249https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765CVE-2020-14765CVE-2020-14765https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776CVE-2020-14776CVE-2020-14776https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789CVE-2020-14789CVE-2020-14789https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812CVE-2020-14812CVE-2020-14812https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15180CVE-2020-15180CVE-2020-15180https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2574CVE-2020-2574CVE-2020-2574https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2752CVE-2020-2752CVE-2020-2752https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2760CVE-2020-2760CVE-2020-2760https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2780CVE-2020-2780CVE-2020-2780https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2812CVE-2020-2812CVE-2020-2812https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2814CVE-2020-2814CVE-2020-2814https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022CVE-2021-2022CVE-2021-2022https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2144CVE-2021-2144CVE-2021-2144https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2194CVE-2021-2194CVE-2021-2194https://bugzilla.redhat.com/show_bug.cgi?id=17646801764680https://bugzilla.redhat.com/show_bug.cgi?id=17646911764691https://bugzilla.redhat.com/show_bug.cgi?id=17985871798587https://bugzilla.redhat.com/show_bug.cgi?id=18300561830056https://bugzilla.redhat.com/show_bug.cgi?id=18300591830059https://bugzilla.redhat.com/show_bug.cgi?id=18300601830060https://bugzilla.redhat.com/show_bug.cgi?id=18300821830082https://bugzilla.redhat.com/show_bug.cgi?id=18358491835849https://bugzilla.redhat.com/show_bug.cgi?id=18398271839827https://bugzilla.redhat.com/show_bug.cgi?id=18907381890738https://bugzilla.redhat.com/show_bug.cgi?id=18907431890743https://bugzilla.redhat.com/show_bug.cgi?id=18907471890747https://bugzilla.redhat.com/show_bug.cgi?id=18907561890756https://bugzilla.redhat.com/show_bug.cgi?id=18949191894919https://bugzilla.redhat.com/show_bug.cgi?id=18990091899009* FTBFS: -D_GLIBCXX_ASSERTIONShttps://bugzilla.redhat.com/show_bug.cgi?id=18990171899017* Queries with entity_id IN ('1', '2', …, '70000') run much slower in MariaDB 10.3 than on MariaDB 10.1https://bugzilla.redhat.com/show_bug.cgi?id=18990211899021* Cleanup race with wsrep_rsync_sst_tunnel may prevent full galera cluster bootstraphttps://bugzilla.redhat.com/show_bug.cgi?id=18990821899082The following packages have been upgraded to a later upstream version: mariadb (10.3.27), galera (25.3.31). (BZ#1899082, BZ#1899086)https://bugzilla.redhat.com/show_bug.cgi?id=18990861899086https://errata.rockylinux.org/RLSA-2020:5500RLSA-2020:5500RLSA-2020:5500 5W.Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm5W.Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpmL SBBBsecurityModerate: mariadb-connector-c security, bug fix, and enhancement update(X https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13249CVE-2020-13249CVE-2020-13249https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2574CVE-2020-2574CVE-2020-2574https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2752CVE-2020-2752CVE-2020-2752https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2922CVE-2020-2922CVE-2020-2922https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2007CVE-2021-2007CVE-2021-2007https://bugzilla.redhat.com/show_bug.cgi?id=17985871798587https://bugzilla.redhat.com/show_bug.cgi?id=18358491835849https://bugzilla.redhat.com/show_bug.cgi?id=18358501835850https://bugzilla.redhat.com/show_bug.cgi?id=18398271839827https://bugzilla.redhat.com/show_bug.cgi?id=18989931898993The following packages have been upgraded to a later upstream version: mariadb-connector-c (3.1.11).https://bugzilla.redhat.com/show_bug.cgi?id=18990011899001* Code utilizing plugins can't be compiled properlyhttps://bugzilla.redhat.com/show_bug.cgi?id=18990991899099* Replace hard-coded /usr with %{_prefix}https://errata.rockylinux.org/RLSA-2020:5503RLSA-2020:5503RLSA-2020:5503 mariadb-connector-c-3.1.11-2.el8_3.x86_64.rpmqmariadb-connector-c-config-3.1.11-2.el8_3.noarch.rpmmariadb-connector-c-devel-3.1.11-2.el8_3.x86_64.rpmmariadb-connector-c-3.1.11-2.el8_3.x86_64.rpmqmariadb-connector-c-config-3.1.11-2.el8_3.noarch.rpmmariadb-connector-c-devel-3.1.11-2.el8_3.x86_64.rpmM gsecurityImportant: postgresql:12 security update https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14349CVE-2020-14349CVE-2020-14349https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14350CVE-2020-14350CVE-2020-14350https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1720CVE-2020-1720CVE-2020-1720https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694CVE-2020-25694CVE-2020-25694https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695CVE-2020-25695CVE-2020-25695https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25696CVE-2020-25696CVE-2020-25696https://bugzilla.redhat.com/show_bug.cgi?id=17988521798852https://bugzilla.redhat.com/show_bug.cgi?id=18657441865744https://bugzilla.redhat.com/show_bug.cgi?id=18657461865746https://bugzilla.redhat.com/show_bug.cgi?id=18944231894423https://bugzilla.redhat.com/show_bug.cgi?id=18944251894425https://bugzilla.redhat.com/show_bug.cgi?id=18944301894430https://errata.rockylinux.org/RLSA-2020:5620RLSA-2020:5620RLSA-2020:5620 gy% postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpmgy% postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpmN IsecurityImportant: subversion:1.10 security update}https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17525CVE-2020-17525CVE-2020-17525https://bugzilla.redhat.com/show_bug.cgi?id=19223031922303https://errata.rockylinux.org/RLSA-2021:0507RLSA-2021:0507RLSA-2021:0507 xGelibserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpmxGelibserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm O h_BBBBBOBBBBBsecurityModerate: container-tools:rhel8 security, bug fix, and enhancement updateYhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14370CVE-2020-14370CVE-2020-14370https://bugzilla.redhat.com/show_bug.cgi?id=16785461678546https://bugzilla.redhat.com/show_bug.cgi?id=17013591701359https://bugzilla.redhat.com/show_bug.cgi?id=17013611701361https://bugzilla.redhat.com/show_bug.cgi?id=18431681843168https://bugzilla.redhat.com/show_bug.cgi?id=18466291846629https://bugzilla.redhat.com/show_bug.cgi?id=18481501848150https://bugzilla.redhat.com/show_bug.cgi?id=18730641873064https://bugzilla.redhat.com/show_bug.cgi?id=18732041873204https://bugzilla.redhat.com/show_bug.cgi?id=18742681874268https://bugzilla.redhat.com/show_bug.cgi?id=18765761876576https://bugzilla.redhat.com/show_bug.cgi?id=18778651877865https://bugzilla.redhat.com/show_bug.cgi?id=18809871880987https://bugzilla.redhat.com/show_bug.cgi?id=18812181881218https://bugzilla.redhat.com/show_bug.cgi?id=18839451883945https://bugzilla.redhat.com/show_bug.cgi?id=18846681884668https://bugzilla.redhat.com/show_bug.cgi?id=18951051895105https://bugzilla.redhat.com/show_bug.cgi?id=18970121897012https://bugzilla.redhat.com/show_bug.cgi?id=18989111898911https://bugzilla.redhat.com/show_bug.cgi?id=19026731902673https://bugzilla.redhat.com/show_bug.cgi?id=19034121903412https://bugzilla.redhat.com/show_bug.cgi?id=19259281925928https://errata.rockylinux.org/RLSA-2021:0531RLSA-2021:0531RLSA-2021:0531 pW-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm.0python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm2_udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpmpW-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm.0python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm2_udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm-} ZBBBBBBBBBBBUbugfixvirt:rhel bug fix updateq[ https://bugzilla.redhat.com/show_bug.cgi?id=19005781900578* qemu-ga aborts after guest-shutdown commandhttps://bugzilla.redhat.com/show_bug.cgi?id=19138181913818* Report logical_name for disks without mounted file-systemhttps://errata.rockylinux.org/RLBA-2021:0542RLBA-2021:0542RLBA-2021:0542 tspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmtspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmY~ hCBFBBBFLBBRBBCBBBBOBBBBbugfixcontainer-tools:2.0 bug fix updateLB https://bugzilla.redhat.com/show_bug.cgi?id=19132941913294* podman exec is fragile in the presence of signalshttps://errata.rockylinux.org/RLBA-2021:0546RLBA-2021:0546RLBA-2021:0546 ~RScockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm1acontainers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmHcontainer-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmLfuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpmhaskopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpmwaskopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm~RScockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm1acontainers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmHcontainer-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmLfuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpmhaskopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpmwaskopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpmn vBEBbugfixidm:DL1 bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=18959101895910* IPA WebUI inaccessible after upgrading to RHEL 8.3.- idoverride-memberof.js missinghttps://bugzilla.redhat.com/show_bug.cgi?id=19148231914823* ipa-kdb: support subordinate/superior UPN suffixeshttps://errata.rockylinux.org/RLBA-2021:0547RLBA-2021:0547RLBA-2021:0547 2/oq9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm2/oq9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpmvP i$securityModerate: nodejs:10 security update=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15095CVE-2020-15095CVE-2020-15095https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15366CVE-2020-15366CVE-2020-15366https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7608CVE-2020-7608CVE-2020-7608https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7754CVE-2020-7754CVE-2020-7754https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7774CVE-2020-7774CVE-2020-7774https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788CVE-2020-7788CVE-2020-7788https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8116CVE-2020-8116CVE-2020-8116https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8252CVE-2020-8252CVE-2020-8252https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8265CVE-2020-8265CVE-2020-8265https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8287CVE-2020-8287CVE-2020-8287https://bugzilla.redhat.com/show_bug.cgi?id=18400041840004https://bugzilla.redhat.com/show_bug.cgi?id=18568751856875https://bugzilla.redhat.com/show_bug.cgi?id=18579771857977https://bugzilla.redhat.com/show_bug.cgi?id=18681961868196https://bugzilla.redhat.com/show_bug.cgi?id=18793151879315https://bugzilla.redhat.com/show_bug.cgi?id=18924301892430https://bugzilla.redhat.com/show_bug.cgi?id=18986801898680https://bugzilla.redhat.com/show_bug.cgi?id=19074441907444https://bugzilla.redhat.com/show_bug.cgi?id=19128541912854https://bugzilla.redhat.com/show_bug.cgi?id=19128631912863https://errata.rockylinux.org/RLSA-2021:0548RLSA-2021:0548RLSA-2021:0548 /ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm/ATCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpmyQ i1securityModerate: nodejs:12 security updateLShttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3750CVE-2018-3750CVE-2018-3750https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10746CVE-2019-10746CVE-2019-10746https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10747CVE-2019-10747CVE-2019-10747https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7754CVE-2020-7754CVE-2020-7754https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788CVE-2020-7788CVE-2020-7788https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8265CVE-2020-8265CVE-2020-8265https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8287CVE-2020-8287CVE-2020-8287https://bugzilla.redhat.com/show_bug.cgi?id=17954751795475https://bugzilla.redhat.com/show_bug.cgi?id=17954791795479https://bugzilla.redhat.com/show_bug.cgi?id=18924301892430https://bugzilla.redhat.com/show_bug.cgi?id=19074441907444https://bugzilla.redhat.com/show_bug.cgi?id=19128541912854https://bugzilla.redhat.com/show_bug.cgi?id=19128631912863https://errata.rockylinux.org/RLSA-2021:0549RLSA-2021:0549RLSA-2021:0549 /}WCAnodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm/}WCAnodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm|R !Y)securityModerate: nodejs:14 security and bug fix updatejhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15366CVE-2020-15366CVE-2020-15366https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7754CVE-2020-7754CVE-2020-7754https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7774CVE-2020-7774CVE-2020-7774https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788CVE-2020-7788CVE-2020-7788https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8265CVE-2020-8265CVE-2020-8265https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8277CVE-2020-8277CVE-2020-8277https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8287CVE-2020-8287CVE-2020-8287https://bugzilla.redhat.com/show_bug.cgi?id=18579771857977https://bugzilla.redhat.com/show_bug.cgi?id=18924301892430https://bugzilla.redhat.com/show_bug.cgi?id=18985541898554https://bugzilla.redhat.com/show_bug.cgi?id=18986801898680https://bugzilla.redhat.com/show_bug.cgi?id=19074441907444https://bugzilla.redhat.com/show_bug.cgi?id=19128541912854https://bugzilla.redhat.com/show_bug.cgi?id=19128631912863https://errata.rockylinux.org/RLSA-2021:0551RLSA-2021:0551RLSA-2021:0551 /}WCAnodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm:mnodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm/}WCAnodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm:mnodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm~S &bBBsecurityImportant: xterm security update Ohttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27135CVE-2021-27135CVE-2021-27135https://bugzilla.redhat.com/show_bug.cgi?id=19275591927559https://errata.rockylinux.org/RLSA-2021:0611RLSA-2021:0611RLSA-2021:0611 Z1xterm-331-1.el8_3.2.x86_64.rpm[1xterm-resize-331-1.el8_3.2.x86_64.rpmZ1xterm-331-1.el8_3.2.x86_64.rpm[1xterm-resize-331-1.el8_3.2.x86_64.rpmT *jBFBBBqBBBfBoByBBBBBdBB_BlBsecurityImportant: container-tools:1.0 security updateX&https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20188CVE-2021-20188CVE-2021-20188https://bugzilla.redhat.com/show_bug.cgi?id=19157341915734https://errata.rockylinux.org/RLSA-2021:0705RLSA-2021:0705RLSA-2021:0705  YR5buildah-1.5-8.gite94b4f9.module+el8.5.0+681+c9a1951f.x86_64.rpm94containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm1containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpmWcontainer-selinux-2.124.0-1.gitf958d0c.module+el8.5.0+681+c9a1951f.noarch.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmLdfuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm#oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm$oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm +podman-1.0.0-8.git921f98f.module+el8.5.0+681+c9a1951f.x86_64.rpm +podman-docker-1.0.0-8.git921f98f.module+el8.5.0+681+c9a1951f.noarch.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm8Erunc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpmhskopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm+Wslirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.x86_64.rpm YR5buildah-1.5-8.gite94b4f9.module+el8.5.0+681+c9a1951f.x86_64.rpm94containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.5.0+681+c9a1951f.x86_64.rpm1containers-common-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpmWcontainer-selinux-2.124.0-1.gitf958d0c.module+el8.5.0+681+c9a1951f.noarch.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmLdfuse-overlayfs-0.3-5.module+el8.5.0+681+c9a1951f.x86_64.rpm#oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.4.0+557+48ba8b2f.x86_64.rpm$oci-umount-2.3.4-2.git87f9237.module+el8.4.0+557+48ba8b2f.x86_64.rpm +podman-1.0.0-8.git921f98f.module+el8.5.0+681+c9a1951f.x86_64.rpm +podman-docker-1.0.0-8.git921f98f.module+el8.5.0+681+c9a1951f.noarch.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm8Erunc-1.0.0-56.rc5.dev.git2abd837.module+el8.5.0+681+c9a1951f.x86_64.rpmhskopeo-0.1.32-6.git1715c90.module+el8.5.0+681+c9a1951f.x86_64.rpm+Wslirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.5.0+681+c9a1951f.x86_64.rpm U +hCBFBBBFLBBRBBCBBBBOBBBBsecurityImportant: container-tools:2.0 security update~&https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20188CVE-2021-20188CVE-2021-20188https://bugzilla.redhat.com/show_bug.cgi?id=19157341915734https://errata.rockylinux.org/RLSA-2021:0706RLSA-2021:0706RLSA-2021:0706 ~RScockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm1acontainers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmHcontainer-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmLfuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpmhaskopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmwaskopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm~RScockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm1acontainers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmHcontainer-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmLfuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpmhaskopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmwaskopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm"V ,ZBBBBBBBBBBBUsecurityImportant: virt:rhel and virt-devel:rhel security update$phttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35517CVE-2020-35517CVE-2020-35517https://bugzilla.redhat.com/show_bug.cgi?id=19158231915823https://errata.rockylinux.org/RLSA-2021:0711RLSA-2021:0711RLSA-2021:0711 tspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmtspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmMW -i1securityImportant: nodejs:12 security update?https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22883CVE-2021-22883CVE-2021-22883https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22884CVE-2021-22884CVE-2021-22884https://bugzilla.redhat.com/show_bug.cgi?id=19320141932014https://bugzilla.redhat.com/show_bug.cgi?id=19320241932024https://errata.rockylinux.org/RLSA-2021:0734RLSA-2021:0734RLSA-2021:0734 /}WCAnodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm/}WCAnodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpmPX 7idcBBBBBBBsecurityImportant: nodejs:10 security updateS?https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22883CVE-2021-22883CVE-2021-22883https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22884CVE-2021-22884CVE-2021-22884https://bugzilla.redhat.com/show_bug.cgi?id=19320141932014https://bugzilla.redhat.com/show_bug.cgi?id=19320241932024https://errata.rockylinux.org/RLSA-2021:0735RLSA-2021:0735RLSA-2021:0735 /AT/nodejs-10.24.0-1.module+el8.3.0+101+f84c7154.x86_64.rpmnodejs-devel-10.24.0-1.module+el8.3.0+101+f84c7154.x86_64.rpm6nodejs-docs-10.24.0-1.module+el8.3.0+101+f84c7154.noarch.rpmnodejs-full-i18n-10.24.0-1.module+el8.3.0+101+f84c7154.x86_64.rpmCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm%npm-6.14.11-1.10.24.0.1.module+el8.3.0+101+f84c7154.x86_64.rpm/AT/nodejs-10.24.0-1.module+el8.3.0+101+f84c7154.x86_64.rpmnodejs-devel-10.24.0-1.module+el8.3.0+101+f84c7154.x86_64.rpm6nodejs-docs-10.24.0-1.module+el8.3.0+101+f84c7154.noarch.rpmnodejs-full-i18n-10.24.0-1.module+el8.3.0+101+f84c7154.x86_64.rpmCunodejs-nodemon-1.18.3-1.module+el8.3.0+101+f84c7154.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm%npm-6.14.11-1.10.24.0.1.module+el8.3.0+101+f84c7154.x86_64.rpmTY 8Y)securityImportant: nodejs:14 security and bug fix updatehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22883CVE-2021-22883CVE-2021-22883https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22884CVE-2021-22884CVE-2021-22884https://bugzilla.redhat.com/show_bug.cgi?id=19320141932014https://bugzilla.redhat.com/show_bug.cgi?id=19320241932024https://bugzilla.redhat.com/show_bug.cgi?id=19324271932427* Node.js should not be built with "--debug-nghttp2"https://errata.rockylinux.org/RLSA-2021:0744RLSA-2021:0744RLSA-2021:0744 /}WCAnodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm:mnodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm/}WCAnodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm:mnodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpmVZ 9ZBBBBBBBBBBBUsecurityModerate: virt:rhel and virt-devel:rhel security update"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20295CVE-2021-20295CVE-2021-20295https://bugzilla.redhat.com/show_bug.cgi?id=19440751944075https://errata.rockylinux.org/RLSA-2021:1064RLSA-2021:1064RLSA-2021:1064 tspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmtspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm :vBEBbugfixidm:DL1 bug fix update% https://bugzilla.redhat.com/show_bug.cgi?id=19305621930562* IPA krb5kdc crash possible doublefree ipadb_mspac_struct_free finish_process_as_reqhttps://errata.rockylinux.org/RLBA-2021:1083RLBA-2021:1083RLBA-2021:1083 2/oq9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm2/oq9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm [ ;LsecurityImportant: mariadb:10.3 and mariadb-devel:10.3 security update&7https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928CVE-2021-27928CVE-2021-27928https://bugzilla.redhat.com/show_bug.cgi?id=19409091940909https://errata.rockylinux.org/RLSA-2021:1242RLSA-2021:1242RLSA-2021:1242 5W.Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm5W.Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm^ |BBBBBBBBBBBsecurityModerate: sane-backends security update]Yhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12867CVE-2020-12867CVE-2020-12867https://bugzilla.redhat.com/show_bug.cgi?id=18480971848097https://errata.rockylinux.org/RLSA-2021:1744RLSA-2021:1744RLSA-2021:1744 Sasane-backends-1.0.27-22.el8.x86_64.rpmTasane-backends-daemon-1.0.27-22.el8.x86_64.rpmUasane-backends-devel-1.0.27-22.el8.x86_64.rpm!asane-backends-doc-1.0.27-22.el8.noarch.rpmVasane-backends-drivers-cameras-1.0.27-22.el8.x86_64.rpmWasane-backends-drivers-scanners-1.0.27-22.el8.x86_64.rpmXasane-backends-libs-1.0.27-22.el8.x86_64.rpmSasane-backends-1.0.27-22.el8.x86_64.rpmTasane-backends-daemon-1.0.27-22.el8.x86_64.rpmUasane-backends-devel-1.0.27-22.el8.x86_64.rpm!asane-backends-doc-1.0.27-22.el8.noarch.rpmVasane-backends-drivers-cameras-1.0.27-22.el8.x86_64.rpmWasane-backends-drivers-scanners-1.0.27-22.el8.x86_64.rpmXasane-backends-libs-1.0.27-22.el8.x86_64.rpm JBBBBBBBBbugfixgcc-toolset-10 bug fix and enhancement update6 https://bugzilla.redhat.com/show_bug.cgi?id=18788891878889https://errata.rockylinux.org/RLBA-2021:1750RLBA-2021:1750RLBA-2021:1750 %gcc-toolset-10-10.1-0.el8.x86_64.rpm)gcc-toolset-10-build-10.1-0.el8.x86_64.rpmFgcc-toolset-10-perftools-10.1-0.el8.x86_64.rpmGgcc-toolset-10-runtime-10.1-0.el8.x86_64.rpmPgcc-toolset-10-toolchain-10.1-0.el8.x86_64.rpm%gcc-toolset-10-10.1-0.el8.x86_64.rpm)gcc-toolset-10-build-10.1-0.el8.x86_64.rpmFgcc-toolset-10-perftools-10.1-0.el8.x86_64.rpmGgcc-toolset-10-runtime-10.1-0.el8.x86_64.rpmPgcc-toolset-10-toolchain-10.1-0.el8.x86_64.rpm) UBBBenhancementnew module: swig:4.0O https://bugzilla.redhat.com/show_bug.cgi?id=18536391853639This enhancement update adds the swig:4.0 module to Red Hat Enterprise Linux 8.https://bugzilla.redhat.com/show_bug.cgi?id=18705571870557https://errata.rockylinux.org/RLEA-2021:1755RLEA-2021:1755RLEA-2021:1755 /$Py/#swig-4.0.2-3.module+el8.4.0+386+8a292e6f.x86_64.rpmS#swig-doc-4.0.2-3.module+el8.4.0+386+8a292e6f.noarch.rpmT#swig-gdb-4.0.2-3.module+el8.4.0+386+8a292e6f.x86_64.rpm/$Py/#swig-4.0.2-3.module+el8.4.0+386+8a292e6f.x86_64.rpmS#swig-doc-4.0.2-3.module+el8.4.0+386+8a292e6f.noarch.rpmT#swig-gdb-4.0.2-3.module+el8.4.0+386+8a292e6f.x86_64.rpm [BBbugfixlibmpc bug fix and enhancement updated) https://bugzilla.redhat.com/show_bug.cgi?id=18351931835193https://errata.rockylinux.org/RLBA-2021:1760RLBA-2021:1760RLBA-2021:1760 "libmpc-1.1.0-9.1.el8.x86_64.rpm#libmpc-devel-1.1.0-9.1.el8.x86_64.rpm"libmpc-1.1.0-9.1.el8.x86_64.rpm#libmpc-devel-1.1.0-9.1.el8.x86_64.rpm_ fBBBBBBBBBBBBBBBBBBBBBqQBB@^BSBBBBBBBBBBsecurityModerate: python27:2.7 security and bug fix update o https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26116CVE-2020-26116CVE-2020-26116https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26137CVE-2020-26137CVE-2020-26137https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27783CVE-2020-27783CVE-2020-27783https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177CVE-2021-3177CVE-2021-3177https://bugzilla.redhat.com/show_bug.cgi?id=18830141883014https://bugzilla.redhat.com/show_bug.cgi?id=18836321883632https://bugzilla.redhat.com/show_bug.cgi?id=18867541886754https://bugzilla.redhat.com/show_bug.cgi?id=19016331901633https://bugzilla.redhat.com/show_bug.cgi?id=19181681918168https://errata.rockylinux.org/RLSA-2021:1761RLSA-2021:1761RLSA-2021:1761 u9pq"wipython2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm]python2-backports-1.0-16.module+el8.4.0+403+9ae17a31.x86_64.rpmQ]python2-backports-ssl_match_hostname-3.5.0.1-12.module+el8.4.0+403+9ae17a31.noarch.rpmxopython2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm\Upython2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm[Ipython2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm.{python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm/python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm0python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpmy_python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpmzcpython2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm{kpython2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm|bpython2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm}jpython2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm*python2-numpy-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpmR*python2-numpy-doc-1.14.2-16.module+el8.5.0+706+735ec4b3.noarch.rpm*python2-numpy-f2py-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm~`python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpmepython2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpmvapython2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpmfpython2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpmqpython2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpmgpython2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpmlpython2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm]Mpython2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm&python2-requests-2.20.0-3.module+el8.5.0+706+735ec4b3.noarch.rpmnpython2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpmTqpython2-setuptools-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpmdpython2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpmUqpython2-setuptools-wheel-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpmVBpython2-six-1.11.0-6.module+el8.4.0+403+9ae17a31.noarch.rpmF(python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.x86_64.rpmWDpython2-urllib3-1.24.2-3.module+el8.5.0+706+735ec4b3.noarch.rpm3(python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpmu9pq"wipython2-attrs-17.4.0-10.module+el8.5.0+706+735ec4b3.noarch.rpm]python2-backports-1.0-16.module+el8.4.0+403+9ae17a31.x86_64.rpmQ]python2-backports-ssl_match_hostname-3.5.0.1-12.module+el8.4.0+403+9ae17a31.noarch.rpmxopython2-chardet-3.0.4-10.module+el8.5.0+706+735ec4b3.noarch.rpm\Upython2-coverage-4.5.1-4.module+el8.5.0+706+735ec4b3.x86_64.rpm[Ipython2-Cython-0.28.1-7.module+el8.5.0+706+735ec4b3.x86_64.rpm.{python2-dns-1.15.0-10.module+el8.7.0+1062+663ba31c.noarch.rpm/python2-docs-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpm0python2-docs-info-2.7.16-2.module+el8.4.0+403+9ae17a31.noarch.rpmy_python2-docutils-0.14-12.module+el8.4.0+403+9ae17a31.noarch.rpmzcpython2-funcsigs-1.0.2-13.module+el8.4.0+403+9ae17a31.noarch.rpm{kpython2-idna-2.5-7.module+el8.5.0+706+735ec4b3.noarch.rpm|bpython2-ipaddress-1.0.18-6.module+el8.4.0+403+9ae17a31.noarch.rpm}jpython2-mock-2.0.0-13.module+el8.4.0+403+9ae17a31.noarch.rpm*python2-numpy-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpmR*python2-numpy-doc-1.14.2-16.module+el8.5.0+706+735ec4b3.noarch.rpm*python2-numpy-f2py-1.14.2-16.module+el8.5.0+706+735ec4b3.x86_64.rpm~`python2-pluggy-0.6.0-8.module+el8.5.0+706+735ec4b3.noarch.rpmepython2-py-1.5.3-6.module+el8.5.0+706+735ec4b3.noarch.rpmvapython2-PyMySQL-0.8.0-10.module+el8.5.0+706+735ec4b3.noarch.rpmfpython2-pysocks-1.6.8-6.module+el8.5.0+706+735ec4b3.noarch.rpmqpython2-pytest-3.4.2-13.module+el8.5.0+706+735ec4b3.noarch.rpmgpython2-pytest-mock-1.9.0-4.module+el8.4.0+403+9ae17a31.noarch.rpmlpython2-pytz-2017.2-12.module+el8.5.0+706+735ec4b3.noarch.rpm]Mpython2-pyyaml-3.12-16.module+el8.5.0+706+735ec4b3.x86_64.rpm&python2-requests-2.20.0-3.module+el8.5.0+706+735ec4b3.noarch.rpmnpython2-rpm-macros-3-38.module+el8.4.0+403+9ae17a31.noarch.rpmTqpython2-setuptools-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpmdpython2-setuptools_scm-1.15.7-6.module+el8.4.0+403+9ae17a31.noarch.rpmUqpython2-setuptools-wheel-39.0.1-13.module+el8.4.0+403+9ae17a31.noarch.rpmVBpython2-six-1.11.0-6.module+el8.4.0+403+9ae17a31.noarch.rpmF(python2-sqlalchemy-1.3.2-2.module+el8.4.0+403+9ae17a31.x86_64.rpmWDpython2-urllib3-1.24.2-3.module+el8.5.0+706+735ec4b3.noarch.rpm3(python-sqlalchemy-doc-1.3.2-2.module+el8.4.0+403+9ae17a31.noarch.rpm/` !ZBBBBBBBBBBBUsecurityModerate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update|+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11947CVE-2020-11947CVE-2020-11947https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16092CVE-2020-16092CVE-2020-16092https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25637CVE-2020-25637CVE-2020-25637https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25707CVE-2020-25707CVE-2020-25707https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25723CVE-2020-25723CVE-2020-25723https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27821CVE-2020-27821CVE-2020-27821https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28916CVE-2020-28916CVE-2020-28916https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29129CVE-2020-29129CVE-2020-29129https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29130CVE-2020-29130CVE-2020-29130https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29443CVE-2020-29443CVE-2020-29443https://bugzilla.redhat.com/show_bug.cgi?id=13842411384241https://bugzilla.redhat.com/show_bug.cgi?id=17984631798463https://bugzilla.redhat.com/show_bug.cgi?id=18289521828952https://bugzilla.redhat.com/show_bug.cgi?id=18342811834281https://bugzilla.redhat.com/show_bug.cgi?id=18374951837495https://bugzilla.redhat.com/show_bug.cgi?id=18438521843852https://bugzilla.redhat.com/show_bug.cgi?id=18469751846975https://bugzilla.redhat.com/show_bug.cgi?id=18506801850680https://bugzilla.redhat.com/show_bug.cgi?id=18594941859494https://bugzilla.redhat.com/show_bug.cgi?id=18602831860283https://bugzilla.redhat.com/show_bug.cgi?id=18728541872854https://bugzilla.redhat.com/show_bug.cgi?id=18743041874304https://bugzilla.redhat.com/show_bug.cgi?id=18747801874780https://bugzilla.redhat.com/show_bug.cgi?id=18762971876297https://bugzilla.redhat.com/show_bug.cgi?id=18767421876742https://bugzilla.redhat.com/show_bug.cgi?id=18804181880418https://bugzilla.redhat.com/show_bug.cgi?id=18805461880546https://bugzilla.redhat.com/show_bug.cgi?id=18810371881037https://bugzilla.redhat.com/show_bug.cgi?id=18845311884531https://bugzilla.redhat.com/show_bug.cgi?id=18938951893895https://bugzilla.redhat.com/show_bug.cgi?id=18985791898579https://bugzilla.redhat.com/show_bug.cgi?id=19018371901837https://bugzilla.redhat.com/show_bug.cgi?id=19022311902231https://bugzilla.redhat.com/show_bug.cgi?id=19026511902651https://bugzilla.redhat.com/show_bug.cgi?id=19029601902960https://bugzilla.redhat.com/show_bug.cgi?id=19030641903064https://bugzilla.redhat.com/show_bug.cgi?id=19102201910220https://bugzilla.redhat.com/show_bug.cgi?id=19102671910267https://bugzilla.redhat.com/show_bug.cgi?id=19103261910326https://bugzilla.redhat.com/show_bug.cgi?id=19127651912765https://bugzilla.redhat.com/show_bug.cgi?id=19174461917446https://bugzilla.redhat.com/show_bug.cgi?id=19187081918708https://errata.rockylinux.org/RLSA-2021:1762RLSA-2021:1762RLSA-2021:1762 tspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmtspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm] 5bBBBBBBBBBBBBBBBBBbugfixbrltty bug fix and enhancement update) https://bugzilla.redhat.com/show_bug.cgi?id=17656111765611https://bugzilla.redhat.com/show_bug.cgi?id=18549051854905https://bugzilla.redhat.com/show_bug.cgi?id=18896361889636https://errata.rockylinux.org/RLBA-2021:1765RLBA-2021:1765RLBA-2021:1765 Bbrlapi-0.6.7-32.el8.x86_64.rpm!Fbrltty-5.6-32.el8.x86_64.rpm Bbrlapi-java-0.6.7-32.el8.x86_64.rpm"Fbrltty-at-spi2-5.6-32.el8.x86_64.rpmFbrltty-docs-5.6-32.el8.noarch.rpm#Fbrltty-dracut-5.6-32.el8.x86_64.rpm$Fbrltty-espeak-ng-5.6-32.el8.x86_64.rpm%Fbrltty-xw-5.6-32.el8.x86_64.rpmNBpython3-brlapi-0.6.7-32.el8.x86_64.rpmBtcl-brlapi-0.6.7-32.el8.x86_64.rpm Bbrlapi-0.6.7-32.el8.x86_64.rpm!Fbrltty-5.6-32.el8.x86_64.rpm Bbrlapi-java-0.6.7-32.el8.x86_64.rpm"Fbrltty-at-spi2-5.6-32.el8.x86_64.rpmFbrltty-docs-5.6-32.el8.noarch.rpm#Fbrltty-dracut-5.6-32.el8.x86_64.rpm$Fbrltty-espeak-ng-5.6-32.el8.x86_64.rpm%Fbrltty-xw-5.6-32.el8.x86_64.rpmNBpython3-brlapi-0.6.7-32.el8.x86_64.rpmBtcl-brlapi-0.6.7-32.el8.x86_64.rpm^a 6~lBBBBBBBBBBBBBBBBBBBBBBBBBxB@BBjsecurityModerate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update<\https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1695CVE-2020-1695CVE-2020-1695https://bugzilla.redhat.com/show_bug.cgi?id=15845501584550https://bugzilla.redhat.com/show_bug.cgi?id=15909421590942https://bugzilla.redhat.com/show_bug.cgi?id=16567721656772https://bugzilla.redhat.com/show_bug.cgi?id=16644351664435https://bugzilla.redhat.com/show_bug.cgi?id=17304621730462https://bugzilla.redhat.com/show_bug.cgi?id=17871151787115https://bugzilla.redhat.com/show_bug.cgi?id=18434161843416https://bugzilla.redhat.com/show_bug.cgi?id=18682331868233https://bugzilla.redhat.com/show_bug.cgi?id=18755631875563https://bugzilla.redhat.com/show_bug.cgi?id=18836561883656https://bugzilla.redhat.com/show_bug.cgi?id=18839961883996https://bugzilla.redhat.com/show_bug.cgi?id=18896911889691https://bugzilla.redhat.com/show_bug.cgi?id=18906391890639https://bugzilla.redhat.com/show_bug.cgi?id=18915771891577https://bugzilla.redhat.com/show_bug.cgi?id=18971201897120https://bugzilla.redhat.com/show_bug.cgi?id=19085411908541https://bugzilla.redhat.com/show_bug.cgi?id=19124181912418https://bugzilla.redhat.com/show_bug.cgi?id=19124931912493https://bugzilla.redhat.com/show_bug.cgi?id=19166861916686https://bugzilla.redhat.com/show_bug.cgi?id=19192821919282https://bugzilla.redhat.com/show_bug.cgi?id=19290671929067https://bugzilla.redhat.com/show_bug.cgi?id=19328031932803https://errata.rockylinux.org/RLSA-2021:1775RLSA-2021:1775RLSA-2021:1775 <*  #"apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm$apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm`^apache-commons-net-3.6-3.module+el8.3.0+53+ea062990.noarch.rpm%bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm'glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm(glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm)wglassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm*wglassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm+wglassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm.vjackson-annotations-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm/vjackson-core-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm0vjackson-databind-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpmjackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpmjackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm, jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm-jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm.njavassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm/njavassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm <python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm <python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm5!relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm+Vresteasy-3.0.26-6.module+el8.5.0+697+f586bb30.noarch.rpmm.slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm6.slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm7stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm8velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm9xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm:xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm?xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm;xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm<xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm=xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm<*  #"apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm$apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm`^apache-commons-net-3.6-3.module+el8.3.0+53+ea062990.noarch.rpm%bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm'glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm(glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm)wglassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm*wglassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm+wglassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm.vjackson-annotations-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm/vjackson-core-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm0vjackson-databind-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpmjackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpmjackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm, jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm-jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm.njavassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm/njavassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm <python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm <python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm5!relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm+Vresteasy-3.0.26-6.module+el8.5.0+697+f586bb30.noarch.rpmm.slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm6.slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm7stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm8velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm9xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm:xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm?xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm;xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm<xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm=xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpmw* ;wBBenhancementlibreoffice bug fix and enhancement update) https://bugzilla.redhat.com/show_bug.cgi?id=18705011870501https://bugzilla.redhat.com/show_bug.cgi?id=18742341874234https://bugzilla.redhat.com/show_bug.cgi?id=18782751878275https://bugzilla.redhat.com/show_bug.cgi?id=18811211881121https://bugzilla.redhat.com/show_bug.cgi?id=18811321881132https://bugzilla.redhat.com/show_bug.cgi?id=18898011889801https://bugzilla.redhat.com/show_bug.cgi?id=19246191924619https://errata.rockylinux.org/RLEA-2021:1779RLEA-2021:1779RLEA-2021:1779 (wlibnumbertext-1.0.6-2.el8.x86_64.rpm,3liborcus-0.15.4-2.el8.x86_64.rpm(wlibnumbertext-1.0.6-2.el8.x86_64.rpm,3liborcus-0.15.4-2.el8.x86_64.rpmxb >|securityModerate: gssdp and gupnp security updateAKhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12695CVE-2020-12695CVE-2020-12695https://bugzilla.redhat.com/show_bug.cgi?id=18460061846006https://errata.rockylinux.org/RLSA-2021:1789RLSA-2021:1789RLSA-2021:1789 :gssdp-1.0.5-1.el8.x86_64.rpm:gssdp-1.0.5-1.el8.x86_64.rpmx  bugfixibus-libpinyin bug fix and enhancement update ) https://bugzilla.redhat.com/show_bug.cgi?id=18577501857750https://errata.rockylinux.org/RLBA-2021:1790RLBA-2021:1790RLBA-2021:1790 7ibus-libpinyin-1.10.0-2.el8.x86_64.rpm7ibus-libpinyin-1.10.0-2.el8.x86_64.rpmy  bugfixpyOpenSSL bug fix and enhancement update5) https://errata.rockylinux.org/RLBA-2021:1793RLBA-2021:1793RLBA-2021:1793 `python3-pyOpenSSL-19.0.0-1.el8.noarch.rpm`python3-pyOpenSSL-19.0.0-1.el8.noarch.rpmzc FBBBBBOBBBBBLBRJWsecurityModerate: container-tools:rhel8 security, bug fix, and enhancement update^*%https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29652CVE-2020-29652CVE-2020-29652https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20199CVE-2021-20199CVE-2021-20199https://bugzilla.redhat.com/show_bug.cgi?id=17070781707078https://bugzilla.redhat.com/show_bug.cgi?id=17249461724946https://bugzilla.redhat.com/show_bug.cgi?id=17264421726442https://bugzilla.redhat.com/show_bug.cgi?id=17630071763007https://bugzilla.redhat.com/show_bug.cgi?id=17700371770037https://bugzilla.redhat.com/show_bug.cgi?id=17982781798278https://bugzilla.redhat.com/show_bug.cgi?id=18117731811773https://bugzilla.redhat.com/show_bug.cgi?id=18382331838233https://bugzilla.redhat.com/show_bug.cgi?id=18414851841485https://bugzilla.redhat.com/show_bug.cgi?id=18441991844199https://bugzilla.redhat.com/show_bug.cgi?id=18534551853455https://bugzilla.redhat.com/show_bug.cgi?id=18601761860176https://bugzilla.redhat.com/show_bug.cgi?id=18678921867892https://bugzilla.redhat.com/show_bug.cgi?id=18818941881894https://bugzilla.redhat.com/show_bug.cgi?id=18972821897282https://bugzilla.redhat.com/show_bug.cgi?id=18975941897594https://bugzilla.redhat.com/show_bug.cgi?id=19029791902979https://bugzilla.redhat.com/show_bug.cgi?id=19038131903813https://bugzilla.redhat.com/show_bug.cgi?id=19045491904549https://bugzilla.redhat.com/show_bug.cgi?id=19088831908883https://bugzilla.redhat.com/show_bug.cgi?id=19153831915383https://bugzilla.redhat.com/show_bug.cgi?id=19185541918554https://bugzilla.redhat.com/show_bug.cgi?id=19190501919050https://bugzilla.redhat.com/show_bug.cgi?id=19211281921128https://bugzilla.redhat.com/show_bug.cgi?id=19239861923986https://bugzilla.redhat.com/show_bug.cgi?id=19241461924146https://bugzilla.redhat.com/show_bug.cgi?id=19315451931545https://bugzilla.redhat.com/show_bug.cgi?id=19317851931785https://bugzilla.redhat.com/show_bug.cgi?id=19320831932083https://bugzilla.redhat.com/show_bug.cgi?id=19353761935376https://bugzilla.redhat.com/show_bug.cgi?id=19359221935922https://bugzilla.redhat.com/show_bug.cgi?id=19369271936927https://bugzilla.redhat.com/show_bug.cgi?id=19374871937487https://bugzilla.redhat.com/show_bug.cgi?id=19382341938234https://errata.rockylinux.org/RLSA-2021:1796RLSA-2021:1796RLSA-2021:1796 pW Scockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm9containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmL fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm.0python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm2_udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpmpW Scockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm9containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmL fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm.0python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm2_udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm   EBBbugfixtelnet bug fix and enhancement update) https://bugzilla.redhat.com/show_bug.cgi?id=18813351881335https://bugzilla.redhat.com/show_bug.cgi?id=18953871895387https://errata.rockylinux.org/RLBA-2021:1799RLBA-2021:1799RLBA-2021:1799 Ttelnet-0.17-76.el8.x86_64.rpmTtelnet-server-0.17-76.el8.x86_64.rpmTtelnet-0.17-76.el8.x86_64.rpmTtelnet-server-0.17-76.el8.x86_64.rpm   Jbugfixlibgpod bug fix and enhancement update1) https://bugzilla.redhat.com/show_bug.cgi?id=16572641657264https://errata.rockylinux.org/RLBA-2021:1801RLBA-2021:1801RLBA-2021:1801 elibgpod-0.8.3-24.el8.x86_64.rpmelibgpod-0.8.3-24.el8.x86_64.rpm   MBBbugfixgnome-bluetooth bug fix and enhancement updateZ) https://errata.rockylinux.org/RLBA-2021:1802RLBA-2021:1802RLBA-2021:1802 |dgnome-bluetooth-3.34.3-1.el8.x86_64.rpm}dgnome-bluetooth-libs-3.34.3-1.el8.x86_64.rpm|dgnome-bluetooth-3.34.3-1.el8.x86_64.rpm}dgnome-bluetooth-libs-3.34.3-1.el8.x86_64.rpmd RsecurityModerate: userspace graphics, xorg-x11, and mesa security, bug fix, and enhancement update% https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344CVE-2020-14344CVE-2020-14344https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345CVE-2020-14345CVE-2020-14345https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346CVE-2020-14346CVE-2020-14346https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347CVE-2020-14347CVE-2020-14347https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360CVE-2020-14360CVE-2020-14360https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361CVE-2020-14361CVE-2020-14361https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362CVE-2020-14362CVE-2020-14362https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363CVE-2020-14363CVE-2020-14363https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712CVE-2020-25712CVE-2020-25712https://bugzilla.redhat.com/show_bug.cgi?id=18261411826141https://bugzilla.redhat.com/show_bug.cgi?id=18549201854920https://bugzilla.redhat.com/show_bug.cgi?id=18567381856738https://bugzilla.redhat.com/show_bug.cgi?id=18622411862241https://bugzilla.redhat.com/show_bug.cgi?id=18622461862246https://bugzilla.redhat.com/show_bug.cgi?id=18622551862255https://bugzilla.redhat.com/show_bug.cgi?id=18622581862258https://bugzilla.redhat.com/show_bug.cgi?id=18631421863142https://bugzilla.redhat.com/show_bug.cgi?id=18691391869139https://bugzilla.redhat.com/show_bug.cgi?id=18691421869142https://bugzilla.redhat.com/show_bug.cgi?id=18691441869144https://bugzilla.redhat.com/show_bug.cgi?id=18724731872473https://bugzilla.redhat.com/show_bug.cgi?id=18781601878160The following packages have been upgraded to a later upstream version: egl-wayland (1.1.5), libdrm (2.4.103), libglvnd (1.3.2), libinput (1.16.3), libwacom (1.6), mesa (20.3.3), xorg-x11-server (1.20.10). (BZ#1878160, BZ#1886648, BZ#1887654, BZ#1887655)https://bugzilla.redhat.com/show_bug.cgi?id=18866441886644https://bugzilla.redhat.com/show_bug.cgi?id=18866481886648https://bugzilla.redhat.com/show_bug.cgi?id=18872761887276https://bugzilla.redhat.com/show_bug.cgi?id=18876541887654https://bugzilla.redhat.com/show_bug.cgi?id=18876551887655https://bugzilla.redhat.com/show_bug.cgi?id=18918711891871https://bugzilla.redhat.com/show_bug.cgi?id=18964421896442https://bugzilla.redhat.com/show_bug.cgi?id=18974391897439https://bugzilla.redhat.com/show_bug.cgi?id=19144111914411https://errata.rockylinux.org/RLSA-2021:1804RLSA-2021:1804RLSA-2021:1804 Pxorg-x11-drivers-7.7-30.el8.x86_64.rpmPxorg-x11-drivers-7.7-30.el8.x86_64.rpm UBBbugfixgcc-toolset-10-dyninst bug fix and enhancement update( https://bugzilla.redhat.com/show_bug.cgi?id=18920071892007https://errata.rockylinux.org/RLBA-2021:1807RLBA-2021:1807RLBA-2021:1807 +@gcc-toolset-10-dyninst-10.2.1-2.el8.x86_64.rpm,@gcc-toolset-10-dyninst-devel-10.2.1-2.el8.x86_64.rpm+@gcc-toolset-10-dyninst-10.2.1-2.el8.x86_64.rpm,@gcc-toolset-10-dyninst-devel-10.2.1-2.el8.x86_64.rpme BsecurityModerate: httpd:2.4 security, bug fix, and enhancement updateA https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17199CVE-2018-17199CVE-2018-17199https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11984CVE-2020-11984CVE-2020-11984https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11993CVE-2020-11993CVE-2020-11993https://bugzilla.redhat.com/show_bug.cgi?id=16513761651376https://bugzilla.redhat.com/show_bug.cgi?id=16684931668493https://bugzilla.redhat.com/show_bug.cgi?id=16801181680118https://bugzilla.redhat.com/show_bug.cgi?id=18475851847585https://bugzilla.redhat.com/show_bug.cgi?id=18665631866563https://bugzilla.redhat.com/show_bug.cgi?id=18665641866564https://bugzilla.redhat.com/show_bug.cgi?id=18728281872828https://bugzilla.redhat.com/show_bug.cgi?id=18758441875844https://bugzilla.redhat.com/show_bug.cgi?id=18915941891594https://bugzilla.redhat.com/show_bug.cgi?id=18918291891829https://bugzilla.redhat.com/show_bug.cgi?id=19187411918741https://errata.rockylinux.org/RLSA-2021:1809RLSA-2021:1809RLSA-2021:1809 [Xrkmod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm[Xrkmod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm+ enhancementmicropipenv bug fix and enhancement updateM) https://errata.rockylinux.org/RLEA-2021:1810RLEA-2021:1810RLEA-2021:1810 s#micropipenv-1.0.2-1.el8.noarch.rpms#micropipenv-1.0.2-1.el8.noarch.rpmf ]securityModerate: libvncserver security updatev https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247CVE-2018-21247CVE-2018-21247https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20839CVE-2019-20839CVE-2019-20839https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14397CVE-2020-14397CVE-2020-14397https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14405CVE-2020-14405CVE-2020-14405https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25708CVE-2020-25708CVE-2020-25708https://bugzilla.redhat.com/show_bug.cgi?id=18498771849877https://bugzilla.redhat.com/show_bug.cgi?id=18498861849886https://bugzilla.redhat.com/show_bug.cgi?id=18603251860325https://bugzilla.redhat.com/show_bug.cgi?id=18603441860344https://bugzilla.redhat.com/show_bug.cgi?id=18967391896739https://errata.rockylinux.org/RLSA-2021:1811RLSA-2021:1811RLSA-2021:1811 oglibvncserver-0.9.11-17.el8.x86_64.rpmoglibvncserver-0.9.11-17.el8.x86_64.rpm, Ienhancementnew module: subversion:1.14* https://bugzilla.redhat.com/show_bug.cgi?id=18449471844947This enhancement update adds the subversion:1.14 module to Red Hat Enterprise Linux 8.https://errata.rockylinux.org/RLEA-2021:1813RLEA-2021:1813RLEA-2021:1813 xGelibserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpmxGelibserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpm- "!enhancementperl-IO-String bug fix and enhancement update9) https://errata.rockylinux.org/RLEA-2021:1816RLEA-2021:1816RLEA-2021:1816 3perl-IO-String-1.08-32.el8.noarch.rpm3perl-IO-String-1.08-32.el8.noarch.rpm 1cBBBBBBBBBBBBbugfixspice-gtk bug fix and enhancement updateb) https://bugzilla.redhat.com/show_bug.cgi?id=14186631418663https://bugzilla.redhat.com/show_bug.cgi?id=18391041839104https://bugzilla.redhat.com/show_bug.cgi?id=18675641867564https://bugzilla.redhat.com/show_bug.cgi?id=18747401874740https://errata.rockylinux.org/RLBA-2021:1821RLBA-2021:1821RLBA-2021:1821 r2spice-glib-0.38-6.el8.x86_64.rpms2spice-glib-devel-0.38-6.el8.x86_64.rpmt2spice-gtk-0.38-6.el8.x86_64.rpmv2spice-gtk3-0.38-6.el8.x86_64.rpmw2spice-gtk3-devel-0.38-6.el8.x86_64.rpmx2spice-gtk3-vala-0.38-6.el8.x86_64.rpmu2spice-gtk-tools-0.38-6.el8.x86_64.rpmr2spice-glib-0.38-6.el8.x86_64.rpms2spice-glib-devel-0.38-6.el8.x86_64.rpmt2spice-gtk-0.38-6.el8.x86_64.rpmv2spice-gtk3-0.38-6.el8.x86_64.rpmw2spice-gtk3-devel-0.38-6.el8.x86_64.rpmx2spice-gtk3-vala-0.38-6.el8.x86_64.rpmu2spice-gtk-tools-0.38-6.el8.x86_64.rpm 4rbugfixperl-Time-HiRes bug fix and enhancement update ) https://bugzilla.redhat.com/show_bug.cgi?id=18958521895852https://errata.rockylinux.org/RLBA-2021:1822RLBA-2021:1822RLBA-2021:1822 8tperl-Time-HiRes-1.9758-2.el8.x86_64.rpm8tperl-Time-HiRes-1.9758-2.el8.x86_64.rpm. 7uenhancementgcc-toolset-10-strace bug fix and enhancement update4 https://bugzilla.redhat.com/show_bug.cgi?id=17908361790836https://errata.rockylinux.org/RLEA-2021:1831RLEA-2021:1831RLEA-2021:1831 Hgcc-toolset-10-strace-5.7-2.el8.x86_64.rpmHgcc-toolset-10-strace-5.7-2.el8.x86_64.rpm/ 3raptor2-2.0.15-16.el8.x86_64.rpm>3raptor2-2.0.15-16.el8.x86_64.rpm ]bugfixsblim-sfcb bug fix and enhancement updates) https://bugzilla.redhat.com/show_bug.cgi?id=18549911854991https://errata.rockylinux.org/RLBA-2021:1845RLBA-2021:1845RLBA-2021:1845 `@sblim-sfcb-1.4.9-17.el8.x86_64.rpm`@sblim-sfcb-1.4.9-17.el8.x86_64.rpmh vBEBTNBBBBsecurityModerate: idm:DL1 and idm:client security, bug fix, and enhancement update<6https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/show_bug.cgi?id=13404631340463https://bugzilla.redhat.com/show_bug.cgi?id=13574951357495https://bugzilla.redhat.com/show_bug.cgi?id=14840881484088https://bugzilla.redhat.com/show_bug.cgi?id=15427371542737https://bugzilla.redhat.com/show_bug.cgi?id=15443791544379https://bugzilla.redhat.com/show_bug.cgi?id=16608771660877https://bugzilla.redhat.com/show_bug.cgi?id=17799811779981https://bugzilla.redhat.com/show_bug.cgi?id=17803281780328https://bugzilla.redhat.com/show_bug.cgi?id=17805101780510https://bugzilla.redhat.com/show_bug.cgi?id=17807821780782https://bugzilla.redhat.com/show_bug.cgi?id=17846571784657https://bugzilla.redhat.com/show_bug.cgi?id=18092151809215https://bugzilla.redhat.com/show_bug.cgi?id=18101481810148https://bugzilla.redhat.com/show_bug.cgi?id=18128711812871https://bugzilla.redhat.com/show_bug.cgi?id=18241931824193https://bugzilla.redhat.com/show_bug.cgi?id=18500041850004https://bugzilla.redhat.com/show_bug.cgi?id=18518351851835https://bugzilla.redhat.com/show_bug.cgi?id=18572721857272https://bugzilla.redhat.com/show_bug.cgi?id=18601291860129https://bugzilla.redhat.com/show_bug.cgi?id=18665581866558https://bugzilla.redhat.com/show_bug.cgi?id=18726031872603https://bugzilla.redhat.com/show_bug.cgi?id=18750011875001https://bugzilla.redhat.com/show_bug.cgi?id=18823401882340https://bugzilla.redhat.com/show_bug.cgi?id=18910561891056https://bugzilla.redhat.com/show_bug.cgi?id=18915051891505https://bugzilla.redhat.com/show_bug.cgi?id=18917351891735https://bugzilla.redhat.com/show_bug.cgi?id=18917411891741https://bugzilla.redhat.com/show_bug.cgi?id=18918321891832https://bugzilla.redhat.com/show_bug.cgi?id=18918501891850https://bugzilla.redhat.com/show_bug.cgi?id=18948001894800https://bugzilla.redhat.com/show_bug.cgi?id=19010681901068https://bugzilla.redhat.com/show_bug.cgi?id=19021731902173https://bugzilla.redhat.com/show_bug.cgi?id=19027271902727https://bugzilla.redhat.com/show_bug.cgi?id=19030251903025https://bugzilla.redhat.com/show_bug.cgi?id=19044841904484https://bugzilla.redhat.com/show_bug.cgi?id=19046121904612https://bugzilla.redhat.com/show_bug.cgi?id=19059191905919https://bugzilla.redhat.com/show_bug.cgi?id=19098761909876https://bugzilla.redhat.com/show_bug.cgi?id=19128451912845https://bugzilla.redhat.com/show_bug.cgi?id=19229551922955https://bugzilla.redhat.com/show_bug.cgi?id=19239001923900https://bugzilla.redhat.com/show_bug.cgi?id=19240261924026https://bugzilla.redhat.com/show_bug.cgi?id=19245011924501https://bugzilla.redhat.com/show_bug.cgi?id=19248121924812https://bugzilla.redhat.com/show_bug.cgi?id=19254101925410https://bugzilla.redhat.com/show_bug.cgi?id=19266991926699https://bugzilla.redhat.com/show_bug.cgi?id=19269101926910https://bugzilla.redhat.com/show_bug.cgi?id=19289001928900https://bugzilla.redhat.com/show_bug.cgi?id=19304261930426https://bugzilla.redhat.com/show_bug.cgi?id=19322891932289https://bugzilla.redhat.com/show_bug.cgi?id=19393711939371https://bugzilla.redhat.com/show_bug.cgi?id=871208871208https://errata.rockylinux.org/RLSA-2021:1846RLSA-2021:1846RLSA-2021:1846 2/oq9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm7opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm9softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm:softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm2/oq9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm7opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm9softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm:softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm- #abugfixdconf bug fix and enhancement updateX) https://bugzilla.redhat.com/show_bug.cgi?id=18797221879722https://errata.rockylinux.org/RLBA-2021:1848RLBA-2021:1848RLBA-2021:1848 OBdconf-0.28.0-4.el8.x86_64.rpmOBdconf-0.28.0-4.el8.x86_64.rpm.1 &denhancementjbig2dec bug fix and enhancement update) https://bugzilla.redhat.com/show_bug.cgi?id=18860111886011https://errata.rockylinux.org/RLEA-2021:1850RLEA-2021:1850RLEA-2021:1850 J4jbig2dec-libs-0.16-1.el8.x86_64.rpmJ4jbig2dec-libs-0.16-1.el8.x86_64.rpm. -gBBBBbugfixsendmail bug fix and enhancement update*) https://bugzilla.redhat.com/show_bug.cgi?id=17308041730804https://bugzilla.redhat.com/show_bug.cgi?id=18680411868041https://errata.rockylinux.org/RLBA-2021:1858RLBA-2021:1858RLBA-2021:1858 gasendmail-8.15.2-34.el8.x86_64.rpm$asendmail-cf-8.15.2-34.el8.noarch.rpm%asendmail-doc-8.15.2-34.el8.noarch.rpmhasendmail-milter-8.15.2-34.el8.x86_64.rpmgasendmail-8.15.2-34.el8.x86_64.rpm$asendmail-cf-8.15.2-34.el8.noarch.rpm%asendmail-doc-8.15.2-34.el8.noarch.rpmhasendmail-milter-8.15.2-34.el8.x86_64.rpm/2 0nenhancementpyodbc bug fix and enhancement updateS) https://errata.rockylinux.org/RLEA-2021:1861RLEA-2021:1861RLEA-2021:1861 e^python3-pyodbc-4.0.30-2.el8.x86_64.rpme^python3-pyodbc-4.0.30-2.el8.x86_64.rpm0 4qBbugfixicedtea-web bug fix and enhancement update|^ https://bugzilla.redhat.com/show_bug.cgi?id=18886331888633https://bugzilla.redhat.com/show_bug.cgi?id=19000431900043https://errata.rockylinux.org/RLBA-2021:1863RLBA-2021:1863RLBA-2021:1863 8Bicedtea-web-1.8.4-4.el8.x86_64.rpmABicedtea-web-javadoc-1.8.4-4.el8.noarch.rpm8Bicedtea-web-1.8.4-4.el8.x86_64.rpmABicedtea-web-javadoc-1.8.4-4.el8.noarch.rpm0 65bugfixtargetcli bug fix and enhancement updateZ) https://bugzilla.redhat.com/show_bug.cgi?id=18898221889822https://errata.rockylinux.org/RLBA-2021:1867RLBA-2021:1867RLBA-2021:1867 /Ttargetcli-2.1.53-2.el8.noarch.rpm/Ttargetcli-2.1.53-2.el8.noarch.rpm13 7gB^enhancementnew module: postgresql:13% https://errata.rockylinux.org/RLEA-2021:1869RLEA-2021:1869RLEA-2021:1869 gy8Qpgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm% postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpmgy8Qpgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm% postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm5 wSDBBBDFBBBBFBBBBBFBBBDBBBBeBBJBBHDBBBBBBBBBBHBBBHHBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBJBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBCBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbugfixperl:5.30 bug fix and enhancement update( https://bugzilla.redhat.com/show_bug.cgi?id=19036311903631https://errata.rockylinux.org/RLBA-2021:1871RLBA-2021:1871RLBA-2021:1871 ]txs]iperl-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm7Cperl-Algorithm-Diff-1.1903-10.module+el8.6.0+878+f93dfff7.noarch.rpm3Uperl-Archive-Tar-2.32-440.module+el8.6.0+878+f93dfff7.noarch.rpm4Dperl-Archive-Zip-1.67-1.module+el8.6.0+878+f93dfff7.noarch.rpm +perl-Attribute-Handlers-1.01-452.module+el8.6.0+878+f93dfff7.noarch.rpmvNperl-autodie-2.29-1001.module+el8.6.0+878+f93dfff7.noarch.rpmw'perl-bignum-0.51-439.module+el8.6.0+878+f93dfff7.noarch.rpmC?perl-Carp-1.50-439.module+el8.6.0+878+f93dfff7.noarch.rpmDzperl-Compress-Bzip2-2.26-7.module+el8.6.0+878+f93dfff7.x86_64.rpmEperl-Compress-Raw-Bzip2-2.093-1.module+el8.6.0+878+f93dfff7.x86_64.rpmFperl-Compress-Raw-Zlib-2.093-1.module+el8.6.0+878+f93dfff7.x86_64.rpmG$perl-Config-Perl-V-0.32-441.module+el8.6.0+878+f93dfff7.noarch.rpmMFperl-constant-1.33-1001.module+el8.6.0+878+f93dfff7.noarch.rpm5Tperl-CPAN-2.27-2.module+el8.6.0+878+f93dfff7.noarch.rpm perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm8Qperl-CPAN-Meta-2.150010-397.module+el8.6.0+878+f93dfff7.noarch.rpm9Pperl-CPAN-Meta-Requirements-2.140-397.module+el8.6.0+878+f93dfff7.noarch.rpm:7perl-CPAN-Meta-YAML-0.018-1001.module+el8.6.0+878+f93dfff7.noarch.rpmIvperl-Data-Dumper-2.174-440.module+el8.6.0+878+f93dfff7.x86_64.rpm;9perl-Data-OptList-0.110-7.module+el8.6.0+878+f93dfff7.noarch.rpmJ"perl-Data-Section-0.200007-8.module+el8.6.0+878+f93dfff7.noarch.rpmH]perl-DB_File-1.852-4.module+el8.6.0+878+f93dfff7.x86_64.rpm:iperl-devel-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm5*perl-Devel-Peek-1.28-452.module+el8.6.0+878+f93dfff7.x86_64.rpmK perl-Devel-PPPort-3.56-1.module+el8.6.0+878+f93dfff7.x86_64.rpm!2perl-Devel-SelfStubber-1.06-452.module+el8.6.0+878+f93dfff7.noarch.rpmLperl-Devel-Size-0.83-3.module+el8.6.0+878+f93dfff7.x86_64.rpmMOperl-Digest-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpmN perl-Digest-MD5-2.55-397.module+el8.6.0+878+f93dfff7.x86_64.rpmOjperl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.x86_64.rpmPgperl-Encode-3.01-439.module+el8.6.0+878+f93dfff7.x86_64.rpmQgperl-Encode-devel-3.01-439.module+el8.6.0+878+f93dfff7.x86_64.rpmxperl-encoding-2.22-439.module+el8.6.0+878+f93dfff7.x86_64.rpm<@perl-Env-1.04-396.module+el8.6.0+878+f93dfff7.noarch.rpmV3perl-Errno-1.30-452.module+el8.6.0+878+f93dfff7.x86_64.rpmJ*perl-experimental-0.020-439.module+el8.6.0+878+f93dfff7.noarch.rpm6fperl-Exporter-5.73-440.module+el8.6.0+878+f93dfff7.noarch.rpm7Iperl-ExtUtils-CBuilder-0.280231-439.module+el8.6.0+878+f93dfff7.noarch.rpm8perl-ExtUtils-Command-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm"{perl-ExtUtils-Embed-1.35-452.module+el8.6.0+878+f93dfff7.noarch.rpm9Sperl-ExtUtils-Install-2.14-440.module+el8.6.0+878+f93dfff7.noarch.rpm;perl-ExtUtils-MakeMaker-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm0perl-Filter-Simple-0.95-439.module+el8.6.0+878+f93dfff7.noarch.rpm9perl-generators-1.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm?Lperl-Getopt-Long-2.51-1.module+el8.6.0+878+f93dfff7.noarch.rpmyUperl-homedir-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm@+perl-HTTP-Tiny-0.076-439.module+el8.6.0+878+f93dfff7.noarch.rpmperl-Importer-0.025-6.module+el8.6.0+878+f93dfff7.noarch.rpmNVperl-inc-latest-0.500-10.module+el8.6.0+878+f93dfff7.noarch.rpm`iperl-interpreter-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpmXAperl-IO-1.40-452.module+el8.6.0+878+f93dfff7.x86_64.rpmAperl-IO-Compress-2.093-1.module+el8.6.0+878+f93dfff7.noarch.rpmX%perl-IO-Socket-IP-0.39-6.module+el8.6.0+878+f93dfff7.noarch.rpm>4perl-IO-Zlib-1.10-452.module+el8.6.0+878+f93dfff7.noarch.rpmYUperl-IPC-Cmd-1.04-2.module+el8.6.0+878+f93dfff7.noarch.rpm[:perl-IPC-System-Simple-1.25-18.module+el8.6.0+878+f93dfff7.noarch.rpmZlperl-IPC-SysV-2.07-398.module+el8.6.0+878+f93dfff7.x86_64.rpm\Iperl-JSON-PP-4.04-2.module+el8.6.0+878+f93dfff7.noarch.rpmzWperl-libnet-3.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm+iperl-libnetcfg-5.30.1-452.module+el8.6.0+878+f93dfff7.noarch.rpmaiperl-libs-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm]<perl-Locale-Maketext-1.29-440.module+el8.6.0+878+f93dfff7.noarch.rpm$(perl-Locale-Maketext-Simple-0.21-452.module+el8.6.0+878+f93dfff7.noarch.rpm{Uperl-local-lib-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpmOiperl-macros-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm_Fperl-Math-BigInt-1.9998.18-1.module+el8.6.0+878+f93dfff7.noarch.rpm`|perl-Math-BigInt-FastCalc-0.500.900-1.module+el8.6.0+878+f93dfff7.x86_64.rpm@<perl-Math-BigRat-0.2614-2.module+el8.6.0+878+f93dfff7.noarch.rpmA perl-Math-Complex-1.59-452.module+el8.6.0+878+f93dfff7.noarch.rpm%0perl-Memoize-1.03-452.module+el8.6.0+878+f93dfff7.noarch.rpm^pperl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.x86_64.rpmBZperl-Module-Build-0.42.29-4.module+el8.6.0+878+f93dfff7.noarch.rpmCiperl-Module-CoreList-5.20191220-1.module+el8.6.0+878+f93dfff7.noarch.rpmDiperl-Module-CoreList-tools-5.20191220-1.module+el8.6.0+878+f93dfff7.noarch.rpmEJperl-Module-Load-0.34-439.module+el8.6.0+878+f93dfff7.noarch.rpmF/perl-Module-Load-Conditional-0.70-1.module+el8.6.0+878+f93dfff7.noarch.rpm&"perl-Module-Loaded-0.08-452.module+el8.6.0+878+f93dfff7.noarch.rpma,perl-Module-Metadata-1.000037-1.module+el8.6.0+878+f93dfff7.noarch.rpm?:perl-MRO-Compat-0.13-5.module+el8.6.0+878+f93dfff7.noarch.rpm'{perl-Net-Ping-2.71-452.module+el8.6.0+878+f93dfff7.noarch.rpmYVperl-Object-HashBase-0.008-1.module+el8.6.0+878+f93dfff7.noarch.rpmZVperl-Object-HashBase-tools-0.008-1.module+el8.6.0+878+f93dfff7.noarch.rpm,Gperl-open-1.11-452.module+el8.6.0+878+f93dfff7.noarch.rpmBAperl-Package-Generator-1.106-12.module+el8.6.0+878+f93dfff7.noarch.rpmCIperl-Params-Check-0.38-396.module+el8.6.0+878+f93dfff7.noarch.rpmbperl-Params-Util-1.07-23.module+el8.6.0+878+f93dfff7.x86_64.rpm|Cperl-parent-0.237-2.module+el8.6.0+878+f93dfff7.noarch.rpmc0perl-PathTools-3.78-439.module+el8.6.0+878+f93dfff7.x86_64.rpmKeperl-perlfaq-5.20191102-1.module+el8.6.0+878+f93dfff7.noarch.rpmd perl-PerlIO-via-QuotedPrint-0.08-396.module+el8.6.0+878+f93dfff7.noarch.rpmD?perl-Perl-OSType-1.010-397.module+el8.6.0+878+f93dfff7.noarch.rpmeaperl-Pod-Checker-1.73-396.module+el8.6.0+878+f93dfff7.noarch.rpmEJperl-Pod-Escapes-1.07-396.module+el8.6.0+878+f93dfff7.noarch.rpm(cperl-Pod-Html-1.24-452.module+el8.6.0+878+f93dfff7.noarch.rpmLOperl-podlators-4.12-2.module+el8.6.0+878+f93dfff7.noarch.rpmFHperl-Pod-Parser-1.63-1001.module+el8.6.0+878+f93dfff7.noarch.rpmG]perl-Pod-Perldoc-3.28.01-442.module+el8.6.0+878+f93dfff7.noarch.rpmHNperl-Pod-Simple-3.40-1.module+el8.6.0+878+f93dfff7.noarch.rpmf`perl-Pod-Usage-1.69-396.module+el8.6.0+878+f93dfff7.noarch.rpmg perl-Scalar-List-Utils-1.53-439.module+el8.6.0+878+f93dfff7.x86_64.rpm)eperl-SelfLoader-1.25-452.module+el8.6.0+878+f93dfff7.noarch.rpmhperl-Socket-2.029-4.module+el8.6.0+878+f93dfff7.x86_64.rpmi!perl-Software-License-0.103014-5.module+el8.6.0+878+f93dfff7.noarch.rpmjjperl-Storable-3.15-442.module+el8.6.0+878+f93dfff7.x86_64.rpmk*perl-Sub-Exporter-0.987-16.module+el8.6.0+878+f93dfff7.noarch.rpmG>perl-Sub-Install-0.928-15.module+el8.6.0+878+f93dfff7.noarch.rpmlwperl-Sys-Syslog-0.36-1.module+el8.6.0+878+f93dfff7.x86_64.rpmm^perl-Term-ANSIColor-4.06-397.module+el8.6.0+878+f93dfff7.noarch.rpmHOperl-Term-Cap-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm perl-Term-Table-0.015-2.module+el8.6.0+878+f93dfff7.noarch.rpm*wperl-Test-1.31-452.module+el8.6.0+878+f93dfff7.noarch.rpmIMperl-Test-Harness-3.42-2.module+el8.6.0+878+f93dfff7.noarch.rpm}iperl-tests-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpmI_perl-Test-Simple-1.302170-1.module+el8.6.0+878+f93dfff7.noarch.rpmnJperl-Text-Balanced-2.03-396.module+el8.6.0+878+f93dfff7.noarch.rpmo>perl-Text-Diff-1.45-7.module+el8.6.0+878+f93dfff7.noarch.rpmJ8perl-Text-Glob-0.11-5.module+el8.6.0+878+f93dfff7.noarch.rpmK\perl-Text-ParseWords-3.30-396.module+el8.6.0+878+f93dfff7.noarch.rpmLTperl-Text-Tabs+Wrap-2013.0523-396.module+el8.6.0+878+f93dfff7.noarch.rpmp@perl-Text-Template-1.58-1.module+el8.6.0+878+f93dfff7.noarch.rpmqXperl-Thread-Queue-3.13-2.module+el8.6.0+878+f93dfff7.noarch.rpm~iperl-threads-2.22-439.module+el8.6.0+878+f93dfff7.x86_64.rpmXperl-threads-shared-1.60-440.module+el8.6.0+878+f93dfff7.x86_64.rpm8aperl-Time-HiRes-1.9760-439.module+el8.6.0+878+f93dfff7.x86_64.rpmrEperl-Time-Local-1.280-2.module+el8.6.0+878+f93dfff7.noarch.rpm99perl-Time-Piece-1.33-452.module+el8.6.0+878+f93dfff7.x86_64.rpmtTperl-Unicode-Collate-1.27-439.module+el8.6.0+878+f93dfff7.x86_64.rpmuSperl-Unicode-Normalize-1.26-439.module+el8.6.0+878+f93dfff7.x86_64.rpmsAperl-URI-1.76-5.module+el8.6.0+878+f93dfff7.noarch.rpm-Operl-utils-5.30.1-452.module+el8.6.0+878+f93dfff7.noarch.rpmperl-version-0.99.24-441.module+el8.6.0+878+f93dfff7.x86_64.rpm]txs]iperl-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm7Cperl-Algorithm-Diff-1.1903-10.module+el8.6.0+878+f93dfff7.noarch.rpm3Uperl-Archive-Tar-2.32-440.module+el8.6.0+878+f93dfff7.noarch.rpm4Dperl-Archive-Zip-1.67-1.module+el8.6.0+878+f93dfff7.noarch.rpm +perl-Attribute-Handlers-1.01-452.module+el8.6.0+878+f93dfff7.noarch.rpmvNperl-autodie-2.29-1001.module+el8.6.0+878+f93dfff7.noarch.rpmw'perl-bignum-0.51-439.module+el8.6.0+878+f93dfff7.noarch.rpmC?perl-Carp-1.50-439.module+el8.6.0+878+f93dfff7.noarch.rpmDzperl-Compress-Bzip2-2.26-7.module+el8.6.0+878+f93dfff7.x86_64.rpmEperl-Compress-Raw-Bzip2-2.093-1.module+el8.6.0+878+f93dfff7.x86_64.rpmFperl-Compress-Raw-Zlib-2.093-1.module+el8.6.0+878+f93dfff7.x86_64.rpmG$perl-Config-Perl-V-0.32-441.module+el8.6.0+878+f93dfff7.noarch.rpmMFperl-constant-1.33-1001.module+el8.6.0+878+f93dfff7.noarch.rpm5Tperl-CPAN-2.27-2.module+el8.6.0+878+f93dfff7.noarch.rpm perl-CPAN-DistnameInfo-0.12-13.module+el8.6.0+878+f93dfff7.noarch.rpm8Qperl-CPAN-Meta-2.150010-397.module+el8.6.0+878+f93dfff7.noarch.rpm9Pperl-CPAN-Meta-Requirements-2.140-397.module+el8.6.0+878+f93dfff7.noarch.rpm:7perl-CPAN-Meta-YAML-0.018-1001.module+el8.6.0+878+f93dfff7.noarch.rpmIvperl-Data-Dumper-2.174-440.module+el8.6.0+878+f93dfff7.x86_64.rpm;9perl-Data-OptList-0.110-7.module+el8.6.0+878+f93dfff7.noarch.rpmJ"perl-Data-Section-0.200007-8.module+el8.6.0+878+f93dfff7.noarch.rpmH]perl-DB_File-1.852-4.module+el8.6.0+878+f93dfff7.x86_64.rpm:iperl-devel-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm5*perl-Devel-Peek-1.28-452.module+el8.6.0+878+f93dfff7.x86_64.rpmK perl-Devel-PPPort-3.56-1.module+el8.6.0+878+f93dfff7.x86_64.rpm!2perl-Devel-SelfStubber-1.06-452.module+el8.6.0+878+f93dfff7.noarch.rpmLperl-Devel-Size-0.83-3.module+el8.6.0+878+f93dfff7.x86_64.rpmMOperl-Digest-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpmN perl-Digest-MD5-2.55-397.module+el8.6.0+878+f93dfff7.x86_64.rpmOjperl-Digest-SHA-6.02-2.module+el8.6.0+878+f93dfff7.x86_64.rpmPgperl-Encode-3.01-439.module+el8.6.0+878+f93dfff7.x86_64.rpmQgperl-Encode-devel-3.01-439.module+el8.6.0+878+f93dfff7.x86_64.rpmxperl-encoding-2.22-439.module+el8.6.0+878+f93dfff7.x86_64.rpm<@perl-Env-1.04-396.module+el8.6.0+878+f93dfff7.noarch.rpmV3perl-Errno-1.30-452.module+el8.6.0+878+f93dfff7.x86_64.rpmJ*perl-experimental-0.020-439.module+el8.6.0+878+f93dfff7.noarch.rpm6fperl-Exporter-5.73-440.module+el8.6.0+878+f93dfff7.noarch.rpm7Iperl-ExtUtils-CBuilder-0.280231-439.module+el8.6.0+878+f93dfff7.noarch.rpm8perl-ExtUtils-Command-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm"{perl-ExtUtils-Embed-1.35-452.module+el8.6.0+878+f93dfff7.noarch.rpm9Sperl-ExtUtils-Install-2.14-440.module+el8.6.0+878+f93dfff7.noarch.rpm;perl-ExtUtils-MakeMaker-7.42-1.module+el8.6.0+878+f93dfff7.noarch.rpm0perl-Filter-Simple-0.95-439.module+el8.6.0+878+f93dfff7.noarch.rpm9perl-generators-1.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm?Lperl-Getopt-Long-2.51-1.module+el8.6.0+878+f93dfff7.noarch.rpmyUperl-homedir-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpm@+perl-HTTP-Tiny-0.076-439.module+el8.6.0+878+f93dfff7.noarch.rpmperl-Importer-0.025-6.module+el8.6.0+878+f93dfff7.noarch.rpmNVperl-inc-latest-0.500-10.module+el8.6.0+878+f93dfff7.noarch.rpm`iperl-interpreter-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpmXAperl-IO-1.40-452.module+el8.6.0+878+f93dfff7.x86_64.rpmAperl-IO-Compress-2.093-1.module+el8.6.0+878+f93dfff7.noarch.rpmX%perl-IO-Socket-IP-0.39-6.module+el8.6.0+878+f93dfff7.noarch.rpm>4perl-IO-Zlib-1.10-452.module+el8.6.0+878+f93dfff7.noarch.rpmYUperl-IPC-Cmd-1.04-2.module+el8.6.0+878+f93dfff7.noarch.rpm[:perl-IPC-System-Simple-1.25-18.module+el8.6.0+878+f93dfff7.noarch.rpmZlperl-IPC-SysV-2.07-398.module+el8.6.0+878+f93dfff7.x86_64.rpm\Iperl-JSON-PP-4.04-2.module+el8.6.0+878+f93dfff7.noarch.rpmzWperl-libnet-3.11-4.module+el8.6.0+878+f93dfff7.noarch.rpm+iperl-libnetcfg-5.30.1-452.module+el8.6.0+878+f93dfff7.noarch.rpmaiperl-libs-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm]<perl-Locale-Maketext-1.29-440.module+el8.6.0+878+f93dfff7.noarch.rpm$(perl-Locale-Maketext-Simple-0.21-452.module+el8.6.0+878+f93dfff7.noarch.rpm{Uperl-local-lib-2.000024-7.module+el8.6.0+878+f93dfff7.noarch.rpmOiperl-macros-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpm_Fperl-Math-BigInt-1.9998.18-1.module+el8.6.0+878+f93dfff7.noarch.rpm`|perl-Math-BigInt-FastCalc-0.500.900-1.module+el8.6.0+878+f93dfff7.x86_64.rpm@<perl-Math-BigRat-0.2614-2.module+el8.6.0+878+f93dfff7.noarch.rpmA perl-Math-Complex-1.59-452.module+el8.6.0+878+f93dfff7.noarch.rpm%0perl-Memoize-1.03-452.module+el8.6.0+878+f93dfff7.noarch.rpm^pperl-MIME-Base64-3.15-1001.module+el8.6.0+878+f93dfff7.x86_64.rpmBZperl-Module-Build-0.42.29-4.module+el8.6.0+878+f93dfff7.noarch.rpmCiperl-Module-CoreList-5.20191220-1.module+el8.6.0+878+f93dfff7.noarch.rpmDiperl-Module-CoreList-tools-5.20191220-1.module+el8.6.0+878+f93dfff7.noarch.rpmEJperl-Module-Load-0.34-439.module+el8.6.0+878+f93dfff7.noarch.rpmF/perl-Module-Load-Conditional-0.70-1.module+el8.6.0+878+f93dfff7.noarch.rpm&"perl-Module-Loaded-0.08-452.module+el8.6.0+878+f93dfff7.noarch.rpma,perl-Module-Metadata-1.000037-1.module+el8.6.0+878+f93dfff7.noarch.rpm?:perl-MRO-Compat-0.13-5.module+el8.6.0+878+f93dfff7.noarch.rpm'{perl-Net-Ping-2.71-452.module+el8.6.0+878+f93dfff7.noarch.rpmYVperl-Object-HashBase-0.008-1.module+el8.6.0+878+f93dfff7.noarch.rpmZVperl-Object-HashBase-tools-0.008-1.module+el8.6.0+878+f93dfff7.noarch.rpm,Gperl-open-1.11-452.module+el8.6.0+878+f93dfff7.noarch.rpmBAperl-Package-Generator-1.106-12.module+el8.6.0+878+f93dfff7.noarch.rpmCIperl-Params-Check-0.38-396.module+el8.6.0+878+f93dfff7.noarch.rpmbperl-Params-Util-1.07-23.module+el8.6.0+878+f93dfff7.x86_64.rpm|Cperl-parent-0.237-2.module+el8.6.0+878+f93dfff7.noarch.rpmc0perl-PathTools-3.78-439.module+el8.6.0+878+f93dfff7.x86_64.rpmKeperl-perlfaq-5.20191102-1.module+el8.6.0+878+f93dfff7.noarch.rpmd perl-PerlIO-via-QuotedPrint-0.08-396.module+el8.6.0+878+f93dfff7.noarch.rpmD?perl-Perl-OSType-1.010-397.module+el8.6.0+878+f93dfff7.noarch.rpmeaperl-Pod-Checker-1.73-396.module+el8.6.0+878+f93dfff7.noarch.rpmEJperl-Pod-Escapes-1.07-396.module+el8.6.0+878+f93dfff7.noarch.rpm(cperl-Pod-Html-1.24-452.module+el8.6.0+878+f93dfff7.noarch.rpmLOperl-podlators-4.12-2.module+el8.6.0+878+f93dfff7.noarch.rpmFHperl-Pod-Parser-1.63-1001.module+el8.6.0+878+f93dfff7.noarch.rpmG]perl-Pod-Perldoc-3.28.01-442.module+el8.6.0+878+f93dfff7.noarch.rpmHNperl-Pod-Simple-3.40-1.module+el8.6.0+878+f93dfff7.noarch.rpmf`perl-Pod-Usage-1.69-396.module+el8.6.0+878+f93dfff7.noarch.rpmg perl-Scalar-List-Utils-1.53-439.module+el8.6.0+878+f93dfff7.x86_64.rpm)eperl-SelfLoader-1.25-452.module+el8.6.0+878+f93dfff7.noarch.rpmhperl-Socket-2.029-4.module+el8.6.0+878+f93dfff7.x86_64.rpmi!perl-Software-License-0.103014-5.module+el8.6.0+878+f93dfff7.noarch.rpmjjperl-Storable-3.15-442.module+el8.6.0+878+f93dfff7.x86_64.rpmk*perl-Sub-Exporter-0.987-16.module+el8.6.0+878+f93dfff7.noarch.rpmG>perl-Sub-Install-0.928-15.module+el8.6.0+878+f93dfff7.noarch.rpmlwperl-Sys-Syslog-0.36-1.module+el8.6.0+878+f93dfff7.x86_64.rpmm^perl-Term-ANSIColor-4.06-397.module+el8.6.0+878+f93dfff7.noarch.rpmHOperl-Term-Cap-1.17-396.module+el8.6.0+878+f93dfff7.noarch.rpm perl-Term-Table-0.015-2.module+el8.6.0+878+f93dfff7.noarch.rpm*wperl-Test-1.31-452.module+el8.6.0+878+f93dfff7.noarch.rpmIMperl-Test-Harness-3.42-2.module+el8.6.0+878+f93dfff7.noarch.rpm}iperl-tests-5.30.1-452.module+el8.6.0+878+f93dfff7.x86_64.rpmI_perl-Test-Simple-1.302170-1.module+el8.6.0+878+f93dfff7.noarch.rpmnJperl-Text-Balanced-2.03-396.module+el8.6.0+878+f93dfff7.noarch.rpmo>perl-Text-Diff-1.45-7.module+el8.6.0+878+f93dfff7.noarch.rpmJ8perl-Text-Glob-0.11-5.module+el8.6.0+878+f93dfff7.noarch.rpmK\perl-Text-ParseWords-3.30-396.module+el8.6.0+878+f93dfff7.noarch.rpmLTperl-Text-Tabs+Wrap-2013.0523-396.module+el8.6.0+878+f93dfff7.noarch.rpmp@perl-Text-Template-1.58-1.module+el8.6.0+878+f93dfff7.noarch.rpmqXperl-Thread-Queue-3.13-2.module+el8.6.0+878+f93dfff7.noarch.rpm~iperl-threads-2.22-439.module+el8.6.0+878+f93dfff7.x86_64.rpmXperl-threads-shared-1.60-440.module+el8.6.0+878+f93dfff7.x86_64.rpm8aperl-Time-HiRes-1.9760-439.module+el8.6.0+878+f93dfff7.x86_64.rpmrEperl-Time-Local-1.280-2.module+el8.6.0+878+f93dfff7.noarch.rpm99perl-Time-Piece-1.33-452.module+el8.6.0+878+f93dfff7.x86_64.rpmtTperl-Unicode-Collate-1.27-439.module+el8.6.0+878+f93dfff7.x86_64.rpmuSperl-Unicode-Normalize-1.26-439.module+el8.6.0+878+f93dfff7.x86_64.rpmsAperl-URI-1.76-5.module+el8.6.0+878+f93dfff7.noarch.rpm-Operl-utils-5.30.1-452.module+el8.6.0+878+f93dfff7.noarch.rpmperl-version-0.99.24-441.module+el8.6.0+878+f93dfff7.x86_64.rpmU UBBbugfixsquid:4 bug fix and enhancement update' https://errata.rockylinux.org/RLBA-2021:1878RLBA-2021:1878RLBA-2021:1878 &SY3libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm4libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm&SY3libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm4libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpmXk @BBBBBBBBBBBBBBBBBBBBBBLBsecurityModerate: python38:3.8 security update&~ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26116CVE-2020-26116CVE-2020-26116https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27783CVE-2020-27783CVE-2020-27783https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177CVE-2021-3177CVE-2021-3177https://bugzilla.redhat.com/show_bug.cgi?id=18680061868006https://bugzilla.redhat.com/show_bug.cgi?id=18830141883014https://bugzilla.redhat.com/show_bug.cgi?id=18867551886755https://bugzilla.redhat.com/show_bug.cgi?id=19016331901633https://bugzilla.redhat.com/show_bug.cgi?id=19181681918168https://bugzilla.redhat.com/show_bug.cgi?id=19205961920596https://errata.rockylinux.org/RLSA-2021:1879RLSA-2021:1879RLSA-2021:1879 b^1|python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpmhHpython38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm2python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpmilpython38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpmg?python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm3 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpmjFpython38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpmNpython38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpmkpython38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmlpython38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmmpython38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm4 python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpmMhpython38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm5python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm6python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm7 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpmnSpython38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpmOppython38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpmb^1|python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpmhHpython38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm2python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpmilpython38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpmg?python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm3 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpmjFpython38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpmNpython38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpmkpython38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmlpython38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmmpython38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm4 python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpmMhpython38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm5python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm6python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm7 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpmnSpython38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpmOppython38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpmg !_bugfixmod_fcgid bug fix and enhancement update$) https://bugzilla.redhat.com/show_bug.cgi?id=18765251876525https://errata.rockylinux.org/RLBA-2021:1880RLBA-2021:1880RLBA-2021:1880 1Ymod_fcgid-2.3.9-17.el8.x86_64.rpm1Ymod_fcgid-2.3.9-17.el8.x86_64.rpmh "bugfixinkscape:0.92.3 bug fix and enhancement updateM https://bugzilla.redhat.com/show_bug.cgi?id=18898001889800https://errata.rockylinux.org/RLBA-2021:1882RLBA-2021:1882RLBA-2021:1882 , bpS=python2-scour-0.35-9.module+el8.4.0+533+773bb730.noarch.rpm, bpS=python2-scour-0.35-9.module+el8.4.0+533+773bb730.noarch.rpmi $#bugfixspice-qxl-wddm-dod bug fix and enhancement updateL) https://bugzilla.redhat.com/show_bug.cgi?id=18518451851845https://errata.rockylinux.org/RLBA-2021:1885RLBA-2021:1885RLBA-2021:1885 +{spice-qxl-wddm-dod-0.21-2.el8.noarch.rpm+{spice-qxl-wddm-dod-0.21-2.el8.noarch.rpmi4 +eBBBBenhancementlibfprint bug fix and enhancement updateu) https://bugzilla.redhat.com/show_bug.cgi?id=18881811888181https://bugzilla.redhat.com/show_bug.cgi?id=19077661907766https://bugzilla.redhat.com/show_bug.cgi?id=19079541907954https://errata.rockylinux.org/RLEA-2021:1889RLEA-2021:1889RLEA-2021:1889 >fprintd-1.90.9-2.el8.x86_64.rpm>fprintd-pam-1.90.9-2.el8.x86_64.rpmflibfprint-1.90.7-1.el8.x86_64.rpm>fprintd-1.90.9-2.el8.x86_64.rpm>fprintd-pam-1.90.9-2.el8.x86_64.rpmflibfprint-1.90.7-1.el8.x86_64.rpmj  .lbugfixsource-highlight bug fix and enhancement update) https://bugzilla.redhat.com/show_bug.cgi?id=17184801718480https://errata.rockylinux.org/RLBA-2021:1892RLBA-2021:1892RLBA-2021:1892 p!source-highlight-3.1.8-17.el8.x86_64.rpmp!source-highlight-3.1.8-17.el8.x86_64.rpmj5 /Lenhancementnew module: mariadb:10.5G7 https://bugzilla.redhat.com/show_bug.cgi?id=17723301772330https://bugzilla.redhat.com/show_bug.cgi?id=19291041929104https://bugzilla.redhat.com/show_bug.cgi?id=19368421936842https://errata.rockylinux.org/RLEA-2021:1893RLEA-2021:1893RLEA-2021:1893 5W.Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm5W.Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpmm! 10bugfixabattis-cantarell-fonts bug fix and enhancement update~) https://bugzilla.redhat.com/show_bug.cgi?id=18657881865788https://errata.rockylinux.org/RLBA-2021:1894RLBA-2021:1894RLBA-2021:1894 fdabattis-cantarell-fonts-0.0.25-6.el8.noarch.rpmfdabattis-cantarell-fonts-0.0.25-6.el8.noarch.rpmn" 4rbugfixlibgovirt bug fix and enhancement update') https://bugzilla.redhat.com/show_bug.cgi?id=18057601805760https://bugzilla.redhat.com/show_bug.cgi?id=19100331910033https://errata.rockylinux.org/RLBA-2021:1895RLBA-2021:1895RLBA-2021:1895 Jlibgovirt-0.3.7-4.el8.x86_64.rpmJlibgovirt-0.3.7-4.el8.x86_64.rpmn# 5|BBBBBBBBBBBBBBBBBBBBBBBbugfixmaven:3.6 bug fix and enhancement updateP https://bugzilla.redhat.com/show_bug.cgi?id=18973751897375https://errata.rockylinux.org/RLBA-2021:1897RLBA-2021:1897RLBA-2021:1897 ,|enhancementmemkind bug fix and enhancement updateh) https://errata.rockylinux.org/RLEA-2021:1900RLEA-2021:1900RLEA-2021:1900 memkind-1.10.1-1.el8.x86_64.rpmmemkind-1.10.1-1.el8.x86_64.rpmz% bugfixuuid bug fix and enhancement update) https://errata.rockylinux.org/RLBA-2021:1902RLBA-2021:1902RLBA-2021:1902 +Quuid-1.6.2-43.el8.x86_64.rpm+Quuid-1.6.2-43.el8.x86_64.rpm{& Bbugfixpulseaudio bug fix and enhancement update:) https://bugzilla.redhat.com/show_bug.cgi?id=18432751843275https://bugzilla.redhat.com/show_bug.cgi?id=19063221906322https://errata.rockylinux.org/RLBA-2021:1903RLBA-2021:1903RLBA-2021:1903 !Gtwolame-libs-0.3.13-12.el8.x86_64.rpm!Gtwolame-libs-0.3.13-12.el8.x86_64.rpm|7 Eenhancementlibyang bug fix and enhancement updatec) https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20391CVE-2019-20391CVE-2019-20391https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20392CVE-2019-20392CVE-2019-20392https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20393CVE-2019-20393CVE-2019-20393https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20394CVE-2019-20394CVE-2019-20394https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20395CVE-2019-20395CVE-2019-20395https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20396CVE-2019-20396CVE-2019-20396https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20397CVE-2019-20397CVE-2019-20397https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20398CVE-2019-20398CVE-2019-20398https://bugzilla.redhat.com/show_bug.cgi?id=19100461910046https://errata.rockylinux.org/RLEA-2021:1906RLEA-2021:1906RLEA-2021:1906 slibyang-1.0.184-1.el8.x86_64.rpmslibyang-1.0.184-1.el8.x86_64.rpm|' hCBFBBBFLBBRBBCBBBBOBBBBbugfixcontainer-tools:2.0 bug fix and enhancement update  https://bugzilla.redhat.com/show_bug.cgi?id=18833241883324https://bugzilla.redhat.com/show_bug.cgi?id=18975961897596https://errata.rockylinux.org/RLBA-2021:1911RLBA-2021:1911RLBA-2021:1911 ~RScockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm1acontainers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmHcontainer-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmLfuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpmhaskopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmwaskopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm~RScockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm1acontainers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmHcontainer-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmLfuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpmhaskopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmwaskopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm( Ibugfixilmbase bug fix and enhancement update ) https://errata.rockylinux.org/RLBA-2021:1912RLBA-2021:1912RLBA-2021:1912 Cgo-srpm-macros-2-17.el8.noarch.rpm>Cgo-srpm-macros-2-17.el8.noarch.rpm&/ ('bugfixdocbook-style-xsl bug fix and enhancement updaten) https://bugzilla.redhat.com/show_bug.cgi?id=17619641761964https://errata.rockylinux.org/RLBA-2021:1921RLBA-2021:1921RLBA-2021:1921 !docbook-style-xsl-1.79.2-9.el8.noarch.rpm!docbook-style-xsl-1.79.2-9.el8.noarch.rpm&l +isecurityLow: spice security updateplhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20201CVE-2021-20201CVE-2021-20201https://bugzilla.redhat.com/show_bug.cgi?id=19044591904459https://bugzilla.redhat.com/show_bug.cgi?id=19218461921846https://errata.rockylinux.org/RLSA-2021:1924RLSA-2021:1924RLSA-2021:1924 y1spice-server-0.14.3-4.el8.x86_64.rpmy1spice-server-0.14.3-4.el8.x86_64.rpm'0 ,kNBHzBsBBBBBBbugfixpython36:3.6 bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=18206281820628https://bugzilla.redhat.com/show_bug.cgi?id=18272611827261https://bugzilla.redhat.com/show_bug.cgi?id=18856411885641https://errata.rockylinux.org/RLBA-2021:1930RLBA-2021:1930RLBA-2021:1930 ^https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027CVE-2021-32027CVE-2021-32027https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028CVE-2021-32028CVE-2021-32028https://bugzilla.redhat.com/show_bug.cgi?id=19568761956876https://bugzilla.redhat.com/show_bug.cgi?id=19568771956877https://errata.rockylinux.org/RLSA-2021:2360RLSA-2021:2360RLSA-2021:2360 lV  postgresql-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm=postgresql-contrib-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm>postgresql-docs-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm?postgresql-plperl-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm@postgresql-plpython3-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpmApostgresql-pltcl-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpmBpostgresql-server-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpmCpostgresql-server-devel-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpmDpostgresql-static-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpmEpostgresql-test-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm postgresql-test-rpm-macros-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpmlV  postgresql-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm=postgresql-contrib-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm>postgresql-docs-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm?postgresql-plperl-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm@postgresql-plpython3-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpmApostgresql-pltcl-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpmBpostgresql-server-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpmCpostgresql-server-devel-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpmDpostgresql-static-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpmEpostgresql-test-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpm postgresql-test-rpm-macros-9.6.22-1.module+el8.5.0+687+7cd82e08.x86_64.rpmqs 4rsecurityImportant: gupnp security update()https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33516CVE-2021-33516CVE-2021-33516https://bugzilla.redhat.com/show_bug.cgi?id=19640911964091https://errata.rockylinux.org/RLSA-2021:2363RLSA-2021:2363RLSA-2021:2363 xgupnp-1.0.6-2.el8_4.x86_64.rpmxgupnp-1.0.6-2.el8_4.x86_64.rpmrt 5FBBBBBOBBBBBLBRJWsecurityImportant: container-tools:3.0 security updateQhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30465CVE-2021-30465CVE-2021-30465https://bugzilla.redhat.com/show_bug.cgi?id=19547361954736https://errata.rockylinux.org/RLSA-2021:2370RLSA-2021:2370RLSA-2021:2370 pW Scockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm9containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmL fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm.0python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm2_udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpmpW Scockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm9containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmL fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm.0python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm2_udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpmu 6FBBBBBOBBBBBLBRJasecurityImportant: container-tools:rhel8 security updateThttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30465CVE-2021-30465CVE-2021-30465https://bugzilla.redhat.com/show_bug.cgi?id=19547361954736https://errata.rockylinux.org/RLSA-2021:2371RLSA-2021:2371RLSA-2021:2371 pW Scockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpmconmon-2.0.26-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm9containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm.0python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm2_udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpmpW Scockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpmconmon-2.0.26-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm9containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm.0python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm2_udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpmv 7gsecurityImportant: postgresql:12 security updateW{ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027CVE-2021-32027CVE-2021-32027https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028CVE-2021-32028CVE-2021-32028https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029CVE-2021-32029CVE-2021-32029https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3393CVE-2021-3393CVE-2021-3393https://bugzilla.redhat.com/show_bug.cgi?id=19240051924005https://bugzilla.redhat.com/show_bug.cgi?id=19568761956876https://bugzilla.redhat.com/show_bug.cgi?id=19568771956877https://bugzilla.redhat.com/show_bug.cgi?id=19568831956883https://errata.rockylinux.org/RLSA-2021:2372RLSA-2021:2372RLSA-2021:2372 gy% postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpmgy% postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpmw 8gB^securityImportant: postgresql:13 security updateRhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027CVE-2021-32027CVE-2021-32027https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028CVE-2021-32028CVE-2021-32028https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029CVE-2021-32029CVE-2021-32029https://bugzilla.redhat.com/show_bug.cgi?id=19568761956876https://bugzilla.redhat.com/show_bug.cgi?id=19568771956877https://bugzilla.redhat.com/show_bug.cgi?id=19568831956883https://errata.rockylinux.org/RLSA-2021:2375RLSA-2021:2375RLSA-2021:2375 gy8Qpgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm% postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpmgy8Qpgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm% postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpmx 9@BBBBBBBBBBBBBBBBBBBBBBLBBVsecurityModerate: python38:3.8 and python38-devel:3.8 security updatek(https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14343CVE-2020-14343CVE-2020-14343https://bugzilla.redhat.com/show_bug.cgi?id=18604661860466https://errata.rockylinux.org/RLSA-2021:2583RLSA-2021:2583RLSA-2021:2583 b^1|python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpmhHpython38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm2python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpmilpython38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpmg?python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm3 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpmjFpython38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpmNpython38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpmkpython38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmlpython38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmmpython38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm4 python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpmMhpython38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm5python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm6python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm%upython38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.x86_64.rpm7 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpmnSpython38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpmOppython38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpmb^1|python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpmhHpython38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm2python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpmilpython38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpmg?python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm3 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpmjFpython38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpmNpython38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpmkpython38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmlpython38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmmpython38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm4 python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpmMhpython38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm5python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm6python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm%upython38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.x86_64.rpm7 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpmnSpython38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpmOppython38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm0y :fBYBBBBBbBBBsecurityModerate: ruby:2.7 security, bug fix, and enhancement updatenhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25613CVE-2020-25613CVE-2020-25613https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28965CVE-2021-28965CVE-2021-28965https://bugzilla.redhat.com/show_bug.cgi?id=18836231883623https://bugzilla.redhat.com/show_bug.cgi?id=19475261947526https://bugzilla.redhat.com/show_bug.cgi?id=19519991951999The following packages have been upgraded to a later upstream version: ruby (2.7.3).https://bugzilla.redhat.com/show_bug.cgi?id=19520001952000* Resolv::DNS: ruby:2.7/ruby: timeouts if multiple IPv6 name servers are given and address contains leading zero [rhel-8]https://errata.rockylinux.org/RLSA-2021:2584RLSA-2021:2584RLSA-2021:2584 z 4 rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm5 rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpmSrubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpmySrubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpmzlrubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm{lrubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm6`rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm)`rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm7brubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm*brubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpmz 4 rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm5 rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpmSrubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpmySrubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpmzlrubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm{lrubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm6`rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm)`rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm7brubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm*brubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpm5z ;SB[BBBBBBBBBsecurityModerate: ruby:2.5 security, bug fix, and enhancement updateWhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15845CVE-2019-15845CVE-2019-15845https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16201CVE-2019-16201CVE-2019-16201https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16254CVE-2019-16254CVE-2019-16254https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16255CVE-2019-16255CVE-2019-16255https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10663CVE-2020-10663CVE-2020-10663https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10933CVE-2020-10933CVE-2020-10933https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25613CVE-2020-25613CVE-2020-25613https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28965CVE-2021-28965CVE-2021-28965https://bugzilla.redhat.com/show_bug.cgi?id=17737281773728https://bugzilla.redhat.com/show_bug.cgi?id=17894071789407https://bugzilla.redhat.com/show_bug.cgi?id=17895561789556https://bugzilla.redhat.com/show_bug.cgi?id=17936831793683https://bugzilla.redhat.com/show_bug.cgi?id=18275001827500https://bugzilla.redhat.com/show_bug.cgi?id=18332911833291https://bugzilla.redhat.com/show_bug.cgi?id=18836231883623https://bugzilla.redhat.com/show_bug.cgi?id=19475261947526https://bugzilla.redhat.com/show_bug.cgi?id=19526261952626The following packages have been upgraded to a later upstream version: ruby (2.5.9).https://bugzilla.redhat.com/show_bug.cgi?id=19550101955010https://errata.rockylinux.org/RLSA-2021:2587RLSA-2021:2587RLSA-2021:2587 , 4 rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm5 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpmy rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpmzrubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm{rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm6rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm)rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm7rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm*rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm, 4 rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm5 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpmy rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpmzrubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm{rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm6rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm)rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm7rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm*rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm>{ fBYBBBBBbBBBsecurityImportant: ruby:2.7 security update+V https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36327CVE-2020-36327CVE-2020-36327https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31799CVE-2021-31799CVE-2021-31799https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31810CVE-2021-31810CVE-2021-31810https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32066CVE-2021-32066CVE-2021-32066https://bugzilla.redhat.com/show_bug.cgi?id=19589991958999https://bugzilla.redhat.com/show_bug.cgi?id=19801261980126https://bugzilla.redhat.com/show_bug.cgi?id=19801281980128https://bugzilla.redhat.com/show_bug.cgi?id=19801321980132https://errata.rockylinux.org/RLSA-2021:3020RLSA-2021:3020RLSA-2021:3020 z 4 rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm5 rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpmSrubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpmySrubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpmzlrubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm{lrubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm6`rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm)`rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm7brubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm*brubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpmz 4 rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm5 rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpmSrubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpmySrubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpmzlrubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm{lrubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm6`rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm)`rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm7brubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm*brubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpmW} ?ZBBBBBBBBBBBUsecurityModerate: virt:rhel and virt-devel:rhel security and bug fix update  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13754CVE-2020-13754CVE-2020-13754https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27617CVE-2020-27617CVE-2020-27617https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20221CVE-2021-20221CVE-2021-20221https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3416CVE-2021-3416CVE-2021-3416https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3504CVE-2021-3504CVE-2021-3504https://bugzilla.redhat.com/show_bug.cgi?id=18423631842363https://bugzilla.redhat.com/show_bug.cgi?id=18916681891668https://bugzilla.redhat.com/show_bug.cgi?id=19246011924601https://bugzilla.redhat.com/show_bug.cgi?id=19328271932827https://bugzilla.redhat.com/show_bug.cgi?id=19496871949687https://bugzilla.redhat.com/show_bug.cgi?id=19583011958301* cannot restart default network and firewalld: iptables: No chain/target/match by that name.https://errata.rockylinux.org/RLSA-2021:3061RLSA-2021:3061RLSA-2021:3061 tspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmtspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm ; FBBBBBOBBBBBLbugfixcontainer-tools:rhel8 security, bug fix, and enhancement updater https://bugzilla.redhat.com/show_bug.cgi?id=19427531942753https://bugzilla.redhat.com/show_bug.cgi?id=19616821961682https://bugzilla.redhat.com/show_bug.cgi?id=19727001972700https://bugzilla.redhat.com/show_bug.cgi?id=19749001974900https://bugzilla.redhat.com/show_bug.cgi?id=19749031974903https://bugzilla.redhat.com/show_bug.cgi?id=19767491976749https://bugzilla.redhat.com/show_bug.cgi?id=19860001986000https://errata.rockylinux.org/RLBA-2021:3070RLBA-2021:3070RLBA-2021:3070 pW9containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm.0python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmpW9containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm.0python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm~ i1securityModerate: nodejs:12 security, bug fix, and enhancement update https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22918CVE-2021-22918CVE-2021-22918https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23362CVE-2021-23362CVE-2021-23362https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27290CVE-2021-27290CVE-2021-27290https://bugzilla.redhat.com/show_bug.cgi?id=19414711941471https://bugzilla.redhat.com/show_bug.cgi?id=19432081943208https://bugzilla.redhat.com/show_bug.cgi?id=19793381979338https://errata.rockylinux.org/RLSA-2021:3073RLSA-2021:3073RLSA-2021:3073 /}WCAnodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm/}WCAnodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm Y)securityModerate: nodejs:14 security, bug fix, and enhancement update https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22918CVE-2021-22918CVE-2021-22918https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23362CVE-2021-23362CVE-2021-23362https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27290CVE-2021-27290CVE-2021-27290https://bugzilla.redhat.com/show_bug.cgi?id=19414711941471https://bugzilla.redhat.com/show_bug.cgi?id=19432081943208https://bugzilla.redhat.com/show_bug.cgi?id=19793381979338https://errata.rockylinux.org/RLSA-2021:3074RLSA-2021:3074RLSA-2021:3074 /}WCAnodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm:mnodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm/}WCAnodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm:mnodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm CsecurityLow: libuv security updatelhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22918CVE-2021-22918CVE-2021-22918https://bugzilla.redhat.com/show_bug.cgi?id=19793381979338https://errata.rockylinux.org/RLSA-2021:3075RLSA-2021:3075RLSA-2021:3075 alibuv-1.41.1-1.el8_4.x86_64.rpmalibuv-1.41.1-1.el8_4.x86_64.rpm< FBBbugfixgcc-toolset-10-valgrind bug fix and enhancement update+  https://bugzilla.redhat.com/show_bug.cgi?id=19683781968378* incorrect pkgconfig virtual provides in devel packageshttps://errata.rockylinux.org/RLBA-2021:3083RLBA-2021:3083RLBA-2021:3083 Qagcc-toolset-10-valgrind-3.16.0-6.el8_4.x86_64.rpmRagcc-toolset-10-valgrind-devel-3.16.0-6.el8_4.x86_64.rpmQagcc-toolset-10-valgrind-3.16.0-6.el8_4.x86_64.rpmRagcc-toolset-10-valgrind-devel-3.16.0-6.el8_4.x86_64.rpm |BBsecurityModerate: mysql:8.0 security, bug fix, and enhancement updateK4https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14672CVE-2020-14672CVE-2020-14672https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765CVE-2020-14765CVE-2020-14765https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14769CVE-2020-14769CVE-2020-14769https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14773CVE-2020-14773CVE-2020-14773https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14775CVE-2020-14775CVE-2020-14775https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776CVE-2020-14776CVE-2020-14776https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14777CVE-2020-14777CVE-2020-14777https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14785CVE-2020-14785CVE-2020-14785https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14786CVE-2020-14786CVE-2020-14786https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789CVE-2020-14789CVE-2020-14789https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14790CVE-2020-14790CVE-2020-14790https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14791CVE-2020-14791CVE-2020-14791https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14793CVE-2020-14793CVE-2020-14793https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14794CVE-2020-14794CVE-2020-14794https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14800CVE-2020-14800CVE-2020-14800https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14804CVE-2020-14804CVE-2020-14804https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14809CVE-2020-14809CVE-2020-14809https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812CVE-2020-14812CVE-2020-14812https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14814CVE-2020-14814CVE-2020-14814https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14821CVE-2020-14821CVE-2020-14821https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14828CVE-2020-14828CVE-2020-14828https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14829CVE-2020-14829CVE-2020-14829https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14830CVE-2020-14830CVE-2020-14830https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14836CVE-2020-14836CVE-2020-14836https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14837CVE-2020-14837CVE-2020-14837https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14838CVE-2020-14838CVE-2020-14838https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14839CVE-2020-14839CVE-2020-14839https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14844CVE-2020-14844CVE-2020-14844https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14845CVE-2020-14845CVE-2020-14845https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14846CVE-2020-14846CVE-2020-14846https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14848CVE-2020-14848CVE-2020-14848https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14852CVE-2020-14852CVE-2020-14852https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14860CVE-2020-14860CVE-2020-14860https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14861CVE-2020-14861CVE-2020-14861https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14866CVE-2020-14866CVE-2020-14866https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14867CVE-2020-14867CVE-2020-14867https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14868CVE-2020-14868CVE-2020-14868https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14870CVE-2020-14870CVE-2020-14870https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14873CVE-2020-14873CVE-2020-14873https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14888CVE-2020-14888CVE-2020-14888https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14891CVE-2020-14891CVE-2020-14891https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14893CVE-2020-14893CVE-2020-14893https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2001CVE-2021-2001CVE-2021-2001https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2002CVE-2021-2002CVE-2021-2002https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2010CVE-2021-2010CVE-2021-2010https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2011CVE-2021-2011CVE-2021-2011https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2021CVE-2021-2021CVE-2021-2021https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022CVE-2021-2022CVE-2021-2022https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2024CVE-2021-2024CVE-2021-2024https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2028CVE-2021-2028CVE-2021-2028https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2030CVE-2021-2030CVE-2021-2030https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2031CVE-2021-2031CVE-2021-2031https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2032CVE-2021-2032CVE-2021-2032https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2036CVE-2021-2036CVE-2021-2036https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2038CVE-2021-2038CVE-2021-2038https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2042CVE-2021-2042CVE-2021-2042https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2046CVE-2021-2046CVE-2021-2046https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2048CVE-2021-2048CVE-2021-2048https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2055CVE-2021-2055CVE-2021-2055https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2056CVE-2021-2056CVE-2021-2056https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2058CVE-2021-2058CVE-2021-2058https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2060CVE-2021-2060CVE-2021-2060https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2061CVE-2021-2061CVE-2021-2061https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2065CVE-2021-2065CVE-2021-2065https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2070CVE-2021-2070CVE-2021-2070https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2072CVE-2021-2072CVE-2021-2072https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2076CVE-2021-2076CVE-2021-2076https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2081CVE-2021-2081CVE-2021-2081https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2087CVE-2021-2087CVE-2021-2087https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2088CVE-2021-2088CVE-2021-2088https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2122CVE-2021-2122CVE-2021-2122https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2146CVE-2021-2146CVE-2021-2146https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2164CVE-2021-2164CVE-2021-2164https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166CVE-2021-2166CVE-2021-2166https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2169CVE-2021-2169CVE-2021-2169https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2170CVE-2021-2170CVE-2021-2170https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2171CVE-2021-2171CVE-2021-2171https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2172CVE-2021-2172CVE-2021-2172https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2174CVE-2021-2174CVE-2021-2174https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2178CVE-2021-2178CVE-2021-2178https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2179CVE-2021-2179CVE-2021-2179https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2180CVE-2021-2180CVE-2021-2180https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2193CVE-2021-2193CVE-2021-2193https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2194CVE-2021-2194CVE-2021-2194https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2196CVE-2021-2196CVE-2021-2196https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2201CVE-2021-2201CVE-2021-2201https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2202CVE-2021-2202CVE-2021-2202https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2203CVE-2021-2203CVE-2021-2203https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2208CVE-2021-2208CVE-2021-2208https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2212CVE-2021-2212CVE-2021-2212https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2213CVE-2021-2213CVE-2021-2213https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2215CVE-2021-2215CVE-2021-2215https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2217CVE-2021-2217CVE-2021-2217https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2226CVE-2021-2226CVE-2021-2226https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2230CVE-2021-2230CVE-2021-2230https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2232CVE-2021-2232CVE-2021-2232https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2278CVE-2021-2278CVE-2021-2278https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2293CVE-2021-2293CVE-2021-2293https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2298CVE-2021-2298CVE-2021-2298https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2299CVE-2021-2299CVE-2021-2299https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2300CVE-2021-2300CVE-2021-2300https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2301CVE-2021-2301CVE-2021-2301https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2304CVE-2021-2304CVE-2021-2304https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2305CVE-2021-2305CVE-2021-2305https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2307CVE-2021-2307CVE-2021-2307https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2308CVE-2021-2308CVE-2021-2308https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2339CVE-2021-2339CVE-2021-2339https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2340CVE-2021-2340CVE-2021-2340https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2342CVE-2021-2342CVE-2021-2342https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2352CVE-2021-2352CVE-2021-2352https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2354CVE-2021-2354CVE-2021-2354https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2356CVE-2021-2356CVE-2021-2356https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2357CVE-2021-2357CVE-2021-2357https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2367CVE-2021-2367CVE-2021-2367https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2370CVE-2021-2370CVE-2021-2370https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372CVE-2021-2372CVE-2021-2372https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2374CVE-2021-2374CVE-2021-2374https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2383CVE-2021-2383CVE-2021-2383https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2384CVE-2021-2384CVE-2021-2384https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2385CVE-2021-2385CVE-2021-2385https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2387CVE-2021-2387CVE-2021-2387https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389CVE-2021-2389CVE-2021-2389https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2390CVE-2021-2390CVE-2021-2390https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2399CVE-2021-2399CVE-2021-2399https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2402CVE-2021-2402CVE-2021-2402https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2410CVE-2021-2410CVE-2021-2410https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2412CVE-2021-2412CVE-2021-2412https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2417CVE-2021-2417CVE-2021-2417https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2418CVE-2021-2418CVE-2021-2418https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2422CVE-2021-2422CVE-2021-2422https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2424CVE-2021-2424CVE-2021-2424https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2425CVE-2021-2425CVE-2021-2425https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2426CVE-2021-2426CVE-2021-2426https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2427CVE-2021-2427CVE-2021-2427https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2429CVE-2021-2429CVE-2021-2429https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2437CVE-2021-2437CVE-2021-2437https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2440CVE-2021-2440CVE-2021-2440https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2441CVE-2021-2441CVE-2021-2441https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2444CVE-2021-2444CVE-2021-2444https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35537CVE-2021-35537CVE-2021-35537https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35629CVE-2021-35629CVE-2021-35629https://bugzilla.redhat.com/show_bug.cgi?id=18907371890737https://bugzilla.redhat.com/show_bug.cgi?id=18907381890738https://bugzilla.redhat.com/show_bug.cgi?id=18907391890739https://bugzilla.redhat.com/show_bug.cgi?id=18907421890742https://bugzilla.redhat.com/show_bug.cgi?id=18907431890743https://bugzilla.redhat.com/show_bug.cgi?id=18907441890744https://bugzilla.redhat.com/show_bug.cgi?id=18907451890745https://bugzilla.redhat.com/show_bug.cgi?id=18907461890746https://bugzilla.redhat.com/show_bug.cgi?id=18907471890747https://bugzilla.redhat.com/show_bug.cgi?id=18907481890748https://bugzilla.redhat.com/show_bug.cgi?id=18907491890749https://bugzilla.redhat.com/show_bug.cgi?id=18907501890750https://bugzilla.redhat.com/show_bug.cgi?id=18907511890751https://bugzilla.redhat.com/show_bug.cgi?id=18907531890753https://bugzilla.redhat.com/show_bug.cgi?id=18907541890754https://bugzilla.redhat.com/show_bug.cgi?id=18907551890755https://bugzilla.redhat.com/show_bug.cgi?id=18907561890756https://bugzilla.redhat.com/show_bug.cgi?id=18907571890757https://bugzilla.redhat.com/show_bug.cgi?id=18907581890758https://bugzilla.redhat.com/show_bug.cgi?id=18907601890760https://bugzilla.redhat.com/show_bug.cgi?id=18907611890761https://bugzilla.redhat.com/show_bug.cgi?id=18907621890762https://bugzilla.redhat.com/show_bug.cgi?id=18907631890763https://bugzilla.redhat.com/show_bug.cgi?id=18907641890764https://bugzilla.redhat.com/show_bug.cgi?id=18907651890765https://bugzilla.redhat.com/show_bug.cgi?id=18907661890766https://bugzilla.redhat.com/show_bug.cgi?id=18907671890767https://bugzilla.redhat.com/show_bug.cgi?id=18907681890768https://bugzilla.redhat.com/show_bug.cgi?id=18907691890769https://bugzilla.redhat.com/show_bug.cgi?id=18907701890770https://bugzilla.redhat.com/show_bug.cgi?id=18907711890771https://bugzilla.redhat.com/show_bug.cgi?id=18907721890772https://bugzilla.redhat.com/show_bug.cgi?id=18907731890773https://bugzilla.redhat.com/show_bug.cgi?id=18907741890774https://bugzilla.redhat.com/show_bug.cgi?id=18907751890775https://bugzilla.redhat.com/show_bug.cgi?id=18907761890776https://bugzilla.redhat.com/show_bug.cgi?id=18907781890778https://bugzilla.redhat.com/show_bug.cgi?id=18907791890779https://bugzilla.redhat.com/show_bug.cgi?id=18907811890781https://bugzilla.redhat.com/show_bug.cgi?id=18907821890782https://bugzilla.redhat.com/show_bug.cgi?id=18907831890783https://bugzilla.redhat.com/show_bug.cgi?id=18907841890784https://bugzilla.redhat.com/show_bug.cgi?id=19223791922379https://bugzilla.redhat.com/show_bug.cgi?id=19223801922380https://bugzilla.redhat.com/show_bug.cgi?id=19223831922383https://bugzilla.redhat.com/show_bug.cgi?id=19223841922384https://bugzilla.redhat.com/show_bug.cgi?id=19223881922388https://bugzilla.redhat.com/show_bug.cgi?id=19223891922389https://bugzilla.redhat.com/show_bug.cgi?id=19223901922390https://bugzilla.redhat.com/show_bug.cgi?id=19223911922391https://bugzilla.redhat.com/show_bug.cgi?id=19223921922392https://bugzilla.redhat.com/show_bug.cgi?id=19223931922393https://bugzilla.redhat.com/show_bug.cgi?id=19223941922394https://bugzilla.redhat.com/show_bug.cgi?id=19223951922395https://bugzilla.redhat.com/show_bug.cgi?id=19223961922396https://bugzilla.redhat.com/show_bug.cgi?id=19223971922397https://bugzilla.redhat.com/show_bug.cgi?id=19223981922398https://bugzilla.redhat.com/show_bug.cgi?id=19223991922399https://bugzilla.redhat.com/show_bug.cgi?id=19224001922400https://bugzilla.redhat.com/show_bug.cgi?id=19224011922401https://bugzilla.redhat.com/show_bug.cgi?id=19224021922402https://bugzilla.redhat.com/show_bug.cgi?id=19224031922403https://bugzilla.redhat.com/show_bug.cgi?id=19224041922404https://bugzilla.redhat.com/show_bug.cgi?id=19224051922405https://bugzilla.redhat.com/show_bug.cgi?id=19224061922406https://bugzilla.redhat.com/show_bug.cgi?id=19224071922407https://bugzilla.redhat.com/show_bug.cgi?id=19224081922408https://bugzilla.redhat.com/show_bug.cgi?id=19224101922410https://bugzilla.redhat.com/show_bug.cgi?id=19224111922411https://bugzilla.redhat.com/show_bug.cgi?id=19224161922416https://bugzilla.redhat.com/show_bug.cgi?id=19224191922419https://bugzilla.redhat.com/show_bug.cgi?id=19517511951751https://bugzilla.redhat.com/show_bug.cgi?id=19517541951754https://bugzilla.redhat.com/show_bug.cgi?id=19517551951755https://bugzilla.redhat.com/show_bug.cgi?id=19517561951756https://bugzilla.redhat.com/show_bug.cgi?id=19517571951757https://bugzilla.redhat.com/show_bug.cgi?id=19517581951758https://bugzilla.redhat.com/show_bug.cgi?id=19517591951759https://bugzilla.redhat.com/show_bug.cgi?id=19517601951760https://bugzilla.redhat.com/show_bug.cgi?id=19517611951761https://bugzilla.redhat.com/show_bug.cgi?id=19517621951762https://bugzilla.redhat.com/show_bug.cgi?id=19517631951763https://bugzilla.redhat.com/show_bug.cgi?id=19517641951764https://bugzilla.redhat.com/show_bug.cgi?id=19517651951765https://bugzilla.redhat.com/show_bug.cgi?id=19517661951766https://bugzilla.redhat.com/show_bug.cgi?id=19517671951767https://bugzilla.redhat.com/show_bug.cgi?id=19517681951768https://bugzilla.redhat.com/show_bug.cgi?id=19517691951769https://bugzilla.redhat.com/show_bug.cgi?id=19517701951770https://bugzilla.redhat.com/show_bug.cgi?id=19517711951771https://bugzilla.redhat.com/show_bug.cgi?id=19517721951772https://bugzilla.redhat.com/show_bug.cgi?id=19517731951773https://bugzilla.redhat.com/show_bug.cgi?id=19517741951774https://bugzilla.redhat.com/show_bug.cgi?id=19517751951775https://bugzilla.redhat.com/show_bug.cgi?id=19517761951776https://bugzilla.redhat.com/show_bug.cgi?id=19517771951777https://bugzilla.redhat.com/show_bug.cgi?id=19517781951778https://bugzilla.redhat.com/show_bug.cgi?id=19517791951779https://bugzilla.redhat.com/show_bug.cgi?id=19517801951780https://bugzilla.redhat.com/show_bug.cgi?id=19517811951781https://bugzilla.redhat.com/show_bug.cgi?id=19517821951782https://bugzilla.redhat.com/show_bug.cgi?id=19517831951783https://bugzilla.redhat.com/show_bug.cgi?id=19517841951784https://bugzilla.redhat.com/show_bug.cgi?id=19517851951785https://bugzilla.redhat.com/show_bug.cgi?id=19517861951786https://bugzilla.redhat.com/show_bug.cgi?id=19528021952802https://bugzilla.redhat.com/show_bug.cgi?id=19922791992279https://bugzilla.redhat.com/show_bug.cgi?id=19922801992280https://bugzilla.redhat.com/show_bug.cgi?id=19922941992294https://bugzilla.redhat.com/show_bug.cgi?id=19922971992297https://bugzilla.redhat.com/show_bug.cgi?id=19922981992298https://bugzilla.redhat.com/show_bug.cgi?id=19922991992299https://bugzilla.redhat.com/show_bug.cgi?id=19923001992300https://bugzilla.redhat.com/show_bug.cgi?id=19923011992301https://bugzilla.redhat.com/show_bug.cgi?id=19923021992302https://bugzilla.redhat.com/show_bug.cgi?id=19923031992303https://bugzilla.redhat.com/show_bug.cgi?id=19923041992304https://bugzilla.redhat.com/show_bug.cgi?id=19923051992305https://bugzilla.redhat.com/show_bug.cgi?id=19923061992306https://bugzilla.redhat.com/show_bug.cgi?id=19923071992307https://bugzilla.redhat.com/show_bug.cgi?id=19923081992308https://bugzilla.redhat.com/show_bug.cgi?id=19923091992309https://bugzilla.redhat.com/show_bug.cgi?id=19923101992310https://bugzilla.redhat.com/show_bug.cgi?id=19923111992311https://bugzilla.redhat.com/show_bug.cgi?id=19923121992312https://bugzilla.redhat.com/show_bug.cgi?id=19923131992313https://bugzilla.redhat.com/show_bug.cgi?id=19923141992314https://bugzilla.redhat.com/show_bug.cgi?id=19923151992315https://bugzilla.redhat.com/show_bug.cgi?id=19923161992316https://bugzilla.redhat.com/show_bug.cgi?id=19923171992317https://bugzilla.redhat.com/show_bug.cgi?id=19923181992318https://bugzilla.redhat.com/show_bug.cgi?id=19923191992319https://bugzilla.redhat.com/show_bug.cgi?id=19923201992320https://bugzilla.redhat.com/show_bug.cgi?id=19923211992321https://bugzilla.redhat.com/show_bug.cgi?id=19923221992322https://bugzilla.redhat.com/show_bug.cgi?id=19923231992323https://bugzilla.redhat.com/show_bug.cgi?id=19923241992324https://bugzilla.redhat.com/show_bug.cgi?id=19923251992325https://bugzilla.redhat.com/show_bug.cgi?id=19923261992326https://bugzilla.redhat.com/show_bug.cgi?id=19966931996693The following packages have been upgraded to a later upstream version: mysql (8.0.26).https://bugzilla.redhat.com/show_bug.cgi?id=19966991996699* Segfault and possible DoS with a crafted queryhttps://errata.rockylinux.org/RLSA-2021:3590RLSA-2021:3590RLSA-2021:3590 0`f?mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm@mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm0`f?mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm@mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm> LBBBBBBBBBBBBbugfixgcc-toolset-10-elfutils bug fix updateR https://bugzilla.redhat.com/show_bug.cgi?id=20010132001013* The gcc-toolset-10-elfutils-devel package has been updated to provide a fix that will facilitate upgrading to upcoming Red Hat Enterprise Linux 8.5 from version 8.4.https://errata.rockylinux.org/RLBA-2021:3593RLBA-2021:3593RLBA-2021:3593 -0gcc-toolset-10-elfutils-0.182-6.el8_4.x86_64.rpm.0gcc-toolset-10-elfutils-debuginfod-client-0.182-6.el8_4.x86_64.rpm/0gcc-toolset-10-elfutils-debuginfod-client-devel-0.182-6.el8_4.x86_64.rpm00gcc-toolset-10-elfutils-devel-0.182-6.el8_4.x86_64.rpm10gcc-toolset-10-elfutils-libelf-0.182-6.el8_4.x86_64.rpm20gcc-toolset-10-elfutils-libelf-devel-0.182-6.el8_4.x86_64.rpm30gcc-toolset-10-elfutils-libs-0.182-6.el8_4.x86_64.rpm-0gcc-toolset-10-elfutils-0.182-6.el8_4.x86_64.rpm.0gcc-toolset-10-elfutils-debuginfod-client-0.182-6.el8_4.x86_64.rpm/0gcc-toolset-10-elfutils-debuginfod-client-devel-0.182-6.el8_4.x86_64.rpm00gcc-toolset-10-elfutils-devel-0.182-6.el8_4.x86_64.rpm10gcc-toolset-10-elfutils-libelf-0.182-6.el8_4.x86_64.rpm20gcc-toolset-10-elfutils-libelf-devel-0.182-6.el8_4.x86_64.rpm30gcc-toolset-10-elfutils-libs-0.182-6.el8_4.x86_64.rpm i1securityImportant: nodejs:12 security and bug fix updateQhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22930CVE-2021-22930CVE-2021-22930https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22931CVE-2021-22931CVE-2021-22931https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22939CVE-2021-22939CVE-2021-22939https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22940CVE-2021-22940CVE-2021-22940https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23343CVE-2021-23343CVE-2021-23343https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32803CVE-2021-32803CVE-2021-32803https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32804CVE-2021-32804CVE-2021-32804https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3672CVE-2021-3672CVE-2021-3672https://bugzilla.redhat.com/show_bug.cgi?id=19568181956818https://bugzilla.redhat.com/show_bug.cgi?id=19883421988342https://bugzilla.redhat.com/show_bug.cgi?id=19883941988394https://bugzilla.redhat.com/show_bug.cgi?id=19904091990409https://bugzilla.redhat.com/show_bug.cgi?id=19904151990415https://bugzilla.redhat.com/show_bug.cgi?id=19930191993019https://bugzilla.redhat.com/show_bug.cgi?id=19930291993029https://bugzilla.redhat.com/show_bug.cgi?id=19930391993039https://bugzilla.redhat.com/show_bug.cgi?id=19939271993927* nodejs:12/nodejs: Make FIPS options always availablehttps://errata.rockylinux.org/RLSA-2021:3623RLSA-2021:3623RLSA-2021:3623 /}WCAnodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm/}WCAnodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm!@ FBBBBBOBBBBBLbugfixcontainer-tools:rhel8 bug fix updatefO https://bugzilla.redhat.com/show_bug.cgi?id=20050532005053* kubelet service fail to load EnvironmentFile due to SELinux denialhttps://errata.rockylinux.org/RLBA-2021:3661RLBA-2021:3661RLBA-2021:3661 pW9containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm.0python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmpW9containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm.0python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm. Y)securityImportant: nodejs:14 security and bug fix update5https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22930CVE-2021-22930CVE-2021-22930https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22931CVE-2021-22931CVE-2021-22931https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22939CVE-2021-22939CVE-2021-22939https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22940CVE-2021-22940CVE-2021-22940https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23343CVE-2021-23343CVE-2021-23343https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32803CVE-2021-32803CVE-2021-32803https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32804CVE-2021-32804CVE-2021-32804https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3672CVE-2021-3672CVE-2021-3672https://bugzilla.redhat.com/show_bug.cgi?id=19568181956818https://bugzilla.redhat.com/show_bug.cgi?id=19883421988342https://bugzilla.redhat.com/show_bug.cgi?id=19883941988394https://bugzilla.redhat.com/show_bug.cgi?id=19904091990409https://bugzilla.redhat.com/show_bug.cgi?id=19904151990415https://bugzilla.redhat.com/show_bug.cgi?id=19930191993019https://bugzilla.redhat.com/show_bug.cgi?id=19930291993029https://bugzilla.redhat.com/show_bug.cgi?id=19930391993039https://bugzilla.redhat.com/show_bug.cgi?id=19939241993924* nodejs:14/nodejs: Make FIPS options always availablehttps://errata.rockylinux.org/RLSA-2021:3666RLSA-2021:3666RLSA-2021:3666 /}WCAnodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm:mnodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm/}WCAnodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm:mnodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm0 BsecurityImportant: httpd:2.4 security updateJkhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691CVE-2021-26691CVE-2021-26691https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438CVE-2021-40438CVE-2021-40438https://bugzilla.redhat.com/show_bug.cgi?id=19667321966732https://bugzilla.redhat.com/show_bug.cgi?id=20051172005117https://errata.rockylinux.org/RLSA-2021:3816RLSA-2021:3816RLSA-2021:3816 [Xrkmod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm[Xrkmod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm4 $_BBBsecurityImportant: redis:5 security update5Q https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626CVE-2021-32626CVE-2021-32626https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627CVE-2021-32627CVE-2021-32627https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628CVE-2021-32628CVE-2021-32628https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675CVE-2021-32675CVE-2021-32675https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687CVE-2021-32687CVE-2021-32687https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099CVE-2021-41099CVE-2021-41099https://bugzilla.redhat.com/show_bug.cgi?id=20109912010991https://bugzilla.redhat.com/show_bug.cgi?id=20110002011000https://bugzilla.redhat.com/show_bug.cgi?id=20110042011004https://bugzilla.redhat.com/show_bug.cgi?id=20110102011010https://bugzilla.redhat.com/show_bug.cgi?id=20110172011017https://bugzilla.redhat.com/show_bug.cgi?id=20110202011020https://errata.rockylinux.org/RLSA-2021:3918RLSA-2021:3918RLSA-2021:3918  JT  'redis-5.0.3-5.module+el8.5.0+657+2674830e.x86_64.rpm'redis-devel-5.0.3-5.module+el8.5.0+657+2674830e.x86_64.rpme'redis-doc-5.0.3-5.module+el8.5.0+657+2674830e.noarch.rpm JT  'redis-5.0.3-5.module+el8.5.0+657+2674830e.x86_64.rpm'redis-devel-5.0.3-5.module+el8.5.0+657+2674830e.x86_64.rpme'redis-doc-5.0.3-5.module+el8.5.0+657+2674830e.noarch.rpm4 *eBBBsecurityImportant: redis:6 security updateQ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32626CVE-2021-32626CVE-2021-32626https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627CVE-2021-32627CVE-2021-32627https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32628CVE-2021-32628CVE-2021-32628https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675CVE-2021-32675CVE-2021-32675https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687CVE-2021-32687CVE-2021-32687https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099CVE-2021-41099CVE-2021-41099https://bugzilla.redhat.com/show_bug.cgi?id=20109912010991https://bugzilla.redhat.com/show_bug.cgi?id=20110002011000https://bugzilla.redhat.com/show_bug.cgi?id=20110042011004https://bugzilla.redhat.com/show_bug.cgi?id=20110102011010https://bugzilla.redhat.com/show_bug.cgi?id=20110172011017https://bugzilla.redhat.com/show_bug.cgi?id=20110202011020https://errata.rockylinux.org/RLSA-2021:3945RLSA-2021:3945RLSA-2021:3945  vU  )redis-6.0.9-5.module+el8.5.0+658+72172854.x86_64.rpm)redis-devel-6.0.9-5.module+el8.5.0+658+72172854.x86_64.rpme)redis-doc-6.0.9-5.module+el8.5.0+658+72172854.noarch.rpm vU  )redis-6.0.9-5.module+el8.5.0+658+72172854.x86_64.rpm)redis-devel-6.0.9-5.module+el8.5.0+658+72172854.x86_64.rpme)redis-doc-6.0.9-5.module+el8.5.0+658+72172854.noarch.rpm5A +FBBBBBOBBBBBLBRJWbugfixcontainer-tools:3.0 bug fix updateW  https://bugzilla.redhat.com/show_bug.cgi?id=19992451999245* kubelet service fail to load EnvironmentFile due to SELinux denialhttps://bugzilla.redhat.com/show_bug.cgi?id=19992641999264* 3.0-8.5.0: Under load, container failed to be created due to missing cgroup scopehttps://errata.rockylinux.org/RLBA-2021:4093RLBA-2021:4093RLBA-2021:4093 pW Scockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm9containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmL fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm.0python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm2_udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpmpW Scockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm9containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmL fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm.0python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm2_udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpmGB ,vBEBTNBBBBbugfixidm:DL1 bug fix update` https://bugzilla.redhat.com/show_bug.cgi?id=20036072003607* Dirsrv memory leakhttps://errata.rockylinux.org/RLBA-2021:4094RLBA-2021:4094RLBA-2021:4094 2/oq9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm7opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm9softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm:softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm2/oq9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm7opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm9softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm:softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpmT enhancementmodulemd-tools bug fix and enhancement update1) https://bugzilla.redhat.com/show_bug.cgi?id=18017471801747https://errata.rockylinux.org/RLEA-2021:4152RLEA-2021:4152RLEA-2021:4152 umodulemd-tools-0.7-6.el8.noarch.rpmumodulemd-tools-0.7-6.el8.noarch.rpmx  JBaBBBBBBBBBBBBsecurityModerate: container-tools:rhel8 security, bug fix, and enhancement updateZ9https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20291CVE-2021-20291CVE-2021-20291https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3602CVE-2021-3602CVE-2021-3602https://bugzilla.redhat.com/show_bug.cgi?id=19146871914687https://bugzilla.redhat.com/show_bug.cgi?id=19289351928935https://bugzilla.redhat.com/show_bug.cgi?id=19323991932399https://bugzilla.redhat.com/show_bug.cgi?id=19337751933775https://bugzilla.redhat.com/show_bug.cgi?id=19337761933776https://bugzilla.redhat.com/show_bug.cgi?id=19344151934415https://bugzilla.redhat.com/show_bug.cgi?id=19344801934480https://bugzilla.redhat.com/show_bug.cgi?id=19376411937641https://bugzilla.redhat.com/show_bug.cgi?id=19378301937830https://bugzilla.redhat.com/show_bug.cgi?id=19394851939485https://bugzilla.redhat.com/show_bug.cgi?id=19400371940037https://bugzilla.redhat.com/show_bug.cgi?id=19400541940054https://bugzilla.redhat.com/show_bug.cgi?id=19400821940082https://bugzilla.redhat.com/show_bug.cgi?id=19404931940493https://bugzilla.redhat.com/show_bug.cgi?id=19413801941380https://bugzilla.redhat.com/show_bug.cgi?id=19474321947432https://bugzilla.redhat.com/show_bug.cgi?id=19479991947999https://bugzilla.redhat.com/show_bug.cgi?id=19522041952204https://bugzilla.redhat.com/show_bug.cgi?id=19526981952698https://bugzilla.redhat.com/show_bug.cgi?id=19572991957299https://bugzilla.redhat.com/show_bug.cgi?id=19578401957840https://bugzilla.redhat.com/show_bug.cgi?id=19579041957904https://bugzilla.redhat.com/show_bug.cgi?id=19583531958353https://bugzilla.redhat.com/show_bug.cgi?id=19609481960948https://bugzilla.redhat.com/show_bug.cgi?id=19665381966538https://bugzilla.redhat.com/show_bug.cgi?id=19668721966872https://bugzilla.redhat.com/show_bug.cgi?id=19692641969264https://bugzilla.redhat.com/show_bug.cgi?id=19721501972150https://bugzilla.redhat.com/show_bug.cgi?id=19722091972209https://bugzilla.redhat.com/show_bug.cgi?id=19722111972211https://bugzilla.redhat.com/show_bug.cgi?id=19722821972282https://bugzilla.redhat.com/show_bug.cgi?id=19726481972648https://bugzilla.redhat.com/show_bug.cgi?id=19734181973418https://bugzilla.redhat.com/show_bug.cgi?id=19762831976283https://bugzilla.redhat.com/show_bug.cgi?id=19772801977280https://bugzilla.redhat.com/show_bug.cgi?id=19776731977673https://bugzilla.redhat.com/show_bug.cgi?id=19784151978415https://bugzilla.redhat.com/show_bug.cgi?id=19785561978556https://bugzilla.redhat.com/show_bug.cgi?id=19786471978647https://bugzilla.redhat.com/show_bug.cgi?id=19794971979497https://bugzilla.redhat.com/show_bug.cgi?id=19802121980212https://bugzilla.redhat.com/show_bug.cgi?id=19825931982593https://bugzilla.redhat.com/show_bug.cgi?id=19827621982762https://bugzilla.redhat.com/show_bug.cgi?id=19854991985499https://bugzilla.redhat.com/show_bug.cgi?id=19859051985905https://bugzilla.redhat.com/show_bug.cgi?id=19870491987049https://bugzilla.redhat.com/show_bug.cgi?id=19932091993209https://bugzilla.redhat.com/show_bug.cgi?id=19932491993249https://bugzilla.redhat.com/show_bug.cgi?id=19950411995041https://bugzilla.redhat.com/show_bug.cgi?id=19981911998191https://bugzilla.redhat.com/show_bug.cgi?id=19991441999144https://bugzilla.redhat.com/show_bug.cgi?id=20009432000943https://bugzilla.redhat.com/show_bug.cgi?id=20045622004562https://bugzilla.redhat.com/show_bug.cgi?id=20050182005018https://errata.rockylinux.org/RLSA-2021:4154RLSA-2021:4154RLSA-2021:4154 $zW-crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm*criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm!criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm"criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpmTXlibslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmUXlibslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm.python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm$zW-crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm*criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm!criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm"criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpmTXlibslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmUXlibslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm.python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm  dBBBBBBBBBBBBBBBBBBBBBCBBBBBBBBsecurityModerate: python39:3.9 and python39-devel:3.9 security update_[https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28957CVE-2021-28957CVE-2021-28957https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921CVE-2021-29921CVE-2021-29921https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33503CVE-2021-33503CVE-2021-33503https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426CVE-2021-3426CVE-2021-3426https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3572CVE-2021-3572CVE-2021-3572https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733CVE-2021-3733CVE-2021-3733https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737CVE-2021-3737CVE-2021-3737https://bugzilla.redhat.com/show_bug.cgi?id=19359131935913https://bugzilla.redhat.com/show_bug.cgi?id=19415341941534https://bugzilla.redhat.com/show_bug.cgi?id=19574581957458https://bugzilla.redhat.com/show_bug.cgi?id=19628561962856https://bugzilla.redhat.com/show_bug.cgi?id=19680741968074https://bugzilla.redhat.com/show_bug.cgi?id=19951621995162https://bugzilla.redhat.com/show_bug.cgi?id=19952341995234https://errata.rockylinux.org/RLSA-2021:4160RLSA-2021:4160RLSA-2021:4160 or"QJ?python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpmKbpython39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpmQpython39-idna-2.10-3.module+el8.4.0+574+843c4898.noarch.rpm&'python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm_'python39-numpy-doc-1.19.4-3.module+el8.5.0+673+10283621.noarch.rpm''python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpmLkpython39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpmMSpython39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpmNSpython39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpmOSpython39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpmRpython39-pycparser-2.20-3.module+el8.4.0+574+843c4898.noarch.rpmPipython39-PyMySQL-0.10.1-2.module+el8.5.0+673+10283621.noarch.rpmPhpython39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpmSpython39-requests-2.25.0-2.module+el8.4.0+574+843c4898.noarch.rpmQHpython39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm`spython39-setuptools-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpmaspython39-setuptools-wheel-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpmTspython39-six-1.15.0-3.module+el8.4.0+574+843c4898.noarch.rpmUjpython39-toml-0.10.1-5.module+el8.4.0+574+843c4898.noarch.rpmbEpython39-urllib3-1.25.10-4.module+el8.5.0+673+10283621.noarch.rpmchpython39-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpmdhpython39-wheel-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpmor"QJ?python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpmKbpython39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpmQpython39-idna-2.10-3.module+el8.4.0+574+843c4898.noarch.rpm&'python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm_'python39-numpy-doc-1.19.4-3.module+el8.5.0+673+10283621.noarch.rpm''python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpmLkpython39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpmMSpython39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpmNSpython39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpmOSpython39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpmRpython39-pycparser-2.20-3.module+el8.4.0+574+843c4898.noarch.rpmPipython39-PyMySQL-0.10.1-2.module+el8.5.0+673+10283621.noarch.rpmPhpython39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpmSpython39-requests-2.25.0-2.module+el8.4.0+574+843c4898.noarch.rpmQHpython39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm`spython39-setuptools-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpmaspython39-setuptools-wheel-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpmTspython39-six-1.15.0-3.module+el8.4.0+574+843c4898.noarch.rpmUjpython39-toml-0.10.1-5.module+el8.4.0+574+843c4898.noarch.rpmbEpython39-urllib3-1.25.10-4.module+el8.5.0+673+10283621.noarch.rpmchpython39-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpmdhpython39-wheel-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm  securityModerate: python-jinja2 security update:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28493CVE-2020-28493CVE-2020-28493https://bugzilla.redhat.com/show_bug.cgi?id=19287071928707https://errata.rockylinux.org/RLSA-2021:4161RLSA-2021:4161RLSA-2021:4161 GUpython3-jinja2-2.10.1-3.el8.noarch.rpmGUpython3-jinja2-2.10.1-3.el8.noarch.rpmC Dbugfixmariadb-connector-odbc bug fix and enhancement update<) https://bugzilla.redhat.com/show_bug.cgi?id=19221051922105https://bugzilla.redhat.com/show_bug.cgi?id=19446921944692https://errata.rockylinux.org/RLBA-2021:4163RLBA-2021:4163RLBA-2021:4163 mariadb-connector-odbc-3.1.12-1.el8.x86_64.rpmmariadb-connector-odbc-3.1.12-1.el8.x86_64.rpmD bugfixsil-nuosu-fonts bug fix and enhancement updatee) https://bugzilla.redhat.com/show_bug.cgi?id=17626231762623https://errata.rockylinux.org/RLBA-2021:4164RLBA-2021:4164RLBA-2021:4164 'bsil-nuosu-fonts-2.200-2.el8.noarch.rpm'bsil-nuosu-fonts-2.200-2.el8.noarch.rpmE Ibugfixsocat bug fix and enhancement update) https://bugzilla.redhat.com/show_bug.cgi?id=18051321805132https://bugzilla.redhat.com/show_bug.cgi?id=18702791870279https://bugzilla.redhat.com/show_bug.cgi?id=19149891914989https://bugzilla.redhat.com/show_bug.cgi?id=19473381947338https://errata.rockylinux.org/RLBA-2021:4167RLBA-2021:4167RLBA-2021:4167 n[socat-1.7.4.1-1.el8.x86_64.rpmn[socat-1.7.4.1-1.el8.x86_64.rpmF Lbugfixlibreoffice-voikko bug fix and enhancement update7) https://bugzilla.redhat.com/show_bug.cgi?id=18623851862385https://errata.rockylinux.org/RLBA-2021:4170RLBA-2021:4170RLBA-2021:4170 A~libreoffice-voikko-5.0-6.el8.x86_64.rpmA~libreoffice-voikko-5.0-6.el8.x86_64.rpm  OsecurityLow: file-roller security update`_lhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36314CVE-2020-36314CVE-2020-36314https://bugzilla.redhat.com/show_bug.cgi?id=19475341947534https://errata.rockylinux.org/RLSA-2021:4179RLSA-2021:4179RLSA-2021:4179  afile-roller-3.28.1-4.el8.x86_64.rpm afile-roller-3.28.1-4.el8.x86_64.rpmG RBBBBBBBBbugfixevolution, evolution-data-server, evolution-ews bug fix and enhancement update?) https://bugzilla.redhat.com/show_bug.cgi?id=19527921952792https://bugzilla.redhat.com/show_bug.cgi?id=19611921961192https://bugzilla.redhat.com/show_bug.cgi?id=19716761971676https://bugzilla.redhat.com/show_bug.cgi?id=19727491972749https://errata.rockylinux.org/RLBA-2021:4180RLBA-2021:4180RLBA-2021:4180 Nevolution-3.28.5-18.el8.x86_64.rpmNevolution-bogofilter-3.28.5-18.el8.x86_64.rpmNevolution-help-3.28.5-18.el8.noarch.rpmNevolution-langpacks-3.28.5-18.el8.noarch.rpmNevolution-pst-3.28.5-18.el8.x86_64.rpmNevolution-spamassassin-3.28.5-18.el8.x86_64.rpmNevolution-3.28.5-18.el8.x86_64.rpmNevolution-bogofilter-3.28.5-18.el8.x86_64.rpmNevolution-help-3.28.5-18.el8.noarch.rpmNevolution-langpacks-3.28.5-18.el8.noarch.rpmNevolution-pst-3.28.5-18.el8.x86_64.rpmNevolution-spamassassin-3.28.5-18.el8.x86_64.rpm ZBBBBBBBBBBBUsecurityModerate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement updateh=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15859CVE-2020-15859CVE-2020-15859https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3592CVE-2021-3592CVE-2021-3592https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3593CVE-2021-3593CVE-2021-3593https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3594CVE-2021-3594CVE-2021-3594https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3595CVE-2021-3595CVE-2021-3595https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3631CVE-2021-3631CVE-2021-3631https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3667CVE-2021-3667CVE-2021-3667https://bugzilla.redhat.com/show_bug.cgi?id=18552501855250https://bugzilla.redhat.com/show_bug.cgi?id=18591681859168https://bugzilla.redhat.com/show_bug.cgi?id=19293571929357https://bugzilla.redhat.com/show_bug.cgi?id=19328231932823https://bugzilla.redhat.com/show_bug.cgi?id=19336401933640https://bugzilla.redhat.com/show_bug.cgi?id=19345091934509https://bugzilla.redhat.com/show_bug.cgi?id=19394181939418https://bugzilla.redhat.com/show_bug.cgi?id=19428051942805https://bugzilla.redhat.com/show_bug.cgi?id=19615621961562https://bugzilla.redhat.com/show_bug.cgi?id=19673291967329https://bugzilla.redhat.com/show_bug.cgi?id=19674961967496https://bugzilla.redhat.com/show_bug.cgi?id=19677161967716https://bugzilla.redhat.com/show_bug.cgi?id=19679141967914https://bugzilla.redhat.com/show_bug.cgi?id=19698481969848https://bugzilla.redhat.com/show_bug.cgi?id=19704841970484https://bugzilla.redhat.com/show_bug.cgi?id=19704871970487https://bugzilla.redhat.com/show_bug.cgi?id=19704891970489https://bugzilla.redhat.com/show_bug.cgi?id=19704911970491https://bugzilla.redhat.com/show_bug.cgi?id=19777261977726https://bugzilla.redhat.com/show_bug.cgi?id=19821341982134https://bugzilla.redhat.com/show_bug.cgi?id=19860941986094https://bugzilla.redhat.com/show_bug.cgi?id=19940411994041https://errata.rockylinux.org/RLSA-2021:4191RLSA-2021:4191RLSA-2021:4191 tspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmtspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmEH &^BBBBBBbugfixrsyslog and its related dependencies bug fix and enhancement update%) https://bugzilla.redhat.com/show_bug.cgi?id=17833481783348https://bugzilla.redhat.com/show_bug.cgi?id=17956071795607https://bugzilla.redhat.com/show_bug.cgi?id=18554221855422https://bugzilla.redhat.com/show_bug.cgi?id=18668771866877https://bugzilla.redhat.com/show_bug.cgi?id=18804341880434https://bugzilla.redhat.com/show_bug.cgi?id=18864001886400https://bugzilla.redhat.com/show_bug.cgi?id=18914581891458https://bugzilla.redhat.com/show_bug.cgi?id=19327831932783https://bugzilla.redhat.com/show_bug.cgi?id=19327951932795https://bugzilla.redhat.com/show_bug.cgi?id=19368071936807https://bugzilla.redhat.com/show_bug.cgi?id=19447181944718https://bugzilla.redhat.com/show_bug.cgi?id=19605361960536https://errata.rockylinux.org/RLBA-2021:4193RLBA-2021:4193RLBA-2021:4193 ?=librelp-1.9.0-1.el8.x86_64.rpmnlibfastjson-0.99.9-1.el8.x86_64.rpmMliblognorm-2.0.5-2.el8.x86_64.rpmMliblognorm-doc-2.0.5-2.el8.x86_64.rpm?=librelp-1.9.0-1.el8.x86_64.rpmnlibfastjson-0.99.9-1.el8.x86_64.rpmMliblognorm-2.0.5-2.el8.x86_64.rpmMliblognorm-doc-2.0.5-2.el8.x86_64.rpmFI )gbugfixpowertop bug fix and enhancement updateN) https://errata.rockylinux.org/RLBA-2021:4195RLBA-2021:4195RLBA-2021:4195 spowertop-2.14-1.el8.x86_64.rpmspowertop-2.14-1.el8.x86_64.rpmFJ .jBBbugfixlibgweather bug fix and enhancement updatew) https://errata.rockylinux.org/RLBA-2021:4196RLBA-2021:4196RLBA-2021:4196 $libgweather-3.28.2-4.el8.x86_64.rpm$libgweather-devel-3.28.2-4.el8.x86_64.rpm$libgweather-3.28.2-4.el8.x86_64.rpm$libgweather-devel-3.28.2-4.el8.x86_64.rpmG< /enhancementnew module: nodejs:16 p https://errata.rockylinux.org/RLEA-2021:4200RLEA-2021:4200RLEA-2021:4200 /Rr:nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm/Rr:nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpmG 10securityModerate: babel security and bug fix updateahttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20095CVE-2021-20095CVE-2021-20095https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42771CVE-2021-42771CVE-2021-42771https://bugzilla.redhat.com/show_bug.cgi?id=19556151955615https://errata.rockylinux.org/RLSA-2021:4201RLSA-2021:4201RLSA-2021:4201 Mtpython3-babel-2.5.1-7.el8.noarch.rpmMtpython3-babel-2.5.1-7.el8.noarch.rpmHK 32bugfixredfish-finder bug fix and enhancement updateq) https://bugzilla.redhat.com/show_bug.cgi?id=19512161951216https://errata.rockylinux.org/RLBA-2021:4209RLBA-2021:4209RLBA-2021:4209 redfish-finder-0.3-6.el8.noarch.rpmredfish-finder-0.3-6.el8.noarch.rpmHL 4Ibugfixmailman bug fix and enhancement update) https://bugzilla.redhat.com/show_bug.cgi?id=19073231907323https://errata.rockylinux.org/RLBA-2021:4212RLBA-2021:4212RLBA-2021:4212 }q!h}2mailman-2.1.29-12.module+el8.5.0+717+27fd1ba7.2.x86_64.rpm}q!h}2mailman-2.1.29-12.module+el8.5.0+717+27fd1ba7.2.x86_64.rpmI 5XBBBBBBBBBBBBBBsecurityModerate: php:7.4 security, bug fix, and enhancement updateCT https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068CVE-2020-7068CVE-2020-7068https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7069CVE-2020-7069CVE-2020-7069https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7070CVE-2020-7070CVE-2020-7070https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7071CVE-2020-7071CVE-2020-7071https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21702CVE-2021-21702CVE-2021-21702https://bugzilla.redhat.com/show_bug.cgi?id=18681091868109https://bugzilla.redhat.com/show_bug.cgi?id=18857351885735https://bugzilla.redhat.com/show_bug.cgi?id=18857381885738https://bugzilla.redhat.com/show_bug.cgi?id=19138461913846https://bugzilla.redhat.com/show_bug.cgi?id=19252721925272https://errata.rockylinux.org/RLSA-2021:4213RLSA-2021:4213RLSA-2021:4213 _c 0apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpmblibzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmclibzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmdlibzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmephp-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpmfphp-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpmtphp-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm;mphp-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpmgPphp-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm_c 0apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpmblibzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmclibzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmdlibzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmephp-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpmfphp-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpmtphp-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm;mphp-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpmgPphp-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpmQM 8vbugfixxorg-x11-font-utils bug fix and enhancement update) https://bugzilla.redhat.com/show_bug.cgi?id=18311181831118https://errata.rockylinux.org/RLBA-2021:4216RLBA-2021:4216RLBA-2021:4216 W)xorg-x11-font-utils-7.5-41.el8.x86_64.rpmW)xorg-x11-font-utils-7.5-41.el8.x86_64.rpmRN >yBBBbugfixstratis-cli bug fix and enhancement update@) https://bugzilla.redhat.com/show_bug.cgi?id=17074611707461https://bugzilla.redhat.com/show_bug.cgi?id=17354751735475https://bugzilla.redhat.com/show_bug.cgi?id=19274851927485https://bugzilla.redhat.com/show_bug.cgi?id=19316701931670https://bugzilla.redhat.com/show_bug.cgi?id=19316711931671https://bugzilla.redhat.com/show_bug.cgi?id=19723551972355https://bugzilla.redhat.com/show_bug.cgi?id=19959161995916https://errata.rockylinux.org/RLBA-2021:4217RLBA-2021:4217RLBA-2021:4217 .pstratis-cli-2.4.2-1.el8.noarch.rpm~ stratisd-2.4.2-2.el8.x86_64.rpm stratisd-dracut-2.4.2-2.el8.x86_64.rpm.pstratis-cli-2.4.2-1.el8.noarch.rpm~ stratisd-2.4.2-2.el8.x86_64.rpm stratisd-dracut-2.4.2-2.el8.x86_64.rpmRO bugfixudftools bug fix and enhancement updatei) https://errata.rockylinux.org/RLBA-2021:4218RLBA-2021:4218RLBA-2021:4218 "Tudftools-2.3-2.el8.x86_64.rpm"Tudftools-2.3-2.el8.x86_64.rpmSP Bbugfixlibinput and libevdev bug fix and enhancement update) https://bugzilla.redhat.com/show_bug.cgi?id=19518851951885https://bugzilla.redhat.com/show_bug.cgi?id=19637671963767https://errata.rockylinux.org/RLBA-2021:4219RLBA-2021:4219RLBA-2021:4219 }libevdev-1.10.0-1.el8.x86_64.rpm}libevdev-1.10.0-1.el8.x86_64.rpmSQ EBBbugfixxapian-core bug fix and enhancement update;) https://errata.rockylinux.org/RLBA-2021:4220RLBA-2021:4220RLBA-2021:4220 H3xapian-core-1.4.18-3.el8.x86_64.rpmI3xapian-core-libs-1.4.18-3.el8.x86_64.rpmH3xapian-core-1.4.18-3.el8.x86_64.rpmI3xapian-core-libs-1.4.18-3.el8.x86_64.rpmT hCBFBBBFLBBRBBCBBBBOBBBBBGsecurityModerate: container-tools:2.0 security updatedEhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3602CVE-2021-3602CVE-2021-3602https://bugzilla.redhat.com/show_bug.cgi?id=19692641969264https://errata.rockylinux.org/RLSA-2021:4221RLSA-2021:4221RLSA-2021:4221 ~RScockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm1acontainers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmHcontainer-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmLfuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm8 runc-1.0.0-66.rc10.module+el8.5.0+770+e2f49861.x86_64.rpmhaskopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmwaskopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm~RScockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm1acontainers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmHcontainer-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmLfuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm8 runc-1.0.0-66.rc10.module+el8.5.0+770+e2f49861.x86_64.rpmhaskopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmwaskopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpmi FBBBBBOBBBBBLBRJWBPsecurityModerate: container-tools:3.0 security and bug fix update)Ehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3602CVE-2021-3602CVE-2021-3602https://bugzilla.redhat.com/show_bug.cgi?id=19692641969264https://bugzilla.redhat.com/show_bug.cgi?id=19904061990406https://errata.rockylinux.org/RLSA-2021:4222RLSA-2021:4222RLSA-2021:4222 pW Scockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm9containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmL fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm\Qoci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm.0python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm2_udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpmpW Scockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm9containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmL fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm\Qoci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm.0python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm2_udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm}R LBbugfixlibwacom bug fix and enhancement updaten) https://bugzilla.redhat.com/show_bug.cgi?id=19408741940874https://errata.rockylinux.org/RLBA-2021:4224RLBA-2021:4224RLBA-2021:4224 r}libwacom-1.6-3.el8.x86_64.rpme}libwacom-data-1.6-3.el8.noarch.rpmr}libwacom-1.6-3.el8.x86_64.rpme}libwacom-data-1.6-3.el8.noarch.rpm}S Pbugfixrshim bug fix and enhancement update) https://errata.rockylinux.org/RLBA-2021:4228RLBA-2021:4228RLBA-2021:4228 7Mrshim-2.0.5-2.el8.x86_64.rpm7Mrshim-2.0.5-2.el8.x86_64.rpm~= SBBBBenhancementgoogle-noto-emoji-fonts and pango bug fix and enhancement update@) https://bugzilla.redhat.com/show_bug.cgi?id=18975411897541https://bugzilla.redhat.com/show_bug.cgi?id=19630181963018https://errata.rockylinux.org/RLEA-2021:4229RLEA-2021:4229RLEA-2021:4229 A{google-noto-emoji-color-fonts-20200916-2.el8.noarch.rpmB{google-noto-emoji-fonts-20200916-2.el8.noarch.rpmy4pango-1.42.4-8.el8.x86_64.rpmz4pango-devel-1.42.4-8.el8.x86_64.rpmA{google-noto-emoji-color-fonts-20200916-2.el8.noarch.rpmB{google-noto-emoji-fonts-20200916-2.el8.noarch.rpmy4pango-1.42.4-8.el8.x86_64.rpmz4pango-devel-1.42.4-8.el8.x86_64.rpm~T vBEBTNBBBBbugfixipa bug fix and enhancement updatei) +https://bugzilla.redhat.com/show_bug.cgi?id=17777641777764https://bugzilla.redhat.com/show_bug.cgi?id=17799841779984https://bugzilla.redhat.com/show_bug.cgi?id=17800201780020https://bugzilla.redhat.com/show_bug.cgi?id=17800621780062https://bugzilla.redhat.com/show_bug.cgi?id=17803171780317https://bugzilla.redhat.com/show_bug.cgi?id=17811071781107https://bugzilla.redhat.com/show_bug.cgi?id=17980331798033https://bugzilla.redhat.com/show_bug.cgi?id=18101491810149https://bugzilla.redhat.com/show_bug.cgi?id=18358531835853https://bugzilla.redhat.com/show_bug.cgi?id=18545571854557https://bugzilla.redhat.com/show_bug.cgi?id=18868371886837https://bugzilla.redhat.com/show_bug.cgi?id=18947811894781https://bugzilla.redhat.com/show_bug.cgi?id=19032501903250https://bugzilla.redhat.com/show_bug.cgi?id=19125561912556https://bugzilla.redhat.com/show_bug.cgi?id=19288541928854https://bugzilla.redhat.com/show_bug.cgi?id=19341961934196https://bugzilla.redhat.com/show_bug.cgi?id=19349911934991https://bugzilla.redhat.com/show_bug.cgi?id=19378561937856https://bugzilla.redhat.com/show_bug.cgi?id=19405031940503https://bugzilla.redhat.com/show_bug.cgi?id=19431511943151https://bugzilla.redhat.com/show_bug.cgi?id=19450381945038https://bugzilla.redhat.com/show_bug.cgi?id=19509141950914https://bugzilla.redhat.com/show_bug.cgi?id=19515111951511https://bugzilla.redhat.com/show_bug.cgi?id=19536561953656https://bugzilla.redhat.com/show_bug.cgi?id=19577681957768https://bugzilla.redhat.com/show_bug.cgi?id=19589091958909https://bugzilla.redhat.com/show_bug.cgi?id=19673251967325https://bugzilla.redhat.com/show_bug.cgi?id=19679061967906https://bugzilla.redhat.com/show_bug.cgi?id=19730231973023https://bugzilla.redhat.com/show_bug.cgi?id=19732731973273https://bugzilla.redhat.com/show_bug.cgi?id=19748221974822https://bugzilla.redhat.com/show_bug.cgi?id=19762861976286https://bugzilla.redhat.com/show_bug.cgi?id=19796051979605https://bugzilla.redhat.com/show_bug.cgi?id=19796251979625https://bugzilla.redhat.com/show_bug.cgi?id=19822111982211https://bugzilla.redhat.com/show_bug.cgi?id=19829561982956https://bugzilla.redhat.com/show_bug.cgi?id=19981291998129https://bugzilla.redhat.com/show_bug.cgi?id=19991421999142https://bugzilla.redhat.com/show_bug.cgi?id=19998931999893https://bugzilla.redhat.com/show_bug.cgi?id=19999921999992https://bugzilla.redhat.com/show_bug.cgi?id=20002632000263https://bugzilla.redhat.com/show_bug.cgi?id=20005532000553https://errata.rockylinux.org/RLBA-2021:4230RLBA-2021:4230RLBA-2021:4230 2/oq9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm7opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm9softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm:softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm2/oq9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm7opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm9softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm:softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm  [BBsecurityModerate: libwebp security updatebhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25009CVE-2018-25009CVE-2018-25009https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25010CVE-2018-25010CVE-2018-25010https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25012CVE-2018-25012CVE-2018-25012https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25013CVE-2018-25013CVE-2018-25013https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25014CVE-2018-25014CVE-2018-25014https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36330CVE-2020-36330CVE-2020-36330https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36331CVE-2020-36331CVE-2020-36331https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36332CVE-2020-36332CVE-2020-36332https://bugzilla.redhat.com/show_bug.cgi?id=19568531956853https://bugzilla.redhat.com/show_bug.cgi?id=19568561956856https://bugzilla.redhat.com/show_bug.cgi?id=19568681956868https://bugzilla.redhat.com/show_bug.cgi?id=19569171956917https://bugzilla.redhat.com/show_bug.cgi?id=19569181956918https://bugzilla.redhat.com/show_bug.cgi?id=19569221956922https://bugzilla.redhat.com/show_bug.cgi?id=19569261956926https://bugzilla.redhat.com/show_bug.cgi?id=19569271956927https://errata.rockylinux.org/RLSA-2021:4231RLSA-2021:4231RLSA-2021:4231 M libwebp-1.0.0-5.el8.x86_64.rpmN libwebp-devel-1.0.0-5.el8.x86_64.rpmM libwebp-1.0.0-5.el8.x86_64.rpmN libwebp-devel-1.0.0-5.el8.x86_64.rpm > .`BBBBBBBBBBBBenhancementmesa and related packages bug fix and enhancement updatet) https://bugzilla.redhat.com/show_bug.cgi?id=19518421951842https://bugzilla.redhat.com/show_bug.cgi?id=19518431951843https://bugzilla.redhat.com/show_bug.cgi?id=19542601954260https://bugzilla.redhat.com/show_bug.cgi?id=19560721956072https://bugzilla.redhat.com/show_bug.cgi?id=19624771962477https://bugzilla.redhat.com/show_bug.cgi?id=19758621975862https://bugzilla.redhat.com/show_bug.cgi?id=19761321976132https://bugzilla.redhat.com/show_bug.cgi?id=19767801976780https://bugzilla.redhat.com/show_bug.cgi?id=19827461982746https://bugzilla.redhat.com/show_bug.cgi?id=19842601984260https://errata.rockylinux.org/RLEA-2021:4234RLEA-2021:4234RLEA-2021:4234 y7libepoxy-1.5.8-1.el8.x86_64.rpmz7libepoxy-devel-1.5.8-1.el8.x86_64.rpmslibwayland-client-1.19.0-1.el8.x86_64.rpmtlibwayland-cursor-1.19.0-1.el8.x86_64.rpmulibwayland-egl-1.19.0-1.el8.x86_64.rpmvlibwayland-server-1.19.0-1.el8.x86_64.rpm?wayland-devel-1.19.0-1.el8.x86_64.rpmy7libepoxy-1.5.8-1.el8.x86_64.rpmz7libepoxy-devel-1.5.8-1.el8.x86_64.rpmslibwayland-client-1.19.0-1.el8.x86_64.rpmtlibwayland-cursor-1.19.0-1.el8.x86_64.rpmulibwayland-egl-1.19.0-1.el8.x86_64.rpmvlibwayland-server-1.19.0-1.el8.x86_64.rpm?wayland-devel-1.19.0-1.el8.x86_64.rpm  1osecurityModerate: jasper security update~ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27828CVE-2020-27828CVE-2020-27828https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26926CVE-2021-26926CVE-2021-26926https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26927CVE-2021-26927CVE-2021-26927https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3272CVE-2021-3272CVE-2021-3272https://bugzilla.redhat.com/show_bug.cgi?id=19052011905201https://bugzilla.redhat.com/show_bug.cgi?id=19213251921325https://bugzilla.redhat.com/show_bug.cgi?id=19214261921426https://bugzilla.redhat.com/show_bug.cgi?id=19214281921428https://errata.rockylinux.org/RLSA-2021:4235RLSA-2021:4235RLSA-2021:4235 01jasper-libs-2.0.14-5.el8.x86_64.rpm01jasper-libs-2.0.14-5.el8.x86_64.rpm ? 4~lBBBBBBBBBBBBBBBBBBBBBBBBBxB@BBFBdZvenhancementpki-core bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=19253111925311https://bugzilla.redhat.com/show_bug.cgi?id=19305861930586https://bugzilla.redhat.com/show_bug.cgi?id=19526281952628https://bugzilla.redhat.com/show_bug.cgi?id=19693661969366https://bugzilla.redhat.com/show_bug.cgi?id=19727411972741https://bugzilla.redhat.com/show_bug.cgi?id=19760101976010https://bugzilla.redhat.com/show_bug.cgi?id=19923371992337https://bugzilla.redhat.com/show_bug.cgi?id=20015762001576https://errata.rockylinux.org/RLEA-2021:4239RLEA-2021:4239RLEA-2021:4239 <* |w$#"apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm$apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm`^apache-commons-net-3.6-3.module+el8.3.0+53+ea062990.noarch.rpm%bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm'glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm(glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm)wglassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm*wglassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm+wglassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm.vjackson-annotations-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm/vjackson-core-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm0vjackson-databind-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpmjackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpmjackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm, jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm-jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm.njavassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm/njavassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpmDopki-servlet-4.0-api-9.0.30-3.module+el8.5.0+697+f586bb30.noarch.rpmEopki-servlet-engine-9.0.30-3.module+el8.5.0+697+f586bb30.noarch.rpm <python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm <python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm5!relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm+Vresteasy-3.0.26-6.module+el8.5.0+697+f586bb30.noarch.rpmm.slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm6.slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm7stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm8velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm9xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm:xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm?xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm;xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm=xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm<xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm1Tldapjdk-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm2Tldapjdk-javadoc-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm<* "#"apache-commons-collections-3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm$apache-commons-lang-2.6-21.module+el8.3.0+53+ea062990.noarch.rpm`^apache-commons-net-3.6-3.module+el8.3.0+53+ea062990.noarch.rpm%bea-stax-api-1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm'glassfish-fastinfoset-1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm(glassfish-jaxb-api-2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm)wglassfish-jaxb-core-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm*wglassfish-jaxb-runtime-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm+wglassfish-jaxb-txw2-2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm.vjackson-annotations-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm/vjackson-core-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm0vjackson-databind-2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpmjackson-jaxrs-json-provider-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpmjackson-jaxrs-providers-2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm, jackson-module-jaxb-annotations-2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm-jakarta-commons-httpclient-3.1-28.module+el8.3.0+53+ea062990.noarch.rpm.njavassist-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm/njavassist-javadoc-3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpmDopki-servlet-4.0-api-9.0.30-3.module+el8.5.0+697+f586bb30.noarch.rpmEopki-servlet-engine-9.0.30-3.module+el8.5.0+697+f586bb30.noarch.rpm <python3-nss-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm <python-nss-doc-1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm5!relaxngDatatype-2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm+Vresteasy-3.0.26-6.module+el8.5.0+697+f586bb30.noarch.rpmm.slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm6.slf4j-jdk14-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm7stax-ex-1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm8velocity-1.7-24.module+el8.3.0+53+ea062990.noarch.rpm9xalan-j2-2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm:xerces-j2-2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm?xml-commons-apis-1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm;xml-commons-resolver-1.2-26.module+el8.3.0+53+ea062990.noarch.rpm=xsom-0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm<xmlstreambuffer-1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm|w1Tldapjdk-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm2Tldapjdk-javadoc-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm'@ 7uenhancementnew packages: gcc-toolset-11-dwz https://bugzilla.redhat.com/show_bug.cgi?id=18418301841830https://errata.rockylinux.org/RLEA-2021:4242RLEA-2021:4242RLEA-2021:4242 Ykgcc-toolset-11-dwz-0.14-2.el8.x86_64.rpmYkgcc-toolset-11-dwz-0.14-2.el8.x86_64.rpm'U :xbugfixdwz bug fix and enhancement update5 https://bugzilla.redhat.com/show_bug.cgi?id=19491851949185https://errata.rockylinux.org/RLBA-2021:4244RLBA-2021:4244RLBA-2021:4244 d,dwz-0.12-10.el8.x86_64.rpmd,dwz-0.12-10.el8.x86_64.rpm(A {BBBBBBBenhancementcmake bug fix and enhancement update4 https://bugzilla.redhat.com/show_bug.cgi?id=19607911960791https://errata.rockylinux.org/RLEA-2021:4246RLEA-2021:4246RLEA-2021:4246 8pcmake-3.20.2-4.el8.x86_64.rpmpcmake-data-3.20.2-4.el8.noarch.rpmpcmake-doc-3.20.2-4.el8.noarch.rpm9pcmake-filesystem-3.20.2-4.el8.x86_64.rpm:pcmake-gui-3.20.2-4.el8.x86_64.rpmpcmake-rpm-macros-3.20.2-4.el8.noarch.rpm8pcmake-3.20.2-4.el8.x86_64.rpmpcmake-data-3.20.2-4.el8.noarch.rpmpcmake-doc-3.20.2-4.el8.noarch.rpm9pcmake-filesystem-3.20.2-4.el8.x86_64.rpm:pcmake-gui-3.20.2-4.el8.x86_64.rpmpcmake-rpm-macros-3.20.2-4.el8.noarch.rpm(W bugfixcopy-jdk-configs bug fix and enhancement update3) https://bugzilla.redhat.com/show_bug.cgi?id=19539231953923https://bugzilla.redhat.com/show_bug.cgi?id=19653051965305https://errata.rockylinux.org/RLBA-2021:4255RLBA-2021:4255RLBA-2021:4255 6copy-jdk-configs-4.0-2.el8.noarch.rpm6copy-jdk-configs-4.0-2.el8.noarch.rpm) GsecurityModerate: graphviz security update\https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18032CVE-2020-18032CVE-2020-18032https://bugzilla.redhat.com/show_bug.cgi?id=19662721966272https://errata.rockylinux.org/RLSA-2021:4256RLSA-2021:4256RLSA-2021:4256 egraphviz-2.40.1-43.el8.x86_64.rpmegraphviz-2.40.1-43.el8.x86_64.rpm) BsecurityModerate: httpd:2.4 security, bug fix, and enhancement updateor https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26690CVE-2021-26690CVE-2021-26690https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30641CVE-2021-30641CVE-2021-30641https://bugzilla.redhat.com/show_bug.cgi?id=19056131905613https://bugzilla.redhat.com/show_bug.cgi?id=19347411934741https://bugzilla.redhat.com/show_bug.cgi?id=19357421935742https://bugzilla.redhat.com/show_bug.cgi?id=19373341937334https://bugzilla.redhat.com/show_bug.cgi?id=19525571952557https://bugzilla.redhat.com/show_bug.cgi?id=19667291966729https://bugzilla.redhat.com/show_bug.cgi?id=19667431966743https://errata.rockylinux.org/RLSA-2021:4257RLSA-2021:4257RLSA-2021:4257 [Xrkmod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm[Xrkmod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm,X KBBbugfixnew packages: gcc-toolset-11-dyninsta https://bugzilla.redhat.com/show_bug.cgi?id=19579421957942https://bugzilla.redhat.com/show_bug.cgi?id=19933171993317https://errata.rockylinux.org/RLBA-2021:4259RLBA-2021:4259RLBA-2021:4259 Zgcc-toolset-11-dyninst-11.0.0-2.el8.x86_64.rpm[gcc-toolset-11-dyninst-devel-11.0.0-2.el8.x86_64.rpmZgcc-toolset-11-dyninst-11.0.0-2.el8.x86_64.rpm[gcc-toolset-11-dyninst-devel-11.0.0-2.el8.x86_64.rpm-Y PBBbugfixnew packages: gcc-toolset-11-valgrind  https://bugzilla.redhat.com/show_bug.cgi?id=19373401937340https://bugzilla.redhat.com/show_bug.cgi?id=19572261957226https://bugzilla.redhat.com/show_bug.cgi?id=19670811967081https://errata.rockylinux.org/RLBA-2021:4263RLBA-2021:4263RLBA-2021:4263 bgcc-toolset-11-valgrind-3.17.0-6.el8.x86_64.rpmbgcc-toolset-11-valgrind-devel-3.17.0-6.el8.x86_64.rpmbgcc-toolset-11-valgrind-3.17.0-6.el8.x86_64.rpmbgcc-toolset-11-valgrind-devel-3.17.0-6.el8.x86_64.rpm-Z bugfixcloud-utils-growpart bug fix and enhancement update ) https://bugzilla.redhat.com/show_bug.cgi?id=18859921885992https://bugzilla.redhat.com/show_bug.cgi?id=19337681933768https://errata.rockylinux.org/RLBA-2021:4264RLBA-2021:4264RLBA-2021:4264 cloud-utils-growpart-0.31-3.el8.noarch.rpmcloud-utils-growpart-0.31-3.el8.noarch.rpm.[ bugfixcldr-emoji-annotation bug fix and enhancement updateI) https://bugzilla.redhat.com/show_bug.cgi?id=18975401897540https://errata.rockylinux.org/RLBA-2021:4266RLBA-2021:4266RLBA-2021:4266 4cldr-emoji-annotation-39-2.el8.noarch.rpm4cldr-emoji-annotation-39-2.el8.noarch.rpm.\ Ybugfixnew packages: gcc-toolset-11-ltracer https://errata.rockylinux.org/RLBA-2021:4274RLBA-2021:4274RLBA-2021:4274 v5gcc-toolset-11-ltrace-0.7.91-1.el8.x86_64.rpmv5gcc-toolset-11-ltrace-0.7.91-1.el8.x86_64.rpm.B gBzBaenhancementpostgresql:12 bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=19815181981518https://errata.rockylinux.org/RLEA-2021:4275RLEA-2021:4275RLEA-2021:4275 }{8Gpgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm:pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm% postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm}{8Gpgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm:pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm% postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm3C gBzBdenhancementpostgresql:13 bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=19826971982697https://errata.rockylinux.org/RLEA-2021:4276RLEA-2021:4276RLEA-2021:4276 gy8Qpgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm:pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm% postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpmgy8Qpgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm:pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm% postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm8D enhancementmod_security_crs bug fix and enhancement update) https://bugzilla.redhat.com/show_bug.cgi?id=18558581855858https://errata.rockylinux.org/RLEA-2021:4277RLEA-2021:4277RLEA-2021:4277 t(mod_security_crs-3.3.0-2.el8.noarch.rpmt(mod_security_crs-3.3.0-2.el8.noarch.rpm8] $`BBbugfixnew packages: gcc-toolset-11-make7 https://errata.rockylinux.org/RLBA-2021:4279RLBA-2021:4279RLBA-2021:4279 whgcc-toolset-11-make-4.3-2.el8.x86_64.rpmxhgcc-toolset-11-make-devel-4.3-2.el8.x86_64.rpmwhgcc-toolset-11-make-4.3-2.el8.x86_64.rpmxhgcc-toolset-11-make-devel-4.3-2.el8.x86_64.rpm9^ &%bugfixautoconf bug fix and enhancement updateS) https://bugzilla.redhat.com/show_bug.cgi?id=19565981956598https://errata.rockylinux.org/RLBA-2021:4280RLBA-2021:4280RLBA-2021:4280 qyautoconf-2.69-29.el8.noarch.rpmqyautoconf-2.69-29.el8.noarch.rpm9E 'fBYBBBBenhancementnew module: ruby:3.0|P https://bugzilla.redhat.com/show_bug.cgi?id=19389421938942https://errata.rockylinux.org/RLEA-2021:4282RLEA-2021:4282RLEA-2021:4282 z4 rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm5 rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm6`rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm)`rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm7brubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm*brubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpmz4 rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm5 rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm6`rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm)`rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm7brubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm*brubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpm=_ -hBBBbugfixlibvoikko bug fix and enhancement updateL) https://bugzilla.redhat.com/show_bug.cgi?id=19752951975295https://errata.rockylinux.org/RLBA-2021:4285RLBA-2021:4285RLBA-2021:4285 p$libvoikko-4.1.1-3.el8.x86_64.rpmX$python3-libvoikko-4.1.1-3.el8.noarch.rpm7$voikko-tools-4.1.1-3.el8.x86_64.rpmp$libvoikko-4.1.1-3.el8.x86_64.rpmX$python3-libvoikko-4.1.1-3.el8.noarch.rpm7$voikko-tools-4.1.1-3.el8.x86_64.rpm>F 0nenhancementlpsolve bug fix and enhancement updateu) https://errata.rockylinux.org/RLEA-2021:4286RLEA-2021:4286RLEA-2021:4286  lpsolve-5.5.2.0-21.el8.x86_64.rpm lpsolve-5.5.2.0-21.el8.x86_64.rpm> 9qBBBBBBsecurityModerate: libjpeg-turbo security and bug fix updateFhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541CVE-2020-17541CVE-2020-17541https://bugzilla.redhat.com/show_bug.cgi?id=19680361968036https://bugzilla.redhat.com/show_bug.cgi?id=19825721982572https://errata.rockylinux.org/RLSA-2021:4288RLSA-2021:4288RLSA-2021:4288 Tlibjpeg-turbo-1.5.3-12.el8.x86_64.rpmTlibjpeg-turbo-devel-1.5.3-12.el8.x86_64.rpmTlibjpeg-turbo-utils-1.5.3-12.el8.x86_64.rpm Tturbojpeg-1.5.3-12.el8.x86_64.rpmTlibjpeg-turbo-1.5.3-12.el8.x86_64.rpmTlibjpeg-turbo-devel-1.5.3-12.el8.x86_64.rpmTlibjpeg-turbo-utils-1.5.3-12.el8.x86_64.rpm Tturbojpeg-1.5.3-12.el8.x86_64.rpm?G platform-python-coverage-4.5.1-9.el8.x86_64.rpmR>python3-coverage-4.5.1-9.el8.x86_64.rpm>platform-python-coverage-4.5.1-9.el8.x86_64.rpmR>python3-coverage-4.5.1-9.el8.x86_64.rpmL @securityModerate: grilo security update=Phttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39365CVE-2021-39365CVE-2021-39365https://bugzilla.redhat.com/show_bug.cgi?id=19971611997161https://errata.rockylinux.org/RLSA-2021:4339RLSA-2021:4339RLSA-2021:4339 Igrilo-0.3.6-3.el8.x86_64.rpmIgrilo-0.3.6-3.el8.x86_64.rpmLK Cenhancementpcm bug fix and enhancement update ) https://errata.rockylinux.org/RLEA-2021:4345RLEA-2021:4345RLEA-2021:4345 |pcm-202107-5.el8.x86_64.rpm|pcm-202107-5.el8.x86_64.rpmLl FBBBBbugfixbrasero bug fix and enhancement update6) https://bugzilla.redhat.com/show_bug.cgi?id=17043411704341https://errata.rockylinux.org/RLBA-2021:4348RLBA-2021:4348RLBA-2021:4348 `brasero-3.12.2-5.el8.x86_64.rpm`brasero-libs-3.12.2-5.el8.x86_64.rpm`brasero-nautilus-3.12.2-5.el8.x86_64.rpm`brasero-3.12.2-5.el8.x86_64.rpm`brasero-libs-3.12.2-5.el8.x86_64.rpm`brasero-nautilus-3.12.2-5.el8.x86_64.rpmMm  bugfixsetroubleshoot-plugins bug fix and enhancement update_) https://bugzilla.redhat.com/show_bug.cgi?id=19620341962034https://errata.rockylinux.org/RLBA-2021:4350RLBA-2021:4350RLBA-2021:4350 &*setroubleshoot-plugins-3.3.14-1.el8.noarch.rpm&*setroubleshoot-plugins-3.3.14-1.el8.noarch.rpmM  @BBBBBBBBBBBBBBBBBBBBBBLBBVB[BBBBBBBBBBBsecurityModerate: python38:3.8 and python38-devel:3.8 security updatebhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18874CVE-2019-18874CVE-2019-18874https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619CVE-2020-27619CVE-2020-27619https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28493CVE-2020-28493CVE-2020-28493https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20095CVE-2021-20095CVE-2021-20095https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336CVE-2021-23336CVE-2021-23336https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28957CVE-2021-28957CVE-2021-28957https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921CVE-2021-29921CVE-2021-29921https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33503CVE-2021-33503CVE-2021-33503https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426CVE-2021-3426CVE-2021-3426https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3572CVE-2021-3572CVE-2021-3572https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42771CVE-2021-42771CVE-2021-42771https://bugzilla.redhat.com/show_bug.cgi?id=17720141772014https://bugzilla.redhat.com/show_bug.cgi?id=19287071928707https://bugzilla.redhat.com/show_bug.cgi?id=19289041928904https://bugzilla.redhat.com/show_bug.cgi?id=19359131935913https://bugzilla.redhat.com/show_bug.cgi?id=19415341941534https://bugzilla.redhat.com/show_bug.cgi?id=19556151955615https://bugzilla.redhat.com/show_bug.cgi?id=19574581957458https://bugzilla.redhat.com/show_bug.cgi?id=19628561962856https://bugzilla.redhat.com/show_bug.cgi?id=19680741968074https://errata.rockylinux.org/RLSA-2021:4162RLSA-2021:4162RLSA-2021:4162 b^1|python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm!Ppython38-babel-2.7.0-11.module+el8.5.0+672+ab6eb015.noarch.rpmhHpython38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm2python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpmilpython38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpmg?python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm3 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpmjFpython38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpmt;python38-numpy-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm";python38-numpy-doc-1.17.3-6.module+el8.5.0+672+ab6eb015.noarch.rpmu;python38-numpy-f2py-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpmNpython38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpmvFpython38-psutil-5.6.4-4.module+el8.5.0+672+ab6eb015.x86_64.rpmkpython38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmlpython38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmmpython38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm4 python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpmMhpython38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm5python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm6python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm%upython38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.x86_64.rpm7 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpmnSpython38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm#\python38-setuptools-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpm$\python38-setuptools-wheel-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpmOppython38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm%;python38-urllib3-1.25.7-5.module+el8.5.0+672+ab6eb015.noarch.rpm&Cpython38-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpm'Cpython38-wheel-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpmb^1|python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm!Ppython38-babel-2.7.0-11.module+el8.5.0+672+ab6eb015.noarch.rpmhHpython38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm2python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpmilpython38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpmg?python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm3 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpmjFpython38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpmt;python38-numpy-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm";python38-numpy-doc-1.17.3-6.module+el8.5.0+672+ab6eb015.noarch.rpmu;python38-numpy-f2py-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpmNpython38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpmvFpython38-psutil-5.6.4-4.module+el8.5.0+672+ab6eb015.x86_64.rpmkpython38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmlpython38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmmpython38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm4 python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpmMhpython38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm5python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm6python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm%upython38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.x86_64.rpm7 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpmnSpython38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm#\python38-setuptools-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpm$\python38-setuptools-wheel-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpmOppython38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm%;python38-urllib3-1.25.7-5.module+el8.5.0+672+ab6eb015.noarch.rpm&Cpython38-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpm'Cpython38-wheel-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpmas pBBBBBBBBBbugfixibus bug fix updatej https://bugzilla.redhat.com/show_bug.cgi?id=20140642014064* Previously, in GNOME Wayland desktop in RHEL 8.5, the IBus emoji candidate pop-up was used with IBus UI and the selected candidate could not inserted into the target input focus smartly. With this update, the IBus emoji candidate pop-up is used with GNOME-Shell UI in GNOME Wayland desktop and the selected candidate is inserted into the input focus correctly.https://errata.rockylinux.org/RLBA-2021:4533RLBA-2021:4533RLBA-2021:4533 #jibus-1.5.19-14.el8_5.x86_64.rpm$jibus-gtk2-1.5.19-14.el8_5.x86_64.rpm%jibus-gtk3-1.5.19-14.el8_5.x86_64.rpm&jibus-libs-1.5.19-14.el8_5.x86_64.rpmrjibus-setup-1.5.19-14.el8_5.noarch.rpm)jibus-wayland-1.5.19-14.el8_5.x86_64.rpm#jibus-1.5.19-14.el8_5.x86_64.rpm$jibus-gtk2-1.5.19-14.el8_5.x86_64.rpm%jibus-gtk3-1.5.19-14.el8_5.x86_64.rpm&jibus-libs-1.5.19-14.el8_5.x86_64.rpmrjibus-setup-1.5.19-14.el8_5.noarch.rpm)jibus-wayland-1.5.19-14.el8_5.x86_64.rpmb  BsecurityImportant: httpd:2.4 security updateihttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20325CVE-2021-20325CVE-2021-20325https://bugzilla.redhat.com/show_bug.cgi?id=20173212017321https://errata.rockylinux.org/RLSA-2021:4537RLSA-2021:4537RLSA-2021:4537 [Xrkmod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm[Xrkmod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpme! ,RBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: gcc-toolset-10-gcc security updateUhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42574CVE-2021-42574CVE-2021-42574https://bugzilla.redhat.com/show_bug.cgi?id=20058192005819https://errata.rockylinux.org/RLSA-2021:4585RLSA-2021:4585RLSA-2021:4585 4lgcc-toolset-10-gcc-10.3.1-1.2.el8_5.x86_64.rpm5lgcc-toolset-10-gcc-c++-10.3.1-1.2.el8_5.x86_64.rpm6lgcc-toolset-10-gcc-gdb-plugin-10.3.1-1.2.el8_5.x86_64.rpm7lgcc-toolset-10-gcc-gfortran-10.3.1-1.2.el8_5.x86_64.rpm:lgcc-toolset-10-libasan-devel-10.3.1-1.2.el8_5.x86_64.rpm;lgcc-toolset-10-libatomic-devel-10.3.1-1.2.el8_5.x86_64.rpmlgcc-toolset-10-libquadmath-devel-10.3.1-1.2.el8_5.x86_64.rpm?lgcc-toolset-10-libstdc++-devel-10.3.1-1.2.el8_5.x86_64.rpm@lgcc-toolset-10-libstdc++-docs-10.3.1-1.2.el8_5.x86_64.rpmAlgcc-toolset-10-libtsan-devel-10.3.1-1.2.el8_5.x86_64.rpmBlgcc-toolset-10-libubsan-devel-10.3.1-1.2.el8_5.x86_64.rpm 4lgcc-toolset-10-gcc-10.3.1-1.2.el8_5.x86_64.rpm5lgcc-toolset-10-gcc-c++-10.3.1-1.2.el8_5.x86_64.rpm6lgcc-toolset-10-gcc-gdb-plugin-10.3.1-1.2.el8_5.x86_64.rpm7lgcc-toolset-10-gcc-gfortran-10.3.1-1.2.el8_5.x86_64.rpm:lgcc-toolset-10-libasan-devel-10.3.1-1.2.el8_5.x86_64.rpm;lgcc-toolset-10-libatomic-devel-10.3.1-1.2.el8_5.x86_64.rpmlgcc-toolset-10-libquadmath-devel-10.3.1-1.2.el8_5.x86_64.rpm?lgcc-toolset-10-libstdc++-devel-10.3.1-1.2.el8_5.x86_64.rpm@lgcc-toolset-10-libstdc++-docs-10.3.1-1.2.el8_5.x86_64.rpmAlgcc-toolset-10-libtsan-devel-10.3.1-1.2.el8_5.x86_64.rpmBlgcc-toolset-10-libubsan-devel-10.3.1-1.2.el8_5.x86_64.rpmft -Bbugfixhttpd:2.4 bug fix updateXV https://errata.rockylinux.org/RLBA-2021:4604RLBA-2021:4604RLBA-2021:4604 [Xrkmod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm[Xrkmod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpmj" .IsecurityImportant: mailman:2.1 security update.\https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42096CVE-2021-42096CVE-2021-42096https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42097CVE-2021-42097CVE-2021-42097https://bugzilla.redhat.com/show_bug.cgi?id=20205682020568https://bugzilla.redhat.com/show_bug.cgi?id=20205752020575https://errata.rockylinux.org/RLSA-2021:4826RLSA-2021:4826RLSA-2021:4826 }q!h}2mailman-2.1.29-12.module+el8.5.0+717+27fd1ba7.2.x86_64.rpm}q!h}2mailman-2.1.29-12.module+el8.5.0+717+27fd1ba7.2.x86_64.rpmj# /IsecurityImportant: mailman:2.1 security update thttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44227CVE-2021-44227CVE-2021-44227https://bugzilla.redhat.com/show_bug.cgi?id=20268622026862https://errata.rockylinux.org/RLSA-2021:4916RLSA-2021:4916RLSA-2021:4916 }q!h}2mailman-2.1.29-12.module+el8.5.0+717+27fd1ba7.2.x86_64.rpm}q!h}2mailman-2.1.29-12.module+el8.5.0+717+27fd1ba7.2.x86_64.rpmk$ 0vBEBTNBBBBsecurityModerate: idm:DL1 security update~https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719CVE-2020-25719CVE-2020-25719https://bugzilla.redhat.com/show_bug.cgi?id=20197322019732https://errata.rockylinux.org/RLSA-2021:5142RLSA-2021:5142RLSA-2021:5142 2/oq9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm7opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm9softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm:softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm2/oq9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm7opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm9softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm:softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpmy% 1securityModerate: nodejs:16 security, bug fix, and enhancement updatehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469CVE-2020-28469CVE-2020-28469https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788CVE-2020-7788CVE-2020-7788https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959CVE-2021-22959CVE-2021-22959https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960CVE-2021-22960CVE-2021-22960https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502CVE-2021-33502CVE-2021-33502https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3807CVE-2021-3807CVE-2021-3807https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3918CVE-2021-3918CVE-2021-3918https://bugzilla.redhat.com/show_bug.cgi?id=19074441907444https://bugzilla.redhat.com/show_bug.cgi?id=19454591945459https://bugzilla.redhat.com/show_bug.cgi?id=19644611964461https://bugzilla.redhat.com/show_bug.cgi?id=20075572007557https://bugzilla.redhat.com/show_bug.cgi?id=20140572014057https://bugzilla.redhat.com/show_bug.cgi?id=20140592014059https://bugzilla.redhat.com/show_bug.cgi?id=20247022024702https://errata.rockylinux.org/RLSA-2021:5171RLSA-2021:5171RLSA-2021:5171 /Rr:nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm/Rr:nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpmz& 2gBzBasecurityModerate: postgresql:12 security updatehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214CVE-2021-23214CVE-2021-23214https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3677CVE-2021-3677CVE-2021-3677https://bugzilla.redhat.com/show_bug.cgi?id=20018572001857https://bugzilla.redhat.com/show_bug.cgi?id=20226662022666https://errata.rockylinux.org/RLSA-2021:5235RLSA-2021:5235RLSA-2021:5235 }{8Gpgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm:pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm% postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm}{8Gpgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm:pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm% postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm~' 3gBzBdsecurityModerate: postgresql:13 security update https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214CVE-2021-23214CVE-2021-23214https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3677CVE-2021-3677CVE-2021-3677https://bugzilla.redhat.com/show_bug.cgi?id=20018572001857https://bugzilla.redhat.com/show_bug.cgi?id=20226662022666https://errata.rockylinux.org/RLSA-2021:5236RLSA-2021:5236RLSA-2021:5236 gy8Qpgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm:pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm% postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpmgy8Qpgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm:pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm% postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpm( 4ZBBBBBBBBBBBUsecurityLow: virt:rhel and virt-devel:rhel security update9Hlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20257CVE-2021-20257CVE-2021-20257https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3930CVE-2021-3930CVE-2021-3930https://bugzilla.redhat.com/show_bug.cgi?id=19300871930087https://bugzilla.redhat.com/show_bug.cgi?id=20205882020588https://errata.rockylinux.org/RLSA-2021:5238RLSA-2021:5238RLSA-2021:5238 tspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmtspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm2) 5BsecurityImportant: httpd:2.4 security updatehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790CVE-2021-44790CVE-2021-44790https://bugzilla.redhat.com/show_bug.cgi?id=20346742034674https://errata.rockylinux.org/RLSA-2022:0258RLSA-2022:0258RLSA-2022:0258 [Xrkmod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm[Xrkmod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm6* :sBBBBBBBBBBzBBsecurityImportant: parfait:0.5 security update2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4104CVE-2021-4104CVE-2021-4104https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23302CVE-2022-23302CVE-2022-23302https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23305CVE-2022-23305CVE-2022-23305https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23307CVE-2022-23307CVE-2022-23307https://bugzilla.redhat.com/show_bug.cgi?id=20316672031667https://bugzilla.redhat.com/show_bug.cgi?id=20419492041949https://bugzilla.redhat.com/show_bug.cgi?id=20419592041959https://bugzilla.redhat.com/show_bug.cgi?id=20419672041967https://errata.rockylinux.org/RLSA-2022:0290RLSA-2022:0290RLSA-2022:0290 |V*u|2parfait-0.5.4-4.module+el8.5.0+728+553fbdb8.noarch.rpm~2parfait-examples-0.5.4-4.module+el8.5.0+728+553fbdb8.noarch.rpm2parfait-javadoc-0.5.4-4.module+el8.5.0+728+553fbdb8.noarch.rpm2pcp-parfait-agent-0.5.4-4.module+el8.5.0+728+553fbdb8.noarch.rpm[si-units-0.6.5-2.module+el8.3.0+214+edf13b3f.noarch.rpm[si-units-javadoc-0.6.5-2.module+el8.3.0+214+edf13b3f.noarch.rpm^unit-api-1.0-5.module+el8.3.0+214+edf13b3f.noarch.rpm^unit-api-javadoc-1.0-5.module+el8.3.0+214+edf13b3f.noarch.rpm_uom-lib-1.0.1-6.module+el8.3.0+214+edf13b3f.noarch.rpm_uom-lib-javadoc-1.0.1-6.module+el8.3.0+214+edf13b3f.noarch.rpm7uom-parent-1.0.3-3.module+el8.3.0+214+edf13b3f.noarch.rpm`uom-se-1.0.4-3.module+el8.3.0+214+edf13b3f.noarch.rpm`uom-se-javadoc-1.0.4-3.module+el8.3.0+214+edf13b3f.noarch.rpm \uom-systems-0.7-1.module+el8.3.0+214+edf13b3f.noarch.rpm!\uom-systems-javadoc-0.7-1.module+el8.3.0+214+edf13b3f.noarch.rpm|V*u|2parfait-0.5.4-4.module+el8.5.0+728+553fbdb8.noarch.rpm~2parfait-examples-0.5.4-4.module+el8.5.0+728+553fbdb8.noarch.rpm2parfait-javadoc-0.5.4-4.module+el8.5.0+728+553fbdb8.noarch.rpm2pcp-parfait-agent-0.5.4-4.module+el8.5.0+728+553fbdb8.noarch.rpm[si-units-0.6.5-2.module+el8.3.0+214+edf13b3f.noarch.rpm[si-units-javadoc-0.6.5-2.module+el8.3.0+214+edf13b3f.noarch.rpm^unit-api-1.0-5.module+el8.3.0+214+edf13b3f.noarch.rpm^unit-api-javadoc-1.0-5.module+el8.3.0+214+edf13b3f.noarch.rpm_uom-lib-1.0.1-6.module+el8.3.0+214+edf13b3f.noarch.rpm_uom-lib-javadoc-1.0.1-6.module+el8.3.0+214+edf13b3f.noarch.rpm7uom-parent-1.0.3-3.module+el8.3.0+214+edf13b3f.noarch.rpm`uom-se-1.0.4-3.module+el8.3.0+214+edf13b3f.noarch.rpm`uom-se-javadoc-1.0.4-3.module+el8.3.0+214+edf13b3f.noarch.rpm \uom-systems-0.7-1.module+el8.3.0+214+edf13b3f.noarch.rpm!\uom-systems-javadoc-0.7-1.module+el8.3.0+214+edf13b3f.noarch.rpm8+ ;UBBBBBBBBBBBBsecurityImportant: nginx:1.20 security updateE:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23017CVE-2021-23017CVE-2021-23017https://bugzilla.redhat.com/show_bug.cgi?id=19631211963121https://errata.rockylinux.org/RLSA-2022:0323RLSA-2022:0323RLSA-2022:0323 s ,sxnginx-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpmUxnginx-all-modules-1.20.1-1.module+el8.6.0+791+48a2bb9d.noarch.rpmVxnginx-filesystem-1.20.1-1.module+el8.6.0+791+48a2bb9d.noarch.rpmxnginx-mod-http-image-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpmxnginx-mod-http-perl-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpmxnginx-mod-http-xslt-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpmxnginx-mod-mail-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpmxnginx-mod-stream-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpms ,sxnginx-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpmUxnginx-all-modules-1.20.1-1.module+el8.6.0+791+48a2bb9d.noarch.rpmVxnginx-filesystem-1.20.1-1.module+el8.6.0+791+48a2bb9d.noarch.rpmxnginx-mod-http-image-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpmxnginx-mod-http-perl-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpmxnginx-mod-http-xslt-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpmxnginx-mod-mail-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpmxnginx-mod-stream-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpm9v JBaBBBBBBBBBBBBenhancementcontainer-tools:rhel8 security, bug fix, and enhancement update@r https://bugzilla.redhat.com/show_bug.cgi?id=20091532009153https://bugzilla.redhat.com/show_bug.cgi?id=20300322030032https://errata.rockylinux.org/RLEA-2022:0352RLEA-2022:0352RLEA-2022:0352 $zW-crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm*criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm!criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm"criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpmTXlibslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmUXlibslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm.python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm$zW-crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm*criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm!criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm"criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpmTXlibslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmUXlibslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm.python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmZw ?@bugfixpki-core:10.6 bug fix and enhancement update2 https://bugzilla.redhat.com/show_bug.cgi?id=20246762024676* Reinstall of the same ipa-replica fails with 'RuntimeError: CA configuration failed.'https://bugzilla.redhat.com/show_bug.cgi?id=20290232029023* ipa: ERROR: 'Certificate operation cannot be completed: Unable to communicate with CMS (403)https://errata.rockylinux.org/RLBA-2022:0357RLBA-2022:0357RLBA-2022:0357 |w1Tldapjdk-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm2Tldapjdk-javadoc-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm|w1Tldapjdk-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm2Tldapjdk-javadoc-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm[x bugfixvirtio-win bug fix and enhancement update2K https://bugzilla.redhat.com/show_bug.cgi?id=20334002033400* virtio-win RPM for 8.5.0zhttps://errata.rockylinux.org/RLBA-2022:0358RLBA-2022:0358RLBA-2022:0358  virtio-win-1.9.24-2.el8_5.noarch.rpm virtio-win-1.9.24-2.el8_5.noarch.rpm\y ZBBBBBBBBBBBUbugfixvirt:rhel bug fix update}G https://bugzilla.redhat.com/show_bug.cgi?id=20388122038812https://errata.rockylinux.org/RLBA-2022:0361RLBA-2022:0361RLBA-2022:0361 tspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmtspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm - QBmBBBBsecurityImportant: varnish:6 security updateD_https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23959CVE-2022-23959CVE-2022-23959https://bugzilla.redhat.com/show_bug.cgi?id=20450312045031https://errata.rockylinux.org/RLSA-2022:0418RLSA-2022:0418RLSA-2022:0418  v+  tvarnish-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpmtvarnish-devel-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpmtvarnish-docs-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpmovarnish-modules-0.15.0-6.module+el8.5.0+677+2a78a869.x86_64.rpm v+  tvarnish-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpmtvarnish-devel-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpmtvarnish-docs-6.0.8-1.module+el8.5.0+736+fec10e21.1.x86_64.rpmovarnish-modules-0.15.0-6.module+el8.5.0+677+2a78a869.x86_64.rpm . csecurityImportant: aide security update#ehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45417CVE-2021-45417CVE-2021-45417https://bugzilla.redhat.com/show_bug.cgi?id=20414892041489https://errata.rockylinux.org/RLSA-2022:0441RLSA-2022:0441RLSA-2022:0441 )Caide-0.16-14.el8_5.1.x86_64.rpm)Caide-0.16-14.el8_5.1.x86_64.rpm / SB|BBBBBBBBBsecurityImportant: ruby:2.6 security update https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36327CVE-2020-36327CVE-2020-36327https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31799CVE-2021-31799CVE-2021-31799https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31810CVE-2021-31810CVE-2021-31810https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32066CVE-2021-32066CVE-2021-32066https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41817CVE-2021-41817CVE-2021-41817https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41819CVE-2021-41819CVE-2021-41819https://bugzilla.redhat.com/show_bug.cgi?id=19589991958999https://bugzilla.redhat.com/show_bug.cgi?id=19801261980126https://bugzilla.redhat.com/show_bug.cgi?id=19801281980128https://bugzilla.redhat.com/show_bug.cgi?id=19801321980132https://bugzilla.redhat.com/show_bug.cgi?id=20251042025104https://bugzilla.redhat.com/show_bug.cgi?id=20267572026757https://errata.rockylinux.org/RLSA-2022:0543RLSA-2022:0543RLSA-2022:0543 , 4 rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm5 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpmRrubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpmyRrubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpmzorubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm{orubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm6@rubygem-mysql2-0.5.2-1.module+el8.5.0+738+032c9c02.x86_64.rpm)@rubygem-mysql2-doc-0.5.2-1.module+el8.5.0+738+032c9c02.noarch.rpm7Crubygem-pg-1.1.4-1.module+el8.5.0+738+032c9c02.x86_64.rpm*Crubygem-pg-doc-1.1.4-1.module+el8.5.0+738+032c9c02.noarch.rpm, 4 rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm5 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpmRrubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpmyRrubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpmzorubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm{orubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm6@rubygem-mysql2-0.5.2-1.module+el8.5.0+738+032c9c02.x86_64.rpm)@rubygem-mysql2-doc-0.5.2-1.module+el8.5.0+738+032c9c02.noarch.rpm7Crubygem-pg-1.1.4-1.module+el8.5.0+738+032c9c02.x86_64.rpm*Crubygem-pg-doc-1.1.4-1.module+el8.5.0+738+032c9c02.noarch.rpm0 SB[BBBBBBBBBBusecurityImportant: ruby:2.5 security update `https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36327CVE-2020-36327CVE-2020-36327https://bugzilla.redhat.com/show_bug.cgi?id=19589991958999https://errata.rockylinux.org/RLSA-2022:0545RLSA-2022:0545RLSA-2022:0545 , 4 rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm5 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpmy rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpmcGrubygem-bundler-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpm3Grubygem-bundler-doc-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpmzrubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm{rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm6rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm)rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm7rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm*rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm, 4 rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm5 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpmy rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpmcGrubygem-bundler-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpm3Grubygem-bundler-doc-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpmzrubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm{rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm6rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm)rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm7rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm*rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm1 esecurityImportant: python-pillow security updateinhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22815CVE-2022-22815CVE-2022-22815https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22816CVE-2022-22816CVE-2022-22816https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22817CVE-2022-22817CVE-2022-22817https://bugzilla.redhat.com/show_bug.cgi?id=20425222042522https://bugzilla.redhat.com/show_bug.cgi?id=20425272042527https://errata.rockylinux.org/RLSA-2022:0643RLSA-2022:0643RLSA-2022:0643  python3-pillow-5.1.1-18.el8_5.x86_64.rpm python3-pillow-5.1.1-18.el8_5.x86_64.rpm3 SB[BBBBBBBBBBusecurityModerate: ruby:2.5 security updateW^https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31799CVE-2021-31799CVE-2021-31799https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31810CVE-2021-31810CVE-2021-31810https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32066CVE-2021-32066CVE-2021-32066https://bugzilla.redhat.com/show_bug.cgi?id=19801261980126https://bugzilla.redhat.com/show_bug.cgi?id=19801281980128https://bugzilla.redhat.com/show_bug.cgi?id=19801321980132https://errata.rockylinux.org/RLSA-2022:0672RLSA-2022:0672RLSA-2022:0672 , 4 rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm5 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpmy rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpmcGrubygem-bundler-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpm3Grubygem-bundler-doc-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpmzrubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm{rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm6rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm)rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm7rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm*rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm, 4 rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm5 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpmy rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpmcGrubygem-bundler-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpm3Grubygem-bundler-doc-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpmzrubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm{rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm6rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm)rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpm7rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm*rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm$z gbugfixredhat-support-lib-python and redhat-support-tool bug fix and enhancement update5" https://bugzilla.redhat.com/show_bug.cgi?id=20285462028546* Add support for handling JSON response from API'shttps://bugzilla.redhat.com/show_bug.cgi?id=20285502028550* RHST should use new Red Hat Secure FTP instead of dropbox for attachmentshttps://bugzilla.redhat.com/show_bug.cgi?id=20285532028553* Add support for handling JSON response from API'shttps://bugzilla.redhat.com/show_bug.cgi?id=20285562028556* RHST should use new Red Hat Secure FTP instead of dropbox for attachmentshttps://errata.rockylinux.org/RLBA-2022:0882RLBA-2022:0882RLBA-2022:0882 Xredhat-support-lib-python-0.13.0-0.el8_5.noarch.rpmXredhat-support-tool-0.13.0-0.el8_5.noarch.rpmXredhat-support-lib-python-0.13.0-0.el8_5.noarch.rpmXredhat-support-tool-0.13.0-0.el8_5.noarch.rpm$4 ZBBBBBBBBBBBUsecurityModerate: virt:rhel and virt-devel:rhel security updateWnhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0358CVE-2022-0358CVE-2022-0358https://bugzilla.redhat.com/show_bug.cgi?id=20448632044863https://errata.rockylinux.org/RLSA-2022:0886RLSA-2022:0886RLSA-2022:0886 tspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmtspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmU5 BsecurityModerate: httpd:2.4 security updateEZhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798CVE-2021-34798CVE-2021-34798https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275CVE-2021-39275CVE-2021-39275https://bugzilla.redhat.com/show_bug.cgi?id=20051192005119https://bugzilla.redhat.com/show_bug.cgi?id=20051282005128https://errata.rockylinux.org/RLSA-2022:0891RLSA-2022:0891RLSA-2022:0891 [Xrkmod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm[Xrkmod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpmY6 BsecurityImportant: httpd:2.4 security update)https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720CVE-2022-22720CVE-2022-22720https://bugzilla.redhat.com/show_bug.cgi?id=20643212064321https://errata.rockylinux.org/RLSA-2022:1049RLSA-2022:1049RLSA-2022:1049 [Xrkmod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm[Xrkmod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm\7 LsecurityModerate: mariadb:10.3 security and bug fix updateHshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2154CVE-2021-2154CVE-2021-2154https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166CVE-2021-2166CVE-2021-2166https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372CVE-2021-2372CVE-2021-2372https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389CVE-2021-2389CVE-2021-2389https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604CVE-2021-35604CVE-2021-35604https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46657CVE-2021-46657CVE-2021-46657https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46658CVE-2021-46658CVE-2021-46658https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662CVE-2021-46662CVE-2021-46662https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666CVE-2021-46666CVE-2021-46666https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667CVE-2021-46667CVE-2021-46667https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21451CVE-2022-21451CVE-2022-21451https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27385CVE-2022-27385CVE-2022-27385https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31621CVE-2022-31621CVE-2022-31621https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31624CVE-2022-31624CVE-2022-31624https://bugzilla.redhat.com/show_bug.cgi?id=19517521951752https://bugzilla.redhat.com/show_bug.cgi?id=19517551951755https://bugzilla.redhat.com/show_bug.cgi?id=19813321981332* mariadb: No password masking in audit log when using ALTER USER IDENTIFIED BY commandhttps://bugzilla.redhat.com/show_bug.cgi?id=19923031992303https://bugzilla.redhat.com/show_bug.cgi?id=19923091992309https://bugzilla.redhat.com/show_bug.cgi?id=20161012016101https://bugzilla.redhat.com/show_bug.cgi?id=20492942049294https://bugzilla.redhat.com/show_bug.cgi?id=20493052049305https://bugzilla.redhat.com/show_bug.cgi?id=20500192050019https://bugzilla.redhat.com/show_bug.cgi?id=20500282050028https://bugzilla.redhat.com/show_bug.cgi?id=20500302050030https://bugzilla.redhat.com/show_bug.cgi?id=20505142050514* mariadb:10.3/mariadb: /etc/security/user_map.conf getting overwritten with mariadb-server upgradehttps://bugzilla.redhat.com/show_bug.cgi?id=20505322050532* MariaDB logrotate leads to "gzip: stdin: file size changed while zipping"https://bugzilla.redhat.com/show_bug.cgi?id=20505332050533* Crash: WSREP: invalid state ROLLED_BACK (FATAL)https://bugzilla.redhat.com/show_bug.cgi?id=20505432050543The following packages have been upgraded to a later upstream version: mariadb (10.3.32), galera (25.3.34).https://bugzilla.redhat.com/show_bug.cgi?id=20505502050550* Galera doesn't work without 'procps-ng' package MariaDB-10.3https://errata.rockylinux.org/RLSA-2022:1556RLSA-2022:1556RLSA-2022:1556 5W.Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm5W.Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm_8 LsecurityModerate: mariadb:10.5 security, bug fix, and enhancement update;4https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2154CVE-2021-2154CVE-2021-2154https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166CVE-2021-2166CVE-2021-2166https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372CVE-2021-2372CVE-2021-2372https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389CVE-2021-2389CVE-2021-2389https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604CVE-2021-35604CVE-2021-35604https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46657CVE-2021-46657CVE-2021-46657https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46658CVE-2021-46658CVE-2021-46658https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662CVE-2021-46662CVE-2021-46662https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666CVE-2021-46666CVE-2021-46666https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667CVE-2021-46667CVE-2021-46667https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21451CVE-2022-21451CVE-2022-21451https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27385CVE-2022-27385CVE-2022-27385https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31621CVE-2022-31621CVE-2022-31621https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31624CVE-2022-31624CVE-2022-31624https://bugzilla.redhat.com/show_bug.cgi?id=19517521951752https://bugzilla.redhat.com/show_bug.cgi?id=19517551951755https://bugzilla.redhat.com/show_bug.cgi?id=19813321981332* mariadb: No password masking in audit log when using ALTER USER IDENTIFIED BY commandhttps://bugzilla.redhat.com/show_bug.cgi?id=19923031992303https://bugzilla.redhat.com/show_bug.cgi?id=19923091992309https://bugzilla.redhat.com/show_bug.cgi?id=20161012016101https://bugzilla.redhat.com/show_bug.cgi?id=20492942049294https://bugzilla.redhat.com/show_bug.cgi?id=20493052049305https://bugzilla.redhat.com/show_bug.cgi?id=20500192050019https://bugzilla.redhat.com/show_bug.cgi?id=20500282050028https://bugzilla.redhat.com/show_bug.cgi?id=20500302050030https://bugzilla.redhat.com/show_bug.cgi?id=20505152050515* mariadb-10.5-module: /etc/security/user_map.conf getting overwritten with mariadb-server upgradehttps://bugzilla.redhat.com/show_bug.cgi?id=20505242050524* mariadb-server:10.5 in centos8 stream is not shipping wsrep_sst_rsync_tunnelhttps://bugzilla.redhat.com/show_bug.cgi?id=20505422050542* Galera doesn't work without 'procps-ng' package MariaDB-10.5https://bugzilla.redhat.com/show_bug.cgi?id=20505462050546The following packages have been upgraded to a later upstream version: mariadb (10.5.13), galera (26.4.9).https://errata.rockylinux.org/RLSA-2022:1557RLSA-2022:1557RLSA-2022:1557 5W.Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm5W.Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpmb{ @bugfixpki-core:10.6 bug fix updateo https://bugzilla.redhat.com/show_bug.cgi?id=20614582061458* ipa: ERROR: 'Certificate operation cannot be completed: Unable to communicate with CMS (403)https://errata.rockylinux.org/RLBA-2022:1560RLBA-2022:1560RLBA-2022:1560 |w1Tldapjdk-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm2Tldapjdk-javadoc-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm|w1Tldapjdk-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpm2Tldapjdk-javadoc-4.23.0-1.module+el8.7.0+1069+6f3de942.noarch.rpmc| vBEBTNBBBBbugfixidm:DL1 bug fix updatev^ https://bugzilla.redhat.com/show_bug.cgi?id=20624042062404* Error replacing a replica with CentOS Stream 9https://bugzilla.redhat.com/show_bug.cgi?id=20657192065719* reinstalling samba client causes winbindd coredumphttps://errata.rockylinux.org/RLBA-2022:1561RLBA-2022:1561RLBA-2022:1561 2/oq9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm7opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm9softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm:softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm2/oq9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm7opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm9softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm:softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpmq} ZBBBBBBBBBBBUbugfixvirt:rhel and virt-devel:rhel bug fix updateT' https://bugzilla.redhat.com/show_bug.cgi?id=20652392065239* KVM Fedora 35 guest x86 programs randomly crash in signal handlerhttps://errata.rockylinux.org/RLBA-2022:1563RLBA-2022:1563RLBA-2022:1563 tspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmtspAblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpm!9 FBBBBBOBBBBBLBRJWBPBnBBBjsecurityModerate: container-tools:3.0 security and bug fix update{qhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27649CVE-2022-27649CVE-2022-27649https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27651CVE-2022-27651CVE-2022-27651https://bugzilla.redhat.com/show_bug.cgi?id=20665682066568https://bugzilla.redhat.com/show_bug.cgi?id=20668402066840https://bugzilla.redhat.com/show_bug.cgi?id=20709612070961* 3.0 stable stream: podman run --pid=host command causes OCI permission errorhttps://errata.rockylinux.org/RLSA-2022:1565RLSA-2022:1565RLSA-2022:1565 pWScockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm9containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmL fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm\Qoci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm.0python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm88runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmV/toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm^/toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm2_udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpmpWScockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm9containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmL fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm\Qoci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm.0python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm88runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmV/toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm^/toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm2_udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm7: hCBFBBBFLBBRBBCBBBBOBBBBBGB\BBBBBBBBBsecurityModerate: container-tools:2.0 security updatelhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27649CVE-2022-27649CVE-2022-27649https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27651CVE-2022-27651CVE-2022-27651https://bugzilla.redhat.com/show_bug.cgi?id=20665682066568https://bugzilla.redhat.com/show_bug.cgi?id=20668402066840https://errata.rockylinux.org/RLSA-2022:1566RLSA-2022:1566RLSA-2022:1566 ~Rbuildah-1.11.6-10.module+el8.5.0+770+e2f49861.x86_64.rpm}buildah-tests-1.11.6-10.module+el8.5.0+770+e2f49861.x86_64.rpmScockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm1acontainers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmHcontainer-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmLfuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm }podman-1.6.4-28.module+el8.5.0+770+e2f49861.x86_64.rpm }podman-docker-1.6.4-28.module+el8.5.0+770+e2f49861.noarch.rpm;}podman-remote-1.6.4-28.module+el8.5.0+770+e2f49861.x86_64.rpm<}podman-tests-1.6.4-28.module+el8.5.0+770+e2f49861.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm8 runc-1.0.0-66.rc10.module+el8.5.0+770+e2f49861.x86_64.rpmhaskopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmwaskopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpm~Rbuildah-1.11.6-10.module+el8.5.0+770+e2f49861.x86_64.rpm}buildah-tests-1.11.6-10.module+el8.5.0+770+e2f49861.x86_64.rpmScockpit-podman-11-1.module+el8.5.0+770+e2f49861.noarch.rpm conmon-2.0.15-1.module+el8.5.0+770+e2f49861.x86_64.rpm9|containernetworking-plugins-0.8.3-4.module+el8.5.0+770+e2f49861.x86_64.rpm1acontainers-common-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmHcontainer-selinux-2.130.0-1.module+el8.5.0+770+e2f49861.noarch.rpm- crit-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpm* criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmLfuse-overlayfs-0.7.8-1.module+el8.5.0+770+e2f49861.x86_64.rpm }podman-1.6.4-28.module+el8.5.0+770+e2f49861.x86_64.rpm }podman-docker-1.6.4-28.module+el8.5.0+770+e2f49861.noarch.rpm;}podman-remote-1.6.4-28.module+el8.5.0+770+e2f49861.x86_64.rpm<}podman-tests-1.6.4-28.module+el8.5.0+770+e2f49861.x86_64.rpm. python3-criu-3.12-9.module+el8.5.0+681+c9a1951f.x86_64.rpmpython-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+770+e2f49861.noarch.rpm8 runc-1.0.0-66.rc10.module+el8.5.0+770+e2f49861.x86_64.rpmhaskopeo-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpmwaskopeo-tests-0.1.41-4.module+el8.5.0+770+e2f49861.x86_64.rpm+;slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+770+e2f49861.x86_64.rpmVitoolbox-0.0.7-1.module+el8.5.0+770+e2f49861.noarch.rpm2+udica-0.2.1-2.module+el8.5.0+770+e2f49861.noarch.rpmL~ _BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbugfixgcc-toolset-11-gcc bug fix and enhancement updater https://bugzilla.redhat.com/show_bug.cgi?id=19951921995192https://bugzilla.redhat.com/show_bug.cgi?id=19968621996862https://bugzilla.redhat.com/show_bug.cgi?id=20370722037072https://bugzilla.redhat.com/show_bug.cgi?id=20472862047286https://errata.rockylinux.org/RLBA-2022:1761RLBA-2022:1761RLBA-2022:1761 jIgcc-toolset-11-libasan-devel-11.2.1-9.1.el8.x86_64.rpmpIgcc-toolset-11-liblsan-devel-11.2.1-9.1.el8.x86_64.rpmqIgcc-toolset-11-libquadmath-devel-11.2.1-9.1.el8.x86_64.rpmcIgcc-toolset-11-gcc-11.2.1-9.1.el8.x86_64.rpmdIgcc-toolset-11-gcc-c++-11.2.1-9.1.el8.x86_64.rpmeIgcc-toolset-11-gcc-gdb-plugin-11.2.1-9.1.el8.x86_64.rpmfIgcc-toolset-11-gcc-gfortran-11.2.1-9.1.el8.x86_64.rpmgIgcc-toolset-11-gcc-plugin-devel-11.2.1-9.1.el8.x86_64.rpmkIgcc-toolset-11-libatomic-devel-11.2.1-9.1.el8.x86_64.rpmlIgcc-toolset-11-libgccjit-11.2.1-9.1.el8.x86_64.rpmmIgcc-toolset-11-libgccjit-devel-11.2.1-9.1.el8.x86_64.rpmnIgcc-toolset-11-libgccjit-docs-11.2.1-9.1.el8.x86_64.rpmoIgcc-toolset-11-libitm-devel-11.2.1-9.1.el8.x86_64.rpmrIgcc-toolset-11-libstdc++-devel-11.2.1-9.1.el8.x86_64.rpmsIgcc-toolset-11-libstdc++-docs-11.2.1-9.1.el8.x86_64.rpmtIgcc-toolset-11-libtsan-devel-11.2.1-9.1.el8.x86_64.rpmuIgcc-toolset-11-libubsan-devel-11.2.1-9.1.el8.x86_64.rpmjIlibasan6-11.2.1-9.1.el8.x86_64.rpmjIgcc-toolset-11-libasan-devel-11.2.1-9.1.el8.x86_64.rpmpIgcc-toolset-11-liblsan-devel-11.2.1-9.1.el8.x86_64.rpmqIgcc-toolset-11-libquadmath-devel-11.2.1-9.1.el8.x86_64.rpmcIgcc-toolset-11-gcc-11.2.1-9.1.el8.x86_64.rpmdIgcc-toolset-11-gcc-c++-11.2.1-9.1.el8.x86_64.rpmeIgcc-toolset-11-gcc-gdb-plugin-11.2.1-9.1.el8.x86_64.rpmfIgcc-toolset-11-gcc-gfortran-11.2.1-9.1.el8.x86_64.rpmgIgcc-toolset-11-gcc-plugin-devel-11.2.1-9.1.el8.x86_64.rpmkIgcc-toolset-11-libatomic-devel-11.2.1-9.1.el8.x86_64.rpmlIgcc-toolset-11-libgccjit-11.2.1-9.1.el8.x86_64.rpmmIgcc-toolset-11-libgccjit-devel-11.2.1-9.1.el8.x86_64.rpmnIgcc-toolset-11-libgccjit-docs-11.2.1-9.1.el8.x86_64.rpmoIgcc-toolset-11-libitm-devel-11.2.1-9.1.el8.x86_64.rpmrIgcc-toolset-11-libstdc++-devel-11.2.1-9.1.el8.x86_64.rpmsIgcc-toolset-11-libstdc++-docs-11.2.1-9.1.el8.x86_64.rpmtIgcc-toolset-11-libtsan-devel-11.2.1-9.1.el8.x86_64.rpmuIgcc-toolset-11-libubsan-devel-11.2.1-9.1.el8.x86_64.rpmjIlibasan6-11.2.1-9.1.el8.x86_64.rpmM> @BBBBBBBBBBBBBBBBBBBBBBLBBVB[BBBBBBBBBBBBusecurityModerate: python38:3.8 and python38-devel:3.8 security updateq https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733CVE-2021-3733CVE-2021-3733https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737CVE-2021-3737CVE-2021-3737https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43818CVE-2021-43818CVE-2021-43818https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391CVE-2022-0391CVE-2022-0391https://bugzilla.redhat.com/show_bug.cgi?id=19951621995162https://bugzilla.redhat.com/show_bug.cgi?id=19952341995234https://bugzilla.redhat.com/show_bug.cgi?id=20045872004587https://bugzilla.redhat.com/show_bug.cgi?id=20067892006789https://bugzilla.redhat.com/show_bug.cgi?id=20325692032569https://bugzilla.redhat.com/show_bug.cgi?id=20473762047376https://errata.rockylinux.org/RLSA-2022:1764RLSA-2022:1764RLSA-2022:1764 b^1|python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm!Ppython38-babel-2.7.0-11.module+el8.5.0+672+ab6eb015.noarch.rpmhHpython38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm2python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpmilpython38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpmg?python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm3 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpmpython38-lxml-4.4.1-7.module+el8.6.0+794+eba84017.x86_64.rpmjFpython38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpmt;python38-numpy-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm";python38-numpy-doc-1.17.3-6.module+el8.5.0+672+ab6eb015.noarch.rpmu;python38-numpy-f2py-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpmNpython38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpmvFpython38-psutil-5.6.4-4.module+el8.5.0+672+ab6eb015.x86_64.rpmkpython38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmlpython38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmmpython38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm4 python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpmMhpython38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm5python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm6python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm%upython38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.x86_64.rpm7 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpmnSpython38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm#\python38-setuptools-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpm$\python38-setuptools-wheel-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpmOppython38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm%;python38-urllib3-1.25.7-5.module+el8.5.0+672+ab6eb015.noarch.rpm&Cpython38-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpm'Cpython38-wheel-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpmb^1|python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm!Ppython38-babel-2.7.0-11.module+el8.5.0+672+ab6eb015.noarch.rpmhHpython38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm2python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpmilpython38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpmg?python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpm3 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpmpython38-lxml-4.4.1-7.module+el8.6.0+794+eba84017.x86_64.rpmjFpython38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpmt;python38-numpy-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm";python38-numpy-doc-1.17.3-6.module+el8.5.0+672+ab6eb015.noarch.rpmu;python38-numpy-f2py-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpmNpython38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpmvFpython38-psutil-5.6.4-4.module+el8.5.0+672+ab6eb015.x86_64.rpmkpython38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmlpython38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmmpython38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm4 python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpmMhpython38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm5python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm6python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm%upython38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.x86_64.rpm7 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpmnSpython38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm#\python38-setuptools-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpm$\python38-setuptools-wheel-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpmOppython38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpm%;python38-urllib3-1.25.7-5.module+el8.5.0+672+ab6eb015.noarch.rpm&Cpython38-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpm'Cpython38-wheel-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpma EBBBBBBbugfixevince bug fix and enhancement updatev https://bugzilla.redhat.com/show_bug.cgi?id=19277041927704https://bugzilla.redhat.com/show_bug.cgi?id=20083102008310https://errata.rockylinux.org/RLBA-2022:1770RLBA-2022:1770RLBA-2022:1770 tyevince-libs-3.28.4-16.el8.x86_64.rpmryevince-3.28.4-16.el8.x86_64.rpmsyevince-browser-plugin-3.28.4-16.el8.x86_64.rpmuyevince-nautilus-3.28.4-16.el8.x86_64.rpmtyevince-libs-3.28.4-16.el8.x86_64.rpmryevince-3.28.4-16.el8.x86_64.rpmsyevince-browser-plugin-3.28.4-16.el8.x86_64.rpmuyevince-nautilus-3.28.4-16.el8.x86_64.rpma bugfixjs-d3-flame-graph bug fix and enhancement updateu https://bugzilla.redhat.com/show_bug.cgi?id=19209731920973https://bugzilla.redhat.com/show_bug.cgi?id=19931941993194https://errata.rockylinux.org/RLBA-2022:1784RLBA-2022:1784RLBA-2022:1784 Y9js-d3-flame-graph-4.0.7-1.el8.noarch.rpmY9js-d3-flame-graph-4.0.7-1.el8.noarch.rpmb Pbugfixcertmonger bug fix and enhancement updatet https://bugzilla.redhat.com/show_bug.cgi?id=15775701577570https://bugzilla.redhat.com/show_bug.cgi?id=18815001881500https://bugzilla.redhat.com/show_bug.cgi?id=19402611940261https://bugzilla.redhat.com/show_bug.cgi?id=20010792001079https://bugzilla.redhat.com/show_bug.cgi?id=20122582012258https://errata.rockylinux.org/RLBA-2022:1789RLBA-2022:1789RLBA-2022:1789 .dcertmonger-0.79.13-5.el8.x86_64.rpm.dcertmonger-0.79.13-5.el8.x86_64.rpmb SBBBBbugfixlibpinyin bug fix and enhancement updates https://bugzilla.redhat.com/show_bug.cgi?id=20061002006100https://errata.rockylinux.org/RLBA-2022:1790RLBA-2022:1790RLBA-2022:1790 1Olibpinyin-2.2.0-2.el8.x86_64.rpm2Olibpinyin-data-2.2.0-2.el8.x86_64.rpmOlibzhuyin-2.2.0-2.el8.x86_64.rpm1Olibpinyin-2.2.0-2.el8.x86_64.rpm2Olibpinyin-data-2.2.0-2.el8.x86_64.rpmOlibzhuyin-2.2.0-2.el8.x86_64.rpmb ZBBbugfixlibmemcached bug fix and enhancement updater https://errata.rockylinux.org/RLBA-2022:1794RLBA-2022:1794RLBA-2022:1794  libmemcached-1.0.18-17.el8.x86_64.rpm! libmemcached-libs-1.0.18-17.el8.x86_64.rpm libmemcached-1.0.18-17.el8.x86_64.rpm! libmemcached-libs-1.0.18-17.el8.x86_64.rpmc #_BBbugfixaccountsservice bug fix and enhancement updateq https://bugzilla.redhat.com/show_bug.cgi?id=19193001919300https://errata.rockylinux.org/RLBA-2022:1800RLBA-2022:1800RLBA-2022:1800 Zaccountsservice-0.6.55-4.el8.x86_64.rpm[accountsservice-libs-0.6.55-4.el8.x86_64.rpmZaccountsservice-0.6.55-4.el8.x86_64.rpm[accountsservice-libs-0.6.55-4.el8.x86_64.rpmcA &dsecurityModerate: gfbgraph security updateplhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39358CVE-2021-39358CVE-2021-39358https://bugzilla.redhat.com/show_bug.cgi?id=19971391997139https://errata.rockylinux.org/RLSA-2022:1801RLSA-2022:1801RLSA-2022:1801 s;gfbgraph-0.2.4-1.el8.x86_64.rpms;gfbgraph-0.2.4-1.el8.x86_64.rpmc  +gBBbugfixlibnotify bug fix and enhancement update\ https://bugzilla.redhat.com/show_bug.cgi?id=18346821834682https://errata.rockylinux.org/RLBA-2022:1818RLBA-2022:1818RLBA-2022:1818 &libnotify-0.7.7-6.el8.x86_64.rpm'libnotify-devel-0.7.7-6.el8.x86_64.rpm&libnotify-0.7.7-6.el8.x86_64.rpm'libnotify-devel-0.7.7-6.el8.x86_64.rpmd ,pBBBBBBBBBbugfixibus bug fix and enhancement update[ https://bugzilla.redhat.com/show_bug.cgi?id=20080742008074https://errata.rockylinux.org/RLBA-2022:1822RLBA-2022:1822RLBA-2022:1822 #jibus-1.5.19-14.el8_5.x86_64.rpm$jibus-gtk2-1.5.19-14.el8_5.x86_64.rpm%jibus-gtk3-1.5.19-14.el8_5.x86_64.rpm&jibus-libs-1.5.19-14.el8_5.x86_64.rpmrjibus-setup-1.5.19-14.el8_5.noarch.rpm)jibus-wayland-1.5.19-14.el8_5.x86_64.rpm#jibus-1.5.19-14.el8_5.x86_64.rpm$jibus-gtk2-1.5.19-14.el8_5.x86_64.rpm%jibus-gtk3-1.5.19-14.el8_5.x86_64.rpm&jibus-libs-1.5.19-14.el8_5.x86_64.rpmrjibus-setup-1.5.19-14.el8_5.noarch.rpm)jibus-wayland-1.5.19-14.el8_5.x86_64.rpmdE -^BBsecurityModerate: mod_auth_openidc:2.3 security updateZ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32786CVE-2021-32786CVE-2021-32786https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32791CVE-2021-32791CVE-2021-32791https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32792CVE-2021-32792CVE-2021-32792https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39191CVE-2021-39191CVE-2021-39191https://bugzilla.redhat.com/show_bug.cgi?id=19861021986102https://bugzilla.redhat.com/show_bug.cgi?id=19863951986395https://bugzilla.redhat.com/show_bug.cgi?id=19863971986397https://bugzilla.redhat.com/show_bug.cgi?id=20016462001646https://errata.rockylinux.org/RLSA-2022:1823RLSA-2022:1823RLSA-2022:1823 /c cjose-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm/c cjose-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpmf 0nbugfixlibrdkafka bug fix and enhancement updatet https://bugzilla.redhat.com/show_bug.cgi?id=18428171842817https://errata.rockylinux.org/RLBA-2022:1827RLBA-2022:1827RLBA-2022:1827 >)librdkafka-0.11.4-3.el8.x86_64.rpm>)librdkafka-0.11.4-3.el8.x86_64.rpmf 3qbugfixvirt-viewer bug fix and enhancement updates https://bugzilla.redhat.com/show_bug.cgi?id=18557161855716https://errata.rockylinux.org/RLBA-2022:1829RLBA-2022:1829RLBA-2022:1829 65virt-viewer-9.0-12.el8.x86_64.rpm65virt-viewer-9.0-12.el8.x86_64.rpmf 6tbugfixpesign bug fix and enhancement updater https://bugzilla.redhat.com/show_bug.cgi?id=18019761801976https://errata.rockylinux.org/RLBA-2022:1834RLBA-2022:1834RLBA-2022:1834 x*pesign-0.112-26.el8.x86_64.rpmx*pesign-0.112-26.el8.x86_64.rpmg 7gbugfixredhat-support-lib-python bug fix and enhancement updateq https://bugzilla.redhat.com/show_bug.cgi?id=19473451947345https://bugzilla.redhat.com/show_bug.cgi?id=19473461947346https://bugzilla.redhat.com/show_bug.cgi?id=20181942018194https://bugzilla.redhat.com/show_bug.cgi?id=20181952018195https://errata.rockylinux.org/RLBA-2022:1836RLBA-2022:1836RLBA-2022:1836 Xredhat-support-lib-python-0.13.0-0.el8_5.noarch.rpmXredhat-support-tool-0.13.0-0.el8_5.noarch.rpmXredhat-support-lib-python-0.13.0-0.el8_5.noarch.rpmXredhat-support-tool-0.13.0-0.el8_5.noarch.rpmg :xbugfixnss-pam-ldapd bug fix and enhancement updatep https://bugzilla.redhat.com/show_bug.cgi?id=19698261969826https://bugzilla.redhat.com/show_bug.cgi?id=20289142028914https://errata.rockylinux.org/RLBA-2022:1838RLBA-2022:1838RLBA-2022:1838 ^lnss-pam-ldapd-0.9.9-5.el8.x86_64.rpm^lnss-pam-ldapd-0.9.9-5.el8.x86_64.rpmgF ?{BBsecurityModerate: exiv2 security, bug fix, and enhancement updateo+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18898CVE-2020-18898CVE-2020-18898https://bugzilla.redhat.com/show_bug.cgi?id=20026782002678https://bugzilla.redhat.com/show_bug.cgi?id=20184222018422The following packages have been upgraded to a later upstream version: exiv2 (0.27.5).https://errata.rockylinux.org/RLSA-2022:1842RLSA-2022:1842RLSA-2022:1842 {sexiv2-0.27.5-2.el8.x86_64.rpm|sexiv2-libs-0.27.5-2.el8.x86_64.rpm{sexiv2-0.27.5-2.el8.x86_64.rpm|sexiv2-libs-0.27.5-2.el8.x86_64.rpmh @BBBBBBBBBBBBbugfixmesa and related packages bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=20158602015860https://bugzilla.redhat.com/show_bug.cgi?id=20161862016186https://bugzilla.redhat.com/show_bug.cgi?id=20161872016187https://bugzilla.redhat.com/show_bug.cgi?id=20433462043346https://errata.rockylinux.org/RLBA-2022:1855RLBA-2022:1855RLBA-2022:1855  8libglvnd-glx-1.3.4-1.el8.x86_64.rpm8libglvnd-1.3.4-1.el8.x86_64.rpm8libglvnd-core-devel-1.3.4-1.el8.x86_64.rpm 8libglvnd-devel-1.3.4-1.el8.x86_64.rpm 8libglvnd-egl-1.3.4-1.el8.x86_64.rpm 8libglvnd-gles-1.3.4-1.el8.x86_64.rpm 8libglvnd-opengl-1.3.4-1.el8.x86_64.rpm 8libglvnd-glx-1.3.4-1.el8.x86_64.rpm8libglvnd-1.3.4-1.el8.x86_64.rpm8libglvnd-core-devel-1.3.4-1.el8.x86_64.rpm 8libglvnd-devel-1.3.4-1.el8.x86_64.rpm 8libglvnd-egl-1.3.4-1.el8.x86_64.rpm 8libglvnd-gles-1.3.4-1.el8.x86_64.rpm 8libglvnd-opengl-1.3.4-1.el8.x86_64.rpmh )OBBBBBBBBBBBBBBBBBBBBBBBBbugfixfreeradius:3.0 bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=20212472021247https://bugzilla.redhat.com/show_bug.cgi?id=20218182021818https://bugzilla.redhat.com/show_bug.cgi?id=20301732030173https://errata.rockylinux.org/RLBA-2022:1868RLBA-2022:1868RLBA-2022:1868 iW} infreeradius-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmnfreeradius-devel-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmnfreeradius-doc-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmnfreeradius-krb5-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmnfreeradius-ldap-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmnfreeradius-mysql-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmnfreeradius-perl-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmnfreeradius-postgresql-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmnfreeradius-rest-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmnfreeradius-sqlite-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmnfreeradius-unixODBC-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmnfreeradius-utils-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmTnpython3-freeradius-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmiW} infreeradius-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmnfreeradius-devel-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmnfreeradius-doc-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmnfreeradius-krb5-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmnfreeradius-ldap-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmnfreeradius-mysql-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmnfreeradius-perl-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmnfreeradius-postgresql-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmnfreeradius-rest-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmnfreeradius-sqlite-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmnfreeradius-unixODBC-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmnfreeradius-utils-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmTnpython3-freeradius-3.0.20-12.module+el8.6.0+798+87c3dbe0.x86_64.rpmi ,jbugfixcorosync bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=20021152002115https://bugzilla.redhat.com/show_bug.cgi?id=20246582024658https://errata.rockylinux.org/RLBA-2022:1871RLBA-2022:1871RLBA-2022:1871 C corosynclib-3.1.5-2.el8.x86_64.rpmC corosynclib-3.1.5-2.el8.x86_64.rpmi  1mBBbugfixgcc-toolset-10-binutils bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=20445232044523https://errata.rockylinux.org/RLBA-2022:1872RLBA-2022:1872RLBA-2022:1872 'gcc-toolset-10-binutils-2.35-11.el8.x86_64.rpm(gcc-toolset-10-binutils-devel-2.35-11.el8.x86_64.rpm'gcc-toolset-10-binutils-2.35-11.el8.x86_64.rpm(gcc-toolset-10-binutils-devel-2.35-11.el8.x86_64.rpmj! 6rBBbugfixgcc-toolset-11-binutils bug fix and enhancement update https://errata.rockylinux.org/RLBA-2022:1873RLBA-2022:1873RLBA-2022:1873 Vgcc-toolset-11-binutils-2.36.1-2.el8.x86_64.rpmWgcc-toolset-11-binutils-devel-2.36.1-2.el8.x86_64.rpmVgcc-toolset-11-binutils-2.36.1-2.el8.x86_64.rpmWgcc-toolset-11-binutils-devel-2.36.1-2.el8.x86_64.rpmjJ ;wBBsecurityLow: libpq security update9lhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222CVE-2021-23222CVE-2021-23222https://bugzilla.redhat.com/show_bug.cgi?id=20226752022675https://errata.rockylinux.org/RLSA-2022:1891RLSA-2022:1891RLSA-2022:1891 FQlibpq-13.5-1.el8.x86_64.rpmGQlibpq-devel-13.5-1.el8.x86_64.rpmFQlibpq-13.5-1.el8.x86_64.rpmGQlibpq-devel-13.5-1.el8.x86_64.rpmj& |BBbugfixlibecpg bug fix and enhancement updateN https://bugzilla.redhat.com/show_bug.cgi?id=20232072023207https://errata.rockylinux.org/RLBA-2022:1895RLBA-2022:1895RLBA-2022:1895 xRlibecpg-13.5-3.el8.x86_64.rpm0Rlibpgtypes-13.5-3.el8.x86_64.rpmxRlibecpg-13.5-3.el8.x86_64.rpm0Rlibpgtypes-13.5-3.el8.x86_64.rpmk( Abugfixspamassassin bug fix and enhancement updateM https://bugzilla.redhat.com/show_bug.cgi?id=19438481943848https://errata.rockylinux.org/RLBA-2022:1899RLBA-2022:1899RLBA-2022:1899 qKspamassassin-3.4.6-1.el8.x86_64.rpmqKspamassassin-3.4.6-1.el8.x86_64.rpmk) DBBBbugfixgcc-toolset-11-gdb bug fix and enhancement updateL https://bugzilla.redhat.com/show_bug.cgi?id=20115202011520https://errata.rockylinux.org/RLBA-2022:1905RLBA-2022:1905RLBA-2022:1905 hgcc-toolset-11-gdb-10.2-5.el8.x86_64.rpm5gcc-toolset-11-gdb-doc-10.2-5.el8.noarch.rpmigcc-toolset-11-gdb-gdbserver-10.2-5.el8.x86_64.rpmhgcc-toolset-11-gdb-10.2-5.el8.x86_64.rpm5gcc-toolset-11-gdb-doc-10.2-5.el8.noarch.rpmigcc-toolset-11-gdb-gdbserver-10.2-5.el8.x86_64.rpmk. Jbugfixmdevctl bug fix and enhancement updateK https://bugzilla.redhat.com/show_bug.cgi?id=19602421960242https://bugzilla.redhat.com/show_bug.cgi?id=19996871999687https://bugzilla.redhat.com/show_bug.cgi?id=20197182019718https://errata.rockylinux.org/RLBA-2022:1922RLBA-2022:1922RLBA-2022:1922 2mdevctl-1.1.0-2.el8.x86_64.rpm2mdevctl-1.1.0-2.el8.x86_64.rpml0 Mbugfixmozilla-filesystem bug fix and enhancement updateL https://bugzilla.redhat.com/show_bug.cgi?id=20312312031231https://errata.rockylinux.org/RLBA-2022:1927RLBA-2022:1927RLBA-2022:1927 8dmozilla-filesystem-1.9-19.el8.x86_64.rpm8dmozilla-filesystem-1.9-19.el8.x86_64.rpmlN XBBBBBBBBBBBBBBsecurityModerate: php:7.4 security updateK8https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703CVE-2021-21703CVE-2021-21703https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705CVE-2021-21705CVE-2021-21705https://bugzilla.redhat.com/show_bug.cgi?id=19787551978755https://bugzilla.redhat.com/show_bug.cgi?id=20165352016535https://errata.rockylinux.org/RLSA-2022:1935RLSA-2022:1935RLSA-2022:1935 _c 0apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpmblibzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmclibzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmdlibzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmephp-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpmfphp-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpmtphp-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm;mphp-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpmgPphp-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm_c 0apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpmblibzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmclibzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmdlibzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmephp-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpmfphp-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpmtphp-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm;mphp-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpmgPphp-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm|3 QBBBBBBBBbugfixgcc-toolset-11 bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=20273772027377https://errata.rockylinux.org/RLBA-2022:1937RLBA-2022:1937RLBA-2022:1937 Sgcc-toolset-11-11.1-1.el8.x86_64.rpmXgcc-toolset-11-build-11.1-1.el8.x86_64.rpmygcc-toolset-11-perftools-11.1-1.el8.x86_64.rpmzgcc-toolset-11-runtime-11.1-1.el8.x86_64.rpmgcc-toolset-11-toolchain-11.1-1.el8.x86_64.rpmSgcc-toolset-11-11.1-1.el8.x86_64.rpmXgcc-toolset-11-build-11.1-1.el8.x86_64.rpmygcc-toolset-11-perftools-11.1-1.el8.x86_64.rpmzgcc-toolset-11-runtime-11.1-1.el8.x86_64.rpmgcc-toolset-11-toolchain-11.1-1.el8.x86_64.rpm|O UBBB[securityModerate: squid:4 security and bug fix update>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28116CVE-2021-28116CVE-2021-28116https://bugzilla.redhat.com/show_bug.cgi?id=19399391939939https://bugzilla.redhat.com/show_bug.cgi?id=20061212006121https://errata.rockylinux.org/RLSA-2022:1939RLSA-2022:1939RLSA-2022:1939 &SY3libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm4libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm&^squid-4.15-3.module+el8.6.0+1044+67ab5d0a.2.x86_64.rpm&SY3libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm4libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm&^squid-4.15-3.module+el8.6.0+1044+67ab5d0a.2.x86_64.rpmQ ]securityModerate: fetchmail security update@https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36386CVE-2021-36386CVE-2021-36386https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39272CVE-2021-39272CVE-2021-39272https://bugzilla.redhat.com/show_bug.cgi?id=19877661987766https://bugzilla.redhat.com/show_bug.cgi?id=19991901999190https://errata.rockylinux.org/RLSA-2022:1964RLSA-2022:1964RLSA-2022:1964  fetchmail-6.4.24-1.el8.x86_64.rpm fetchmail-6.4.24-1.el8.x86_64.rpm; `BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbugfixplymouth bug fix and enhancement updateZ https://bugzilla.redhat.com/show_bug.cgi?id=20564732056473https://errata.rockylinux.org/RLBA-2022:1965RLBA-2022:1965RLBA-2022:1965 Mplymouth-0.9.4-11.20200615git1e36e30.el8.x86_64.rpmMplymouth-core-libs-0.9.4-11.20200615git1e36e30.el8.x86_64.rpmMplymouth-graphics-libs-0.9.4-11.20200615git1e36e30.el8.x86_64.rpmMplymouth-plugin-fade-throbber-0.9.4-11.20200615git1e36e30.el8.x86_64.rpmMplymouth-plugin-label-0.9.4-11.20200615git1e36e30.el8.x86_64.rpmMplymouth-plugin-script-0.9.4-11.20200615git1e36e30.el8.x86_64.rpmMplymouth-plugin-space-flares-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm Mplymouth-plugin-throbgress-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm!Mplymouth-plugin-two-step-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm"Mplymouth-scripts-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm#Mplymouth-system-theme-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm$Mplymouth-theme-charge-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm%Mplymouth-theme-fade-in-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm&Mplymouth-theme-script-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm'Mplymouth-theme-solar-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm(Mplymouth-theme-spinfinity-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm)Mplymouth-theme-spinner-0.9.4-11.20200615git1e36e30.el8.x86_64.rpmMplymouth-0.9.4-11.20200615git1e36e30.el8.x86_64.rpmMplymouth-core-libs-0.9.4-11.20200615git1e36e30.el8.x86_64.rpmMplymouth-graphics-libs-0.9.4-11.20200615git1e36e30.el8.x86_64.rpmMplymouth-plugin-fade-throbber-0.9.4-11.20200615git1e36e30.el8.x86_64.rpmMplymouth-plugin-label-0.9.4-11.20200615git1e36e30.el8.x86_64.rpmMplymouth-plugin-script-0.9.4-11.20200615git1e36e30.el8.x86_64.rpmMplymouth-plugin-space-flares-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm Mplymouth-plugin-throbgress-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm!Mplymouth-plugin-two-step-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm"Mplymouth-scripts-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm#Mplymouth-system-theme-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm$Mplymouth-theme-charge-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm%Mplymouth-theme-fade-in-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm&Mplymouth-theme-script-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm'Mplymouth-theme-solar-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm(Mplymouth-theme-spinfinity-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm)Mplymouth-theme-spinner-0.9.4-11.20200615git1e36e30.el8.x86_64.rpm< bugfixpython-suds bug fix and enhancement updateY https://bugzilla.redhat.com/show_bug.cgi?id=19219201921920https://errata.rockylinux.org/RLBA-2022:1967RLBA-2022:1967RLBA-2022:1967 fpython3-suds-0.7-0.11.94664ddd46a6.el8.noarch.rpmfpython3-suds-0.7-0.11.94664ddd46a6.el8.noarch.rpm; ZBBBBBBBBBBBUBwBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement updateXjhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20196CVE-2021-20196CVE-2021-20196https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33285CVE-2021-33285CVE-2021-33285https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33286CVE-2021-33286CVE-2021-33286https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33287CVE-2021-33287CVE-2021-33287https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33289CVE-2021-33289CVE-2021-33289https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35266CVE-2021-35266CVE-2021-35266https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35267CVE-2021-35267CVE-2021-35267https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35268CVE-2021-35268CVE-2021-35268https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35269CVE-2021-35269CVE-2021-35269https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3622CVE-2021-3622CVE-2021-3622https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3716CVE-2021-3716CVE-2021-3716https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3748CVE-2021-3748CVE-2021-3748https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39251CVE-2021-39251CVE-2021-39251https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39252CVE-2021-39252CVE-2021-39252https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39253CVE-2021-39253CVE-2021-39253https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39254CVE-2021-39254CVE-2021-39254https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39255CVE-2021-39255CVE-2021-39255https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39256CVE-2021-39256CVE-2021-39256https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39257CVE-2021-39257CVE-2021-39257https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39258CVE-2021-39258CVE-2021-39258https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39259CVE-2021-39259CVE-2021-39259https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39260CVE-2021-39260CVE-2021-39260https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39261CVE-2021-39261CVE-2021-39261https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39262CVE-2021-39262CVE-2021-39262https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39263CVE-2021-39263CVE-2021-39263https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3975CVE-2021-3975CVE-2021-3975https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4145CVE-2021-4145CVE-2021-4145https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4158CVE-2021-4158CVE-2021-4158https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0485CVE-2022-0485CVE-2022-0485https://bugzilla.redhat.com/show_bug.cgi?id=16776081677608https://bugzilla.redhat.com/show_bug.cgi?id=15102371510237https://bugzilla.redhat.com/show_bug.cgi?id=16892021689202https://bugzilla.redhat.com/show_bug.cgi?id=17383921738392https://bugzilla.redhat.com/show_bug.cgi?id=17430981743098https://bugzilla.redhat.com/show_bug.cgi?id=18068571806857https://bugzilla.redhat.com/show_bug.cgi?id=18108631810863https://bugzilla.redhat.com/show_bug.cgi?id=18360941836094https://bugzilla.redhat.com/show_bug.cgi?id=18454681845468https://bugzilla.redhat.com/show_bug.cgi?id=18527621852762https://bugzilla.redhat.com/show_bug.cgi?id=18670871867087https://bugzilla.redhat.com/show_bug.cgi?id=19192101919210https://bugzilla.redhat.com/show_bug.cgi?id=19249721924972https://bugzilla.redhat.com/show_bug.cgi?id=19265081926508https://bugzilla.redhat.com/show_bug.cgi?id=19422751942275https://bugzilla.redhat.com/show_bug.cgi?id=19432031943203https://bugzilla.redhat.com/show_bug.cgi?id=19533891953389https://bugzilla.redhat.com/show_bug.cgi?id=19651401965140https://bugzilla.redhat.com/show_bug.cgi?id=19655891965589https://bugzilla.redhat.com/show_bug.cgi?id=19656381965638https://bugzilla.redhat.com/show_bug.cgi?id=19725151972515https://bugzilla.redhat.com/show_bug.cgi?id=19754891975489https://bugzilla.redhat.com/show_bug.cgi?id=19758401975840https://bugzilla.redhat.com/show_bug.cgi?id=19785741978574https://bugzilla.redhat.com/show_bug.cgi?id=19817821981782https://bugzilla.redhat.com/show_bug.cgi?id=19829931982993https://bugzilla.redhat.com/show_bug.cgi?id=19836841983684https://bugzilla.redhat.com/show_bug.cgi?id=19847211984721https://bugzilla.redhat.com/show_bug.cgi?id=19854511985451https://bugzilla.redhat.com/show_bug.cgi?id=19881041988104https://bugzilla.redhat.com/show_bug.cgi?id=19889861988986https://bugzilla.redhat.com/show_bug.cgi?id=19893381989338https://bugzilla.redhat.com/show_bug.cgi?id=19895201989520https://bugzilla.redhat.com/show_bug.cgi?id=19901351990135https://bugzilla.redhat.com/show_bug.cgi?id=19946951994695https://bugzilla.redhat.com/show_bug.cgi?id=19958651995865https://bugzilla.redhat.com/show_bug.cgi?id=19965301996530https://bugzilla.redhat.com/show_bug.cgi?id=19974101997410The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0), libvirt (8.0.0), libvirt-python (8.0.0), perl-Sys-Virt (8.0.0), seabios (1.15.0), libtpms (0.9.1). (BZ#1997410, BZ#2012802, BZ#2012806, BZ#2012813, BZ#2018392, BZ#2027716, BZ#2029355)https://bugzilla.redhat.com/show_bug.cgi?id=19985141998514https://bugzilla.redhat.com/show_bug.cgi?id=19989471998947https://bugzilla.redhat.com/show_bug.cgi?id=19989491998949https://bugzilla.redhat.com/show_bug.cgi?id=19989501998950https://bugzilla.redhat.com/show_bug.cgi?id=20002252000225https://bugzilla.redhat.com/show_bug.cgi?id=20015252001525https://bugzilla.redhat.com/show_bug.cgi?id=20016082001608https://bugzilla.redhat.com/show_bug.cgi?id=20016092001609https://bugzilla.redhat.com/show_bug.cgi?id=20016132001613https://bugzilla.redhat.com/show_bug.cgi?id=20016162001616https://bugzilla.redhat.com/show_bug.cgi?id=20016192001619https://bugzilla.redhat.com/show_bug.cgi?id=20016212001621https://bugzilla.redhat.com/show_bug.cgi?id=20016232001623https://bugzilla.redhat.com/show_bug.cgi?id=20016452001645https://bugzilla.redhat.com/show_bug.cgi?id=20016492001649https://bugzilla.redhat.com/show_bug.cgi?id=20016502001650https://bugzilla.redhat.com/show_bug.cgi?id=20016512001651https://bugzilla.redhat.com/show_bug.cgi?id=20016522001652https://bugzilla.redhat.com/show_bug.cgi?id=20016532001653https://bugzilla.redhat.com/show_bug.cgi?id=20016542001654https://bugzilla.redhat.com/show_bug.cgi?id=20016562001656https://bugzilla.redhat.com/show_bug.cgi?id=20016582001658https://bugzilla.redhat.com/show_bug.cgi?id=20016592001659https://bugzilla.redhat.com/show_bug.cgi?id=20016612001661https://bugzilla.redhat.com/show_bug.cgi?id=20016622001662https://bugzilla.redhat.com/show_bug.cgi?id=20016652001665https://bugzilla.redhat.com/show_bug.cgi?id=20016672001667https://bugzilla.redhat.com/show_bug.cgi?id=20026072002607https://bugzilla.redhat.com/show_bug.cgi?id=20026942002694https://bugzilla.redhat.com/show_bug.cgi?id=20029072002907https://bugzilla.redhat.com/show_bug.cgi?id=20030712003071https://bugzilla.redhat.com/show_bug.cgi?id=20036792003679https://bugzilla.redhat.com/show_bug.cgi?id=20044162004416https://bugzilla.redhat.com/show_bug.cgi?id=20048122004812https://bugzilla.redhat.com/show_bug.cgi?id=20071292007129https://bugzilla.redhat.com/show_bug.cgi?id=20092362009236https://bugzilla.redhat.com/show_bug.cgi?id=20123852012385https://bugzilla.redhat.com/show_bug.cgi?id=20128022012802https://bugzilla.redhat.com/show_bug.cgi?id=20128062012806https://bugzilla.redhat.com/show_bug.cgi?id=20128132012813https://bugzilla.redhat.com/show_bug.cgi?id=20139162013916https://bugzilla.redhat.com/show_bug.cgi?id=20179282017928https://bugzilla.redhat.com/show_bug.cgi?id=20181732018173https://bugzilla.redhat.com/show_bug.cgi?id=20183922018392https://bugzilla.redhat.com/show_bug.cgi?id=20206302020630https://bugzilla.redhat.com/show_bug.cgi?id=20217782021778https://bugzilla.redhat.com/show_bug.cgi?id=20226042022604https://bugzilla.redhat.com/show_bug.cgi?id=20226062022606https://bugzilla.redhat.com/show_bug.cgi?id=20226072022607https://bugzilla.redhat.com/show_bug.cgi?id=20226082022608https://bugzilla.redhat.com/show_bug.cgi?id=20232792023279https://bugzilla.redhat.com/show_bug.cgi?id=20243262024326https://bugzilla.redhat.com/show_bug.cgi?id=20244192024419https://bugzilla.redhat.com/show_bug.cgi?id=20257692025769https://bugzilla.redhat.com/show_bug.cgi?id=20268342026834https://bugzilla.redhat.com/show_bug.cgi?id=20272082027208https://bugzilla.redhat.com/show_bug.cgi?id=20277162027716https://bugzilla.redhat.com/show_bug.cgi?id=20293552029355https://bugzilla.redhat.com/show_bug.cgi?id=20293802029380https://bugzilla.redhat.com/show_bug.cgi?id=20295822029582https://bugzilla.redhat.com/show_bug.cgi?id=20296122029612https://bugzilla.redhat.com/show_bug.cgi?id=20296472029647https://bugzilla.redhat.com/show_bug.cgi?id=20301192030119https://bugzilla.redhat.com/show_bug.cgi?id=20304352030435https://bugzilla.redhat.com/show_bug.cgi?id=20304372030437https://bugzilla.redhat.com/show_bug.cgi?id=20304382030438https://bugzilla.redhat.com/show_bug.cgi?id=20310352031035https://bugzilla.redhat.com/show_bug.cgi?id=20310392031039https://bugzilla.redhat.com/show_bug.cgi?id=20310412031041https://bugzilla.redhat.com/show_bug.cgi?id=20332792033279https://bugzilla.redhat.com/show_bug.cgi?id=20346022034602https://bugzilla.redhat.com/show_bug.cgi?id=20350022035002https://bugzilla.redhat.com/show_bug.cgi?id=20351772035177https://bugzilla.redhat.com/show_bug.cgi?id=20351852035185https://bugzilla.redhat.com/show_bug.cgi?id=20352372035237https://bugzilla.redhat.com/show_bug.cgi?id=20357142035714https://bugzilla.redhat.com/show_bug.cgi?id=20361782036178https://bugzilla.redhat.com/show_bug.cgi?id=20371352037135https://bugzilla.redhat.com/show_bug.cgi?id=20414802041480https://bugzilla.redhat.com/show_bug.cgi?id=20416102041610https://bugzilla.redhat.com/show_bug.cgi?id=20435842043584https://bugzilla.redhat.com/show_bug.cgi?id=20459452045945https://bugzilla.redhat.com/show_bug.cgi?id=20461722046172https://bugzilla.redhat.com/show_bug.cgi?id=20503242050324https://bugzilla.redhat.com/show_bug.cgi?id=20506972050697https://bugzilla.redhat.com/show_bug.cgi?id=20507022050702https://bugzilla.redhat.com/show_bug.cgi?id=20545972054597https://bugzilla.redhat.com/show_bug.cgi?id=20593112059311https://bugzilla.redhat.com/show_bug.cgi?id=20653142065314https://errata.rockylinux.org/RLSA-2022:1759RLSA-2022:1759RLSA-2022:1759 tspA&+=hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm,=hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm=libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpmblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm>?libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm?libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm??libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmB?nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmCnbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmnbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpmDnbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmEnbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmFnbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmGnbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmHnbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmInbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmJnbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmKnbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmLnbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmMnbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmNnbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmOnbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmPnbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmQnbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmRnbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmSnbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmTnbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmd=perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmcperl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpme=python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmf?python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmq=ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmtspA&+=hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm,=hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm=libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpmblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm>?libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm?libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm??libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmB?nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmCnbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmnbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpmDnbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmEnbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmFnbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmGnbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmHnbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmInbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmJnbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmKnbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmLnbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmMnbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmNnbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmOnbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmPnbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmQnbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmRnbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmSnbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmTnbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmd=perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmcperl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpme=python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmf?python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmq=ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm+< kBBBBBBBBBBBBBuqsecurityImportant: container-tools:rhel8 security, bug fix, and enhancement updateB"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1227CVE-2022-1227CVE-2022-1227https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21698CVE-2022-21698CVE-2022-21698https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27649CVE-2022-27649CVE-2022-27649https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27650CVE-2022-27650CVE-2022-27650https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27651CVE-2022-27651CVE-2022-27651https://bugzilla.redhat.com/show_bug.cgi?id=18617601861760https://bugzilla.redhat.com/show_bug.cgi?id=19676421967642https://bugzilla.redhat.com/show_bug.cgi?id=19821641982164https://bugzilla.redhat.com/show_bug.cgi?id=19827841982784https://bugzilla.redhat.com/show_bug.cgi?id=19959001995900https://bugzilla.redhat.com/show_bug.cgi?id=19988351998835https://bugzilla.redhat.com/show_bug.cgi?id=20009142000914https://bugzilla.redhat.com/show_bug.cgi?id=20027212002721https://bugzilla.redhat.com/show_bug.cgi?id=20049932004993https://bugzilla.redhat.com/show_bug.cgi?id=20059722005972https://bugzilla.redhat.com/show_bug.cgi?id=20066782006678https://bugzilla.redhat.com/show_bug.cgi?id=20090472009047https://bugzilla.redhat.com/show_bug.cgi?id=20092962009296https://bugzilla.redhat.com/show_bug.cgi?id=20172662017266https://bugzilla.redhat.com/show_bug.cgi?id=20189492018949https://bugzilla.redhat.com/show_bug.cgi?id=20231122023112https://bugzilla.redhat.com/show_bug.cgi?id=20242292024229https://bugzilla.redhat.com/show_bug.cgi?id=20253362025336https://bugzilla.redhat.com/show_bug.cgi?id=20305992030599https://bugzilla.redhat.com/show_bug.cgi?id=20458802045880https://bugzilla.redhat.com/show_bug.cgi?id=20554872055487https://bugzilla.redhat.com/show_bug.cgi?id=20597542059754https://bugzilla.redhat.com/show_bug.cgi?id=20652922065292https://bugzilla.redhat.com/show_bug.cgi?id=20657072065707https://bugzilla.redhat.com/show_bug.cgi?id=20665682066568https://bugzilla.redhat.com/show_bug.cgi?id=20668402066840https://bugzilla.redhat.com/show_bug.cgi?id=20668452066845https://bugzilla.redhat.com/show_bug.cgi?id=20703682070368https://errata.rockylinux.org/RLSA-2022:1762RLSA-2022:1762RLSA-2022:1762 $zW -crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm*criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm!criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm"criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpmTXlibslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmUXlibslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm.python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm=python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm+Fslirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm$zW -crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm*criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm!criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm"criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpmTXlibslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmUXlibslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm.python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm=python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm+Fslirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm4= dBBBBBBBBBBBBBBBBBBBBBCBBBBBBBBBqBBsecurityModerate: python39:3.9 and python39-devel:3.9 security updateYehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43818CVE-2021-43818CVE-2021-43818https://bugzilla.redhat.com/show_bug.cgi?id=20031022003102https://bugzilla.redhat.com/show_bug.cgi?id=20067902006790https://bugzilla.redhat.com/show_bug.cgi?id=20325692032569https://errata.rockylinux.org/RLSA-2022:1763RLSA-2022:1763RLSA-2022:1763 or"QJ?python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpmKbpython39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpmQpython39-idna-2.10-3.module+el8.4.0+574+843c4898.noarch.rpmw?python39-lxml-4.6.5-1.module+el8.6.0+795+de4edbcc.x86_64.rpm&'python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm_'python39-numpy-doc-1.19.4-3.module+el8.5.0+673+10283621.noarch.rpm''python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm(Zpython39-pip-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpm)Zpython39-pip-wheel-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpmLkpython39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpmRpython39-pycparser-2.20-3.module+el8.4.0+574+843c4898.noarch.rpmMSpython39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpmNSpython39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpmOSpython39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpmPipython39-PyMySQL-0.10.1-2.module+el8.5.0+673+10283621.noarch.rpmPhpython39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpmSpython39-requests-2.25.0-2.module+el8.4.0+574+843c4898.noarch.rpmQHpython39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm`spython39-setuptools-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpmaspython39-setuptools-wheel-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpmTspython39-six-1.15.0-3.module+el8.4.0+574+843c4898.noarch.rpmUjpython39-toml-0.10.1-5.module+el8.4.0+574+843c4898.noarch.rpmbEpython39-urllib3-1.25.10-4.module+el8.5.0+673+10283621.noarch.rpmchpython39-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpmdhpython39-wheel-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpmor"QJ?python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpmKbpython39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpmQpython39-idna-2.10-3.module+el8.4.0+574+843c4898.noarch.rpmw?python39-lxml-4.6.5-1.module+el8.6.0+795+de4edbcc.x86_64.rpm&'python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm_'python39-numpy-doc-1.19.4-3.module+el8.5.0+673+10283621.noarch.rpm''python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm(Zpython39-pip-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpm)Zpython39-pip-wheel-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpmLkpython39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpmRpython39-pycparser-2.20-3.module+el8.4.0+574+843c4898.noarch.rpmMSpython39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpmNSpython39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpmOSpython39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpmPipython39-PyMySQL-0.10.1-2.module+el8.5.0+673+10283621.noarch.rpmPhpython39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpmSpython39-requests-2.25.0-2.module+el8.4.0+574+843c4898.noarch.rpmQHpython39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm`spython39-setuptools-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpmaspython39-setuptools-wheel-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpmTspython39-six-1.15.0-3.module+el8.4.0+574+843c4898.noarch.rpmUjpython39-toml-0.10.1-5.module+el8.4.0+574+843c4898.noarch.rpmbEpython39-urllib3-1.25.10-4.module+el8.5.0+673+10283621.noarch.rpmchpython39-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpmdhpython39-wheel-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpmEO UBBBBBBBBBBBBBgenhancementnginx:1.20 bug fix and enhancement update> https://bugzilla.redhat.com/show_bug.cgi?id=19917871991787https://bugzilla.redhat.com/show_bug.cgi?id=20152432015243https://errata.rockylinux.org/RLEA-2022:1767RLEA-2022:1767RLEA-2022:1767 s , sxnginx-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpmUxnginx-all-modules-1.20.1-1.module+el8.6.0+791+48a2bb9d.noarch.rpmVxnginx-filesystem-1.20.1-1.module+el8.6.0+791+48a2bb9d.noarch.rpmUxnginx-mod-devel-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpmxnginx-mod-http-image-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpmxnginx-mod-http-perl-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpmxnginx-mod-http-xslt-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpmxnginx-mod-mail-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpmxnginx-mod-stream-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpms , sxnginx-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpmUxnginx-all-modules-1.20.1-1.module+el8.6.0+791+48a2bb9d.noarch.rpmVxnginx-filesystem-1.20.1-1.module+el8.6.0+791+48a2bb9d.noarch.rpmUxnginx-mod-devel-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpmxnginx-mod-http-image-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpmxnginx-mod-http-perl-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpmxnginx-mod-http-xslt-filter-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpmxnginx-mod-mail-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpmxnginx-mod-stream-1.20.1-1.module+el8.6.0+791+48a2bb9d.x86_64.rpmG Kbugfixlibgit2-glib bug fix and enhancement update= https://errata.rockylinux.org/RLBA-2022:1769RLBA-2022:1769RLBA-2022:1769 ?libgit2-glib-0.26.4-3.el8.x86_64.rpm?libgit2-glib-0.26.4-3.el8.x86_64.rpmG NBBBBBBBbugfixusbguard bug fix and enhancement update< https://bugzilla.redhat.com/show_bug.cgi?id=19293641929364https://bugzilla.redhat.com/show_bug.cgi?id=19632711963271https://bugzilla.redhat.com/show_bug.cgi?id=20000002000000https://bugzilla.redhat.com/show_bug.cgi?id=20045112004511https://bugzilla.redhat.com/show_bug.cgi?id=20050202005020https://bugzilla.redhat.com/show_bug.cgi?id=20144412014441https://errata.rockylinux.org/RLBA-2022:1779RLBA-2022:1779RLBA-2022:1779 Ausbguard-1.0.0-8.el8.x86_64.rpmAusbguard-dbus-1.0.0-8.el8.x86_64.rpmAusbguard-notifier-1.0.0-8.el8.x86_64.rpmAusbguard-selinux-1.0.0-8.el8.noarch.rpmAusbguard-tools-1.0.0-8.el8.x86_64.rpmAusbguard-1.0.0-8.el8.x86_64.rpmAusbguard-dbus-1.0.0-8.el8.x86_64.rpmAusbguard-notifier-1.0.0-8.el8.x86_64.rpmAusbguard-selinux-1.0.0-8.el8.noarch.rpmAusbguard-tools-1.0.0-8.el8.x86_64.rpmH Xbugfixjq bug fix and enhancement update; https://bugzilla.redhat.com/show_bug.cgi?id=20087172008717https://errata.rockylinux.org/RLBA-2022:1788RLBA-2022:1788RLBA-2022:1788 %}jq-1.6-3.el8.x86_64.rpm%}jq-1.6-3.el8.x86_64.rpmH? FBBBBBOBBBBBLBRJWBPBnBBBjBOsecurityModerate: container-tools:3.0 security and bug fix update:7https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27650CVE-2022-27650CVE-2022-27650https://bugzilla.redhat.com/show_bug.cgi?id=20340662034066https://bugzilla.redhat.com/show_bug.cgi?id=20352272035227https://bugzilla.redhat.com/show_bug.cgi?id=20668452066845https://errata.rockylinux.org/RLSA-2022:1793RLSA-2022:1793RLSA-2022:1793 pWScockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm9containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmZYcrun-0.18-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpmL fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm\Qoci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm.0python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm88runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmV/toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm^/toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm2_udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpmpWScockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm9containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmZYcrun-0.18-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpmL fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm\Qoci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm.0python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm88runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmV/toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm^/toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm2_udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm]@ \securityModerate: compat-exiv2-026 security updateqFhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18898CVE-2020-18898CVE-2020-18898https://bugzilla.redhat.com/show_bug.cgi?id=20026782002678https://errata.rockylinux.org/RLSA-2022:1797RLSA-2022:1797RLSA-2022:1797 ;>compat-exiv2-026-0.26-7.el8.x86_64.rpm;>compat-exiv2-026-0.26-7.el8.x86_64.rpm] -_BBBBBBBBBBBBbugfixgcc-toolset-11-elfutils bug fix and enhancement update7 https://bugzilla.redhat.com/show_bug.cgi?id=20009422000942https://errata.rockylinux.org/RLBA-2022:1802RLBA-2022:1802RLBA-2022:1802 \1gcc-toolset-11-elfutils-0.185-5.el8.x86_64.rpm]1gcc-toolset-11-elfutils-debuginfod-client-0.185-5.el8.x86_64.rpm^1gcc-toolset-11-elfutils-debuginfod-client-devel-0.185-5.el8.x86_64.rpm_1gcc-toolset-11-elfutils-devel-0.185-5.el8.x86_64.rpm`1gcc-toolset-11-elfutils-libelf-0.185-5.el8.x86_64.rpma1gcc-toolset-11-elfutils-libelf-devel-0.185-5.el8.x86_64.rpmb1gcc-toolset-11-elfutils-libs-0.185-5.el8.x86_64.rpm\1gcc-toolset-11-elfutils-0.185-5.el8.x86_64.rpm]1gcc-toolset-11-elfutils-debuginfod-client-0.185-5.el8.x86_64.rpm^1gcc-toolset-11-elfutils-debuginfod-client-devel-0.185-5.el8.x86_64.rpm_1gcc-toolset-11-elfutils-devel-0.185-5.el8.x86_64.rpm`1gcc-toolset-11-elfutils-libelf-0.185-5.el8.x86_64.rpma1gcc-toolset-11-elfutils-libelf-devel-0.185-5.el8.x86_64.rpmb1gcc-toolset-11-elfutils-libs-0.185-5.el8.x86_64.rpm^  cdi-api-1.2-8.module+el8.6.0+843+5a13dac3.noarch.rpm)3geronimo-annotation-1.0-23.module+el8.6.0+843+5a13dac3.noarch.rpm[glassfish-el-api-3.0.1-0.7.b08.module+el8.6.0+975+c0ed2db8.noarch.rpmZ`google-guice-4.1-11.module+el8.6.0+843+5a13dac3.noarch.rpmpXguava20-20.0-8.module+el8.3.0+133+b8b54b58.noarch.rpmq;hawtjni-runtime-1.16-2.module+el8.3.0+133+b8b54b58.noarch.rpmdhttpcomponents-client-4.5.5-5.module+el8.6.0+843+5a13dac3.noarch.rpm[bhttpcomponents-core-4.4.10-3.module+el8.6.0+843+5a13dac3.noarch.rpm/Yjansi-native-1.7-7.module+el8.3.0+133+b8b54b58.x86_64.rpmw4jboss-interceptors-1.2-api-1.0.0-8.module+el8.3.0+133+b8b54b58.noarch.rpm\Gjcl-over-slf4j-1.7.25-4.module+el8.6.0+843+5a13dac3.noarch.rpm<:jsoup-1.11.3-3.module+el8.6.0+843+5a13dac3.noarch.rpm,hmaven-3.5.4-5.module+el8.6.0+975+c0ed2db8.noarch.rpmhmaven-lib-3.5.4-5.module+el8.6.0+975+c0ed2db8.noarch.rpmzmaven-resolver-api-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm{maven-resolver-connector-basic-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm|maven-resolver-impl-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm}maven-resolver-spi-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm~maven-resolver-transport-wagon-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpmmaven-resolver-util-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm!maven-wagon-file-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm!maven-wagon-http-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm!maven-wagon-http-shared-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm!maven-wagon-provider-api-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm]Eplexus-cipher-1.7-14.module+el8.6.0+843+5a13dac3.noarch.rpm^Vplexus-classworlds-2.5.2-9.module+el8.6.0+843+5a13dac3.noarch.rpm_Fplexus-containers-component-annotations-1.7.1-8.module+el8.6.0+843+5a13dac3.noarch.rpm`?plexus-interpolation-1.22-9.module+el8.6.0+843+5a13dac3.noarch.rpmaBplexus-sec-dispatcher-1.4-26.module+el8.6.0+843+5a13dac3.noarch.rpmb\plexus-utils-3.1.0-3.module+el8.6.0+843+5a13dac3.noarch.rpmfsisu-inject-0.3.3-6.module+el8.6.0+843+5a13dac3.noarch.rpmfsisu-plexus-0.3.3-6.module+el8.6.0+843+5a13dac3.noarch.rpm7<jansi-1.17.1-1.module+el8.3.0+241+f23502a8.noarch.rpmm.slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm,L/''%2aopalliance-1.0-17.module+el8.6.0+843+5a13dac3.noarch.rpmTCapache-commons-cli-1.4-4.module+el8.6.0+843+5a13dac3.noarch.rpmU8apache-commons-codec-1.11-3.module+el8.6.0+843+5a13dac3.noarch.rpmVMapache-commons-io-2.6-3.module+el8.6.0+843+5a13dac3.noarch.rpmW^apache-commons-lang3-3.7-3.module+el8.6.0+843+5a13dac3.noarch.rpmj=apache-commons-logging-1.2-13.module+el8.3.0+133+b8b54b58.noarch.rpmX1atinject-1-28.20100611svn86.module+el8.6.0+843+5a13dac3.noarch.rpmY>cdi-api-1.2-8.module+el8.6.0+843+5a13dac3.noarch.rpm)3geronimo-annotation-1.0-23.module+el8.6.0+843+5a13dac3.noarch.rpm[glassfish-el-api-3.0.1-0.7.b08.module+el8.6.0+975+c0ed2db8.noarch.rpmZ`google-guice-4.1-11.module+el8.6.0+843+5a13dac3.noarch.rpmpXguava20-20.0-8.module+el8.3.0+133+b8b54b58.noarch.rpmq;hawtjni-runtime-1.16-2.module+el8.3.0+133+b8b54b58.noarch.rpmdhttpcomponents-client-4.5.5-5.module+el8.6.0+843+5a13dac3.noarch.rpm[bhttpcomponents-core-4.4.10-3.module+el8.6.0+843+5a13dac3.noarch.rpm/Yjansi-native-1.7-7.module+el8.3.0+133+b8b54b58.x86_64.rpmw4jboss-interceptors-1.2-api-1.0.0-8.module+el8.3.0+133+b8b54b58.noarch.rpm\Gjcl-over-slf4j-1.7.25-4.module+el8.6.0+843+5a13dac3.noarch.rpm<:jsoup-1.11.3-3.module+el8.6.0+843+5a13dac3.noarch.rpm,hmaven-3.5.4-5.module+el8.6.0+975+c0ed2db8.noarch.rpmhmaven-lib-3.5.4-5.module+el8.6.0+975+c0ed2db8.noarch.rpmzmaven-resolver-api-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm{maven-resolver-connector-basic-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm|maven-resolver-impl-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm}maven-resolver-spi-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm~maven-resolver-transport-wagon-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpmmaven-resolver-util-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm!maven-wagon-file-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm!maven-wagon-http-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm!maven-wagon-http-shared-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm!maven-wagon-provider-api-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm]Eplexus-cipher-1.7-14.module+el8.6.0+843+5a13dac3.noarch.rpm^Vplexus-classworlds-2.5.2-9.module+el8.6.0+843+5a13dac3.noarch.rpm_Fplexus-containers-component-annotations-1.7.1-8.module+el8.6.0+843+5a13dac3.noarch.rpm`?plexus-interpolation-1.22-9.module+el8.6.0+843+5a13dac3.noarch.rpmaBplexus-sec-dispatcher-1.4-26.module+el8.6.0+843+5a13dac3.noarch.rpmb\plexus-utils-3.1.0-3.module+el8.6.0+843+5a13dac3.noarch.rpmfsisu-inject-0.3.3-6.module+el8.6.0+843+5a13dac3.noarch.rpmfsisu-plexus-0.3.3-6.module+el8.6.0+843+5a13dac3.noarch.rpmbC'}7<jansi-1.17.1-1.module+el8.3.0+241+f23502a8.noarch.rpm<* m.slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm. ?|Bbugfixvirt-manager bug fix and enhancement updatew https://bugzilla.redhat.com/show_bug.cgi?id=19138081913808https://bugzilla.redhat.com/show_bug.cgi?id=20017942001794https://bugzilla.redhat.com/show_bug.cgi?id=20090802009080https://bugzilla.redhat.com/show_bug.cgi?id=20113272011327https://bugzilla.redhat.com/show_bug.cgi?id=20202412020241https://bugzilla.redhat.com/show_bug.cgi?id=20269872026987https://bugzilla.redhat.com/show_bug.cgi?id=20372022037202https://errata.rockylinux.org/RLBA-2022:1862RLBA-2022:1862RLBA-2022:1862 4[virt-install-3.2.0-4.el8.noarch.rpm5[virt-manager-3.2.0-4.el8.noarch.rpm6[virt-manager-common-3.2.0-4.el8.noarch.rpm4[virt-install-3.2.0-4.el8.noarch.rpm5[virt-manager-3.2.0-4.el8.noarch.rpm6[virt-manager-common-3.2.0-4.el8.noarch.rpm." @bugfixadwaita-icon-theme bug fix and enhancement updatev https://bugzilla.redhat.com/show_bug.cgi?id=19774431977443https://errata.rockylinux.org/RLBA-2022:1875RLBA-2022:1875RLBA-2022:1875 gqadwaita-cursor-theme-3.28.0-3.el8.noarch.rpmhqadwaita-icon-theme-3.28.0-3.el8.noarch.rpmgqadwaita-cursor-theme-3.28.0-3.el8.noarch.rpmhqadwaita-icon-theme-3.28.0-3.el8.noarch.rpm.# CBBBBBBBBBBBBBBBBBBbugfixgit bug fix and enhancement updateu https://bugzilla.redhat.com/show_bug.cgi?id=20215472021547https://errata.rockylinux.org/RLBA-2022:1878RLBA-2022:1878RLBA-2022:1878 $ygit-daemon-2.31.1-2.el8.x86_64.rpm!ygit-2.31.1-2.el8.x86_64.rpmygit-all-2.31.1-2.el8.noarch.rpm"ygit-core-2.31.1-2.el8.x86_64.rpm ygit-core-doc-2.31.1-2.el8.noarch.rpm#ygit-credential-libsecret-2.31.1-2.el8.x86_64.rpm ygit-email-2.31.1-2.el8.noarch.rpm ygit-gui-2.31.1-2.el8.noarch.rpm ygit-instaweb-2.31.1-2.el8.noarch.rpmygitk-2.31.1-2.el8.noarch.rpm%ygit-subtree-2.31.1-2.el8.x86_64.rpmygit-svn-2.31.1-2.el8.noarch.rpmygitweb-2.31.1-2.el8.noarch.rpm6yperl-Git-2.31.1-2.el8.noarch.rpm7yperl-Git-SVN-2.31.1-2.el8.noarch.rpm$ygit-daemon-2.31.1-2.el8.x86_64.rpm!ygit-2.31.1-2.el8.x86_64.rpmygit-all-2.31.1-2.el8.noarch.rpm"ygit-core-2.31.1-2.el8.x86_64.rpm ygit-core-doc-2.31.1-2.el8.noarch.rpm#ygit-credential-libsecret-2.31.1-2.el8.x86_64.rpm ygit-email-2.31.1-2.el8.noarch.rpm ygit-gui-2.31.1-2.el8.noarch.rpm ygit-instaweb-2.31.1-2.el8.noarch.rpmygitk-2.31.1-2.el8.noarch.rpm%ygit-subtree-2.31.1-2.el8.x86_64.rpmygit-svn-2.31.1-2.el8.noarch.rpmygitweb-2.31.1-2.el8.noarch.rpm6yperl-Git-2.31.1-2.el8.noarch.rpm7yperl-Git-SVN-2.31.1-2.el8.noarch.rpm/Q vBEBTNBBBBenhancementidm:client and idm:DL1 bug fix and enhancement updatet %https://bugzilla.redhat.com/show_bug.cgi?id=17314841731484https://bugzilla.redhat.com/show_bug.cgi?id=17407021740702https://bugzilla.redhat.com/show_bug.cgi?id=17766871776687https://bugzilla.redhat.com/show_bug.cgi?id=19210071921007https://bugzilla.redhat.com/show_bug.cgi?id=19597521959752https://bugzilla.redhat.com/show_bug.cgi?id=19787471978747https://bugzilla.redhat.com/show_bug.cgi?id=19813221981322https://bugzilla.redhat.com/show_bug.cgi?id=19830601983060https://bugzilla.redhat.com/show_bug.cgi?id=19850691985069https://bugzilla.redhat.com/show_bug.cgi?id=19860521986052https://bugzilla.redhat.com/show_bug.cgi?id=20009172000917https://bugzilla.redhat.com/show_bug.cgi?id=20009192000919https://bugzilla.redhat.com/show_bug.cgi?id=20015002001500https://bugzilla.redhat.com/show_bug.cgi?id=20027182002718https://bugzilla.redhat.com/show_bug.cgi?id=20027292002729https://bugzilla.redhat.com/show_bug.cgi?id=20041652004165https://bugzilla.redhat.com/show_bug.cgi?id=20041662004166https://bugzilla.redhat.com/show_bug.cgi?id=20049922004992https://bugzilla.redhat.com/show_bug.cgi?id=20060172006017https://bugzilla.redhat.com/show_bug.cgi?id=20091142009114https://bugzilla.redhat.com/show_bug.cgi?id=20156072015607https://bugzilla.redhat.com/show_bug.cgi?id=20224832022483https://bugzilla.redhat.com/show_bug.cgi?id=20227622022762https://bugzilla.redhat.com/show_bug.cgi?id=20267322026732https://bugzilla.redhat.com/show_bug.cgi?id=20318252031825https://bugzilla.redhat.com/show_bug.cgi?id=20327382032738https://bugzilla.redhat.com/show_bug.cgi?id=20328062032806https://bugzilla.redhat.com/show_bug.cgi?id=20333422033342https://bugzilla.redhat.com/show_bug.cgi?id=20419952041995https://bugzilla.redhat.com/show_bug.cgi?id=20485092048509https://bugzilla.redhat.com/show_bug.cgi?id=20485582048558https://bugzilla.redhat.com/show_bug.cgi?id=20491672049167https://bugzilla.redhat.com/show_bug.cgi?id=20515752051575https://bugzilla.redhat.com/show_bug.cgi?id=20530242053024https://bugzilla.redhat.com/show_bug.cgi?id=20553162055316https://bugzilla.redhat.com/show_bug.cgi?id=20575052057505https://errata.rockylinux.org/RLEA-2022:1884RLEA-2022:1884RLEA-2022:1884 2/oq9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm7opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm9softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm:softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm2/oq9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm7opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm9softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm:softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm<$ *YBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbugfixtexlive bug fix and enhancement updates https://bugzilla.redhat.com/show_bug.cgi?id=19849291984929https://bugzilla.redhat.com/show_bug.cgi?id=20254932025493https://errata.rockylinux.org/RLBA-2022:1889RLBA-2022:1889RLBA-2022:1889 =$ texlive-euler-20180414-25.el8.noarch.rpm- texlive-filehook-20180414-25.el8.noarch.rpm7 texlive-fontspec-20180414-25.el8.noarch.rpm texlive-environ-20180414-25.el8.noarch.rpmU texlive-20180414-25.el8.x86_64.rpmV texlive-adjustbox-20180414-25.el8.noarch.rpmW texlive-ae-20180414-25.el8.noarch.rpmX texlive-algorithms-20180414-25.el8.noarch.rpmY texlive-amscls-20180414-25.el8.noarch.rpmZ texlive-amsfonts-20180414-25.el8.noarch.rpm[ texlive-amsmath-20180414-25.el8.noarch.rpm\ texlive-anyfontsize-20180414-25.el8.noarch.rpm] texlive-anysize-20180414-25.el8.noarch.rpm^ texlive-appendix-20180414-25.el8.noarch.rpm_ texlive-arabxetex-20180414-25.el8.noarch.rpm` texlive-arphic-20180414-25.el8.noarch.rpma texlive-attachfile-20180414-25.el8.noarch.rpmb texlive-avantgar-20180414-25.el8.noarch.rpmc texlive-awesomebox-20180414-25.el8.noarch.rpmd texlive-babel-20180414-25.el8.noarch.rpmf texlive-babelbib-20180414-25.el8.noarch.rpme texlive-babel-english-20180414-25.el8.noarch.rpmg texlive-base-20180414-25.el8.noarch.rpmh texlive-beamer-20180414-25.el8.noarch.rpmi texlive-bera-20180414-25.el8.noarch.rpmj texlive-beton-20180414-25.el8.noarch.rpmk texlive-bibtex-20180414-25.el8.x86_64.rpml texlive-bibtopic-20180414-25.el8.noarch.rpmm texlive-bidi-20180414-25.el8.noarch.rpmn texlive-bigfoot-20180414-25.el8.noarch.rpmo texlive-bookman-20180414-25.el8.noarch.rpmp texlive-booktabs-20180414-25.el8.noarch.rpmq texlive-breakurl-20180414-25.el8.noarch.rpmr texlive-breqn-20180414-25.el8.noarch.rpmt texlive-caption-20180414-25.el8.noarch.rpms texlive-capt-of-20180414-25.el8.noarch.rpmu texlive-carlisle-20180414-25.el8.noarch.rpmv texlive-changebar-20180414-25.el8.noarch.rpmw texlive-changepage-20180414-25.el8.noarch.rpmx texlive-charter-20180414-25.el8.noarch.rpmy texlive-chngcntr-20180414-25.el8.noarch.rpmz texlive-cite-20180414-25.el8.noarch.rpm{ texlive-cjk-20180414-25.el8.noarch.rpm| texlive-classpack-20180414-25.el8.noarch.rpm} texlive-cm-20180414-25.el8.noarch.rpm texlive-cmap-20180414-25.el8.noarch.rpm texlive-cmextra-20180414-25.el8.noarch.rpm~ texlive-cm-lgc-20180414-25.el8.noarch.rpm texlive-cm-super-20180414-25.el8.noarch.rpm texlive-cns-20180414-25.el8.noarch.rpm texlive-collectbox-20180414-25.el8.noarch.rpm texlive-collection-basic-20180414-25.el8.noarch.rpm texlive-collection-fontsrecommended-20180414-25.el8.noarch.rpm texlive-collection-htmlxml-20180414-25.el8.noarch.rpm texlive-collection-latex-20180414-25.el8.noarch.rpm texlive-collection-latexrecommended-20180414-25.el8.noarch.rpm texlive-collection-xetex-20180414-25.el8.noarch.rpm texlive-colortbl-20180414-25.el8.noarch.rpm texlive-context-20180414-25.el8.noarch.rpm texlive-courier-20180414-25.el8.noarch.rpm texlive-crop-20180414-25.el8.noarch.rpm texlive-csquotes-20180414-25.el8.noarch.rpm texlive-ctable-20180414-25.el8.noarch.rpm texlive-ctablestack-20180414-25.el8.noarch.rpm texlive-currfile-20180414-25.el8.noarch.rpm texlive-datetime-20180414-25.el8.noarch.rpm texlive-dvipdfmx-20180414-25.el8.x86_64.rpm texlive-dvipng-20180414-25.el8.x86_64.rpm texlive-dvips-20180414-25.el8.x86_64.rpm texlive-dvisvgm-20180414-25.el8.x86_64.rpm texlive-ec-20180414-25.el8.noarch.rpm texlive-eepic-20180414-25.el8.noarch.rpm texlive-enctex-20180414-25.el8.noarch.rpm texlive-enumitem-20180414-25.el8.noarch.rpm texlive-epsf-20180414-25.el8.noarch.rpm texlive-epstopdf-20180414-25.el8.noarch.rpm texlive-eqparbox-20180414-25.el8.noarch.rpm texlive-eso-pic-20180414-25.el8.noarch.rpm texlive-etex-20180414-25.el8.noarch.rpm! texlive-etex-pkg-20180414-25.el8.noarch.rpm" texlive-etoolbox-20180414-25.el8.noarch.rpm# texlive-euenc-20180414-25.el8.noarch.rpm% texlive-euro-20180414-25.el8.noarch.rpm& texlive-eurosym-20180414-25.el8.noarch.rpm' texlive-extsizes-20180414-25.el8.noarch.rpm( texlive-fancybox-20180414-25.el8.noarch.rpm) texlive-fancyhdr-20180414-25.el8.noarch.rpm* texlive-fancyref-20180414-25.el8.noarch.rpm+ texlive-fancyvrb-20180414-25.el8.noarch.rpm, texlive-filecontents-20180414-25.el8.noarch.rpm. texlive-finstrut-20180414-25.el8.noarch.rpm/ texlive-fix2col-20180414-25.el8.noarch.rpm0 texlive-fixlatvian-20180414-25.el8.noarch.rpm1 texlive-float-20180414-25.el8.noarch.rpm2 texlive-fmtcount-20180414-25.el8.noarch.rpm3 texlive-fncychap-20180414-25.el8.noarch.rpm4 texlive-fontawesome-20180414-25.el8.noarch.rpm5 texlive-fontbook-20180414-25.el8.noarch.rpm6 texlive-fonts-tlwg-20180414-25.el8.noarch.rpm8 texlive-fontware-20180414-25.el8.x86_64.rpm9 texlive-fontwrap-20180414-25.el8.noarch.rpm: texlive-footmisc-20180414-25.el8.noarch.rpm; texlive-fp-20180414-25.el8.noarch.rpm< texlive-fpl-20180414-25.el8.noarch.rpm= texlive-framed-20180414-25.el8.noarch.rpm> texlive-garuda-c90-20180414-25.el8.noarch.rpm? texlive-geometry-20180414-25.el8.noarch.rpm@ texlive-glyphlist-20180414-25.el8.noarch.rpmA texlive-graphics-20180414-25.el8.noarch.rpmB texlive-graphics-cfg-20180414-25.el8.noarch.rpmC texlive-graphics-def-20180414-25.el8.noarch.rpmD texlive-gsftopk-20180414-25.el8.x86_64.rpmE texlive-helvetic-20180414-25.el8.noarch.rpmF texlive-hyperref-20180414-25.el8.noarch.rpmI texlive-hyphenat-20180414-25.el8.noarch.rpmH texlive-hyphen-base-20180414-25.el8.noarch.rpmG texlive-hyph-utf8-20180414-25.el8.noarch.rpmJ texlive-ifetex-20180414-25.el8.noarch.rpmK texlive-ifluatex-20180414-25.el8.noarch.rpmL texlive-ifmtarg-20180414-25.el8.noarch.rpmM texlive-ifoddpage-20180414-25.el8.noarch.rpmN texlive-iftex-20180414-25.el8.noarch.rpmO texlive-ifxetex-20180414-25.el8.noarch.rpmP texlive-import-20180414-25.el8.noarch.rpmQ texlive-index-20180414-25.el8.noarch.rpmR texlive-jadetex-20180414-25.el8.noarch.rpmS texlive-jknapltx-20180414-25.el8.noarch.rpmT texlive-kastrup-20180414-25.el8.noarch.rpmU texlive-kerkis-20180414-25.el8.noarch.rpmV texlive-knuth-lib-20180414-25.el8.noarch.rpmW texlive-knuth-local-20180414-25.el8.noarch.rpmX texlive-koma-script-20180414-25.el8.noarch.rpmY texlive-kpathsea-20180414-25.el8.x86_64.rpmZ texlive-l3experimental-20180414-25.el8.noarch.rpm[ texlive-l3kernel-20180414-25.el8.noarch.rpm\ texlive-l3packages-20180414-25.el8.noarch.rpm] texlive-lastpage-20180414-25.el8.noarch.rpm^ texlive-latex-20180414-25.el8.noarch.rpm` texlive-latex2man-20180414-25.el8.noarch.rpma texlive-latexconfig-20180414-25.el8.noarch.rpm_ texlive-latex-fonts-20180414-25.el8.noarch.rpmb texlive-lettrine-20180414-25.el8.noarch.rpmc texlive-lib-20180414-25.el8.x86_64.rpmd texlive-linegoal-20180414-25.el8.noarch.rpme texlive-lineno-20180414-25.el8.noarch.rpmf texlive-listings-20180414-25.el8.noarch.rpmg texlive-lm-20180414-25.el8.noarch.rpmh texlive-lm-math-20180414-25.el8.noarch.rpmi texlive-ltabptch-20180414-25.el8.noarch.rpmj texlive-ltxmisc-20180414-25.el8.noarch.rpmk texlive-lua-alt-getopt-20180414-25.el8.noarch.rpml texlive-lualatex-math-20180414-25.el8.noarch.rpmm texlive-lualibs-20180414-25.el8.noarch.rpmn texlive-luaotfload-20180414-25.el8.noarch.rpmo texlive-luatex-20180414-25.el8.x86_64.rpmp texlive-luatex85-20180414-25.el8.noarch.rpmq texlive-luatexbase-20180414-25.el8.noarch.rpmr texlive-makecmds-20180414-25.el8.noarch.rpms texlive-makeindex-20180414-25.el8.x86_64.rpmt texlive-manfnt-font-20180414-25.el8.noarch.rpmu texlive-marginnote-20180414-25.el8.noarch.rpmv texlive-marvosym-20180414-25.el8.noarch.rpmw texlive-mathpazo-20180414-25.el8.noarch.rpmx texlive-mathspec-20180414-25.el8.noarch.rpmy texlive-mathtools-20180414-25.el8.noarch.rpmz texlive-mdwtools-20180414-25.el8.noarch.rpm{ texlive-memoir-20180414-25.el8.noarch.rpm| texlive-metafont-20180414-25.el8.x86_64.rpm} texlive-metalogo-20180414-25.el8.noarch.rpm~ texlive-metapost-20180414-25.el8.x86_64.rpm texlive-mflogo-20180414-25.el8.noarch.rpm texlive-mflogo-font-20180414-25.el8.noarch.rpm texlive-mfnfss-20180414-25.el8.noarch.rpm texlive-mfware-20180414-25.el8.x86_64.rpm texlive-microtype-20180414-25.el8.noarch.rpm texlive-mnsymbol-20180414-25.el8.noarch.rpm texlive-mparhack-20180414-25.el8.noarch.rpm texlive-mptopdf-20180414-25.el8.noarch.rpm texlive-ms-20180414-25.el8.noarch.rpm texlive-multido-20180414-25.el8.noarch.rpm texlive-multirow-20180414-25.el8.noarch.rpm texlive-natbib-20180414-25.el8.noarch.rpm texlive-ncctools-20180414-25.el8.noarch.rpm texlive-ncntrsbk-20180414-25.el8.noarch.rpm texlive-needspace-20180414-25.el8.noarch.rpm texlive-norasi-c90-20180414-25.el8.noarch.rpm texlive-ntgclass-20180414-25.el8.noarch.rpm texlive-oberdiek-20180414-25.el8.noarch.rpm texlive-overpic-20180414-25.el8.noarch.rpm texlive-palatino-20180414-25.el8.noarch.rpm texlive-paralist-20180414-25.el8.noarch.rpm texlive-parallel-20180414-25.el8.noarch.rpm texlive-parskip-20180414-25.el8.noarch.rpm texlive-passivetex-20180414-25.el8.noarch.rpm texlive-pdfpages-20180414-25.el8.noarch.rpm texlive-pdftex-20180414-25.el8.x86_64.rpm texlive-pgf-20180414-25.el8.noarch.rpm texlive-philokalia-20180414-25.el8.noarch.rpm texlive-placeins-20180414-25.el8.noarch.rpm texlive-plain-20180414-25.el8.noarch.rpm texlive-polyglossia-20180414-25.el8.noarch.rpm texlive-powerdot-20180414-25.el8.noarch.rpm texlive-preprint-20180414-25.el8.noarch.rpm texlive-psfrag-20180414-25.el8.noarch.rpm! texlive-pslatex-20180414-25.el8.noarch.rpm" texlive-psnfss-20180414-25.el8.noarch.rpm# texlive-pspicture-20180414-25.el8.noarch.rpm$ texlive-pst-3d-20180414-25.el8.noarch.rpm% texlive-pst-arrow-20180414-25.el8.noarch.rpm& texlive-pst-blur-20180414-25.el8.noarch.rpm' texlive-pst-coil-20180414-25.el8.noarch.rpm( texlive-pst-eps-20180414-25.el8.noarch.rpm) texlive-pst-fill-20180414-25.el8.noarch.rpm* texlive-pst-grad-20180414-25.el8.noarch.rpm+ texlive-pst-math-20180414-25.el8.noarch.rpm, texlive-pst-node-20180414-25.el8.noarch.rpm- texlive-pst-plot-20180414-25.el8.noarch.rpm2 texlive-pstricks-20180414-25.el8.noarch.rpm3 texlive-pstricks-add-20180414-25.el8.noarch.rpm. texlive-pst-slpe-20180414-25.el8.noarch.rpm/ texlive-pst-text-20180414-25.el8.noarch.rpm0 texlive-pst-tools-20180414-25.el8.noarch.rpm1 texlive-pst-tree-20180414-25.el8.noarch.rpm4 texlive-ptext-20180414-25.el8.noarch.rpm5 texlive-pxfonts-20180414-25.el8.noarch.rpm6 texlive-qstest-20180414-25.el8.noarch.rpm7 texlive-rcs-20180414-25.el8.noarch.rpm8 texlive-realscripts-20180414-25.el8.noarch.rpm9 texlive-rsfs-20180414-25.el8.noarch.rpm: texlive-sansmath-20180414-25.el8.noarch.rpm; texlive-sauerj-20180414-25.el8.noarch.rpm< texlive-scheme-basic-20180414-25.el8.noarch.rpm= texlive-section-20180414-25.el8.noarch.rpm> texlive-sectsty-20180414-25.el8.noarch.rpm? texlive-seminar-20180414-25.el8.noarch.rpm@ texlive-sepnum-20180414-25.el8.noarch.rpmA texlive-setspace-20180414-25.el8.noarch.rpmB texlive-showexpl-20180414-25.el8.noarch.rpmC texlive-soul-20180414-25.el8.noarch.rpmD texlive-stmaryrd-20180414-25.el8.noarch.rpmE texlive-subfig-20180414-25.el8.noarch.rpmF texlive-subfigure-20180414-25.el8.noarch.rpmG texlive-svn-prov-20180414-25.el8.noarch.rpmH texlive-symbol-20180414-25.el8.noarch.rpmI texlive-t2-20180414-25.el8.noarch.rpmJ texlive-tabu-20180414-25.el8.noarch.rpmK texlive-tabulary-20180414-25.el8.noarch.rpmL texlive-tetex-20180414-25.el8.noarch.rpmM texlive-tex-20180414-25.el8.x86_64.rpmQ texlive-tex4ht-20180414-25.el8.x86_64.rpmR texlive-texconfig-20180414-25.el8.noarch.rpmN texlive-tex-gyre-20180414-25.el8.noarch.rpmO texlive-tex-gyre-math-20180414-25.el8.noarch.rpmP texlive-tex-ini-files-20180414-25.el8.noarch.rpmS texlive-texlive-common-doc-20180414-25.el8.noarch.rpmT texlive-texlive-docindex-20180414-25.el8.noarch.rpmU texlive-texlive-en-20180414-25.el8.noarch.rpmX texlive-texlive.infra-20180414-25.el8.noarch.rpmV texlive-texlive-msg-translations-20180414-25.el8.noarch.rpmW texlive-texlive-scripts-20180414-25.el8.noarch.rpmY texlive-textcase-20180414-25.el8.noarch.rpmZ texlive-textpos-20180414-25.el8.noarch.rpm[ texlive-threeparttable-20180414-25.el8.noarch.rpm\ texlive-thumbpdf-20180414-25.el8.noarch.rpm] texlive-times-20180414-25.el8.noarch.rpm^ texlive-tipa-20180414-25.el8.noarch.rpm_ texlive-titlesec-20180414-25.el8.noarch.rpm` texlive-titling-20180414-25.el8.noarch.rpma texlive-tocloft-20180414-25.el8.noarch.rpmb texlive-tools-20180414-25.el8.noarch.rpmc texlive-trimspaces-20180414-25.el8.noarch.rpmd texlive-txfonts-20180414-25.el8.noarch.rpme texlive-type1cm-20180414-25.el8.noarch.rpmf texlive-typehtml-20180414-25.el8.noarch.rpmg texlive-ucharclasses-20180414-25.el8.noarch.rpmh texlive-ucs-20180414-25.el8.noarch.rpmi texlive-uhc-20180414-25.el8.noarch.rpmj texlive-ulem-20180414-25.el8.noarch.rpmk texlive-underscore-20180414-25.el8.noarch.rpml texlive-unicode-data-20180414-25.el8.noarch.rpmm texlive-unicode-math-20180414-25.el8.noarch.rpmn texlive-unisugar-20180414-25.el8.noarch.rpmo texlive-updmap-map-20180414-25.el8.noarch.rpmp texlive-upquote-20180414-25.el8.noarch.rpmq texlive-url-20180414-25.el8.noarch.rpmr texlive-utopia-20180414-25.el8.noarch.rpms texlive-varwidth-20180414-25.el8.noarch.rpmt texlive-wadalab-20180414-25.el8.noarch.rpmu texlive-was-20180414-25.el8.noarch.rpmv texlive-wasy-20180414-25.el8.noarch.rpmw texlive-wasy2-ps-20180414-25.el8.noarch.rpmx texlive-wasysym-20180414-25.el8.noarch.rpmy texlive-wrapfig-20180414-25.el8.noarch.rpmz texlive-xcolor-20180414-25.el8.noarch.rpm{ texlive-xdvi-20180414-25.el8.x86_64.rpm| texlive-xecjk-20180414-25.el8.noarch.rpm} texlive-xecolor-20180414-25.el8.noarch.rpm~ texlive-xecyr-20180414-25.el8.noarch.rpm texlive-xeindex-20180414-25.el8.noarch.rpm texlive-xepersian-20180414-25.el8.noarch.rpm texlive-xesearch-20180414-25.el8.noarch.rpm texlive-xetex-20180414-25.el8.x86_64.rpm texlive-xetexconfig-20180414-25.el8.noarch.rpm texlive-xetexfontinfo-20180414-25.el8.noarch.rpm texlive-xetex-itrans-20180414-25.el8.noarch.rpm texlive-xetex-pstricks-20180414-25.el8.noarch.rpm texlive-xetex-tibetan-20180414-25.el8.noarch.rpm texlive-xifthen-20180414-25.el8.noarch.rpm texlive-xkeyval-20180414-25.el8.noarch.rpm texlive-xltxtra-20180414-25.el8.noarch.rpm texlive-xmltex-20180414-25.el8.noarch.rpm texlive-xmltexconfig-20180414-25.el8.noarch.rpm texlive-xstring-20180414-25.el8.noarch.rpm texlive-xtab-20180414-25.el8.noarch.rpm texlive-xunicode-20180414-25.el8.noarch.rpm texlive-zapfchan-20180414-25.el8.noarch.rpm texlive-zapfding-20180414-25.el8.noarch.rpm=$ texlive-euler-20180414-25.el8.noarch.rpm- texlive-filehook-20180414-25.el8.noarch.rpm7 texlive-fontspec-20180414-25.el8.noarch.rpm texlive-environ-20180414-25.el8.noarch.rpmU texlive-20180414-25.el8.x86_64.rpmV texlive-adjustbox-20180414-25.el8.noarch.rpmW texlive-ae-20180414-25.el8.noarch.rpmX texlive-algorithms-20180414-25.el8.noarch.rpmY texlive-amscls-20180414-25.el8.noarch.rpmZ texlive-amsfonts-20180414-25.el8.noarch.rpm[ texlive-amsmath-20180414-25.el8.noarch.rpm\ texlive-anyfontsize-20180414-25.el8.noarch.rpm] texlive-anysize-20180414-25.el8.noarch.rpm^ texlive-appendix-20180414-25.el8.noarch.rpm_ texlive-arabxetex-20180414-25.el8.noarch.rpm` texlive-arphic-20180414-25.el8.noarch.rpma texlive-attachfile-20180414-25.el8.noarch.rpmb texlive-avantgar-20180414-25.el8.noarch.rpmc texlive-awesomebox-20180414-25.el8.noarch.rpmd texlive-babel-20180414-25.el8.noarch.rpmf texlive-babelbib-20180414-25.el8.noarch.rpme texlive-babel-english-20180414-25.el8.noarch.rpmg texlive-base-20180414-25.el8.noarch.rpmh texlive-beamer-20180414-25.el8.noarch.rpmi texlive-bera-20180414-25.el8.noarch.rpmj texlive-beton-20180414-25.el8.noarch.rpmk texlive-bibtex-20180414-25.el8.x86_64.rpml texlive-bibtopic-20180414-25.el8.noarch.rpmm texlive-bidi-20180414-25.el8.noarch.rpmn texlive-bigfoot-20180414-25.el8.noarch.rpmo texlive-bookman-20180414-25.el8.noarch.rpmp texlive-booktabs-20180414-25.el8.noarch.rpmq texlive-breakurl-20180414-25.el8.noarch.rpmr texlive-breqn-20180414-25.el8.noarch.rpmt texlive-caption-20180414-25.el8.noarch.rpms texlive-capt-of-20180414-25.el8.noarch.rpmu texlive-carlisle-20180414-25.el8.noarch.rpmv texlive-changebar-20180414-25.el8.noarch.rpmw texlive-changepage-20180414-25.el8.noarch.rpmx texlive-charter-20180414-25.el8.noarch.rpmy texlive-chngcntr-20180414-25.el8.noarch.rpmz texlive-cite-20180414-25.el8.noarch.rpm{ texlive-cjk-20180414-25.el8.noarch.rpm| texlive-classpack-20180414-25.el8.noarch.rpm} texlive-cm-20180414-25.el8.noarch.rpm texlive-cmap-20180414-25.el8.noarch.rpm texlive-cmextra-20180414-25.el8.noarch.rpm~ texlive-cm-lgc-20180414-25.el8.noarch.rpm texlive-cm-super-20180414-25.el8.noarch.rpm texlive-cns-20180414-25.el8.noarch.rpm texlive-collectbox-20180414-25.el8.noarch.rpm texlive-collection-basic-20180414-25.el8.noarch.rpm texlive-collection-fontsrecommended-20180414-25.el8.noarch.rpm texlive-collection-htmlxml-20180414-25.el8.noarch.rpm texlive-collection-latex-20180414-25.el8.noarch.rpm texlive-collection-latexrecommended-20180414-25.el8.noarch.rpm texlive-collection-xetex-20180414-25.el8.noarch.rpm texlive-colortbl-20180414-25.el8.noarch.rpm texlive-context-20180414-25.el8.noarch.rpm texlive-courier-20180414-25.el8.noarch.rpm texlive-crop-20180414-25.el8.noarch.rpm texlive-csquotes-20180414-25.el8.noarch.rpm texlive-ctable-20180414-25.el8.noarch.rpm texlive-ctablestack-20180414-25.el8.noarch.rpm texlive-currfile-20180414-25.el8.noarch.rpm texlive-datetime-20180414-25.el8.noarch.rpm texlive-dvipdfmx-20180414-25.el8.x86_64.rpm texlive-dvipng-20180414-25.el8.x86_64.rpm texlive-dvips-20180414-25.el8.x86_64.rpm texlive-dvisvgm-20180414-25.el8.x86_64.rpm texlive-ec-20180414-25.el8.noarch.rpm texlive-eepic-20180414-25.el8.noarch.rpm texlive-enctex-20180414-25.el8.noarch.rpm texlive-enumitem-20180414-25.el8.noarch.rpm texlive-epsf-20180414-25.el8.noarch.rpm texlive-epstopdf-20180414-25.el8.noarch.rpm texlive-eqparbox-20180414-25.el8.noarch.rpm texlive-eso-pic-20180414-25.el8.noarch.rpm texlive-etex-20180414-25.el8.noarch.rpm! texlive-etex-pkg-20180414-25.el8.noarch.rpm" texlive-etoolbox-20180414-25.el8.noarch.rpm# texlive-euenc-20180414-25.el8.noarch.rpm% texlive-euro-20180414-25.el8.noarch.rpm& texlive-eurosym-20180414-25.el8.noarch.rpm' texlive-extsizes-20180414-25.el8.noarch.rpm( texlive-fancybox-20180414-25.el8.noarch.rpm) texlive-fancyhdr-20180414-25.el8.noarch.rpm* texlive-fancyref-20180414-25.el8.noarch.rpm+ texlive-fancyvrb-20180414-25.el8.noarch.rpm, texlive-filecontents-20180414-25.el8.noarch.rpm. texlive-finstrut-20180414-25.el8.noarch.rpm/ texlive-fix2col-20180414-25.el8.noarch.rpm0 texlive-fixlatvian-20180414-25.el8.noarch.rpm1 texlive-float-20180414-25.el8.noarch.rpm2 texlive-fmtcount-20180414-25.el8.noarch.rpm3 texlive-fncychap-20180414-25.el8.noarch.rpm4 texlive-fontawesome-20180414-25.el8.noarch.rpm5 texlive-fontbook-20180414-25.el8.noarch.rpm6 texlive-fonts-tlwg-20180414-25.el8.noarch.rpm8 texlive-fontware-20180414-25.el8.x86_64.rpm9 texlive-fontwrap-20180414-25.el8.noarch.rpm: texlive-footmisc-20180414-25.el8.noarch.rpm; texlive-fp-20180414-25.el8.noarch.rpm< texlive-fpl-20180414-25.el8.noarch.rpm= texlive-framed-20180414-25.el8.noarch.rpm> texlive-garuda-c90-20180414-25.el8.noarch.rpm? texlive-geometry-20180414-25.el8.noarch.rpm@ texlive-glyphlist-20180414-25.el8.noarch.rpmA texlive-graphics-20180414-25.el8.noarch.rpmB texlive-graphics-cfg-20180414-25.el8.noarch.rpmC texlive-graphics-def-20180414-25.el8.noarch.rpmD texlive-gsftopk-20180414-25.el8.x86_64.rpmE texlive-helvetic-20180414-25.el8.noarch.rpmF texlive-hyperref-20180414-25.el8.noarch.rpmI texlive-hyphenat-20180414-25.el8.noarch.rpmH texlive-hyphen-base-20180414-25.el8.noarch.rpmG texlive-hyph-utf8-20180414-25.el8.noarch.rpmJ texlive-ifetex-20180414-25.el8.noarch.rpmK texlive-ifluatex-20180414-25.el8.noarch.rpmL texlive-ifmtarg-20180414-25.el8.noarch.rpmM texlive-ifoddpage-20180414-25.el8.noarch.rpmN texlive-iftex-20180414-25.el8.noarch.rpmO texlive-ifxetex-20180414-25.el8.noarch.rpmP texlive-import-20180414-25.el8.noarch.rpmQ texlive-index-20180414-25.el8.noarch.rpmR texlive-jadetex-20180414-25.el8.noarch.rpmS texlive-jknapltx-20180414-25.el8.noarch.rpmT texlive-kastrup-20180414-25.el8.noarch.rpmU texlive-kerkis-20180414-25.el8.noarch.rpmV texlive-knuth-lib-20180414-25.el8.noarch.rpmW texlive-knuth-local-20180414-25.el8.noarch.rpmX texlive-koma-script-20180414-25.el8.noarch.rpmY texlive-kpathsea-20180414-25.el8.x86_64.rpmZ texlive-l3experimental-20180414-25.el8.noarch.rpm[ texlive-l3kernel-20180414-25.el8.noarch.rpm\ texlive-l3packages-20180414-25.el8.noarch.rpm] texlive-lastpage-20180414-25.el8.noarch.rpm^ texlive-latex-20180414-25.el8.noarch.rpm` texlive-latex2man-20180414-25.el8.noarch.rpma texlive-latexconfig-20180414-25.el8.noarch.rpm_ texlive-latex-fonts-20180414-25.el8.noarch.rpmb texlive-lettrine-20180414-25.el8.noarch.rpmc texlive-lib-20180414-25.el8.x86_64.rpmd texlive-linegoal-20180414-25.el8.noarch.rpme texlive-lineno-20180414-25.el8.noarch.rpmf texlive-listings-20180414-25.el8.noarch.rpmg texlive-lm-20180414-25.el8.noarch.rpmh texlive-lm-math-20180414-25.el8.noarch.rpmi texlive-ltabptch-20180414-25.el8.noarch.rpmj texlive-ltxmisc-20180414-25.el8.noarch.rpmk texlive-lua-alt-getopt-20180414-25.el8.noarch.rpml texlive-lualatex-math-20180414-25.el8.noarch.rpmm texlive-lualibs-20180414-25.el8.noarch.rpmn texlive-luaotfload-20180414-25.el8.noarch.rpmo texlive-luatex-20180414-25.el8.x86_64.rpmp texlive-luatex85-20180414-25.el8.noarch.rpmq texlive-luatexbase-20180414-25.el8.noarch.rpmr texlive-makecmds-20180414-25.el8.noarch.rpms texlive-makeindex-20180414-25.el8.x86_64.rpmt texlive-manfnt-font-20180414-25.el8.noarch.rpmu texlive-marginnote-20180414-25.el8.noarch.rpmv texlive-marvosym-20180414-25.el8.noarch.rpmw texlive-mathpazo-20180414-25.el8.noarch.rpmx texlive-mathspec-20180414-25.el8.noarch.rpmy texlive-mathtools-20180414-25.el8.noarch.rpmz texlive-mdwtools-20180414-25.el8.noarch.rpm{ texlive-memoir-20180414-25.el8.noarch.rpm| texlive-metafont-20180414-25.el8.x86_64.rpm} texlive-metalogo-20180414-25.el8.noarch.rpm~ texlive-metapost-20180414-25.el8.x86_64.rpm texlive-mflogo-20180414-25.el8.noarch.rpm texlive-mflogo-font-20180414-25.el8.noarch.rpm texlive-mfnfss-20180414-25.el8.noarch.rpm texlive-mfware-20180414-25.el8.x86_64.rpm texlive-microtype-20180414-25.el8.noarch.rpm texlive-mnsymbol-20180414-25.el8.noarch.rpm texlive-mparhack-20180414-25.el8.noarch.rpm texlive-mptopdf-20180414-25.el8.noarch.rpm texlive-ms-20180414-25.el8.noarch.rpm texlive-multido-20180414-25.el8.noarch.rpm texlive-multirow-20180414-25.el8.noarch.rpm texlive-natbib-20180414-25.el8.noarch.rpm texlive-ncctools-20180414-25.el8.noarch.rpm texlive-ncntrsbk-20180414-25.el8.noarch.rpm texlive-needspace-20180414-25.el8.noarch.rpm texlive-norasi-c90-20180414-25.el8.noarch.rpm texlive-ntgclass-20180414-25.el8.noarch.rpm texlive-oberdiek-20180414-25.el8.noarch.rpm texlive-overpic-20180414-25.el8.noarch.rpm texlive-palatino-20180414-25.el8.noarch.rpm texlive-paralist-20180414-25.el8.noarch.rpm texlive-parallel-20180414-25.el8.noarch.rpm texlive-parskip-20180414-25.el8.noarch.rpm texlive-passivetex-20180414-25.el8.noarch.rpm texlive-pdfpages-20180414-25.el8.noarch.rpm texlive-pdftex-20180414-25.el8.x86_64.rpm texlive-pgf-20180414-25.el8.noarch.rpm texlive-philokalia-20180414-25.el8.noarch.rpm texlive-placeins-20180414-25.el8.noarch.rpm texlive-plain-20180414-25.el8.noarch.rpm texlive-polyglossia-20180414-25.el8.noarch.rpm texlive-powerdot-20180414-25.el8.noarch.rpm texlive-preprint-20180414-25.el8.noarch.rpm texlive-psfrag-20180414-25.el8.noarch.rpm! texlive-pslatex-20180414-25.el8.noarch.rpm" texlive-psnfss-20180414-25.el8.noarch.rpm# texlive-pspicture-20180414-25.el8.noarch.rpm$ texlive-pst-3d-20180414-25.el8.noarch.rpm% texlive-pst-arrow-20180414-25.el8.noarch.rpm& texlive-pst-blur-20180414-25.el8.noarch.rpm' texlive-pst-coil-20180414-25.el8.noarch.rpm( texlive-pst-eps-20180414-25.el8.noarch.rpm) texlive-pst-fill-20180414-25.el8.noarch.rpm* texlive-pst-grad-20180414-25.el8.noarch.rpm+ texlive-pst-math-20180414-25.el8.noarch.rpm, texlive-pst-node-20180414-25.el8.noarch.rpm- texlive-pst-plot-20180414-25.el8.noarch.rpm2 texlive-pstricks-20180414-25.el8.noarch.rpm3 texlive-pstricks-add-20180414-25.el8.noarch.rpm. texlive-pst-slpe-20180414-25.el8.noarch.rpm/ texlive-pst-text-20180414-25.el8.noarch.rpm0 texlive-pst-tools-20180414-25.el8.noarch.rpm1 texlive-pst-tree-20180414-25.el8.noarch.rpm4 texlive-ptext-20180414-25.el8.noarch.rpm5 texlive-pxfonts-20180414-25.el8.noarch.rpm6 texlive-qstest-20180414-25.el8.noarch.rpm7 texlive-rcs-20180414-25.el8.noarch.rpm8 texlive-realscripts-20180414-25.el8.noarch.rpm9 texlive-rsfs-20180414-25.el8.noarch.rpm: texlive-sansmath-20180414-25.el8.noarch.rpm; texlive-sauerj-20180414-25.el8.noarch.rpm< texlive-scheme-basic-20180414-25.el8.noarch.rpm= texlive-section-20180414-25.el8.noarch.rpm> texlive-sectsty-20180414-25.el8.noarch.rpm? texlive-seminar-20180414-25.el8.noarch.rpm@ texlive-sepnum-20180414-25.el8.noarch.rpmA texlive-setspace-20180414-25.el8.noarch.rpmB texlive-showexpl-20180414-25.el8.noarch.rpmC texlive-soul-20180414-25.el8.noarch.rpmD texlive-stmaryrd-20180414-25.el8.noarch.rpmE texlive-subfig-20180414-25.el8.noarch.rpmF texlive-subfigure-20180414-25.el8.noarch.rpmG texlive-svn-prov-20180414-25.el8.noarch.rpmH texlive-symbol-20180414-25.el8.noarch.rpmI texlive-t2-20180414-25.el8.noarch.rpmJ texlive-tabu-20180414-25.el8.noarch.rpmK texlive-tabulary-20180414-25.el8.noarch.rpmL texlive-tetex-20180414-25.el8.noarch.rpmM texlive-tex-20180414-25.el8.x86_64.rpmQ texlive-tex4ht-20180414-25.el8.x86_64.rpmR texlive-texconfig-20180414-25.el8.noarch.rpmN texlive-tex-gyre-20180414-25.el8.noarch.rpmO texlive-tex-gyre-math-20180414-25.el8.noarch.rpmP texlive-tex-ini-files-20180414-25.el8.noarch.rpmS texlive-texlive-common-doc-20180414-25.el8.noarch.rpmT texlive-texlive-docindex-20180414-25.el8.noarch.rpmU texlive-texlive-en-20180414-25.el8.noarch.rpmX texlive-texlive.infra-20180414-25.el8.noarch.rpmV texlive-texlive-msg-translations-20180414-25.el8.noarch.rpmW texlive-texlive-scripts-20180414-25.el8.noarch.rpmY texlive-textcase-20180414-25.el8.noarch.rpmZ texlive-textpos-20180414-25.el8.noarch.rpm[ texlive-threeparttable-20180414-25.el8.noarch.rpm\ texlive-thumbpdf-20180414-25.el8.noarch.rpm] texlive-times-20180414-25.el8.noarch.rpm^ texlive-tipa-20180414-25.el8.noarch.rpm_ texlive-titlesec-20180414-25.el8.noarch.rpm` texlive-titling-20180414-25.el8.noarch.rpma texlive-tocloft-20180414-25.el8.noarch.rpmb texlive-tools-20180414-25.el8.noarch.rpmc texlive-trimspaces-20180414-25.el8.noarch.rpmd texlive-txfonts-20180414-25.el8.noarch.rpme texlive-type1cm-20180414-25.el8.noarch.rpmf texlive-typehtml-20180414-25.el8.noarch.rpmg texlive-ucharclasses-20180414-25.el8.noarch.rpmh texlive-ucs-20180414-25.el8.noarch.rpmi texlive-uhc-20180414-25.el8.noarch.rpmj texlive-ulem-20180414-25.el8.noarch.rpmk texlive-underscore-20180414-25.el8.noarch.rpml texlive-unicode-data-20180414-25.el8.noarch.rpmm texlive-unicode-math-20180414-25.el8.noarch.rpmn texlive-unisugar-20180414-25.el8.noarch.rpmo texlive-updmap-map-20180414-25.el8.noarch.rpmp texlive-upquote-20180414-25.el8.noarch.rpmq texlive-url-20180414-25.el8.noarch.rpmr texlive-utopia-20180414-25.el8.noarch.rpms texlive-varwidth-20180414-25.el8.noarch.rpmt texlive-wadalab-20180414-25.el8.noarch.rpmu texlive-was-20180414-25.el8.noarch.rpmv texlive-wasy-20180414-25.el8.noarch.rpmw texlive-wasy2-ps-20180414-25.el8.noarch.rpmx texlive-wasysym-20180414-25.el8.noarch.rpmy texlive-wrapfig-20180414-25.el8.noarch.rpmz texlive-xcolor-20180414-25.el8.noarch.rpm{ texlive-xdvi-20180414-25.el8.x86_64.rpm| texlive-xecjk-20180414-25.el8.noarch.rpm} texlive-xecolor-20180414-25.el8.noarch.rpm~ texlive-xecyr-20180414-25.el8.noarch.rpm texlive-xeindex-20180414-25.el8.noarch.rpm texlive-xepersian-20180414-25.el8.noarch.rpm texlive-xesearch-20180414-25.el8.noarch.rpm texlive-xetex-20180414-25.el8.x86_64.rpm texlive-xetexconfig-20180414-25.el8.noarch.rpm texlive-xetexfontinfo-20180414-25.el8.noarch.rpm texlive-xetex-itrans-20180414-25.el8.noarch.rpm texlive-xetex-pstricks-20180414-25.el8.noarch.rpm texlive-xetex-tibetan-20180414-25.el8.noarch.rpm texlive-xifthen-20180414-25.el8.noarch.rpm texlive-xkeyval-20180414-25.el8.noarch.rpm texlive-xltxtra-20180414-25.el8.noarch.rpm texlive-xmltex-20180414-25.el8.noarch.rpm texlive-xmltexconfig-20180414-25.el8.noarch.rpm texlive-xstring-20180414-25.el8.noarch.rpm texlive-xtab-20180414-25.el8.noarch.rpm texlive-xunicode-20180414-25.el8.noarch.rpm texlive-zapfchan-20180414-25.el8.noarch.rpm texlive-zapfding-20180414-25.el8.noarch.rpm=% -kbugfixsysstat bug fix and enhancement updater https://bugzilla.redhat.com/show_bug.cgi?id=18778361877836https://bugzilla.redhat.com/show_bug.cgi?id=19108411910841https://bugzilla.redhat.com/show_bug.cgi?id=20009102000910https://bugzilla.redhat.com/show_bug.cgi?id=20009162000916https://errata.rockylinux.org/RLBA-2022:1892RLBA-2022:1892RLBA-2022:1892 ysysstat-11.7.3-7.el8.x86_64.rpmysysstat-11.7.3-7.el8.x86_64.rpm>' R =FwBBBBBBBBBBBBBBBenhancementnew module: php:8.0pO https://errata.rockylinux.org/RLEA-2022:1904RLEA-2022:1904RLEA-2022:1904 `$ 0Eapcu-panel-5.1.20-1.module+el8.6.0+790+fc63e43f.noarch.rpmblibzip-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpmclibzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpmdlibzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpmj php-pear-1.10.13-1.module+el8.7.0+1067+0a7071cc.noarch.rpmeEphp-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpmfEphp-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpmtjphp-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpmcphp-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpmg"php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm`$ 0Eapcu-panel-5.1.20-1.module+el8.6.0+790+fc63e43f.noarch.rpmblibzip-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpmclibzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpmdlibzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpmj php-pear-1.10.13-1.module+el8.7.0+1067+0a7071cc.noarch.rpmeEphp-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpmfEphp-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpmtjphp-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpmcphp-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpmg"php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm@* ~bugfixspice-vdagent bug fix and enhancement update? https://bugzilla.redhat.com/show_bug.cgi?id=20058022005802https://errata.rockylinux.org/RLBA-2022:1909RLBA-2022:1909RLBA-2022:1909 {<spice-vdagent-0.20.0-4.el8.x86_64.rpm{<spice-vdagent-0.20.0-4.el8.x86_64.rpmA+ Abugfixtcpdump bug fix and enhancement update> https://errata.rockylinux.org/RLBA-2022:1913RLBA-2022:1913RLBA-2022:1913 ztcpdump-4.9.3-3.el8.x86_64.rpmztcpdump-4.9.3-3.el8.x86_64.rpmA, Dbugfixlibosinfo bug fix and enhancement update= https://bugzilla.redhat.com/show_bug.cgi?id=19027201902720https://bugzilla.redhat.com/show_bug.cgi?id=20532722053272https://errata.rockylinux.org/RLBA-2022:1914RLBA-2022:1914RLBA-2022:1914 -elibosinfo-1.9.0-3.el8.x86_64.rpm-elibosinfo-1.9.0-3.el8.x86_64.rpmAK BBKsecurityModerate: httpd:2.4 security and bug fix update<+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35452CVE-2020-35452CVE-2020-35452https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193CVE-2021-33193CVE-2021-33193https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160CVE-2021-36160CVE-2021-36160https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224CVE-2021-44224CVE-2021-44224https://bugzilla.redhat.com/show_bug.cgi?id=19667241966724https://bugzilla.redhat.com/show_bug.cgi?id=19667281966728https://bugzilla.redhat.com/show_bug.cgi?id=19848281984828https://bugzilla.redhat.com/show_bug.cgi?id=20010462001046https://bugzilla.redhat.com/show_bug.cgi?id=20051242005124https://bugzilla.redhat.com/show_bug.cgi?id=20346722034672https://errata.rockylinux.org/RLSA-2022:1915RLSA-2022:1915RLSA-2022:1915 [Xnmod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpmrkmod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm[Xnmod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpmrkmod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpmD- Hbugfixwebrtc-audio-processing bug fix and enhancement updateg https://bugzilla.redhat.com/show_bug.cgi?id=20369562036956https://errata.rockylinux.org/RLBA-2022:1918RLBA-2022:1918RLBA-2022:1918 @Dwebrtc-audio-processing-0.3-10.el8.x86_64.rpm@Dwebrtc-audio-processing-0.3-10.el8.x86_64.rpmE/ KBBBBBBbugfixgnome-session bug fix and enhancement updatef https://bugzilla.redhat.com/show_bug.cgi?id=18779971877997https://errata.rockylinux.org/RLBA-2022:1923RLBA-2022:1923RLBA-2022:1923  wgnome-session-3.28.1-14.el8.x86_64.rpm wgnome-session-kiosk-session-3.28.1-14.el8.x86_64.rpm wgnome-session-wayland-session-3.28.1-14.el8.x86_64.rpm wgnome-session-xsession-3.28.1-14.el8.x86_64.rpm wgnome-session-3.28.1-14.el8.x86_64.rpm wgnome-session-kiosk-session-3.28.1-14.el8.x86_64.rpm wgnome-session-wayland-session-3.28.1-14.el8.x86_64.rpm wgnome-session-xsession-3.28.1-14.el8.x86_64.rpmES Tenhancementlibreswan bug fix and enhancement updatee https://errata.rockylinux.org/RLEA-2022:1926RLEA-2022:1926RLEA-2022:1926 :mlibreswan-4.5-1.el8.x86_64.rpm:mlibreswan-4.5-1.el8.x86_64.rpmE1 Wbugfixgcc-toolset-11-strace bug fix and enhancement updated https://bugzilla.redhat.com/show_bug.cgi?id=20281632028163https://bugzilla.redhat.com/show_bug.cgi?id=20389922038992https://bugzilla.redhat.com/show_bug.cgi?id=20462652046265https://errata.rockylinux.org/RLBA-2022:1929RLBA-2022:1929RLBA-2022:1929 {gcc-toolset-11-strace-5.13-7.el8.x86_64.rpm{gcc-toolset-11-strace-5.13-7.el8.x86_64.rpmFL ZsecurityModerate: python-lxml security updatecChttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43818CVE-2021-43818CVE-2021-43818https://bugzilla.redhat.com/show_bug.cgi?id=20325692032569https://errata.rockylinux.org/RLSA-2022:1932RLSA-2022:1932RLSA-2022:1932 ^ipython3-lxml-4.2.3-4.el8.x86_64.rpm^ipython3-lxml-4.2.3-4.el8.x86_64.rpmFM UBBsecurityModerate: mod_auth_mellon security update&https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3639CVE-2021-3639CVE-2021-3639https://bugzilla.redhat.com/show_bug.cgi?id=19806481980648https://errata.rockylinux.org/RLSA-2022:1934RLSA-2022:1934RLSA-2022:1934 d*mod_auth_mellon-0.14.0-12.el8.1.x86_64.rpme*mod_auth_mellon-diagnostics-0.14.0-12.el8.1.x86_64.rpmd*mod_auth_mellon-0.14.0-12.el8.1.x86_64.rpme*mod_auth_mellon-diagnostics-0.14.0-12.el8.1.x86_64.rpmG2 ^bugfixvsftpd bug fix and enhancement updateD https://errata.rockylinux.org/RLBA-2022:1936RLBA-2022:1936RLBA-2022:1936 ;vsftpd-3.0.3-35.el8.x86_64.rpm;vsftpd-3.0.3-35.el8.x86_64.rpmG4 #abugfixhostapd bug fix and enhancement updateC https://bugzilla.redhat.com/show_bug.cgi?id=20435972043597https://errata.rockylinux.org/RLBA-2022:1938RLBA-2022:1938RLBA-2022:1938 ,Dhostapd-2.10-1.el8.x86_64.rpm,Dhostapd-2.10-1.el8.x86_64.rpmG5 &dbugfixegl-wayland bug fix and enhancement updateB https://bugzilla.redhat.com/show_bug.cgi?id=20158572015857https://errata.rockylinux.org/RLBA-2022:1940RLBA-2022:1940RLBA-2022:1940 legl-wayland-1.1.9-3.el8.x86_64.rpmlegl-wayland-1.1.9-3.el8.x86_64.rpmHT gBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBenhancementpmdk:1_fileformat_v6 bug fix and enhancement updateA https://bugzilla.redhat.com/show_bug.cgi?id=20617202061720https://errata.rockylinux.org/RLEA-2022:1943RLEA-2022:1943RLEA-2022:1943 +DXR3daxio-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm:3libpmem-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm<3libpmemblk-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm43libpmemblk-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm=3libpmemblk-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm33libpmem-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm;3libpmem-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm>3libpmemlog-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm53libpmemlog-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm?3libpmemlog-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm@3libpmemobj-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm63libpmemobj-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpmC3libpmemobj-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpmAlibpmemobj++-devel-1.11-2.module+el8.6.0+818+bd395263.x86_64.rpmBlibpmemobj++-doc-1.11-2.module+el8.6.0+818+bd395263.x86_64.rpmD3libpmempool-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm73libpmempool-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpmE3libpmempool-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpmH3librpmem-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpmT3librpmem-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpmI3librpmem-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm}3pmempool-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm3pmreorder-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpmH3rpmemd-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm+DXR3daxio-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm:3libpmem-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm<3libpmemblk-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm43libpmemblk-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm=3libpmemblk-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm33libpmem-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm;3libpmem-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm>3libpmemlog-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm53libpmemlog-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm?3libpmemlog-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm@3libpmemobj-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm63libpmemobj-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpmC3libpmemobj-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpmAlibpmemobj++-devel-1.11-2.module+el8.6.0+818+bd395263.x86_64.rpmBlibpmemobj++-doc-1.11-2.module+el8.6.0+818+bd395263.x86_64.rpmD3libpmempool-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm73libpmempool-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpmE3libpmempool-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpmH3librpmem-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpmT3librpmem-debug-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpmI3librpmem-devel-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm}3pmempool-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpm3pmreorder-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpmH3rpmemd-1.11.1-1.module+el8.6.0+818+bd395263.x86_64.rpmH6 XBBbugfixnetpbm bug fix and enhancement update@ https://bugzilla.redhat.com/show_bug.cgi?id=20291182029118https://errata.rockylinux.org/RLBA-2022:1944RLBA-2022:1944RLBA-2022:1944 PBnetpbm-10.82.00-7.el8.x86_64.rpmQBnetpbm-progs-10.82.00-7.el8.x86_64.rpmPBnetpbm-10.82.00-7.el8.x86_64.rpmQBnetpbm-progs-10.82.00-7.el8.x86_64.rpmI7 ebugfixpython-pillow update? https://errata.rockylinux.org/RLBA-2022:1949RLBA-2022:1949RLBA-2022:1949  python3-pillow-5.1.1-18.el8_5.x86_64.rpm python3-pillow-5.1.1-18.el8_5.x86_64.rpmI8 bugfixman-pages-overrides bug fix and enhancement update> https://bugzilla.redhat.com/show_bug.cgi?id=20429722042972https://errata.rockylinux.org/RLBA-2022:1951RLBA-2022:1951RLBA-2022:1951 p_man-pages-overrides-8.6.0.0-1.el8.noarch.rpmp_man-pages-overrides-8.6.0.0-1.el8.noarch.rpmJX denhancementperl:5.32 metadata for the Rocky Linux 8 module matrix (4/4)= https://bugzilla.redhat.com/show_bug.cgi?id=20551342055134https://errata.rockylinux.org/RLEA-2022:1957RLEA-2022:1957RLEA-2022:1957 #+%Rperl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpm#+%Rperl-DBD-Pg-3.7.4-4.module+el8.6.0+900+0603912d.x86_64.rpmL9 %aBBbugfixscl-utils bug fix and enhancement update< https://bugzilla.redhat.com/show_bug.cgi?id=19676861967686https://errata.rockylinux.org/RLBA-2022:1959RLBA-2022:1959RLBA-2022:1959 d]scl-utils-2.0.2-15.el8.x86_64.rpme]scl-utils-build-2.0.2-15.el8.x86_64.rpmd]scl-utils-2.0.2-15.el8.x86_64.rpme]scl-utils-build-2.0.2-15.el8.x86_64.rpmL: (fbugfixgegl04 bug fix and enhancement update; https://errata.rockylinux.org/RLBA-2022:1960RLBA-2022:1960RLBA-2022:1960 mPgegl04-0.4.4-7.el8.x86_64.rpmmPgegl04-0.4.4-7.el8.x86_64.rpmLP 5iBBBBBBBBBBsecurityModerate: cairo and pixman security and bug fix update:rhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35492CVE-2020-35492CVE-2020-35492https://bugzilla.redhat.com/show_bug.cgi?id=18983961898396https://errata.rockylinux.org/RLSA-2022:1961RLSA-2022:1961RLSA-2022:1961 (Icairo-1.15.12-6.el8.x86_64.rpm)Icairo-devel-1.15.12-6.el8.x86_64.rpm*Icairo-gobject-1.15.12-6.el8.x86_64.rpm+Icairo-gobject-devel-1.15.12-6.el8.x86_64.rpm{ypixman-0.38.4-2.el8.x86_64.rpm|ypixman-devel-0.38.4-2.el8.x86_64.rpm(Icairo-1.15.12-6.el8.x86_64.rpm)Icairo-devel-1.15.12-6.el8.x86_64.rpm*Icairo-gobject-1.15.12-6.el8.x86_64.rpm+Icairo-gobject-devel-1.15.12-6.el8.x86_64.rpm{ypixman-0.38.4-2.el8.x86_64.rpm|ypixman-devel-0.38.4-2.el8.x86_64.rpmMY ;vBBBenhancementnew module: log4j:2,O https://errata.rockylinux.org/RLEA-2022:1963RLEA-2022:1963RLEA-2022:1963 xZl /disruptor-3.4.4-2.module+el8.6.0+895+381d2531.noarch.rpmN)jctools-3.3.0-3.module+el8.6.0+895+381d2531.noarch.rpmxRlog4j-2.17.1-4.module+el8.6.0+895+381d2531.noarch.rpmgRlog4j-jcl-2.17.1-4.module+el8.6.0+895+381d2531.noarch.rpmhRlog4j-slf4j-2.17.1-4.module+el8.6.0+895+381d2531.noarch.rpmxZl /disruptor-3.4.4-2.module+el8.6.0+895+381d2531.noarch.rpmN)jctools-3.3.0-3.module+el8.6.0+895+381d2531.noarch.rpmxRlog4j-2.17.1-4.module+el8.6.0+895+381d2531.noarch.rpmgRlog4j-jcl-2.17.1-4.module+el8.6.0+895+381d2531.noarch.rpmhRlog4j-slf4j-2.17.1-4.module+el8.6.0+895+381d2531.noarch.rpmMR >|securityModerate: libsndfile security update{,https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4156CVE-2021-4156CVE-2021-4156https://bugzilla.redhat.com/show_bug.cgi?id=20276902027690https://errata.rockylinux.org/RLSA-2022:1968RLSA-2022:1968RLSA-2022:1968 ]vlibsndfile-1.0.28-12.el8.x86_64.rpm]vlibsndfile-1.0.28-12.el8.x86_64.rpmN= BBBBBbugfixdpdk bug fix and enhancement update' https://bugzilla.redhat.com/show_bug.cgi?id=20294972029497https://errata.rockylinux.org/RLBA-2022:1969RLBA-2022:1969RLBA-2022:1969 dpdk-21.11-1.el8.x86_64.rpmZdpdk-devel-21.11-1.el8.x86_64.rpmdpdk-doc-21.11-1.el8.noarch.rpmdpdk-tools-21.11-1.el8.x86_64.rpmdpdk-21.11-1.el8.x86_64.rpmZdpdk-devel-21.11-1.el8.x86_64.rpmdpdk-doc-21.11-1.el8.noarch.rpmdpdk-tools-21.11-1.el8.x86_64.rpmNJ kBBBBBBBBBBBBBuqBbugfixcontainer-tools:rhel8 bug fix update&P https://bugzilla.redhat.com/show_bug.cgi?id=20774722077472* Udica crashes when processing inspect file without capabilitieshttps://errata.rockylinux.org/RLBA-2022:2141RLBA-2022:2141RLBA-2022:2141 $zW -crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm*criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm!criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm"criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpmTXlibslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmUXlibslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm.python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm=python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm+Fslirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm2udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpm$zW -crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm*criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm!criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm"criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpmTXlibslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmUXlibslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm.python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm=python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm+Fslirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm2udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpmXT FBBBBBOBBBBBLBRJWBPBnBBBjBOsecurityImportant: container-tools:3.0 security updatevhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1227CVE-2022-1227CVE-2022-1227https://bugzilla.redhat.com/show_bug.cgi?id=20703682070368https://errata.rockylinux.org/RLSA-2022:2143RLSA-2022:2143RLSA-2022:2143 pWScockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm9containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmZYcrun-0.18-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpmL fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm\Qoci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm.0python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm88runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmV/toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm^/toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm2_udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpmpWScockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm9containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmZYcrun-0.18-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpmL fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm\Qoci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm.0python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm88runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmV/toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm^/toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm2_udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpmmK kBBBBBBBBBBBBBuqBbugfixcontainer-tools:4.0 bug fix updatewL https://bugzilla.redhat.com/show_bug.cgi?id=20774742077474* Udica crashes when processing inspect file without capabilitieshttps://errata.rockylinux.org/RLBA-2022:2144RLBA-2022:2144RLBA-2022:2144 $zW -crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm*criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm!criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm"criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpmTXlibslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmUXlibslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm.python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm=python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm+Fslirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm2udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpm$zW -crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm*criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm!criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm"criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpmTXlibslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmUXlibslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm.python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm=python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm+Fslirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm2udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpmxU JBBBBBBBBBBBBBBsecurityImportant: .NET 5.0 security, bug fix, and enhancement updateCkhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23267CVE-2022-23267CVE-2022-23267https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29117CVE-2022-29117CVE-2022-29117https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29145CVE-2022-29145CVE-2022-29145https://bugzilla.redhat.com/show_bug.cgi?id=20836472083647https://bugzilla.redhat.com/show_bug.cgi?id=20836492083649https://bugzilla.redhat.com/show_bug.cgi?id=20836502083650https://errata.rockylinux.org/RLSA-2022:2200RLSA-2022:2200RLSA-2022:2200 oaspnetcore-runtime-5.0-5.0.17-1.el8_6.x86_64.rpmqaspnetcore-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpmTdotnet-apphost-pack-5.0-5.0.17-1.el8_6.x86_64.rpmWdotnet-hostfxr-5.0-5.0.17-1.el8_6.x86_64.rpmZdotnet-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm^Cdotnet-sdk-5.0-5.0.214-1.el8_6.x86_64.rpm`dotnet-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpmbCdotnet-templates-5.0-5.0.214-1.el8_6.x86_64.rpmoaspnetcore-runtime-5.0-5.0.17-1.el8_6.x86_64.rpmqaspnetcore-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpmTdotnet-apphost-pack-5.0-5.0.17-1.el8_6.x86_64.rpmWdotnet-hostfxr-5.0-5.0.17-1.el8_6.x86_64.rpmZdotnet-runtime-5.0-5.0.17-1.el8_6.x86_64.rpm^Cdotnet-sdk-5.0-5.0.214-1.el8_6.x86_64.rpm`dotnet-targeting-pack-5.0-5.0.17-1.el8_6.x86_64.rpmbCdotnet-templates-5.0-5.0.214-1.el8_6.x86_64.rpmxV IBPBBBBBBBBBBBBBsecurityImportant: subversion:1.10 security update.https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24070CVE-2022-24070CVE-2022-24070https://bugzilla.redhat.com/show_bug.cgi?id=20747722074772https://errata.rockylinux.org/RLSA-2022:2234RLSA-2022:2234RLSA-2022:2234 xG elibserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpmAmod_dav_svn-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpmxsubversion-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm)subversion-devel-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm*subversion-gnome-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm+subversion-javahl-1.10.2-5.module+el8.7.0+1065+42200b2e.noarch.rpm,subversion-libs-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm-subversion-perl-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm.subversion-tools-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpmxG elibserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpmAmod_dav_svn-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpmxsubversion-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm)subversion-devel-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm*subversion-gnome-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm+subversion-javahl-1.10.2-5.module+el8.7.0+1065+42200b2e.noarch.rpm,subversion-libs-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm-subversion-perl-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm.subversion-tools-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm{W securityImportant: nodejs:16 security update-4https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43616CVE-2021-43616CVE-2021-43616https://bugzilla.redhat.com/show_bug.cgi?id=20502822050282https://errata.rockylinux.org/RLSA-2022:4796RLSA-2022:4796RLSA-2022:4796 /Rr:nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm/Rr:nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm|Y ~WBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"securityImportant: maven:3.5 security updateahttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29599CVE-2022-29599CVE-2022-29599https://bugzilla.redhat.com/show_bug.cgi?id=20664792066479https://errata.rockylinux.org/RLSA-2022:4798RLSA-2022:4798RLSA-2022:4798 ,L/'bC'}<* *%2aopalliance-1.0-17.module+el8.6.0+843+5a13dac3.noarch.rpmTCapache-commons-cli-1.4-4.module+el8.6.0+843+5a13dac3.noarch.rpmU8apache-commons-codec-1.11-3.module+el8.6.0+843+5a13dac3.noarch.rpmVMapache-commons-io-2.6-3.module+el8.6.0+843+5a13dac3.noarch.rpmW^apache-commons-lang3-3.7-3.module+el8.6.0+843+5a13dac3.noarch.rpmj=apache-commons-logging-1.2-13.module+el8.3.0+133+b8b54b58.noarch.rpmX1atinject-1-28.20100611svn86.module+el8.6.0+843+5a13dac3.noarch.rpmY>cdi-api-1.2-8.module+el8.6.0+843+5a13dac3.noarch.rpm)3geronimo-annotation-1.0-23.module+el8.6.0+843+5a13dac3.noarch.rpm[glassfish-el-api-3.0.1-0.7.b08.module+el8.6.0+975+c0ed2db8.noarch.rpmZ`google-guice-4.1-11.module+el8.6.0+843+5a13dac3.noarch.rpmpXguava20-20.0-8.module+el8.3.0+133+b8b54b58.noarch.rpmq;hawtjni-runtime-1.16-2.module+el8.3.0+133+b8b54b58.noarch.rpmdhttpcomponents-client-4.5.5-5.module+el8.6.0+843+5a13dac3.noarch.rpm[bhttpcomponents-core-4.4.10-3.module+el8.6.0+843+5a13dac3.noarch.rpm/Yjansi-native-1.7-7.module+el8.3.0+133+b8b54b58.x86_64.rpmw4jboss-interceptors-1.2-api-1.0.0-8.module+el8.3.0+133+b8b54b58.noarch.rpm\Gjcl-over-slf4j-1.7.25-4.module+el8.6.0+843+5a13dac3.noarch.rpm<:jsoup-1.11.3-3.module+el8.6.0+843+5a13dac3.noarch.rpm,hmaven-3.5.4-5.module+el8.6.0+975+c0ed2db8.noarch.rpmhmaven-lib-3.5.4-5.module+el8.6.0+975+c0ed2db8.noarch.rpmzmaven-resolver-api-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm{maven-resolver-connector-basic-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm|maven-resolver-impl-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm}maven-resolver-spi-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm~maven-resolver-transport-wagon-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpmmaven-resolver-util-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm0maven-shared-utils-3.2.1-0.2.module+el8.6.0+975+c0ed2db8.noarch.rpm!maven-wagon-file-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm!maven-wagon-http-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm!maven-wagon-http-shared-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm!maven-wagon-provider-api-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm]Eplexus-cipher-1.7-14.module+el8.6.0+843+5a13dac3.noarch.rpm^Vplexus-classworlds-2.5.2-9.module+el8.6.0+843+5a13dac3.noarch.rpm_Fplexus-containers-component-annotations-1.7.1-8.module+el8.6.0+843+5a13dac3.noarch.rpm`?plexus-interpolation-1.22-9.module+el8.6.0+843+5a13dac3.noarch.rpmaBplexus-sec-dispatcher-1.4-26.module+el8.6.0+843+5a13dac3.noarch.rpmb\plexus-utils-3.1.0-3.module+el8.6.0+843+5a13dac3.noarch.rpmfsisu-inject-0.3.3-6.module+el8.6.0+843+5a13dac3.noarch.rpmfsisu-plexus-0.3.3-6.module+el8.6.0+843+5a13dac3.noarch.rpm7<jansi-1.17.1-1.module+el8.3.0+241+f23502a8.noarch.rpmm.slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm,L/'(%2aopalliance-1.0-17.module+el8.6.0+843+5a13dac3.noarch.rpmTCapache-commons-cli-1.4-4.module+el8.6.0+843+5a13dac3.noarch.rpmU8apache-commons-codec-1.11-3.module+el8.6.0+843+5a13dac3.noarch.rpmVMapache-commons-io-2.6-3.module+el8.6.0+843+5a13dac3.noarch.rpmW^apache-commons-lang3-3.7-3.module+el8.6.0+843+5a13dac3.noarch.rpmj=apache-commons-logging-1.2-13.module+el8.3.0+133+b8b54b58.noarch.rpmX1atinject-1-28.20100611svn86.module+el8.6.0+843+5a13dac3.noarch.rpmY>cdi-api-1.2-8.module+el8.6.0+843+5a13dac3.noarch.rpm)3geronimo-annotation-1.0-23.module+el8.6.0+843+5a13dac3.noarch.rpm[glassfish-el-api-3.0.1-0.7.b08.module+el8.6.0+975+c0ed2db8.noarch.rpmZ`google-guice-4.1-11.module+el8.6.0+843+5a13dac3.noarch.rpmpXguava20-20.0-8.module+el8.3.0+133+b8b54b58.noarch.rpmq;hawtjni-runtime-1.16-2.module+el8.3.0+133+b8b54b58.noarch.rpmdhttpcomponents-client-4.5.5-5.module+el8.6.0+843+5a13dac3.noarch.rpm[bhttpcomponents-core-4.4.10-3.module+el8.6.0+843+5a13dac3.noarch.rpm/Yjansi-native-1.7-7.module+el8.3.0+133+b8b54b58.x86_64.rpmw4jboss-interceptors-1.2-api-1.0.0-8.module+el8.3.0+133+b8b54b58.noarch.rpm\Gjcl-over-slf4j-1.7.25-4.module+el8.6.0+843+5a13dac3.noarch.rpm<:jsoup-1.11.3-3.module+el8.6.0+843+5a13dac3.noarch.rpm,hmaven-3.5.4-5.module+el8.6.0+975+c0ed2db8.noarch.rpmhmaven-lib-3.5.4-5.module+el8.6.0+975+c0ed2db8.noarch.rpmzmaven-resolver-api-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm{maven-resolver-connector-basic-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm|maven-resolver-impl-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm}maven-resolver-spi-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm~maven-resolver-transport-wagon-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpmmaven-resolver-util-1.1.1-2.module+el8.6.0+843+5a13dac3.noarch.rpm0maven-shared-utils-3.2.1-0.2.module+el8.6.0+975+c0ed2db8.noarch.rpm!maven-wagon-file-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm!maven-wagon-http-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm!maven-wagon-http-shared-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm!maven-wagon-provider-api-3.1.0-1.module+el8.6.0+843+5a13dac3.noarch.rpm]Eplexus-cipher-1.7-14.module+el8.6.0+843+5a13dac3.noarch.rpm^Vplexus-classworlds-2.5.2-9.module+el8.6.0+843+5a13dac3.noarch.rpm_Fplexus-containers-component-annotations-1.7.1-8.module+el8.6.0+843+5a13dac3.noarch.rpm`?plexus-interpolation-1.22-9.module+el8.6.0+843+5a13dac3.noarch.rpmaBplexus-sec-dispatcher-1.4-26.module+el8.6.0+843+5a13dac3.noarch.rpmb\plexus-utils-3.1.0-3.module+el8.6.0+843+5a13dac3.noarch.rpmfsisu-inject-0.3.3-6.module+el8.6.0+843+5a13dac3.noarch.rpmfsisu-plexus-0.3.3-6.module+el8.6.0+843+5a13dac3.noarch.rpmbC'}7<jansi-1.17.1-1.module+el8.3.0+241+f23502a8.noarch.rpm<* m.slf4j-1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm X |BBBBBBBBBBBBBBBBBBBBBBBB{BBBBB securityImportant: maven:3.6 security updateqhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29599CVE-2022-29599CVE-2022-29599https://bugzilla.redhat.com/show_bug.cgi?id=20664792066479https://errata.rockylinux.org/RLSA-2022:4797RLSA-2022:4797RLSA-2022:4797 ,jpostgresql-docs-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm?jpostgresql-plperl-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm@jpostgresql-plpython3-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpmAjpostgresql-pltcl-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpmBjpostgresql-server-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpmCjpostgresql-server-devel-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpmDjpostgresql-static-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpmEjpostgresql-test-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm jpostgresql-test-rpm-macros-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpmjpostgresql-upgrade-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpmjpostgresql-upgrade-devel-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpmA[ jpostgresql-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm=jpostgresql-contrib-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm>jpostgresql-docs-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm?jpostgresql-plperl-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm@jpostgresql-plpython3-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpmAjpostgresql-pltcl-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpmBjpostgresql-server-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpmCjpostgresql-server-devel-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpmDjpostgresql-static-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpmEjpostgresql-test-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm jpostgresql-test-rpm-macros-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpmjpostgresql-upgrade-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpmjpostgresql-upgrade-devel-10.21-2.module+el8.6.0+977+ab6e685c.x86_64.rpm[ vpostgresql-docs-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm?vpostgresql-plperl-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm@vpostgresql-plpython3-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpmAvpostgresql-pltcl-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpmBvpostgresql-server-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpmCvpostgresql-server-devel-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpmDvpostgresql-static-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpmEvpostgresql-test-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm vpostgresql-test-rpm-macros-13.7-2.module+el8.6.0+980+9caa008a.noarch.rpmvpostgresql-upgrade-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpmvpostgresql-upgrade-devel-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpmgy8Qpgaudit-1.5.0-1.module+el8.5.0+684+c3892ef9.x86_64.rpm:pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm% postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpmvpostgresql-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm=vpostgresql-contrib-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm>vpostgresql-docs-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm?vpostgresql-plperl-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm@vpostgresql-plpython3-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpmAvpostgresql-pltcl-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpmBvpostgresql-server-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpmCvpostgresql-server-devel-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpmDvpostgresql-static-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpmEvpostgresql-test-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm vpostgresql-test-rpm-macros-13.7-2.module+el8.6.0+980+9caa008a.noarch.rpmvpostgresql-upgrade-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpmvpostgresql-upgrade-devel-13.7-2.module+el8.6.0+980+9caa008a.x86_64.rpm] IBcBBBBBBBBBBBBBBBsecurityImportant: subversion:1.14 security update8https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24070CVE-2022-24070CVE-2022-24070https://bugzilla.redhat.com/show_bug.cgi?id=20747722074772https://errata.rockylinux.org/RLSA-2022:4941RLSA-2022:4941RLSA-2022:4941 xG elibserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpmAimod_dav_svn-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpmipython3-subversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm*isubversion-gnome-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpmxisubversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm)isubversion-devel-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm+isubversion-javahl-1.14.1-2.module+el8.7.0+1066+f8abeb19.noarch.rpm,isubversion-libs-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm-isubversion-perl-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm.isubversion-tools-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpmxG elibserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpmAimod_dav_svn-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpmipython3-subversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm*isubversion-gnome-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpmxisubversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm)isubversion-devel-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm+isubversion-javahl-1.14.1-2.module+el8.7.0+1066+f8abeb19.noarch.rpm,isubversion-libs-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm-isubversion-perl-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm.isubversion-tools-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm"\ !iq@BBBBBBBenhancementnodejs:12 bug fix and enhancement update7j https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959CVE-2021-22959CVE-2021-22959https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960CVE-2021-22960CVE-2021-22960https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37701CVE-2021-37701CVE-2021-37701https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37712CVE-2021-37712CVE-2021-37712https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3918CVE-2021-3918CVE-2021-3918https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531CVE-2021-44531CVE-2021-44531https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532CVE-2021-44532CVE-2021-44532https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533CVE-2021-44533CVE-2021-44533https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824CVE-2022-21824CVE-2022-21824https://bugzilla.redhat.com/show_bug.cgi?id=20846512084651* nodejs:12/nodejs: rebase to last upstream releasehttps://errata.rockylinux.org/RLEA-2022:5139RLEA-2022:5139RLEA-2022:5139 /}W/nodejs-12.22.12-1.module+el8.6.0+982+9fdca2d4.x86_64.rpmnodejs-devel-12.22.12-1.module+el8.6.0+982+9fdca2d4.x86_64.rpm6nodejs-docs-12.22.12-1.module+el8.6.0+982+9fdca2d4.noarch.rpmnodejs-full-i18n-12.22.12-1.module+el8.6.0+982+9fdca2d4.x86_64.rpmCAnodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm&npm-6.14.16-1.12.22.12.1.module+el8.6.0+982+9fdca2d4.x86_64.rpm/}W/nodejs-12.22.12-1.module+el8.6.0+982+9fdca2d4.x86_64.rpmnodejs-devel-12.22.12-1.module+el8.6.0+982+9fdca2d4.x86_64.rpm6nodejs-docs-12.22.12-1.module+el8.6.0+982+9fdca2d4.noarch.rpmnodejs-full-i18n-12.22.12-1.module+el8.6.0+982+9fdca2d4.x86_64.rpmCAnodejs-nodemon-2.0.3-1.module+el8.6.0+982+9fdca2d4.noarch.rpm:nodejs-packaging-17-3.module+el8.3.0+101+f84c7154.noarch.rpm&npm-6.14.16-1.12.22.12.1.module+el8.6.0+982+9fdca2d4.x86_64.rpm%^ "BBKsecurityLow: httpd:2.4 security update!tlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13950CVE-2020-13950CVE-2020-13950https://bugzilla.redhat.com/show_bug.cgi?id=19667381966738https://errata.rockylinux.org/RLSA-2022:5163RLSA-2022:5163RLSA-2022:5163 [Xnmod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpmrkmod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm[Xnmod_http2-1.15.7-5.module+el8.6.0+823+f143cee1.x86_64.rpmrkmod_md-2.0.8-8.module+el8.5.0+695+1fa8055e.x86_64.rpm)L 'cBBbugfixpostgresql-odbc bug fix and enhancement updatex https://bugzilla.redhat.com/show_bug.cgi?id=20801792080179* postgresql-server-13 doesn't work with postgresql-odbc-10https://errata.rockylinux.org/RLBA-2022:5325RLBA-2022:5325RLBA-2022:5325 3?postgresql-odbc-10.03.0000-3.el8_6.x86_64.rpm4?postgresql-odbc-tests-10.03.0000-3.el8_6.x86_64.rpm3?postgresql-odbc-10.03.0000-3.el8_6.x86_64.rpm4?postgresql-odbc-tests-10.03.0000-3.el8_6.x86_64.rpm)_ *hsecurityLow: compat-openssl10 security update Elhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778CVE-2022-0778CVE-2022-0778https://bugzilla.redhat.com/show_bug.cgi?id=20622022062202https://errata.rockylinux.org/RLSA-2022:5326RLSA-2022:5326RLSA-2022:5326 =compat-openssl10-1.0.2o-4.el8_6.x86_64.rpm=compat-openssl10-1.0.2o-4.el8_6.x86_64.rpm)M +CBBbugfixcheese bug fix and enhancement updateR_ https://errata.rockylinux.org/RLBA-2022:5329RLBA-2022:5329RLBA-2022:5329 E]cheese-3.28.0-4.el8_6.x86_64.rpmF]cheese-libs-3.28.0-4.el8_6.x86_64.rpmE]cheese-3.28.0-4.el8_6.x86_64.rpmF]cheese-libs-3.28.0-4.el8_6.x86_64.rpm*` 0lBBsecurityModerate: libinput security update16https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1215CVE-2022-1215CVE-2022-1215https://bugzilla.redhat.com/show_bug.cgi?id=20749522074952https://errata.rockylinux.org/RLSA-2022:5331RLSA-2022:5331RLSA-2022:5331 !libinput-1.16.3-3.el8_6.x86_64.rpm!libinput-utils-1.16.3-3.el8_6.x86_64.rpm!libinput-1.16.3-3.el8_6.x86_64.rpm!libinput-utils-1.16.3-3.el8_6.x86_64.rpm*a SB|BBBBBBBBBBYBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby:2.6 security, bug fix, and enhancement updateghttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28739CVE-2022-28739CVE-2022-28739https://bugzilla.redhat.com/show_bug.cgi?id=20756872075687https://bugzilla.redhat.com/show_bug.cgi?id=20893742089374The following packages have been upgraded to a later upstream version: ruby (2.6.10).https://errata.rockylinux.org/RLSA-2022:5338RLSA-2022:5338RLSA-2022:5338 , ruby-2.6.10-109.module+el8.6.0+988+8031c193.x86_64.rpmT ruby-devel-2.6.10-109.module+el8.6.0+988+8031c193.x86_64.rpm9 ruby-doc-2.6.10-109.module+el8.6.0+988+8031c193.noarch.rpm4 rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm5 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpmV=rubygem-bigdecimal-1.4.1-109.module+el8.6.0+988+8031c193.x86_64.rpmRrubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpmyRrubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpmcLrubygem-bundler-1.17.2-109.module+el8.6.0+988+8031c193.noarch.rpmJorubygem-did_you_mean-1.3.0-109.module+el8.6.0+988+8031c193.noarch.rpmWTrubygem-io-console-0.4.7-109.module+el8.6.0+988+8031c193.x86_64.rpmX!rubygem-irb-1.0.0-109.module+el8.6.0+988+8031c193.noarch.rpmY6rubygem-json-2.1.0-109.module+el8.6.0+988+8031c193.x86_64.rpm:Grubygem-minitest-5.11.3-109.module+el8.6.0+988+8031c193.noarch.rpmzorubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm{orubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm6@rubygem-mysql2-0.5.2-1.module+el8.5.0+738+032c9c02.x86_64.rpm)@rubygem-mysql2-doc-0.5.2-1.module+el8.5.0+738+032c9c02.noarch.rpmgwrubygem-net-telnet-0.2.0-109.module+el8.6.0+988+8031c193.noarch.rpm <rubygem-openssl-2.1.2-109.module+el8.6.0+988+8031c193.x86_64.rpm7Crubygem-pg-1.1.4-1.module+el8.5.0+738+032c9c02.x86_64.rpm*Crubygem-pg-doc-1.1.4-1.module+el8.5.0+738+032c9c02.noarch.rpm;<rubygem-power_assert-1.1.3-109.module+el8.6.0+988+8031c193.noarch.rpmZrubygem-psych-3.1.0-109.module+el8.6.0+988+8031c193.x86_64.rpm<rubygem-rake-12.3.3-109.module+el8.6.0+988+8031c193.noarch.rpm=Urubygem-rdoc-6.1.2.1-109.module+el8.6.0+988+8031c193.noarch.rpm?rubygems-3.0.3.1-109.module+el8.6.0+988+8031c193.noarch.rpm@rubygems-devel-3.0.3.1-109.module+el8.6.0+988+8031c193.noarch.rpm>#rubygem-test-unit-3.2.9-109.module+el8.6.0+988+8031c193.noarch.rpmhrubygem-xmlrpc-0.3.0-109.module+el8.6.0+988+8031c193.noarch.rpmU ruby-libs-2.6.10-109.module+el8.6.0+988+8031c193.x86_64.rpm, ruby-2.6.10-109.module+el8.6.0+988+8031c193.x86_64.rpmT ruby-devel-2.6.10-109.module+el8.6.0+988+8031c193.x86_64.rpm9 ruby-doc-2.6.10-109.module+el8.6.0+988+8031c193.noarch.rpm4 rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm5 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpmV=rubygem-bigdecimal-1.4.1-109.module+el8.6.0+988+8031c193.x86_64.rpmRrubygem-bson-4.5.0-1.module+el8.4.0+593+8d7f9f0c.x86_64.rpmyRrubygem-bson-doc-4.5.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpmcLrubygem-bundler-1.17.2-109.module+el8.6.0+988+8031c193.noarch.rpmJorubygem-did_you_mean-1.3.0-109.module+el8.6.0+988+8031c193.noarch.rpmWTrubygem-io-console-0.4.7-109.module+el8.6.0+988+8031c193.x86_64.rpmX!rubygem-irb-1.0.0-109.module+el8.6.0+988+8031c193.noarch.rpmY6rubygem-json-2.1.0-109.module+el8.6.0+988+8031c193.x86_64.rpm:Grubygem-minitest-5.11.3-109.module+el8.6.0+988+8031c193.noarch.rpmzorubygem-mongo-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm{orubygem-mongo-doc-2.8.0-1.module+el8.4.0+593+8d7f9f0c.noarch.rpm6@rubygem-mysql2-0.5.2-1.module+el8.5.0+738+032c9c02.x86_64.rpm)@rubygem-mysql2-doc-0.5.2-1.module+el8.5.0+738+032c9c02.noarch.rpmgwrubygem-net-telnet-0.2.0-109.module+el8.6.0+988+8031c193.noarch.rpm <rubygem-openssl-2.1.2-109.module+el8.6.0+988+8031c193.x86_64.rpm7Crubygem-pg-1.1.4-1.module+el8.5.0+738+032c9c02.x86_64.rpm*Crubygem-pg-doc-1.1.4-1.module+el8.5.0+738+032c9c02.noarch.rpm;<rubygem-power_assert-1.1.3-109.module+el8.6.0+988+8031c193.noarch.rpmZrubygem-psych-3.1.0-109.module+el8.6.0+988+8031c193.x86_64.rpm<rubygem-rake-12.3.3-109.module+el8.6.0+988+8031c193.noarch.rpm=Urubygem-rdoc-6.1.2.1-109.module+el8.6.0+988+8031c193.noarch.rpm?rubygems-3.0.3.1-109.module+el8.6.0+988+8031c193.noarch.rpm@rubygems-devel-3.0.3.1-109.module+el8.6.0+988+8031c193.noarch.rpm>#rubygem-test-unit-3.2.9-109.module+el8.6.0+988+8031c193.noarch.rpmhrubygem-xmlrpc-0.3.0-109.module+el8.6.0+988+8031c193.noarch.rpmU ruby-libs-2.6.10-109.module+el8.6.0+988+8031c193.x86_64.rpm0b XBBBBBBBBBBBBBBsecurityImportant: php:7.4 security updatezhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31626CVE-2022-31626CVE-2022-31626https://bugzilla.redhat.com/show_bug.cgi?id=20985232098523https://errata.rockylinux.org/RLSA-2022:5467RLSA-2022:5467RLSA-2022:5467 _c 0apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpmblibzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmclibzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmdlibzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmephp-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpmfphp-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpmtphp-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm;mphp-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpmgPphp-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm_c 0apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpmblibzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmclibzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmdlibzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmephp-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpmfphp-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpmtphp-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm;mphp-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpmgPphp-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm8c FwBBBBBBBBBBBBBBBsecurityImportant: php:8.0 security updatehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31626CVE-2022-31626CVE-2022-31626https://bugzilla.redhat.com/show_bug.cgi?id=20985232098523https://errata.rockylinux.org/RLSA-2022:5468RLSA-2022:5468RLSA-2022:5468 `$ 0Eapcu-panel-5.1.20-1.module+el8.6.0+790+fc63e43f.noarch.rpmblibzip-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpmclibzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpmdlibzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpmj php-pear-1.10.13-1.module+el8.7.0+1067+0a7071cc.noarch.rpmeEphp-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpmfEphp-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpmtjphp-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpmcphp-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpmg"php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm`$ 0Eapcu-panel-5.1.20-1.module+el8.6.0+790+fc63e43f.noarch.rpmblibzip-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpmclibzip-devel-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpmdlibzip-tools-1.7.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpmj php-pear-1.10.13-1.module+el8.7.0+1067+0a7071cc.noarch.rpmeEphp-pecl-apcu-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpmfEphp-pecl-apcu-devel-5.1.20-1.module+el8.6.0+790+fc63e43f.x86_64.rpmtjphp-pecl-rrd-2.0.3-1.module+el8.6.0+790+fc63e43f.x86_64.rpmcphp-pecl-xdebug3-3.1.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpmg"php-pecl-zip-1.19.2-1.module+el8.6.0+790+fc63e43f.x86_64.rpm;d UBBB[securityImportant: squid:4 security update https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46784CVE-2021-46784CVE-2021-46784https://bugzilla.redhat.com/show_bug.cgi?id=21007212100721https://errata.rockylinux.org/RLSA-2022:5526RLSA-2022:5526RLSA-2022:5526 &SY3libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm4libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm&^squid-4.15-3.module+el8.6.0+1044+67ab5d0a.2.x86_64.rpm&SY3libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm4libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm&^squid-4.15-3.module+el8.6.0+1044+67ab5d0a.2.x86_64.rpm>e .SB[BBBBBBBBBBuBfBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby:2.5 security update https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41817CVE-2021-41817CVE-2021-41817https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41819CVE-2021-41819CVE-2021-41819https://bugzilla.redhat.com/show_bug.cgi?id=20251042025104https://bugzilla.redhat.com/show_bug.cgi?id=20267572026757https://errata.rockylinux.org/RLSA-2022:5779RLSA-2022:5779RLSA-2022:5779 E\ mruby-2.5.9-110.module+el8.6.0+992+fc951c18.x86_64.rpmTmruby-devel-2.5.9-110.module+el8.6.0+992+fc951c18.x86_64.rpm9mruby-doc-2.5.9-110.module+el8.6.0+992+fc951c18.noarch.rpm4 rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm5 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpmV2rubygem-bigdecimal-1.3.4-110.module+el8.6.0+992+fc951c18.x86_64.rpm rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpmy rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpmcGrubygem-bundler-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpm3Grubygem-bundler-doc-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpmJNrubygem-did_you_mean-1.2.0-110.module+el8.6.0+992+fc951c18.noarch.rpmWSrubygem-io-console-0.4.6-110.module+el8.6.0+992+fc951c18.x86_64.rpmY8rubygem-json-2.1.0-110.module+el8.6.0+992+fc951c18.x86_64.rpm:Frubygem-minitest-5.10.3-110.module+el8.6.0+992+fc951c18.noarch.rpmzrubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm{rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm6rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm)rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpmgmrubygem-net-telnet-0.1.1-110.module+el8.6.0+992+fc951c18.noarch.rpm =rubygem-openssl-2.1.2-110.module+el8.6.0+992+fc951c18.x86_64.rpm7rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm*rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm;;rubygem-power_assert-1.1.1-110.module+el8.6.0+992+fc951c18.noarch.rpmZrubygem-psych-3.0.2-110.module+el8.6.0+992+fc951c18.x86_64.rpm<rubygem-rake-12.3.3-110.module+el8.6.0+992+fc951c18.noarch.rpm=Trubygem-rdoc-6.0.1.1-110.module+el8.6.0+992+fc951c18.noarch.rpm?yrubygems-2.7.6.3-110.module+el8.6.0+992+fc951c18.noarch.rpm@yrubygems-devel-2.7.6.3-110.module+el8.6.0+992+fc951c18.noarch.rpm>"rubygem-test-unit-3.2.7-110.module+el8.6.0+992+fc951c18.noarch.rpmhrubygem-xmlrpc-0.3.0-110.module+el8.6.0+992+fc951c18.noarch.rpmmruby-irb-2.5.9-110.module+el8.6.0+992+fc951c18.noarch.rpmUmruby-libs-2.5.9-110.module+el8.6.0+992+fc951c18.x86_64.rpmE\ mruby-2.5.9-110.module+el8.6.0+992+fc951c18.x86_64.rpmTmruby-devel-2.5.9-110.module+el8.6.0+992+fc951c18.x86_64.rpm9mruby-doc-2.5.9-110.module+el8.6.0+992+fc951c18.noarch.rpm4 rubygem-abrt-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpm5 rubygem-abrt-doc-0.3.0-4.module+el8.5.0+738+032c9c02.noarch.rpmV2rubygem-bigdecimal-1.3.4-110.module+el8.6.0+992+fc951c18.x86_64.rpm rubygem-bson-4.3.0-2.module+el8.4.0+592+03ff458a.x86_64.rpmy rubygem-bson-doc-4.3.0-2.module+el8.4.0+592+03ff458a.noarch.rpmcGrubygem-bundler-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpm3Grubygem-bundler-doc-1.16.1-4.module+el8.6.0+992+fc951c18.noarch.rpmJNrubygem-did_you_mean-1.2.0-110.module+el8.6.0+992+fc951c18.noarch.rpmWSrubygem-io-console-0.4.6-110.module+el8.6.0+992+fc951c18.x86_64.rpmY8rubygem-json-2.1.0-110.module+el8.6.0+992+fc951c18.x86_64.rpm:Frubygem-minitest-5.10.3-110.module+el8.6.0+992+fc951c18.noarch.rpmzrubygem-mongo-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm{rubygem-mongo-doc-2.5.1-2.module+el8.4.0+592+03ff458a.noarch.rpm6rubygem-mysql2-0.4.10-4.module+el8.5.0+739+43897a5e.x86_64.rpm)rubygem-mysql2-doc-0.4.10-4.module+el8.5.0+739+43897a5e.noarch.rpmgmrubygem-net-telnet-0.1.1-110.module+el8.6.0+992+fc951c18.noarch.rpm =rubygem-openssl-2.1.2-110.module+el8.6.0+992+fc951c18.x86_64.rpm7rubygem-pg-1.0.0-2.module+el8.4.0+592+03ff458a.x86_64.rpm*rubygem-pg-doc-1.0.0-2.module+el8.4.0+592+03ff458a.noarch.rpm;;rubygem-power_assert-1.1.1-110.module+el8.6.0+992+fc951c18.noarch.rpmZrubygem-psych-3.0.2-110.module+el8.6.0+992+fc951c18.x86_64.rpm<rubygem-rake-12.3.3-110.module+el8.6.0+992+fc951c18.noarch.rpm=Trubygem-rdoc-6.0.1.1-110.module+el8.6.0+992+fc951c18.noarch.rpm?yrubygems-2.7.6.3-110.module+el8.6.0+992+fc951c18.noarch.rpm@yrubygems-devel-2.7.6.3-110.module+el8.6.0+992+fc951c18.noarch.rpm>"rubygem-test-unit-3.2.7-110.module+el8.6.0+992+fc951c18.noarch.rpmhrubygem-xmlrpc-0.3.0-110.module+el8.6.0+992+fc951c18.noarch.rpmmruby-irb-2.5.9-110.module+el8.6.0+992+fc951c18.noarch.rpmUmruby-libs-2.5.9-110.module+el8.6.0+992+fc951c18.x86_64.rpmFg /ZBBBBBBBBBBBUBwBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update G https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4206CVE-2021-4206CVE-2021-4206https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4207CVE-2021-4207CVE-2021-4207https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26353CVE-2022-26353CVE-2022-26353https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26354CVE-2022-26354CVE-2022-26354https://bugzilla.redhat.com/show_bug.cgi?id=20369662036966https://bugzilla.redhat.com/show_bug.cgi?id=20369982036998https://bugzilla.redhat.com/show_bug.cgi?id=20631972063197https://bugzilla.redhat.com/show_bug.cgi?id=20632572063257https://bugzilla.redhat.com/show_bug.cgi?id=20722422072242* Fail to rebuild the reference count tables of qcow2 image on host block devices (e.g. LVs)https://bugzilla.redhat.com/show_bug.cgi?id=20755692075569* Allow memory prealloc from multiple threadshttps://bugzilla.redhat.com/show_bug.cgi?id=20840302084030* When doing a cpu-baseline between skylake and cascadelake, cascadelake is selected as baseline.https://bugzilla.redhat.com/show_bug.cgi?id=20934152093415* Virt-v2v can't convert rhel8.6 guest from VMware on rhel8.6https://errata.rockylinux.org/RLSA-2022:5821RLSA-2022:5821RLSA-2022:5821 tspA&+=hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm,=hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm=libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpmblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm>?libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm?libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm??libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmB?nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmCnbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmnbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpmDnbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmEnbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmFnbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmGnbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmHnbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmInbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmJnbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmKnbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmLnbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmMnbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmNnbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmOnbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmPnbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmQnbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmRnbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmSnbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmTnbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmd=perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmcperl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpme=python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmf?python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmq=ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmtspA&+=hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm,=hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm=libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpmblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm>?libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm?libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm??libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmB?nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmCnbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmnbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpmDnbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmEnbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmFnbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmGnbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmHnbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmInbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmJnbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmKnbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmLnbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmMnbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmNnbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmOnbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmPnbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmQnbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmRnbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmSnbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmTnbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmd=perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmcperl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpme=python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmf?python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmq=ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmpN 0kBBBBBBBBBBBBBuDBpBBBBBBBtCBBBBbugfixcontainer-tools:rhel8 bug fix updateg https://bugzilla.redhat.com/show_bug.cgi?id=20795942079594* error during chown: storage-chown-by-maps: lgetxattr usr/bin/ping: value too large for defined data typehttps://bugzilla.redhat.com/show_bug.cgi?id=20877422087742* Work on container-tools for RHEL8.7.0https://bugzilla.redhat.com/show_bug.cgi?id=20949682094968* Backport podman's PR 14319 in RHEL's podman 4.0 banchhttps://bugzilla.redhat.com/show_bug.cgi?id=20970492097049* ERRO[0009] Error forwarding signal 18 to container using rootless user with timeout+sleep in the podman run commandhttps://bugzilla.redhat.com/show_bug.cgi?id=21001432100143* catatonit not found when starting pod (podman 4.0 under RHEL 8.6)https://bugzilla.redhat.com/show_bug.cgi?id=21046272104627* symlinks doesn't work on volumes under podman when SELINUX is enabledhttps://bugzilla.redhat.com/show_bug.cgi?id=21092952109295* Podman does not detect volume from the volume plugin, unlike dockerhttps://errata.rockylinux.org/RLBA-2022:5824RLBA-2022:5824RLBA-2022:5824 $zW[aardvark-dns-1.0.1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm9Scontainernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm1containers-common-1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm-crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm*criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm!criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm"criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpmLVfuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmTXlibslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmUXlibslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmB[netavark-1.0.1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm.python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm=python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm+Hslirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpmV.toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm^.toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm2;udica-0.2.6-4.module+el8.7.0+1122+04a7498b.noarch.rpm$zW[aardvark-dns-1.0.1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm9Scontainernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm1containers-common-1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm-crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm*criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm!criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm"criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpmLVfuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmTXlibslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmUXlibslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmB[netavark-1.0.1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm.python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm=python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm+Hslirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpmV.toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm^.toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm2;udica-0.2.6-4.module+el8.7.0+1122+04a7498b.noarch.rpmzh LBeBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: mariadb:10.5 security, bug fix, and enhancement updategsOhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46659CVE-2021-46659CVE-2021-46659https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46661CVE-2021-46661CVE-2021-46661https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46663CVE-2021-46663CVE-2021-46663https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46664CVE-2021-46664CVE-2021-46664https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46665CVE-2021-46665CVE-2021-46665https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46668CVE-2021-46668CVE-2021-46668https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669CVE-2021-46669CVE-2021-46669https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21595CVE-2022-21595CVE-2022-21595https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24048CVE-2022-24048CVE-2022-24048https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24050CVE-2022-24050CVE-2022-24050https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24051CVE-2022-24051CVE-2022-24051https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24052CVE-2022-24052CVE-2022-24052https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27376CVE-2022-27376CVE-2022-27376https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27377CVE-2022-27377CVE-2022-27377https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27378CVE-2022-27378CVE-2022-27378https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27379CVE-2022-27379CVE-2022-27379https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27380CVE-2022-27380CVE-2022-27380https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27381CVE-2022-27381CVE-2022-27381https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27382CVE-2022-27382CVE-2022-27382https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27383CVE-2022-27383CVE-2022-27383https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27384CVE-2022-27384CVE-2022-27384https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27386CVE-2022-27386CVE-2022-27386https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27387CVE-2022-27387CVE-2022-27387https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27444CVE-2022-27444CVE-2022-27444https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27445CVE-2022-27445CVE-2022-27445https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27446CVE-2022-27446CVE-2022-27446https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27447CVE-2022-27447CVE-2022-27447https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27448CVE-2022-27448CVE-2022-27448https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27449CVE-2022-27449CVE-2022-27449https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27451CVE-2022-27451CVE-2022-27451https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27452CVE-2022-27452CVE-2022-27452https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27455CVE-2022-27455CVE-2022-27455https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27456CVE-2022-27456CVE-2022-27456https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27457CVE-2022-27457CVE-2022-27457https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27458CVE-2022-27458CVE-2022-27458https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31622CVE-2022-31622CVE-2022-31622https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31623CVE-2022-31623CVE-2022-31623https://bugzilla.redhat.com/show_bug.cgi?id=20493022049302https://bugzilla.redhat.com/show_bug.cgi?id=20500172050017https://bugzilla.redhat.com/show_bug.cgi?id=20500222050022https://bugzilla.redhat.com/show_bug.cgi?id=20500242050024https://bugzilla.redhat.com/show_bug.cgi?id=20500262050026https://bugzilla.redhat.com/show_bug.cgi?id=20500322050032https://bugzilla.redhat.com/show_bug.cgi?id=20500342050034https://bugzilla.redhat.com/show_bug.cgi?id=20682112068211https://bugzilla.redhat.com/show_bug.cgi?id=20682332068233https://bugzilla.redhat.com/show_bug.cgi?id=20682342068234https://bugzilla.redhat.com/show_bug.cgi?id=20698332069833https://bugzilla.redhat.com/show_bug.cgi?id=20748172074817https://bugzilla.redhat.com/show_bug.cgi?id=20749472074947https://bugzilla.redhat.com/show_bug.cgi?id=20749492074949https://bugzilla.redhat.com/show_bug.cgi?id=20749512074951https://bugzilla.redhat.com/show_bug.cgi?id=20749662074966https://bugzilla.redhat.com/show_bug.cgi?id=20749812074981https://bugzilla.redhat.com/show_bug.cgi?id=20749872074987https://bugzilla.redhat.com/show_bug.cgi?id=20749962074996https://bugzilla.redhat.com/show_bug.cgi?id=20749992074999https://bugzilla.redhat.com/show_bug.cgi?id=20750052075005https://bugzilla.redhat.com/show_bug.cgi?id=20750062075006https://bugzilla.redhat.com/show_bug.cgi?id=20756912075691https://bugzilla.redhat.com/show_bug.cgi?id=20756922075692https://bugzilla.redhat.com/show_bug.cgi?id=20756932075693https://bugzilla.redhat.com/show_bug.cgi?id=20756942075694https://bugzilla.redhat.com/show_bug.cgi?id=20756952075695https://bugzilla.redhat.com/show_bug.cgi?id=20756962075696https://bugzilla.redhat.com/show_bug.cgi?id=20756972075697https://bugzilla.redhat.com/show_bug.cgi?id=20756992075699https://bugzilla.redhat.com/show_bug.cgi?id=20757002075700https://bugzilla.redhat.com/show_bug.cgi?id=20757012075701https://bugzilla.redhat.com/show_bug.cgi?id=20761442076144https://bugzilla.redhat.com/show_bug.cgi?id=20761452076145https://bugzilla.redhat.com/show_bug.cgi?id=20923542092354https://bugzilla.redhat.com/show_bug.cgi?id=20923602092360https://bugzilla.redhat.com/show_bug.cgi?id=20952902095290https://bugzilla.redhat.com/show_bug.cgi?id=20962812096281https://bugzilla.redhat.com/show_bug.cgi?id=20969342096934* Don't use less parallelism if not necessaryhttps://bugzilla.redhat.com/show_bug.cgi?id=20969352096935* Links in galera package description are badhttps://bugzilla.redhat.com/show_bug.cgi?id=20969362096936* [Tracker] Rebase to Galera 26.4.11https://errata.rockylinux.org/RLSA-2022:5826RLSA-2022:5826RLSA-2022:5826 5C]l galera-26.4.11-1.module+el8.6.0+995+5ac2a483.x86_64.rpm.Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm5^mariadb-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpmW^mariadb-backup-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpmX^mariadb-common-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpmY^mariadb-devel-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpmZ^mariadb-embedded-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm[^mariadb-embedded-devel-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm\^mariadb-errmsg-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm]^mariadb-gssapi-server-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm^^mariadb-oqgraph-engine-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm^mariadb-pam-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm_^mariadb-server-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm`^mariadb-server-galera-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpma^mariadb-server-utils-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpmb^mariadb-test-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm5C]l galera-26.4.11-1.module+el8.6.0+995+5ac2a483.x86_64.rpm.Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm5^mariadb-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpmW^mariadb-backup-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpmX^mariadb-common-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpmY^mariadb-devel-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpmZ^mariadb-embedded-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm[^mariadb-embedded-devel-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm\^mariadb-errmsg-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm]^mariadb-gssapi-server-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm^^mariadb-oqgraph-engine-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm^mariadb-pam-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm_^mariadb-server-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm`^mariadb-server-galera-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpma^mariadb-server-utils-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpmb^mariadb-test-10.5.16-2.module+el8.6.0+995+5ac2a483.x86_64.rpm}i XBBBBBBBBBBBBBBsecurityModerate: php:7.4 security updateZxhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31625CVE-2022-31625CVE-2022-31625https://bugzilla.redhat.com/show_bug.cgi?id=20985212098521https://errata.rockylinux.org/RLSA-2022:6158RLSA-2022:6158RLSA-2022:6158 _c 0apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpmblibzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmclibzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmdlibzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmephp-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpmfphp-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpmtphp-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm;mphp-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpmgPphp-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm_c 0apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpmblibzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmclibzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmdlibzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmephp-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpmfphp-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpmtphp-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm;mphp-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpmgPphp-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm] )QBBBBBBBBBBBBBBBBBBBBBBenhancementnss and nspr bug fix and enhancement updateR~ https://bugzilla.redhat.com/show_bug.cgi?id=20930622093062* Rebase NSS to 3.79 for Firefox 103 ESRhttps://bugzilla.redhat.com/show_bug.cgi?id=20944702094470* Rebase NSPR to 4.34 for NSS 3.79 for Firefox 103 ESR [rhel-8.7]https://bugzilla.redhat.com/show_bug.cgi?id=20979002097900* certmonger startup very slow using default NSS sqlite database backendhttps://bugzilla.redhat.com/show_bug.cgi?id=20986412098641* selfserv binds on ipv6 only instead of both ipv6 and ipv4https://bugzilla.redhat.com/show_bug.cgi?id=20986422098642* allow signature verification using RSA keys <2k in FIPS mode [rhel-8.7.0]https://bugzilla.redhat.com/show_bug.cgi?id=20997592099759* Need to be able to run self-tests at will programmaticallyhttps://bugzilla.redhat.com/show_bug.cgi?id=21050072105007* NSS segfaults still in client auth path.https://bugzilla.redhat.com/show_bug.cgi?id=21214862121486* ipsec --initnss timeouts probably due to entropy.https://errata.rockylinux.org/RLEA-2022:6440RLEA-2022:6440RLEA-2022:6440 Y#nss-3.79.0-10.el8_6.x86_64.rpm\=nspr-devel-4.34.0-3.el8_6.x86_64.rpm[=nspr-4.34.0-3.el8_6.x86_64.rpmZ#nss-devel-3.79.0-10.el8_6.x86_64.rpm[#nss-softokn-3.79.0-10.el8_6.x86_64.rpm\#nss-softokn-devel-3.79.0-10.el8_6.x86_64.rpm]#nss-softokn-freebl-3.79.0-10.el8_6.x86_64.rpm^#nss-softokn-freebl-devel-3.79.0-10.el8_6.x86_64.rpm_#nss-sysinit-3.79.0-10.el8_6.x86_64.rpm`#nss-tools-3.79.0-10.el8_6.x86_64.rpma#nss-util-3.79.0-10.el8_6.x86_64.rpmb#nss-util-devel-3.79.0-10.el8_6.x86_64.rpm Y#nss-3.79.0-10.el8_6.x86_64.rpm\=nspr-devel-4.34.0-3.el8_6.x86_64.rpm[=nspr-4.34.0-3.el8_6.x86_64.rpmZ#nss-devel-3.79.0-10.el8_6.x86_64.rpm[#nss-softokn-3.79.0-10.el8_6.x86_64.rpm\#nss-softokn-devel-3.79.0-10.el8_6.x86_64.rpm]#nss-softokn-freebl-3.79.0-10.el8_6.x86_64.rpm^#nss-softokn-freebl-devel-3.79.0-10.el8_6.x86_64.rpm_#nss-sysinit-3.79.0-10.el8_6.x86_64.rpm`#nss-tools-3.79.0-10.el8_6.x86_64.rpma#nss-util-3.79.0-10.el8_6.x86_64.rpmb#nss-util-devel-3.79.0-10.el8_6.x86_64.rpmO +*bugfixmysql-selinux bug fix and enhancement updatePA https://bugzilla.redhat.com/show_bug.cgi?id=20962792096279* SELinux is preventing wsrep_sst_rsync getattr of /usr/bin/hostnamehttps://errata.rockylinux.org/RLBA-2022:6441RLBA-2022:6441RLBA-2022:6441 k%mysql-selinux-1.0.5-1.el8_6.noarch.rpmk%mysql-selinux-1.0.5-1.el8_6.noarch.rpmj LB`BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: mariadb:10.3 security and bug fix update.Hhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46659CVE-2021-46659CVE-2021-46659https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46661CVE-2021-46661CVE-2021-46661https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46663CVE-2021-46663CVE-2021-46663https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46664CVE-2021-46664CVE-2021-46664https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46665CVE-2021-46665CVE-2021-46665https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46668CVE-2021-46668CVE-2021-46668https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669CVE-2021-46669CVE-2021-46669https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21427CVE-2022-21427CVE-2022-21427https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21595CVE-2022-21595CVE-2022-21595https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24048CVE-2022-24048CVE-2022-24048https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24050CVE-2022-24050CVE-2022-24050https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24051CVE-2022-24051CVE-2022-24051https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24052CVE-2022-24052CVE-2022-24052https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27376CVE-2022-27376CVE-2022-27376https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27377CVE-2022-27377CVE-2022-27377https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27378CVE-2022-27378CVE-2022-27378https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27379CVE-2022-27379CVE-2022-27379https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27380CVE-2022-27380CVE-2022-27380https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27381CVE-2022-27381CVE-2022-27381https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27383CVE-2022-27383CVE-2022-27383https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27384CVE-2022-27384CVE-2022-27384https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27386CVE-2022-27386CVE-2022-27386https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27387CVE-2022-27387CVE-2022-27387https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27445CVE-2022-27445CVE-2022-27445https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27447CVE-2022-27447CVE-2022-27447https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27448CVE-2022-27448CVE-2022-27448https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27449CVE-2022-27449CVE-2022-27449https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27452CVE-2022-27452CVE-2022-27452https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27456CVE-2022-27456CVE-2022-27456https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27458CVE-2022-27458CVE-2022-27458https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31622CVE-2022-31622CVE-2022-31622https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31623CVE-2022-31623CVE-2022-31623https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32083CVE-2022-32083CVE-2022-32083https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32085CVE-2022-32085CVE-2022-32085https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32087CVE-2022-32087CVE-2022-32087https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32088CVE-2022-32088CVE-2022-32088https://bugzilla.redhat.com/show_bug.cgi?id=20493022049302https://bugzilla.redhat.com/show_bug.cgi?id=20500172050017https://bugzilla.redhat.com/show_bug.cgi?id=20500222050022https://bugzilla.redhat.com/show_bug.cgi?id=20500242050024https://bugzilla.redhat.com/show_bug.cgi?id=20500262050026https://bugzilla.redhat.com/show_bug.cgi?id=20500322050032https://bugzilla.redhat.com/show_bug.cgi?id=20500342050034https://bugzilla.redhat.com/show_bug.cgi?id=20682112068211https://bugzilla.redhat.com/show_bug.cgi?id=20682332068233https://bugzilla.redhat.com/show_bug.cgi?id=20682342068234https://bugzilla.redhat.com/show_bug.cgi?id=20698332069833https://bugzilla.redhat.com/show_bug.cgi?id=20748172074817https://bugzilla.redhat.com/show_bug.cgi?id=20749472074947https://bugzilla.redhat.com/show_bug.cgi?id=20749492074949https://bugzilla.redhat.com/show_bug.cgi?id=20749512074951https://bugzilla.redhat.com/show_bug.cgi?id=20749662074966https://bugzilla.redhat.com/show_bug.cgi?id=20749812074981https://bugzilla.redhat.com/show_bug.cgi?id=20749962074996https://bugzilla.redhat.com/show_bug.cgi?id=20749992074999https://bugzilla.redhat.com/show_bug.cgi?id=20750052075005https://bugzilla.redhat.com/show_bug.cgi?id=20750062075006https://bugzilla.redhat.com/show_bug.cgi?id=20756912075691https://bugzilla.redhat.com/show_bug.cgi?id=20756932075693https://bugzilla.redhat.com/show_bug.cgi?id=20756942075694https://bugzilla.redhat.com/show_bug.cgi?id=20756952075695https://bugzilla.redhat.com/show_bug.cgi?id=20756972075697https://bugzilla.redhat.com/show_bug.cgi?id=20757002075700https://bugzilla.redhat.com/show_bug.cgi?id=20761452076145https://bugzilla.redhat.com/show_bug.cgi?id=20826442082644https://bugzilla.redhat.com/show_bug.cgi?id=20923542092354https://bugzilla.redhat.com/show_bug.cgi?id=20923602092360https://bugzilla.redhat.com/show_bug.cgi?id=21044252104425https://bugzilla.redhat.com/show_bug.cgi?id=21044312104431https://bugzilla.redhat.com/show_bug.cgi?id=21044342104434https://bugzilla.redhat.com/show_bug.cgi?id=21060082106008https://errata.rockylinux.org/RLSA-2022:6443RLSA-2022:6443RLSA-2022:6443 5Wl galera-25.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm.Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm5omariadb-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpmWomariadb-backup-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpmXomariadb-common-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpmYomariadb-devel-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpmZomariadb-embedded-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm[omariadb-embedded-devel-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm\omariadb-errmsg-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm]omariadb-gssapi-server-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm^omariadb-oqgraph-engine-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm_omariadb-server-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm`omariadb-server-galera-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpmaomariadb-server-utils-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpmbomariadb-test-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm5Wl galera-25.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm.Judy-1.0.5-18.module+el8.4.0+427+adf35707.x86_64.rpm5omariadb-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpmWomariadb-backup-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpmXomariadb-common-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpmYomariadb-devel-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpmZomariadb-embedded-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm[omariadb-embedded-devel-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm\omariadb-errmsg-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm]omariadb-gssapi-server-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm^omariadb-oqgraph-engine-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm_omariadb-server-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm`omariadb-server-galera-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpmaomariadb-server-utils-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpmbomariadb-test-10.3.35-1.module+el8.6.0+1005+cdf19c22.x86_64.rpm P ZBBBBBBBBBBBUBwBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbugfixvirt:rhel and virt-devel:rhel bug fix and enhancement update?n https://bugzilla.redhat.com/show_bug.cgi?id=20957942095794https://bugzilla.redhat.com/show_bug.cgi?id=21095682109568* swtpm: Disable OpenSSL FIPS mode to avoid libtpms failureshttps://bugzilla.redhat.com/show_bug.cgi?id=21095712109571https://bugzilla.redhat.com/show_bug.cgi?id=21099872109987* swtpm_localca: Test for available issuercert before creating CAhttps://bugzilla.redhat.com/show_bug.cgi?id=21172522117252https://bugzilla.redhat.com/show_bug.cgi?id=21172722117272https://bugzilla.redhat.com/show_bug.cgi?id=21194292119429https://errata.rockylinux.org/RLBA-2022:6446RLBA-2022:6446RLBA-2022:6446 tspA&+=hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm,=hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm=libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpmblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm>?libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm?libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm??libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmDnbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmB?nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmCnbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmnbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpmEnbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmFnbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmGnbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmHnbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmInbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmJnbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmKnbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmLnbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmMnbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmNnbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmOnbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmPnbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmQnbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmRnbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmSnbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmTnbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmd=perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmcperl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpme=python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmf?python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmq=ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmtspA&+=hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm,=hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm=libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpmblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm>?libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm?libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm??libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmDnbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmB?nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmCnbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmnbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpmEnbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmFnbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmGnbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmHnbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmInbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmJnbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmKnbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmLnbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmMnbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmNnbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmOnbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmPnbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmQnbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmRnbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmSnbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmTnbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmd=perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmcperl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpme=python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmf?python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmq=ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm4k 'fBYBBBBBbBBBBbBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby:2.7 security, bug fix, and enhancement update-=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41817CVE-2021-41817CVE-2021-41817https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41819CVE-2021-41819CVE-2021-41819https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28739CVE-2022-28739CVE-2022-28739https://bugzilla.redhat.com/show_bug.cgi?id=20251042025104https://bugzilla.redhat.com/show_bug.cgi?id=20267572026757https://bugzilla.redhat.com/show_bug.cgi?id=20756872075687https://bugzilla.redhat.com/show_bug.cgi?id=21094242109424The following packages have been upgraded to a later upstream version: ruby (2.7.6).https://errata.rockylinux.org/RLSA-2022:6447RLSA-2022:6447RLSA-2022:6447 9^nruby-2.7.6-138.module+el8.6.0+1001+b5678180.x86_64.rpmfnruby-default-gems-2.7.6-138.module+el8.6.0+1001+b5678180.noarch.rpmTnruby-devel-2.7.6-138.module+el8.6.0+1001+b5678180.x86_64.rpm9nruby-doc-2.7.6-138.module+el8.6.0+1001+b5678180.noarch.rpm4 rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm5 rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpmV/rubygem-bigdecimal-2.0.0-138.module+el8.6.0+1001+b5678180.x86_64.rpmSrubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpmySrubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpmc^rubygem-bundler-2.2.24-138.module+el8.6.0+1001+b5678180.noarch.rpmWZrubygem-io-console-0.5.6-138.module+el8.6.0+1001+b5678180.x86_64.rpmXSrubygem-irb-1.2.6-138.module+el8.6.0+1001+b5678180.noarch.rpmYVrubygem-json-2.3.0-138.module+el8.6.0+1001+b5678180.x86_64.rpm:Hrubygem-minitest-5.13.0-138.module+el8.6.0+1001+b5678180.noarch.rpmzlrubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm{lrubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm6`rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm)`rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpmgxrubygem-net-telnet-0.2.0-138.module+el8.6.0+1001+b5678180.noarch.rpm ?rubygem-openssl-2.1.3-138.module+el8.6.0+1001+b5678180.x86_64.rpm7brubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm*brubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpm;>rubygem-power_assert-1.1.7-138.module+el8.6.0+1001+b5678180.noarch.rpmZrubygem-psych-3.1.0-138.module+el8.6.0+1001+b5678180.x86_64.rpm<rubygem-rake-13.0.1-138.module+el8.6.0+1001+b5678180.noarch.rpm=Vrubygem-rdoc-6.2.1.1-138.module+el8.6.0+1001+b5678180.noarch.rpm?rubygems-3.1.6-138.module+el8.6.0+1001+b5678180.noarch.rpm@rubygems-devel-3.1.6-138.module+el8.6.0+1001+b5678180.noarch.rpm>+rubygem-test-unit-3.3.4-138.module+el8.6.0+1001+b5678180.noarch.rpmhrubygem-xmlrpc-0.3.0-138.module+el8.6.0+1001+b5678180.noarch.rpmUnruby-libs-2.7.6-138.module+el8.6.0+1001+b5678180.x86_64.rpm9^nruby-2.7.6-138.module+el8.6.0+1001+b5678180.x86_64.rpmfnruby-default-gems-2.7.6-138.module+el8.6.0+1001+b5678180.noarch.rpmTnruby-devel-2.7.6-138.module+el8.6.0+1001+b5678180.x86_64.rpm9nruby-doc-2.7.6-138.module+el8.6.0+1001+b5678180.noarch.rpm4 rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm5 rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpmV/rubygem-bigdecimal-2.0.0-138.module+el8.6.0+1001+b5678180.x86_64.rpmSrubygem-bson-4.8.1-1.module+el8.4.0+594+11b6673a.x86_64.rpmySrubygem-bson-doc-4.8.1-1.module+el8.4.0+594+11b6673a.noarch.rpmc^rubygem-bundler-2.2.24-138.module+el8.6.0+1001+b5678180.noarch.rpmWZrubygem-io-console-0.5.6-138.module+el8.6.0+1001+b5678180.x86_64.rpmXSrubygem-irb-1.2.6-138.module+el8.6.0+1001+b5678180.noarch.rpmYVrubygem-json-2.3.0-138.module+el8.6.0+1001+b5678180.x86_64.rpm:Hrubygem-minitest-5.13.0-138.module+el8.6.0+1001+b5678180.noarch.rpmzlrubygem-mongo-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm{lrubygem-mongo-doc-2.11.3-1.module+el8.4.0+594+11b6673a.noarch.rpm6`rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm)`rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpmgxrubygem-net-telnet-0.2.0-138.module+el8.6.0+1001+b5678180.noarch.rpm ?rubygem-openssl-2.1.3-138.module+el8.6.0+1001+b5678180.x86_64.rpm7brubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm*brubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpm;>rubygem-power_assert-1.1.7-138.module+el8.6.0+1001+b5678180.noarch.rpmZrubygem-psych-3.1.0-138.module+el8.6.0+1001+b5678180.x86_64.rpm<rubygem-rake-13.0.1-138.module+el8.6.0+1001+b5678180.noarch.rpm=Vrubygem-rdoc-6.2.1.1-138.module+el8.6.0+1001+b5678180.noarch.rpm?rubygems-3.1.6-138.module+el8.6.0+1001+b5678180.noarch.rpm@rubygems-devel-3.1.6-138.module+el8.6.0+1001+b5678180.noarch.rpm>+rubygem-test-unit-3.3.4-138.module+el8.6.0+1001+b5678180.noarch.rpmhrubygem-xmlrpc-0.3.0-138.module+el8.6.0+1001+b5678180.noarch.rpmUnruby-libs-2.7.6-138.module+el8.6.0+1001+b5678180.x86_64.rpm9l (AsecurityModerate: nodejs:14 security and bug fix updatejf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212CVE-2022-32212CVE-2022-32212https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213CVE-2022-32213CVE-2022-32213https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32214CVE-2022-32214CVE-2022-32214https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32215CVE-2022-32215CVE-2022-32215https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33987CVE-2022-33987CVE-2022-33987https://bugzilla.redhat.com/show_bug.cgi?id=21020012102001https://bugzilla.redhat.com/show_bug.cgi?id=21054222105422https://bugzilla.redhat.com/show_bug.cgi?id=21054262105426https://bugzilla.redhat.com/show_bug.cgi?id=21054282105428https://bugzilla.redhat.com/show_bug.cgi?id=21054302105430https://bugzilla.redhat.com/show_bug.cgi?id=21063672106367* nodejs:14/nodejs: rebase to latest upstream releasehttps://errata.rockylinux.org/RLSA-2022:6448RLSA-2022:6448RLSA-2022:6448 /RrCNnodejs-nodemon-2.0.19-2.module+el8.6.0+1046+80feca58.noarch.rpm:mnodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm/RrCNnodejs-nodemon-2.0.19-2.module+el8.6.0+1046+80feca58.noarch.rpm:mnodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm;m )WsecurityModerate: nodejs:16 security and bug fix updatePThttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3807CVE-2021-3807CVE-2021-3807https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212CVE-2022-32212CVE-2022-32212https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213CVE-2022-32213CVE-2022-32213https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32214CVE-2022-32214CVE-2022-32214https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32215CVE-2022-32215CVE-2022-32215https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33987CVE-2022-33987CVE-2022-33987https://bugzilla.redhat.com/show_bug.cgi?id=20075572007557https://bugzilla.redhat.com/show_bug.cgi?id=21020012102001https://bugzilla.redhat.com/show_bug.cgi?id=21054222105422https://bugzilla.redhat.com/show_bug.cgi?id=21054262105426https://bugzilla.redhat.com/show_bug.cgi?id=21054282105428https://bugzilla.redhat.com/show_bug.cgi?id=21054302105430https://bugzilla.redhat.com/show_bug.cgi?id=21063692106369* nodejs:16/nodejs: rebase to latest upstream releasehttps://errata.rockylinux.org/RLSA-2022:6449RLSA-2022:6449RLSA-2022:6449 /RrCNnodejs-nodemon-2.0.19-2.module+el8.6.0+1046+80feca58.noarch.rpm:nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm/RrCNnodejs-nodemon-2.0.19-2.module+el8.6.0+1046+80feca58.noarch.rpm:nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm<n fBYBBBBBgBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby:3.0 security, bug fix, and enhancement update$e https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41817CVE-2021-41817CVE-2021-41817https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41819CVE-2021-41819CVE-2021-41819https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28738CVE-2022-28738CVE-2022-28738https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28739CVE-2022-28739CVE-2022-28739https://bugzilla.redhat.com/show_bug.cgi?id=20251042025104https://bugzilla.redhat.com/show_bug.cgi?id=20267572026757https://bugzilla.redhat.com/show_bug.cgi?id=20756852075685https://bugzilla.redhat.com/show_bug.cgi?id=20756872075687https://bugzilla.redhat.com/show_bug.cgi?id=21094312109431The following packages have been upgraded to a later upstream version: ruby (3.0.4).https://bugzilla.redhat.com/show_bug.cgi?id=21109812110981* ruby 3.0: User-installed rubygems plugins are not being loaded [RHEL8]https://errata.rockylinux.org/RLSA-2022:6450RLSA-2022:6450RLSA-2022:6450 zpruby-3.0.4-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpmfpruby-default-gems-3.0.4-141.module+el8.6.0+1002+a7dba0ac.noarch.rpmTpruby-devel-3.0.4-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm9pruby-doc-3.0.4-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm4 rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm5 rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpmVrubygem-bigdecimal-3.0.0-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpmc`rubygem-bundler-2.2.33-141.module+el8.6.0+1002+a7dba0ac.noarch.rpmW[rubygem-io-console-0.5.7-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpmXqrubygem-irb-1.3.5-141.module+el8.6.0+1002+a7dba0ac.noarch.rpmYhrubygem-json-2.5.1-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm:Irubygem-minitest-5.14.2-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm6`rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm)`rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm7brubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm*brubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpm;Orubygem-power_assert-1.2.0-141.module+el8.6.0+1002+a7dba0ac.noarch.rpmZ5rubygem-psych-3.3.2-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm<rubygem-rake-13.0.3-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm4~rubygem-rbs-1.4.0-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm=Wrubygem-rdoc-6.3.3-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm!rubygem-rexml-3.2.5-141.module+el8.6.0+1002+a7dba0ac.noarch.rpmyrubygem-rss-0.2.9-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm? rubygems-3.2.33-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm@ rubygems-devel-3.2.33-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm>-rubygem-test-unit-3.3.7-141.module+el8.6.0+1002+a7dba0ac.noarch.rpmKvrubygem-typeprof-0.15.2-141.module+el8.6.0+1002+a7dba0ac.noarch.rpmUpruby-libs-3.0.4-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpmzpruby-3.0.4-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpmfpruby-default-gems-3.0.4-141.module+el8.6.0+1002+a7dba0ac.noarch.rpmTpruby-devel-3.0.4-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm9pruby-doc-3.0.4-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm4 rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm5 rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpmVrubygem-bigdecimal-3.0.0-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpmc`rubygem-bundler-2.2.33-141.module+el8.6.0+1002+a7dba0ac.noarch.rpmW[rubygem-io-console-0.5.7-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpmXqrubygem-irb-1.3.5-141.module+el8.6.0+1002+a7dba0ac.noarch.rpmYhrubygem-json-2.5.1-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm:Irubygem-minitest-5.14.2-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm6`rubygem-mysql2-0.5.3-1.module+el8.5.0+668+665814fa.x86_64.rpm)`rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+668+665814fa.noarch.rpm7brubygem-pg-1.2.3-1.module+el8.5.0+668+665814fa.x86_64.rpm*brubygem-pg-doc-1.2.3-1.module+el8.5.0+668+665814fa.noarch.rpm;Orubygem-power_assert-1.2.0-141.module+el8.6.0+1002+a7dba0ac.noarch.rpmZ5rubygem-psych-3.3.2-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpm<rubygem-rake-13.0.3-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm4~rubygem-rbs-1.4.0-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm=Wrubygem-rdoc-6.3.3-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm!rubygem-rexml-3.2.5-141.module+el8.6.0+1002+a7dba0ac.noarch.rpmyrubygem-rss-0.2.9-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm? rubygems-3.2.33-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm@ rubygems-devel-3.2.33-141.module+el8.6.0+1002+a7dba0ac.noarch.rpm>-rubygem-test-unit-3.3.7-141.module+el8.6.0+1002+a7dba0ac.noarch.rpmKvrubygem-typeprof-0.15.2-141.module+el8.6.0+1002+a7dba0ac.noarch.rpmUpruby-libs-3.0.4-141.module+el8.6.0+1002+a7dba0ac.x86_64.rpmA^ FBBBBBOBBBBBLBRJWBPBnBBBjBOenhancementcontainer-tools:3.0 bug fix update & https://bugzilla.redhat.com/show_bug.cgi?id=21205582120558* Module meta data is wronghttps://errata.rockylinux.org/RLEA-2022:6453RLEA-2022:6453RLEA-2022:6453 pWScockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm9containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmZYcrun-0.18-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpmL fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm\Qoci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm.0python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm88runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmV/toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm^/toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm2_udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpmpWScockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpm9containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmZYcrun-0.18-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpmL fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm\Qoci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm.0python3-criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm88runc-1.0.0-73.rc95.module+el8.7.0+1076+9b1c11c1.x86_64.rpm+=slirp4netns-1.1.8-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmV/toolbox-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm^/toolbox-tests-0.0.99.3-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm2_udica-0.2.4-1.module+el8.7.0+1076+9b1c11c1.noarch.rpmV_ kBBBBBBBBBBBBBuqBenhancementcontainer-tools:4.0 bug fix update/& https://bugzilla.redhat.com/show_bug.cgi?id=21205612120561* Module meta data is wronghttps://errata.rockylinux.org/RLEA-2022:6454RLEA-2022:6454RLEA-2022:6454 $zW -crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm*criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm!criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm"criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpmTXlibslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmUXlibslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm.python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm=python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm+Fslirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm2udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpm$zW -crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm*criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm!criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm"criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpmTXlibslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmUXlibslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm.python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm=python3-podman-4.0.0-1.module+el8.7.0+1077+0e4f03d4.noarch.rpm+Fslirp4netns-1.1.8-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm2udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpma` penhancementgnome-settings-daemon bug fix and enhancement updateU4 https://bugzilla.redhat.com/show_bug.cgi?id=21229642122964* Automatic logout function logs out of GDM session, causing GUI to fail.https://errata.rockylinux.org/RLEA-2022:6456RLEA-2022:6456RLEA-2022:6456 (gnome-settings-daemon-3.32.0-16.el8_6.1.x86_64.rpm(gnome-settings-daemon-3.32.0-16.el8_6.1.x86_64.rpmao WBBBBBBsecurityModerate: webkit2gtk3 security update uhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32893CVE-2022-32893CVE-2022-32893https://bugzilla.redhat.com/show_bug.cgi?id=21216452121645https://errata.rockylinux.org/RLSA-2022:6540RLSA-2022:6540RLSA-2022:6540 ywebkit2gtk3-2.36.7-1.el8_6.x86_64.rpmzwebkit2gtk3-devel-2.36.7-1.el8_6.x86_64.rpm{webkit2gtk3-jsc-2.36.7-1.el8_6.x86_64.rpm|webkit2gtk3-jsc-devel-2.36.7-1.el8_6.x86_64.rpmywebkit2gtk3-2.36.7-1.el8_6.x86_64.rpmzwebkit2gtk3-devel-2.36.7-1.el8_6.x86_64.rpm{webkit2gtk3-jsc-2.36.7-1.el8_6.x86_64.rpm|webkit2gtk3-jsc-devel-2.36.7-1.el8_6.x86_64.rpmap XBBBBBBBBBBBBBBB"securityModerate: php:7.4 security update~Vhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28948CVE-2020-28948CVE-2020-28948https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28949CVE-2020-28949CVE-2020-28949https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36193CVE-2020-36193CVE-2020-36193https://bugzilla.redhat.com/show_bug.cgi?id=19040011904001https://bugzilla.redhat.com/show_bug.cgi?id=19103231910323https://bugzilla.redhat.com/show_bug.cgi?id=19429611942961https://errata.rockylinux.org/RLSA-2022:6542RLSA-2022:6542RLSA-2022:6542 _c 0apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpmblibzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmclibzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmdlibzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmj php-pear-1.10.13-1.module+el8.7.0+1067+0a7071cc.noarch.rpmephp-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpmfphp-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpmtphp-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm;mphp-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpmgPphp-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpm_c 0apcu-panel-5.1.18-1.module+el8.6.0+789+2130c178.noarch.rpmblibzip-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmclibzip-devel-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmdlibzip-tools-1.6.1-1.module+el8.6.0+789+2130c178.x86_64.rpmj php-pear-1.10.13-1.module+el8.7.0+1067+0a7071cc.noarch.rpmephp-pecl-apcu-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpmfphp-pecl-apcu-devel-5.1.18-1.module+el8.6.0+789+2130c178.x86_64.rpmtphp-pecl-rrd-2.0.1-1.module+el8.4.0+414+2e7afcdd.x86_64.rpm;mphp-pecl-xdebug-2.9.5-1.module+el8.4.0+415+e936cba3.x86_64.rpmgPphp-pecl-zip-1.18.2-1.module+el8.6.0+789+2130c178.x86_64.rpmjq UBBB[securityImportant: squid:4 security updateT https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41318CVE-2022-41318CVE-2022-41318https://bugzilla.redhat.com/show_bug.cgi?id=21297712129771https://errata.rockylinux.org/RLSA-2022:6775RLSA-2022:6775RLSA-2022:6775 &SY3libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm4libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm&^squid-4.15-3.module+el8.6.0+1044+67ab5d0a.2.x86_64.rpm&SY3libecap-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm4libecap-devel-1.0.1-2.module+el8.4.0+404+316a0dc5.x86_64.rpm&^squid-4.15-3.module+el8.6.0+1044+67ab5d0a.2.x86_64.rpmnr _BBsecurityModerate: prometheus-jmx-exporter security updateaBhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25857CVE-2022-25857CVE-2022-25857https://bugzilla.redhat.com/show_bug.cgi?id=21267892126789https://errata.rockylinux.org/RLSA-2022:6820RLSA-2022:6820RLSA-2022:6820 f prometheus-jmx-exporter-0.12.0-8.el8.noarch.rpmg prometheus-jmx-exporter-openjdk11-0.12.0-8.el8.noarch.rpmh prometheus-jmx-exporter-openjdk17-0.12.0-8.el8.noarch.rpmi prometheus-jmx-exporter-openjdk8-0.12.0-8.el8.noarch.rpmf prometheus-jmx-exporter-0.12.0-8.el8.noarch.rpmg prometheus-jmx-exporter-openjdk11-0.12.0-8.el8.noarch.rpmh prometheus-jmx-exporter-openjdk17-0.12.0-8.el8.noarch.rpmi prometheus-jmx-exporter-openjdk8-0.12.0-8.el8.noarch.rpmns OBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security and bugfix update#Vhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41032CVE-2022-41032CVE-2022-41032https://bugzilla.redhat.com/show_bug.cgi?id=21326142132614https://errata.rockylinux.org/RLSA-2022:6911RLSA-2022:6911RLSA-2022:6911 Zaspnetcore-runtime-6.0-6.0.10-1.el8_6.x86_64.rpm[aspnetcore-targeting-pack-6.0-6.0.10-1.el8_6.x86_64.rpm\dotnet-apphost-pack-6.0-6.0.10-1.el8_6.x86_64.rpm]dotnet-hostfxr-6.0-6.0.10-1.el8_6.x86_64.rpm^dotnet-runtime-6.0-6.0.10-1.el8_6.x86_64.rpm_Hdotnet-sdk-6.0-6.0.110-1.el8_6.x86_64.rpm`dotnet-targeting-pack-6.0-6.0.10-1.el8_6.x86_64.rpmaHdotnet-templates-6.0-6.0.110-1.el8_6.x86_64.rpmZaspnetcore-runtime-6.0-6.0.10-1.el8_6.x86_64.rpm[aspnetcore-targeting-pack-6.0-6.0.10-1.el8_6.x86_64.rpm\dotnet-apphost-pack-6.0-6.0.10-1.el8_6.x86_64.rpm]dotnet-hostfxr-6.0-6.0.10-1.el8_6.x86_64.rpm^dotnet-runtime-6.0-6.0.10-1.el8_6.x86_64.rpm_Hdotnet-sdk-6.0-6.0.110-1.el8_6.x86_64.rpm`dotnet-targeting-pack-6.0-6.0.10-1.el8_6.x86_64.rpmaHdotnet-templates-6.0-6.0.110-1.el8_6.x86_64.rpmnt 0`BBBBBBBBBBBBBBsecurityModerate: .NET Core 3.1 security and bugfix updateyWhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41032CVE-2022-41032CVE-2022-41032https://bugzilla.redhat.com/show_bug.cgi?id=21326142132614https://errata.rockylinux.org/RLSA-2022:6912RLSA-2022:6912RLSA-2022:6912 ;aspnetcore-runtime-3.1-3.1.30-1.el8_6.x86_64.rpm<aspnetcore-targeting-pack-3.1-3.1.30-1.el8_6.x86_64.rpmTdotnet-apphost-pack-3.1-3.1.30-1.el8_6.x86_64.rpmUdotnet-hostfxr-3.1-3.1.30-1.el8_6.x86_64.rpmVdotnet-runtime-3.1-3.1.30-1.el8_6.x86_64.rpmWdotnet-sdk-3.1-3.1.424-1.el8_6.x86_64.rpmXdotnet-targeting-pack-3.1-3.1.30-1.el8_6.x86_64.rpmYdotnet-templates-3.1-3.1.424-1.el8_6.x86_64.rpm;aspnetcore-runtime-3.1-3.1.30-1.el8_6.x86_64.rpm<aspnetcore-targeting-pack-3.1-3.1.30-1.el8_6.x86_64.rpmTdotnet-apphost-pack-3.1-3.1.30-1.el8_6.x86_64.rpmUdotnet-hostfxr-3.1-3.1.30-1.el8_6.x86_64.rpmVdotnet-runtime-3.1-3.1.30-1.el8_6.x86_64.rpmWdotnet-sdk-3.1-3.1.424-1.el8_6.x86_64.rpmXdotnet-targeting-pack-3.1-3.1.30-1.el8_6.x86_64.rpmYdotnet-templates-3.1-3.1.424-1.el8_6.x86_64.rpmou :WDXBBBBBBBsecurityImportant: nodejs:16 security updatePIhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35255CVE-2022-35255CVE-2022-35255https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256CVE-2022-35256CVE-2022-35256https://bugzilla.redhat.com/show_bug.cgi?id=21305172130517https://bugzilla.redhat.com/show_bug.cgi?id=21305182130518https://errata.rockylinux.org/RLSA-2022:6964RLSA-2022:6964RLSA-2022:6964 /Rr/nodejs-16.17.1-1.module+el8.6.0+1046+80feca58.x86_64.rpmnodejs-devel-16.17.1-1.module+el8.6.0+1046+80feca58.x86_64.rpm6nodejs-docs-16.17.1-1.module+el8.6.0+1046+80feca58.noarch.rpmnodejs-full-i18n-16.17.1-1.module+el8.6.0+1046+80feca58.x86_64.rpmCNnodejs-nodemon-2.0.19-2.module+el8.6.0+1046+80feca58.noarch.rpm:nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm*npm-8.15.0-1.16.17.1.1.module+el8.6.0+1046+80feca58.x86_64.rpm/Rr/nodejs-16.17.1-1.module+el8.6.0+1046+80feca58.x86_64.rpmnodejs-devel-16.17.1-1.module+el8.6.0+1046+80feca58.x86_64.rpm6nodejs-docs-16.17.1-1.module+el8.6.0+1046+80feca58.noarch.rpmnodejs-full-i18n-16.17.1-1.module+el8.6.0+1046+80feca58.x86_64.rpmCNnodejs-nodemon-2.0.19-2.module+el8.6.0+1046+80feca58.noarch.rpm:nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm*npm-8.15.0-1.16.17.1.1.module+el8.6.0+1046+80feca58.x86_64.rpmpw ;CBBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security updateb https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619CVE-2022-21619CVE-2022-21619https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624CVE-2022-21624CVE-2022-21624https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626CVE-2022-21626CVE-2022-21626https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628CVE-2022-21628CVE-2022-21628https://bugzilla.redhat.com/show_bug.cgi?id=21337452133745https://bugzilla.redhat.com/show_bug.cgi?id=21337532133753https://bugzilla.redhat.com/show_bug.cgi?id=21337652133765https://bugzilla.redhat.com/show_bug.cgi?id=21337692133769https://errata.rockylinux.org/RLSA-2022:7006RLSA-2022:7006RLSA-2022:7006 -java-1.8.0-openjdk-1.8.0.352.b08-2.el8_7.x86_64.rpm.java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el8_7.x86_64.rpm/java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el8_7.x86_64.rpm0java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el8_7.x86_64.rpm1java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el8_7.x86_64.rpm8java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el8_7.noarch.rpm9java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el8_7.noarch.rpm2java-1.8.0-openjdk-src-1.8.0.352.b08-2.el8_7.x86_64.rpm-java-1.8.0-openjdk-1.8.0.352.b08-2.el8_7.x86_64.rpm.java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el8_7.x86_64.rpm/java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el8_7.x86_64.rpm0java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el8_7.x86_64.rpm1java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el8_7.x86_64.rpm8java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el8_7.noarch.rpm9java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el8_7.noarch.rpm2java-1.8.0-openjdk-src-1.8.0.352.b08-2.el8_7.x86_64.rpmpv |BBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix update{ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618CVE-2022-21618CVE-2022-21618https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619CVE-2022-21619CVE-2022-21619https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624CVE-2022-21624CVE-2022-21624https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626CVE-2022-21626CVE-2022-21626https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628CVE-2022-21628CVE-2022-21628https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399CVE-2022-39399CVE-2022-39399https://bugzilla.redhat.com/show_bug.cgi?id=21337452133745https://bugzilla.redhat.com/show_bug.cgi?id=21337532133753https://bugzilla.redhat.com/show_bug.cgi?id=21337652133765https://bugzilla.redhat.com/show_bug.cgi?id=21337692133769https://bugzilla.redhat.com/show_bug.cgi?id=21337762133776https://bugzilla.redhat.com/show_bug.cgi?id=21338172133817https://errata.rockylinux.org/RLSA-2022:7000RLSA-2022:7000RLSA-2022:7000 sKjava-17-openjdk-17.0.5.0.8-2.el8_6.x86_64.rpmtKjava-17-openjdk-demo-17.0.5.0.8-2.el8_6.x86_64.rpmuKjava-17-openjdk-devel-17.0.5.0.8-2.el8_6.x86_64.rpmvKjava-17-openjdk-headless-17.0.5.0.8-2.el8_6.x86_64.rpmwKjava-17-openjdk-javadoc-17.0.5.0.8-2.el8_6.x86_64.rpmxKjava-17-openjdk-javadoc-zip-17.0.5.0.8-2.el8_6.x86_64.rpmyKjava-17-openjdk-jmods-17.0.5.0.8-2.el8_6.x86_64.rpmzKjava-17-openjdk-src-17.0.5.0.8-2.el8_6.x86_64.rpm{Kjava-17-openjdk-static-libs-17.0.5.0.8-2.el8_6.x86_64.rpm sKjava-17-openjdk-17.0.5.0.8-2.el8_6.x86_64.rpmtKjava-17-openjdk-demo-17.0.5.0.8-2.el8_6.x86_64.rpmuKjava-17-openjdk-devel-17.0.5.0.8-2.el8_6.x86_64.rpmvKjava-17-openjdk-headless-17.0.5.0.8-2.el8_6.x86_64.rpmwKjava-17-openjdk-javadoc-17.0.5.0.8-2.el8_6.x86_64.rpmxKjava-17-openjdk-javadoc-zip-17.0.5.0.8-2.el8_6.x86_64.rpmyKjava-17-openjdk-jmods-17.0.5.0.8-2.el8_6.x86_64.rpmzKjava-17-openjdk-src-17.0.5.0.8-2.el8_6.x86_64.rpm{Kjava-17-openjdk-static-libs-17.0.5.0.8-2.el8_6.x86_64.rpmqx !OBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618CVE-2022-21618CVE-2022-21618https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619CVE-2022-21619CVE-2022-21619https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624CVE-2022-21624CVE-2022-21624https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626CVE-2022-21626CVE-2022-21626https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628CVE-2022-21628CVE-2022-21628https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399CVE-2022-39399CVE-2022-39399https://bugzilla.redhat.com/show_bug.cgi?id=21318632131863* Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [rhel-8]https://bugzilla.redhat.com/show_bug.cgi?id=21337452133745https://bugzilla.redhat.com/show_bug.cgi?id=21337532133753https://bugzilla.redhat.com/show_bug.cgi?id=21337652133765https://bugzilla.redhat.com/show_bug.cgi?id=21337692133769https://bugzilla.redhat.com/show_bug.cgi?id=21337762133776https://bugzilla.redhat.com/show_bug.cgi?id=21338172133817https://errata.rockylinux.org/RLSA-2022:7012RLSA-2022:7012RLSA-2022:7012 3Cjava-11-openjdk-11.0.17.0.8-2.el8_6.x86_64.rpm4Cjava-11-openjdk-demo-11.0.17.0.8-2.el8_6.x86_64.rpm5Cjava-11-openjdk-devel-11.0.17.0.8-2.el8_6.x86_64.rpm6Cjava-11-openjdk-headless-11.0.17.0.8-2.el8_6.x86_64.rpm7Cjava-11-openjdk-javadoc-11.0.17.0.8-2.el8_6.x86_64.rpm8Cjava-11-openjdk-javadoc-zip-11.0.17.0.8-2.el8_6.x86_64.rpm9Cjava-11-openjdk-jmods-11.0.17.0.8-2.el8_6.x86_64.rpm:Cjava-11-openjdk-src-11.0.17.0.8-2.el8_6.x86_64.rpm;Cjava-11-openjdk-static-libs-11.0.17.0.8-2.el8_6.x86_64.rpm 3Cjava-11-openjdk-11.0.17.0.8-2.el8_6.x86_64.rpm4Cjava-11-openjdk-demo-11.0.17.0.8-2.el8_6.x86_64.rpm5Cjava-11-openjdk-devel-11.0.17.0.8-2.el8_6.x86_64.rpm6Cjava-11-openjdk-headless-11.0.17.0.8-2.el8_6.x86_64.rpm7Cjava-11-openjdk-javadoc-11.0.17.0.8-2.el8_6.x86_64.rpm8Cjava-11-openjdk-javadoc-zip-11.0.17.0.8-2.el8_6.x86_64.rpm9Cjava-11-openjdk-jmods-11.0.17.0.8-2.el8_6.x86_64.rpm:Cjava-11-openjdk-src-11.0.17.0.8-2.el8_6.x86_64.rpm;Cjava-11-openjdk-static-libs-11.0.17.0.8-2.el8_6.x86_64.rpmq| 2|BBBdBBBBBBBBBBBBBBsecurityModerate: mysql:8.0 security, bug fix, and enhancement updateohttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2478CVE-2021-2478CVE-2021-2478https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2479CVE-2021-2479CVE-2021-2479https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2481CVE-2021-2481CVE-2021-2481https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35546CVE-2021-35546CVE-2021-35546https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35575CVE-2021-35575CVE-2021-35575https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35577CVE-2021-35577CVE-2021-35577https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35591CVE-2021-35591CVE-2021-35591https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35596CVE-2021-35596CVE-2021-35596https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35597CVE-2021-35597CVE-2021-35597https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35602CVE-2021-35602CVE-2021-35602https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604CVE-2021-35604CVE-2021-35604https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35607CVE-2021-35607CVE-2021-35607https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35608CVE-2021-35608CVE-2021-35608https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35610CVE-2021-35610CVE-2021-35610https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35612CVE-2021-35612CVE-2021-35612https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35622CVE-2021-35622CVE-2021-35622https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35623CVE-2021-35623CVE-2021-35623https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35624CVE-2021-35624CVE-2021-35624https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35625CVE-2021-35625CVE-2021-35625https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35626CVE-2021-35626CVE-2021-35626https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35627CVE-2021-35627CVE-2021-35627https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35628CVE-2021-35628CVE-2021-35628https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35630CVE-2021-35630CVE-2021-35630https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35631CVE-2021-35631CVE-2021-35631https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35632CVE-2021-35632CVE-2021-35632https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35633CVE-2021-35633CVE-2021-35633https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35634CVE-2021-35634CVE-2021-35634https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35635CVE-2021-35635CVE-2021-35635https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35636CVE-2021-35636CVE-2021-35636https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35637CVE-2021-35637CVE-2021-35637https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35638CVE-2021-35638CVE-2021-35638https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35639CVE-2021-35639CVE-2021-35639https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35640CVE-2021-35640CVE-2021-35640https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35641CVE-2021-35641CVE-2021-35641https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35642CVE-2021-35642CVE-2021-35642https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35643CVE-2021-35643CVE-2021-35643https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35644CVE-2021-35644CVE-2021-35644https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35645CVE-2021-35645CVE-2021-35645https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35646CVE-2021-35646CVE-2021-35646https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35647CVE-2021-35647CVE-2021-35647https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35648CVE-2021-35648CVE-2021-35648https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21245CVE-2022-21245CVE-2022-21245https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21249CVE-2022-21249CVE-2022-21249https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21253CVE-2022-21253CVE-2022-21253https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21254CVE-2022-21254CVE-2022-21254https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21256CVE-2022-21256CVE-2022-21256https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21264CVE-2022-21264CVE-2022-21264https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21265CVE-2022-21265CVE-2022-21265https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21270CVE-2022-21270CVE-2022-21270https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21278CVE-2022-21278CVE-2022-21278https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21297CVE-2022-21297CVE-2022-21297https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21301CVE-2022-21301CVE-2022-21301https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21302CVE-2022-21302CVE-2022-21302https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21303CVE-2022-21303CVE-2022-21303https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21304CVE-2022-21304CVE-2022-21304https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21339CVE-2022-21339CVE-2022-21339https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21342CVE-2022-21342CVE-2022-21342https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21344CVE-2022-21344CVE-2022-21344https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21348CVE-2022-21348CVE-2022-21348https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21351CVE-2022-21351CVE-2022-21351https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21352CVE-2022-21352CVE-2022-21352https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21358CVE-2022-21358CVE-2022-21358https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21362CVE-2022-21362CVE-2022-21362https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21367CVE-2022-21367CVE-2022-21367https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21368CVE-2022-21368CVE-2022-21368https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21370CVE-2022-21370CVE-2022-21370https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21372CVE-2022-21372CVE-2022-21372https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21374CVE-2022-21374CVE-2022-21374https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21378CVE-2022-21378CVE-2022-21378https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21379CVE-2022-21379CVE-2022-21379https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21412CVE-2022-21412CVE-2022-21412https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21413CVE-2022-21413CVE-2022-21413https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21414CVE-2022-21414CVE-2022-21414https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21415CVE-2022-21415CVE-2022-21415https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21417CVE-2022-21417CVE-2022-21417https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21418CVE-2022-21418CVE-2022-21418https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21423CVE-2022-21423CVE-2022-21423https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21425CVE-2022-21425CVE-2022-21425https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21427CVE-2022-21427CVE-2022-21427https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21435CVE-2022-21435CVE-2022-21435https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21436CVE-2022-21436CVE-2022-21436https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21437CVE-2022-21437CVE-2022-21437https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21438CVE-2022-21438CVE-2022-21438https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21440CVE-2022-21440CVE-2022-21440https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21444CVE-2022-21444CVE-2022-21444https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21451CVE-2022-21451CVE-2022-21451https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21452CVE-2022-21452CVE-2022-21452https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21454CVE-2022-21454CVE-2022-21454https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21455CVE-2022-21455CVE-2022-21455https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21457CVE-2022-21457CVE-2022-21457https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21459CVE-2022-21459CVE-2022-21459https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21460CVE-2022-21460CVE-2022-21460https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21462CVE-2022-21462CVE-2022-21462https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21478CVE-2022-21478CVE-2022-21478https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21479CVE-2022-21479CVE-2022-21479https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21509CVE-2022-21509CVE-2022-21509https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21515CVE-2022-21515CVE-2022-21515https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21517CVE-2022-21517CVE-2022-21517https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21522CVE-2022-21522CVE-2022-21522https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21525CVE-2022-21525CVE-2022-21525https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21526CVE-2022-21526CVE-2022-21526https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21527CVE-2022-21527CVE-2022-21527https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21528CVE-2022-21528CVE-2022-21528https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21529CVE-2022-21529CVE-2022-21529https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21530CVE-2022-21530CVE-2022-21530https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21531CVE-2022-21531CVE-2022-21531https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21534CVE-2022-21534CVE-2022-21534https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21537CVE-2022-21537CVE-2022-21537https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21538CVE-2022-21538CVE-2022-21538https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21539CVE-2022-21539CVE-2022-21539https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21547CVE-2022-21547CVE-2022-21547https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21553CVE-2022-21553CVE-2022-21553https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21556CVE-2022-21556CVE-2022-21556https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21569CVE-2022-21569CVE-2022-21569https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21592CVE-2022-21592CVE-2022-21592https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21595CVE-2022-21595CVE-2022-21595https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21600CVE-2022-21600CVE-2022-21600https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21605CVE-2022-21605CVE-2022-21605https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21607CVE-2022-21607CVE-2022-21607https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21635CVE-2022-21635CVE-2022-21635https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21638CVE-2022-21638CVE-2022-21638https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21641CVE-2022-21641CVE-2022-21641https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21866CVE-2023-21866CVE-2023-21866https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21872CVE-2023-21872CVE-2023-21872https://bugzilla.redhat.com/show_bug.cgi?id=20160892016089https://bugzilla.redhat.com/show_bug.cgi?id=20160902016090https://bugzilla.redhat.com/show_bug.cgi?id=20160912016091https://bugzilla.redhat.com/show_bug.cgi?id=20160932016093https://bugzilla.redhat.com/show_bug.cgi?id=20160942016094https://bugzilla.redhat.com/show_bug.cgi?id=20160952016095https://bugzilla.redhat.com/show_bug.cgi?id=20160972016097https://bugzilla.redhat.com/show_bug.cgi?id=20160982016098https://bugzilla.redhat.com/show_bug.cgi?id=20160992016099https://bugzilla.redhat.com/show_bug.cgi?id=20161002016100https://bugzilla.redhat.com/show_bug.cgi?id=20161012016101https://bugzilla.redhat.com/show_bug.cgi?id=20161042016104https://bugzilla.redhat.com/show_bug.cgi?id=20161052016105https://bugzilla.redhat.com/show_bug.cgi?id=20161062016106https://bugzilla.redhat.com/show_bug.cgi?id=20161072016107https://bugzilla.redhat.com/show_bug.cgi?id=20161082016108https://bugzilla.redhat.com/show_bug.cgi?id=20161092016109https://bugzilla.redhat.com/show_bug.cgi?id=20161102016110https://bugzilla.redhat.com/show_bug.cgi?id=20161112016111https://bugzilla.redhat.com/show_bug.cgi?id=20161122016112https://bugzilla.redhat.com/show_bug.cgi?id=20161132016113https://bugzilla.redhat.com/show_bug.cgi?id=20161142016114https://bugzilla.redhat.com/show_bug.cgi?id=20161172016117https://bugzilla.redhat.com/show_bug.cgi?id=20161182016118https://bugzilla.redhat.com/show_bug.cgi?id=20161192016119https://bugzilla.redhat.com/show_bug.cgi?id=20161202016120https://bugzilla.redhat.com/show_bug.cgi?id=20161212016121https://bugzilla.redhat.com/show_bug.cgi?id=20161222016122https://bugzilla.redhat.com/show_bug.cgi?id=20161242016124https://bugzilla.redhat.com/show_bug.cgi?id=20161262016126https://bugzilla.redhat.com/show_bug.cgi?id=20161272016127https://bugzilla.redhat.com/show_bug.cgi?id=20161282016128https://bugzilla.redhat.com/show_bug.cgi?id=20161292016129https://bugzilla.redhat.com/show_bug.cgi?id=20161302016130https://bugzilla.redhat.com/show_bug.cgi?id=20161312016131https://bugzilla.redhat.com/show_bug.cgi?id=20161322016132https://bugzilla.redhat.com/show_bug.cgi?id=20161332016133https://bugzilla.redhat.com/show_bug.cgi?id=20161342016134https://bugzilla.redhat.com/show_bug.cgi?id=20161352016135https://bugzilla.redhat.com/show_bug.cgi?id=20161372016137https://bugzilla.redhat.com/show_bug.cgi?id=20161382016138https://bugzilla.redhat.com/show_bug.cgi?id=20436202043620https://bugzilla.redhat.com/show_bug.cgi?id=20436212043621https://bugzilla.redhat.com/show_bug.cgi?id=20436222043622https://bugzilla.redhat.com/show_bug.cgi?id=20436232043623https://bugzilla.redhat.com/show_bug.cgi?id=20436242043624https://bugzilla.redhat.com/show_bug.cgi?id=20436252043625https://bugzilla.redhat.com/show_bug.cgi?id=20436262043626https://bugzilla.redhat.com/show_bug.cgi?id=20436272043627https://bugzilla.redhat.com/show_bug.cgi?id=20436282043628https://bugzilla.redhat.com/show_bug.cgi?id=20436292043629https://bugzilla.redhat.com/show_bug.cgi?id=20436302043630https://bugzilla.redhat.com/show_bug.cgi?id=20436312043631https://bugzilla.redhat.com/show_bug.cgi?id=20436322043632https://bugzilla.redhat.com/show_bug.cgi?id=20436332043633https://bugzilla.redhat.com/show_bug.cgi?id=20436342043634https://bugzilla.redhat.com/show_bug.cgi?id=20436352043635https://bugzilla.redhat.com/show_bug.cgi?id=20436362043636https://bugzilla.redhat.com/show_bug.cgi?id=20436372043637https://bugzilla.redhat.com/show_bug.cgi?id=20436382043638https://bugzilla.redhat.com/show_bug.cgi?id=20436392043639https://bugzilla.redhat.com/show_bug.cgi?id=20436402043640https://bugzilla.redhat.com/show_bug.cgi?id=20436412043641https://bugzilla.redhat.com/show_bug.cgi?id=20436422043642https://bugzilla.redhat.com/show_bug.cgi?id=20436432043643https://bugzilla.redhat.com/show_bug.cgi?id=20436442043644https://bugzilla.redhat.com/show_bug.cgi?id=20436452043645https://bugzilla.redhat.com/show_bug.cgi?id=20436462043646https://bugzilla.redhat.com/show_bug.cgi?id=20436472043647https://bugzilla.redhat.com/show_bug.cgi?id=20436482043648https://bugzilla.redhat.com/show_bug.cgi?id=20826362082636https://bugzilla.redhat.com/show_bug.cgi?id=20826372082637https://bugzilla.redhat.com/show_bug.cgi?id=20826382082638https://bugzilla.redhat.com/show_bug.cgi?id=20826392082639https://bugzilla.redhat.com/show_bug.cgi?id=20826402082640https://bugzilla.redhat.com/show_bug.cgi?id=20826412082641https://bugzilla.redhat.com/show_bug.cgi?id=20826422082642https://bugzilla.redhat.com/show_bug.cgi?id=20826432082643https://bugzilla.redhat.com/show_bug.cgi?id=20826442082644https://bugzilla.redhat.com/show_bug.cgi?id=20826452082645https://bugzilla.redhat.com/show_bug.cgi?id=20826462082646https://bugzilla.redhat.com/show_bug.cgi?id=20826472082647https://bugzilla.redhat.com/show_bug.cgi?id=20826482082648https://bugzilla.redhat.com/show_bug.cgi?id=20826492082649https://bugzilla.redhat.com/show_bug.cgi?id=20826502082650https://bugzilla.redhat.com/show_bug.cgi?id=20826512082651https://bugzilla.redhat.com/show_bug.cgi?id=20826522082652https://bugzilla.redhat.com/show_bug.cgi?id=20826532082653https://bugzilla.redhat.com/show_bug.cgi?id=20826542082654https://bugzilla.redhat.com/show_bug.cgi?id=20826552082655https://bugzilla.redhat.com/show_bug.cgi?id=20826562082656https://bugzilla.redhat.com/show_bug.cgi?id=20826572082657https://bugzilla.redhat.com/show_bug.cgi?id=20826582082658https://bugzilla.redhat.com/show_bug.cgi?id=20826592082659https://bugzilla.redhat.com/show_bug.cgi?id=21109402110940* Rebuild mecab due to change in the suffix (from .el8 to .el8.0.0) [rhel-8]https://bugzilla.redhat.com/show_bug.cgi?id=21152832115283https://bugzilla.redhat.com/show_bug.cgi?id=21152842115284https://bugzilla.redhat.com/show_bug.cgi?id=21152852115285https://bugzilla.redhat.com/show_bug.cgi?id=21152862115286https://bugzilla.redhat.com/show_bug.cgi?id=21152872115287https://bugzilla.redhat.com/show_bug.cgi?id=21152882115288https://bugzilla.redhat.com/show_bug.cgi?id=21152892115289https://bugzilla.redhat.com/show_bug.cgi?id=21152902115290https://bugzilla.redhat.com/show_bug.cgi?id=21152912115291https://bugzilla.redhat.com/show_bug.cgi?id=21152922115292https://bugzilla.redhat.com/show_bug.cgi?id=21152932115293https://bugzilla.redhat.com/show_bug.cgi?id=21152942115294https://bugzilla.redhat.com/show_bug.cgi?id=21152952115295https://bugzilla.redhat.com/show_bug.cgi?id=21152962115296https://bugzilla.redhat.com/show_bug.cgi?id=21152972115297https://bugzilla.redhat.com/show_bug.cgi?id=21152982115298https://bugzilla.redhat.com/show_bug.cgi?id=21152992115299https://bugzilla.redhat.com/show_bug.cgi?id=21153012115301https://bugzilla.redhat.com/show_bug.cgi?id=21226042122604https://errata.rockylinux.org/RLSA-2022:7119RLSA-2022:7119RLSA-2022:7119 0`f omecab-0.996-2.module+el8.6.0+1057+4d6a1721.x86_64.rpm0Nmysql-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm?mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm@mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpmFNmysql-common-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpmGNmysql-devel-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpmHNmysql-errmsg-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpmINmysql-libs-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpmJNmysql-server-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpmKNmysql-test-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm0`f omecab-0.996-2.module+el8.6.0+1057+4d6a1721.x86_64.rpm0Nmysql-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpm?mecab-ipadic-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpm@mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.3.0+242+87d3366a.x86_64.rpmFNmysql-common-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpmGNmysql-devel-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpmHNmysql-errmsg-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpmINmysql-libs-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpmJNmysql-server-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpmKNmysql-test-8.0.30-1.module+el8.6.0+1057+4d6a1721.x86_64.rpmsS 3ZBBBBBBBBBBBUBwBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbugfixvirt:rhel and virt-devel:rhel bug fix update$r https://bugzilla.redhat.com/show_bug.cgi?id=21217832121783* scsi-generic: Fix emulated block limits VPD pagehttps://bugzilla.redhat.com/show_bug.cgi?id=21321772132177* libvirt kills virtual machine on restart when 2M and 1G hugepages are mountedhttps://errata.rockylinux.org/RLBA-2022:7122RLBA-2022:7122RLBA-2022:7122 tspA&+=hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm,=hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm=libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpmblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm>?libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm?libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm??libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmB?nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmCnbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmnbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpmDnbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmEnbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmFnbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmGnbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmHnbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmInbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmJnbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmKnbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmLnbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmMnbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmNnbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmOnbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmPnbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmQnbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmRnbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmSnbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmTnbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmd=perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmcperl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpme=python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmf?python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmq=ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmtspA&+=hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm,=hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm=libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpmblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm>?libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm?libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm??libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmB?nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmCnbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmnbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpmDnbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmEnbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmFnbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmGnbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmHnbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmInbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmJnbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmKnbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmLnbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmMnbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmNnbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmOnbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmPnbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmQnbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmRnbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmSnbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmTnbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmd=perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmcperl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpme=python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmf?python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmq=ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmT 54bugfixvirt-who bug fix and enhancement update, https://bugzilla.redhat.com/show_bug.cgi?id=21248132124813* virt-who reporting always the same VM's when using with Nutanix Prism Centralhttps://errata.rockylinux.org/RLBA-2022:7125RLBA-2022:7125RLBA-2022:7125 uvirt-who-1.30.12-2.el8_6.noarch.rpmuvirt-who-1.30.12-2.el8_6.noarch.rpmU 8vbugfixstalld bug fix and enhancement updateB2 https://bugzilla.redhat.com/show_bug.cgi?id=21264952126495* Stalld is running in unconfined_service_t typehttps://errata.rockylinux.org/RLBA-2022:7126RLBA-2022:7126RLBA-2022:7126 Rstalld-1.17-3.el8_6.x86_64.rpmRstalld-1.17-3.el8_6.x86_64.rpmV 9kBBBBBBBBBBBBBxBBoBBBBBBBBB`Bbugfixcontainer-tools:rhel8 bug fix and enhancement updatet https://bugzilla.redhat.com/show_bug.cgi?id=21302372130237* containers config.json gets empty after sudden power losshttps://bugzilla.redhat.com/show_bug.cgi?id=21309122130912* Podman support to perform custom actions on unhealthy containershttps://bugzilla.redhat.com/show_bug.cgi?id=21323612132361* [RFE] python-podman: Podman support to perform custom actions on unhealthy containershttps://bugzilla.redhat.com/show_bug.cgi?id=21324132132413* PANIC podman API service endpoint handler panichttps://bugzilla.redhat.com/show_bug.cgi?id=21329932132993* Podman volume plugin timeout should be configurablehttps://bugzilla.redhat.com/show_bug.cgi?id=21333912133391* Podman container got global IPv6 address unexpectedly even when macvlan network is created for pure IPv4 networkhttps://errata.rockylinux.org/RLBA-2022:7127RLBA-2022:7127RLBA-2022:7127 v}W9Scontainernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpmcontainer-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm-crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm*criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm!criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm"criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpmZPcrun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmLVfuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmTXlibslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmUXlibslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm\Coci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm.python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm+Hslirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpmV.toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm^.toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm2;udica-0.2.6-4.module+el8.7.0+1122+04a7498b.noarch.rpmv}W9Scontainernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpmcontainer-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm-crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm*criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm!criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm"criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpmZPcrun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmLVfuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmTXlibslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmUXlibslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm\Coci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm.python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm+Hslirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpmV.toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm^.toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm2;udica-0.2.6-4.module+el8.7.0+1122+04a7498b.noarch.rpm(} gBzBaBxBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: postgresql:12 security update https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625CVE-2022-2625CVE-2022-2625https://bugzilla.redhat.com/show_bug.cgi?id=21138252113825https://errata.rockylinux.org/RLSA-2022:7128RLSA-2022:7128RLSA-2022:7128 }{8Gpgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm:pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm% postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpmupostgresql-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm=upostgresql-contrib-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm>upostgresql-docs-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm?upostgresql-plperl-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm@upostgresql-plpython3-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpmAupostgresql-pltcl-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpmBupostgresql-server-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpmCupostgresql-server-devel-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpmDupostgresql-static-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpmEupostgresql-test-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm upostgresql-test-rpm-macros-12.12-1.module+el8.6.0+1049+f8fc4c36.noarch.rpmupostgresql-upgrade-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpmupostgresql-upgrade-devel-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm}{8Gpgaudit-1.4.0-5.module+el8.5.0+686+20453ecc.x86_64.rpm:pg_repack-1.4.6-3.module+el8.5.0+684+c3892ef9.x86_64.rpm% postgres-decoderbufs-0.10.0-2.module+el8.5.0+684+c3892ef9.x86_64.rpmupostgresql-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm=upostgresql-contrib-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm>upostgresql-docs-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm?upostgresql-plperl-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm@upostgresql-plpython3-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpmAupostgresql-pltcl-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpmBupostgresql-server-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpmCupostgresql-server-devel-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpmDupostgresql-static-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpmEupostgresql-test-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm upostgresql-test-rpm-macros-12.12-1.module+el8.6.0+1049+f8fc4c36.noarch.rpmupostgresql-upgrade-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpmupostgresql-upgrade-devel-12.12-1.module+el8.6.0+1049+f8fc4c36.x86_64.rpm-~ TsecurityModerate: git-lfs security and bug fix update+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28851CVE-2020-28851CVE-2020-28851https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28852CVE-2020-28852CVE-2020-28852https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1705CVE-2022-1705CVE-2022-1705https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27664CVE-2022-27664CVE-2022-27664https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30630CVE-2022-30630CVE-2022-30630https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30632CVE-2022-30632CVE-2022-30632https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30635CVE-2022-30635CVE-2022-30635https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32148CVE-2022-32148CVE-2022-32148https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32189CVE-2022-32189CVE-2022-32189https://bugzilla.redhat.com/show_bug.cgi?id=19133331913333https://bugzilla.redhat.com/show_bug.cgi?id=19133381913338https://bugzilla.redhat.com/show_bug.cgi?id=21073712107371https://bugzilla.redhat.com/show_bug.cgi?id=21073742107374https://bugzilla.redhat.com/show_bug.cgi?id=21073832107383https://bugzilla.redhat.com/show_bug.cgi?id=21073862107386https://bugzilla.redhat.com/show_bug.cgi?id=21073882107388https://bugzilla.redhat.com/show_bug.cgi?id=21138142113814https://bugzilla.redhat.com/show_bug.cgi?id=21246692124669https://errata.rockylinux.org/RLSA-2022:7129RLSA-2022:7129RLSA-2022:7129  Ggit-lfs-2.13.3-3.el8_6.x86_64.rpm Ggit-lfs-2.13.3-3.el8_6.x86_64.rpm-W vBEBTNBBBBBaBHbugfixidm:DL1 bug fix and enhancement update9 https://bugzilla.redhat.com/show_bug.cgi?id=21213242121324* Regression: cn=views,cn=compat broken with slapi-nis-0.56.5-3.el7_9.x86_64https://bugzilla.redhat.com/show_bug.cgi?id=21330362133036* named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind-dyndb-ldap]https://bugzilla.redhat.com/show_bug.cgi?id=21330512133051* Attempt to log in as "root" user with admin's password in Web UI does not properly failhttps://errata.rockylinux.org/RLBA-2022:7132RLBA-2022:7132RLBA-2022:7132 2/1S Abbind-dyndb-ldap-11.6-4.module+el8.7.0+1075+05db0c1d.x86_64.rpm9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm7opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm slapi-nis-0.60.0-1.module+el8.7.0+1075+05db0c1d.x86_64.rpm9softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm:softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm2/1S Abbind-dyndb-ldap-11.6-4.module+el8.7.0+1075+05db0c1d.x86_64.rpm9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm7opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm slapi-nis-0.60.0-1.module+el8.7.0+1075+05db0c1d.x86_64.rpm9softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm:softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm:X kBBBBBBBBBBBBBxBBoBBBBBBBBB`Bbugfixcontainer-tools:rhel8 bug fix and enhancement updateJ  https://bugzilla.redhat.com/show_bug.cgi?id=21373452137345* Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission deniedhttps://errata.rockylinux.org/RLBA-2022:7240RLBA-2022:7240RLBA-2022:7240 v}W9Scontainernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpmcontainer-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm-crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm*criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm!criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm"criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpmZPcrun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmLVfuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmTXlibslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmUXlibslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm\Coci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm.python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm+Hslirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpmV.toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm^.toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm2;udica-0.2.6-4.module+el8.7.0+1122+04a7498b.noarch.rpmv}W9Scontainernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpmcontainer-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm-crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm*criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm!criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm"criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpmZPcrun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmLVfuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmTXlibslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmUXlibslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm\Coci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm.python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm+Hslirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpmV.toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm^.toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm2;udica-0.2.6-4.module+el8.7.0+1122+04a7498b.noarch.rpmD\ Ybugfixjigawatts bug fix and enhancement updateS https://errata.rockylinux.org/RLBA-2022:7455RLBA-2022:7455RLBA-2022:7455 K#jigawatts-1.21.0.0.0-3.el8.x86_64.rpmK#jigawatts-1.21.0.0.0-3.el8.x86_64.rpmE] \BBbugfixansible-core bug fix and enhancement updateR^ https://bugzilla.redhat.com/show_bug.cgi?id=20615122061512https://bugzilla.redhat.com/show_bug.cgi?id=20638802063880https://bugzilla.redhat.com/show_bug.cgi?id=20741912074191https://bugzilla.redhat.com/show_bug.cgi?id=20833382083338https://bugzilla.redhat.com/show_bug.cgi?id=20899142089914https://bugzilla.redhat.com/show_bug.cgi?id=20945492094549https://bugzilla.redhat.com/show_bug.cgi?id=20993232099323https://bugzilla.redhat.com/show_bug.cgi?id=21036992103699https://bugzilla.redhat.com/show_bug.cgi?id=21091922109192https://bugzilla.redhat.com/show_bug.cgi?id=21184752118475https://errata.rockylinux.org/RLBA-2022:7456RLBA-2022:7456RLBA-2022:7456 mqansible-core-2.13.3-1.el8.x86_64.rpmnqansible-test-2.13.3-1.el8.x86_64.rpmmqansible-core-2.13.3-1.el8.x86_64.rpmnqansible-test-2.13.3-1.el8.x86_64.rpmE !kBBBBBBBBBBBBBxBBnBBBBBBBBBB`BVBBB$securityModerate: container-tools:rhel8 security, bug fix, and enhancement update0>;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36221CVE-2021-36221CVE-2021-36221https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41190CVE-2021-41190CVE-2021-41190https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1708CVE-2022-1708CVE-2022-1708https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27191CVE-2022-27191CVE-2022-27191https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29162CVE-2022-29162CVE-2022-29162https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2990CVE-2022-2990CVE-2022-2990https://bugzilla.redhat.com/show_bug.cgi?id=18205511820551https://bugzilla.redhat.com/show_bug.cgi?id=19417271941727https://bugzilla.redhat.com/show_bug.cgi?id=19459291945929https://bugzilla.redhat.com/show_bug.cgi?id=19744231974423https://bugzilla.redhat.com/show_bug.cgi?id=19956561995656https://bugzilla.redhat.com/show_bug.cgi?id=19960501996050https://bugzilla.redhat.com/show_bug.cgi?id=20058662005866https://bugzilla.redhat.com/show_bug.cgi?id=20092642009264https://bugzilla.redhat.com/show_bug.cgi?id=20093462009346https://bugzilla.redhat.com/show_bug.cgi?id=20249382024938https://bugzilla.redhat.com/show_bug.cgi?id=20276622027662https://bugzilla.redhat.com/show_bug.cgi?id=20284082028408https://bugzilla.redhat.com/show_bug.cgi?id=20301952030195https://bugzilla.redhat.com/show_bug.cgi?id=20390452039045https://bugzilla.redhat.com/show_bug.cgi?id=20526972052697https://bugzilla.redhat.com/show_bug.cgi?id=20539902053990https://bugzilla.redhat.com/show_bug.cgi?id=20553132055313https://bugzilla.redhat.com/show_bug.cgi?id=20596662059666https://bugzilla.redhat.com/show_bug.cgi?id=20626972062697https://bugzilla.redhat.com/show_bug.cgi?id=20647022064702https://bugzilla.redhat.com/show_bug.cgi?id=20661452066145https://bugzilla.redhat.com/show_bug.cgi?id=20680062068006https://bugzilla.redhat.com/show_bug.cgi?id=20724522072452https://bugzilla.redhat.com/show_bug.cgi?id=20739582073958https://bugzilla.redhat.com/show_bug.cgi?id=20789252078925https://bugzilla.redhat.com/show_bug.cgi?id=20797592079759https://bugzilla.redhat.com/show_bug.cgi?id=20797612079761https://bugzilla.redhat.com/show_bug.cgi?id=20818362081836https://bugzilla.redhat.com/show_bug.cgi?id=20835702083570https://bugzilla.redhat.com/show_bug.cgi?id=20839972083997https://bugzilla.redhat.com/show_bug.cgi?id=20853612085361https://bugzilla.redhat.com/show_bug.cgi?id=20863982086398https://bugzilla.redhat.com/show_bug.cgi?id=20867572086757https://bugzilla.redhat.com/show_bug.cgi?id=20906092090609https://bugzilla.redhat.com/show_bug.cgi?id=20909202090920https://bugzilla.redhat.com/show_bug.cgi?id=20930792093079https://bugzilla.redhat.com/show_bug.cgi?id=20946102094610https://bugzilla.redhat.com/show_bug.cgi?id=20948752094875https://bugzilla.redhat.com/show_bug.cgi?id=20950972095097https://bugzilla.redhat.com/show_bug.cgi?id=20962642096264https://bugzilla.redhat.com/show_bug.cgi?id=20978652097865https://bugzilla.redhat.com/show_bug.cgi?id=21007402100740https://bugzilla.redhat.com/show_bug.cgi?id=21021402102140https://bugzilla.redhat.com/show_bug.cgi?id=21023612102361https://bugzilla.redhat.com/show_bug.cgi?id=21023812102381https://bugzilla.redhat.com/show_bug.cgi?id=21139412113941https://bugzilla.redhat.com/show_bug.cgi?id=21176992117699https://bugzilla.redhat.com/show_bug.cgi?id=21179282117928https://bugzilla.redhat.com/show_bug.cgi?id=21182312118231https://bugzilla.redhat.com/show_bug.cgi?id=21190722119072https://bugzilla.redhat.com/show_bug.cgi?id=21206512120651https://bugzilla.redhat.com/show_bug.cgi?id=21214532121453https://errata.rockylinux.org/RLSA-2022:7457RLSA-2022:7457RLSA-2022:7457 v}WSecockpit-podman-53-1.module+el8.7.0+1078+e72fcd4f.noarch.rpmoconmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm9Scontainernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpmcontainer-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm-crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm*criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm!criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm"criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpmZPcrun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmLVfuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmTXlibslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmUXlibslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm\Coci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm.python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm8grunc-1.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm+Hslirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpmV.toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm^.toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm2udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpmv}WSecockpit-podman-53-1.module+el8.7.0+1078+e72fcd4f.noarch.rpmoconmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm9Scontainernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpmcontainer-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm-crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm*criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm!criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm"criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpmZPcrun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmLVfuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmTXlibslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmUXlibslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm\Coci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm.python3-criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm8grunc-1.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm+Hslirp4netns-1.2.0-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpmV.toolbox-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm^.toolbox-tests-0.0.99.3-0.6.module+el8.7.0+1078+e72fcd4f.x86_64.rpm2udica-0.2.6-3.module+el8.7.0+1077+0e4f03d4.noarch.rpmO $bsecurityModerate: flatpak-builder security and bug fix updatenhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21682CVE-2022-21682CVE-2022-21682https://bugzilla.redhat.com/show_bug.cgi?id=20415922041592https://bugzilla.redhat.com/show_bug.cgi?id=20473122047312https://errata.rockylinux.org/RLSA-2022:7458RLSA-2022:7458RLSA-2022:7458 rflatpak-builder-1.0.14-2.el8.x86_64.rpmrflatpak-builder-1.0.14-2.el8.x86_64.rpmO^ ,eBBBBBbugfixflatpak bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=20624172062417https://errata.rockylinux.org/RLBA-2022:7459RLBA-2022:7459RLBA-2022:7459 'xflatpak-selinux-1.10.7-1.el8.noarch.rpmxflatpak-session-helper-1.10.7-1.el8.x86_64.rpmxflatpak-1.10.7-1.el8.x86_64.rpmxflatpak-libs-1.10.7-1.el8.x86_64.rpm'xflatpak-selinux-1.10.7-1.el8.noarch.rpmxflatpak-session-helper-1.10.7-1.el8.x86_64.rpmxflatpak-1.10.7-1.el8.x86_64.rpmxflatpak-libs-1.10.7-1.el8.x86_64.rpmO_ mBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbugfixrsyslog bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=19096391909639https://bugzilla.redhat.com/show_bug.cgi?id=19623181962318https://bugzilla.redhat.com/show_bug.cgi?id=20461582046158https://errata.rockylinux.org/RLBA-2022:7460RLBA-2022:7460RLBA-2022:7460 8@rsyslog-8.2102.0-10.el8.x86_64.rpm9@rsyslog-crypto-8.2102.0-10.el8.x86_64.rpmI@rsyslog-snmp-8.2102.0-10.el8.x86_64.rpm@rsyslog-doc-8.2102.0-10.el8.noarch.rpm:@rsyslog-elasticsearch-8.2102.0-10.el8.x86_64.rpm;@rsyslog-gnutls-8.2102.0-10.el8.x86_64.rpm<@rsyslog-gssapi-8.2102.0-10.el8.x86_64.rpm=@rsyslog-kafka-8.2102.0-10.el8.x86_64.rpm>@rsyslog-mmaudit-8.2102.0-10.el8.x86_64.rpm?@rsyslog-mmfields-8.2102.0-10.el8.x86_64.rpm@@rsyslog-mmjsonparse-8.2102.0-10.el8.x86_64.rpmA@rsyslog-mmkubernetes-8.2102.0-10.el8.x86_64.rpmB@rsyslog-mmnormalize-8.2102.0-10.el8.x86_64.rpmC@rsyslog-mmsnmptrapd-8.2102.0-10.el8.x86_64.rpmD@rsyslog-mysql-8.2102.0-10.el8.x86_64.rpmE@rsyslog-omamqp1-8.2102.0-10.el8.x86_64.rpmF@rsyslog-openssl-8.2102.0-10.el8.x86_64.rpmG@rsyslog-pgsql-8.2102.0-10.el8.x86_64.rpmH@rsyslog-relp-8.2102.0-10.el8.x86_64.rpmJ@rsyslog-udpspoof-8.2102.0-10.el8.x86_64.rpm8@rsyslog-8.2102.0-10.el8.x86_64.rpm9@rsyslog-crypto-8.2102.0-10.el8.x86_64.rpmI@rsyslog-snmp-8.2102.0-10.el8.x86_64.rpm@rsyslog-doc-8.2102.0-10.el8.noarch.rpm:@rsyslog-elasticsearch-8.2102.0-10.el8.x86_64.rpm;@rsyslog-gnutls-8.2102.0-10.el8.x86_64.rpm<@rsyslog-gssapi-8.2102.0-10.el8.x86_64.rpm=@rsyslog-kafka-8.2102.0-10.el8.x86_64.rpm>@rsyslog-mmaudit-8.2102.0-10.el8.x86_64.rpm?@rsyslog-mmfields-8.2102.0-10.el8.x86_64.rpm@@rsyslog-mmjsonparse-8.2102.0-10.el8.x86_64.rpmA@rsyslog-mmkubernetes-8.2102.0-10.el8.x86_64.rpmB@rsyslog-mmnormalize-8.2102.0-10.el8.x86_64.rpmC@rsyslog-mmsnmptrapd-8.2102.0-10.el8.x86_64.rpmD@rsyslog-mysql-8.2102.0-10.el8.x86_64.rpmE@rsyslog-omamqp1-8.2102.0-10.el8.x86_64.rpmF@rsyslog-openssl-8.2102.0-10.el8.x86_64.rpmG@rsyslog-pgsql-8.2102.0-10.el8.x86_64.rpmH@rsyslog-relp-8.2102.0-10.el8.x86_64.rpmJ@rsyslog-udpspoof-8.2102.0-10.el8.x86_64.rpmO UBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libreoffice security update https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25636CVE-2021-25636CVE-2021-25636https://bugzilla.redhat.com/show_bug.cgi?id=20569552056955https://errata.rockylinux.org/RLSA-2022:7461RLSA-2022:7461RLSA-2022:7461 )}autocorr-sr-6.4.7.2-11.el8.noarch.rpm~autocorr-sv-6.4.7.2-11.el8.noarch.rpmautocorr-tr-6.4.7.2-11.el8.noarch.rpmautocorr-vi-6.4.7.2-11.el8.noarch.rpmautocorr-zh-6.4.7.2-11.el8.noarch.rpmaautocorr-af-6.4.7.2-11.el8.noarch.rpmbautocorr-bg-6.4.7.2-11.el8.noarch.rpmcautocorr-ca-6.4.7.2-11.el8.noarch.rpmdautocorr-cs-6.4.7.2-11.el8.noarch.rpmeautocorr-da-6.4.7.2-11.el8.noarch.rpmfautocorr-de-6.4.7.2-11.el8.noarch.rpmgautocorr-en-6.4.7.2-11.el8.noarch.rpmhautocorr-es-6.4.7.2-11.el8.noarch.rpmiautocorr-fa-6.4.7.2-11.el8.noarch.rpmjautocorr-fi-6.4.7.2-11.el8.noarch.rpmkautocorr-fr-6.4.7.2-11.el8.noarch.rpmlautocorr-ga-6.4.7.2-11.el8.noarch.rpmmautocorr-hr-6.4.7.2-11.el8.noarch.rpmnautocorr-hu-6.4.7.2-11.el8.noarch.rpmoautocorr-is-6.4.7.2-11.el8.noarch.rpmpautocorr-it-6.4.7.2-11.el8.noarch.rpmqautocorr-ja-6.4.7.2-11.el8.noarch.rpmrautocorr-ko-6.4.7.2-11.el8.noarch.rpmsautocorr-lb-6.4.7.2-11.el8.noarch.rpmtautocorr-lt-6.4.7.2-11.el8.noarch.rpmuautocorr-mn-6.4.7.2-11.el8.noarch.rpmvautocorr-nl-6.4.7.2-11.el8.noarch.rpmwautocorr-pl-6.4.7.2-11.el8.noarch.rpmxautocorr-pt-6.4.7.2-11.el8.noarch.rpmyautocorr-ro-6.4.7.2-11.el8.noarch.rpmzautocorr-ru-6.4.7.2-11.el8.noarch.rpm{autocorr-sk-6.4.7.2-11.el8.noarch.rpm|autocorr-sl-6.4.7.2-11.el8.noarch.rpmDlibreoffice-base-6.4.7.2-11.el8.x86_64.rpmElibreoffice-calc-6.4.7.2-11.el8.x86_64.rpmFlibreoffice-core-6.4.7.2-11.el8.x86_64.rpm-libreoffice-data-6.4.7.2-11.el8.noarch.rpmGlibreoffice-draw-6.4.7.2-11.el8.x86_64.rpmHlibreoffice-emailmerge-6.4.7.2-11.el8.x86_64.rpmIlibreoffice-filters-6.4.7.2-11.el8.x86_64.rpmJlibreoffice-gdb-debug-support-6.4.7.2-11.el8.x86_64.rpmKlibreoffice-graphicfilter-6.4.7.2-11.el8.x86_64.rpmLlibreoffice-gtk3-6.4.7.2-11.el8.x86_64.rpmMlibreoffice-help-ar-6.4.7.2-11.el8.x86_64.rpmNlibreoffice-help-bg-6.4.7.2-11.el8.x86_64.rpmOlibreoffice-help-bn-6.4.7.2-11.el8.x86_64.rpmPlibreoffice-help-ca-6.4.7.2-11.el8.x86_64.rpmQlibreoffice-help-cs-6.4.7.2-11.el8.x86_64.rpmRlibreoffice-help-da-6.4.7.2-11.el8.x86_64.rpmSlibreoffice-help-de-6.4.7.2-11.el8.x86_64.rpmTlibreoffice-help-dz-6.4.7.2-11.el8.x86_64.rpmUlibreoffice-help-el-6.4.7.2-11.el8.x86_64.rpmVlibreoffice-help-en-6.4.7.2-11.el8.x86_64.rpmWlibreoffice-help-es-6.4.7.2-11.el8.x86_64.rpmXlibreoffice-help-et-6.4.7.2-11.el8.x86_64.rpmYlibreoffice-help-eu-6.4.7.2-11.el8.x86_64.rpmZlibreoffice-help-fi-6.4.7.2-11.el8.x86_64.rpm[libreoffice-help-fr-6.4.7.2-11.el8.x86_64.rpm\libreoffice-help-gl-6.4.7.2-11.el8.x86_64.rpm]libreoffice-help-gu-6.4.7.2-11.el8.x86_64.rpm^libreoffice-help-he-6.4.7.2-11.el8.x86_64.rpm_libreoffice-help-hi-6.4.7.2-11.el8.x86_64.rpm`libreoffice-help-hr-6.4.7.2-11.el8.x86_64.rpmalibreoffice-help-hu-6.4.7.2-11.el8.x86_64.rpmblibreoffice-help-id-6.4.7.2-11.el8.x86_64.rpmclibreoffice-help-it-6.4.7.2-11.el8.x86_64.rpmdlibreoffice-help-ja-6.4.7.2-11.el8.x86_64.rpmelibreoffice-help-ko-6.4.7.2-11.el8.x86_64.rpmflibreoffice-help-lt-6.4.7.2-11.el8.x86_64.rpmglibreoffice-help-lv-6.4.7.2-11.el8.x86_64.rpmhlibreoffice-help-nb-6.4.7.2-11.el8.x86_64.rpmilibreoffice-help-nl-6.4.7.2-11.el8.x86_64.rpmjlibreoffice-help-nn-6.4.7.2-11.el8.x86_64.rpmklibreoffice-help-pl-6.4.7.2-11.el8.x86_64.rpmllibreoffice-help-pt-BR-6.4.7.2-11.el8.x86_64.rpmmlibreoffice-help-pt-PT-6.4.7.2-11.el8.x86_64.rpmnlibreoffice-help-ro-6.4.7.2-11.el8.x86_64.rpmolibreoffice-help-ru-6.4.7.2-11.el8.x86_64.rpmplibreoffice-help-si-6.4.7.2-11.el8.x86_64.rpmqlibreoffice-help-sk-6.4.7.2-11.el8.x86_64.rpmrlibreoffice-help-sl-6.4.7.2-11.el8.x86_64.rpmslibreoffice-help-sv-6.4.7.2-11.el8.x86_64.rpmtlibreoffice-help-ta-6.4.7.2-11.el8.x86_64.rpmulibreoffice-help-tr-6.4.7.2-11.el8.x86_64.rpmvlibreoffice-help-uk-6.4.7.2-11.el8.x86_64.rpmwlibreoffice-help-zh-Hans-6.4.7.2-11.el8.x86_64.rpmxlibreoffice-help-zh-Hant-6.4.7.2-11.el8.x86_64.rpmylibreoffice-impress-6.4.7.2-11.el8.x86_64.rpmHlibreofficekit-6.4.7.2-11.el8.x86_64.rpmzlibreoffice-langpack-af-6.4.7.2-11.el8.x86_64.rpm{libreoffice-langpack-ar-6.4.7.2-11.el8.x86_64.rpm|libreoffice-langpack-as-6.4.7.2-11.el8.x86_64.rpm}libreoffice-langpack-bg-6.4.7.2-11.el8.x86_64.rpm~libreoffice-langpack-bn-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-br-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-ca-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-cs-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-cy-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-da-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-de-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-dz-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-el-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-en-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-es-6.4.7.2-11.el8.x86_64.rpm libreoffice-langpack-et-6.4.7.2-11.el8.x86_64.rpm libreoffice-langpack-eu-6.4.7.2-11.el8.x86_64.rpm libreoffice-langpack-fa-6.4.7.2-11.el8.x86_64.rpm libreoffice-langpack-fi-6.4.7.2-11.el8.x86_64.rpm libreoffice-langpack-fr-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-ga-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-gl-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-gu-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-he-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-hi-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-hr-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-hu-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-id-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-it-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-ja-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-kk-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-kn-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-ko-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-lt-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-lv-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-mai-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-ml-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-mr-6.4.7.2-11.el8.x86_64.rpm libreoffice-langpack-nb-6.4.7.2-11.el8.x86_64.rpm!libreoffice-langpack-nl-6.4.7.2-11.el8.x86_64.rpm"libreoffice-langpack-nn-6.4.7.2-11.el8.x86_64.rpm#libreoffice-langpack-nr-6.4.7.2-11.el8.x86_64.rpm$libreoffice-langpack-nso-6.4.7.2-11.el8.x86_64.rpm%libreoffice-langpack-or-6.4.7.2-11.el8.x86_64.rpm&libreoffice-langpack-pa-6.4.7.2-11.el8.x86_64.rpm'libreoffice-langpack-pl-6.4.7.2-11.el8.x86_64.rpm(libreoffice-langpack-pt-BR-6.4.7.2-11.el8.x86_64.rpm)libreoffice-langpack-pt-PT-6.4.7.2-11.el8.x86_64.rpm*libreoffice-langpack-ro-6.4.7.2-11.el8.x86_64.rpm+libreoffice-langpack-ru-6.4.7.2-11.el8.x86_64.rpm,libreoffice-langpack-si-6.4.7.2-11.el8.x86_64.rpm-libreoffice-langpack-sk-6.4.7.2-11.el8.x86_64.rpm.libreoffice-langpack-sl-6.4.7.2-11.el8.x86_64.rpm/libreoffice-langpack-sr-6.4.7.2-11.el8.x86_64.rpm0libreoffice-langpack-ss-6.4.7.2-11.el8.x86_64.rpm1libreoffice-langpack-st-6.4.7.2-11.el8.x86_64.rpm2libreoffice-langpack-sv-6.4.7.2-11.el8.x86_64.rpm3libreoffice-langpack-ta-6.4.7.2-11.el8.x86_64.rpm4libreoffice-langpack-te-6.4.7.2-11.el8.x86_64.rpm5libreoffice-langpack-th-6.4.7.2-11.el8.x86_64.rpm6libreoffice-langpack-tn-6.4.7.2-11.el8.x86_64.rpm7libreoffice-langpack-tr-6.4.7.2-11.el8.x86_64.rpm8libreoffice-langpack-ts-6.4.7.2-11.el8.x86_64.rpm9libreoffice-langpack-uk-6.4.7.2-11.el8.x86_64.rpm:libreoffice-langpack-ve-6.4.7.2-11.el8.x86_64.rpm;libreoffice-langpack-xh-6.4.7.2-11.el8.x86_64.rpm<libreoffice-langpack-zh-Hans-6.4.7.2-11.el8.x86_64.rpm=libreoffice-langpack-zh-Hant-6.4.7.2-11.el8.x86_64.rpm>libreoffice-langpack-zu-6.4.7.2-11.el8.x86_64.rpm?libreoffice-math-6.4.7.2-11.el8.x86_64.rpm@libreoffice-ogltrans-6.4.7.2-11.el8.x86_64.rpm.libreoffice-opensymbol-fonts-6.4.7.2-11.el8.noarch.rpmAlibreoffice-pdfimport-6.4.7.2-11.el8.x86_64.rpmBlibreoffice-pyuno-6.4.7.2-11.el8.x86_64.rpmClibreoffice-ure-6.4.7.2-11.el8.x86_64.rpm/libreoffice-ure-common-6.4.7.2-11.el8.noarch.rpmDlibreoffice-wiki-publisher-6.4.7.2-11.el8.x86_64.rpmElibreoffice-writer-6.4.7.2-11.el8.x86_64.rpmFlibreoffice-x11-6.4.7.2-11.el8.x86_64.rpmGlibreoffice-xsltfilter-6.4.7.2-11.el8.x86_64.rpm)}autocorr-sr-6.4.7.2-11.el8.noarch.rpm~autocorr-sv-6.4.7.2-11.el8.noarch.rpmautocorr-tr-6.4.7.2-11.el8.noarch.rpmautocorr-vi-6.4.7.2-11.el8.noarch.rpmautocorr-zh-6.4.7.2-11.el8.noarch.rpmaautocorr-af-6.4.7.2-11.el8.noarch.rpmbautocorr-bg-6.4.7.2-11.el8.noarch.rpmcautocorr-ca-6.4.7.2-11.el8.noarch.rpmdautocorr-cs-6.4.7.2-11.el8.noarch.rpmeautocorr-da-6.4.7.2-11.el8.noarch.rpmfautocorr-de-6.4.7.2-11.el8.noarch.rpmgautocorr-en-6.4.7.2-11.el8.noarch.rpmhautocorr-es-6.4.7.2-11.el8.noarch.rpmiautocorr-fa-6.4.7.2-11.el8.noarch.rpmjautocorr-fi-6.4.7.2-11.el8.noarch.rpmkautocorr-fr-6.4.7.2-11.el8.noarch.rpmlautocorr-ga-6.4.7.2-11.el8.noarch.rpmmautocorr-hr-6.4.7.2-11.el8.noarch.rpmnautocorr-hu-6.4.7.2-11.el8.noarch.rpmoautocorr-is-6.4.7.2-11.el8.noarch.rpmpautocorr-it-6.4.7.2-11.el8.noarch.rpmqautocorr-ja-6.4.7.2-11.el8.noarch.rpmrautocorr-ko-6.4.7.2-11.el8.noarch.rpmsautocorr-lb-6.4.7.2-11.el8.noarch.rpmtautocorr-lt-6.4.7.2-11.el8.noarch.rpmuautocorr-mn-6.4.7.2-11.el8.noarch.rpmvautocorr-nl-6.4.7.2-11.el8.noarch.rpmwautocorr-pl-6.4.7.2-11.el8.noarch.rpmxautocorr-pt-6.4.7.2-11.el8.noarch.rpmyautocorr-ro-6.4.7.2-11.el8.noarch.rpmzautocorr-ru-6.4.7.2-11.el8.noarch.rpm{autocorr-sk-6.4.7.2-11.el8.noarch.rpm|autocorr-sl-6.4.7.2-11.el8.noarch.rpmDlibreoffice-base-6.4.7.2-11.el8.x86_64.rpmElibreoffice-calc-6.4.7.2-11.el8.x86_64.rpmFlibreoffice-core-6.4.7.2-11.el8.x86_64.rpm-libreoffice-data-6.4.7.2-11.el8.noarch.rpmGlibreoffice-draw-6.4.7.2-11.el8.x86_64.rpmHlibreoffice-emailmerge-6.4.7.2-11.el8.x86_64.rpmIlibreoffice-filters-6.4.7.2-11.el8.x86_64.rpmJlibreoffice-gdb-debug-support-6.4.7.2-11.el8.x86_64.rpmKlibreoffice-graphicfilter-6.4.7.2-11.el8.x86_64.rpmLlibreoffice-gtk3-6.4.7.2-11.el8.x86_64.rpmMlibreoffice-help-ar-6.4.7.2-11.el8.x86_64.rpmNlibreoffice-help-bg-6.4.7.2-11.el8.x86_64.rpmOlibreoffice-help-bn-6.4.7.2-11.el8.x86_64.rpmPlibreoffice-help-ca-6.4.7.2-11.el8.x86_64.rpmQlibreoffice-help-cs-6.4.7.2-11.el8.x86_64.rpmRlibreoffice-help-da-6.4.7.2-11.el8.x86_64.rpmSlibreoffice-help-de-6.4.7.2-11.el8.x86_64.rpmTlibreoffice-help-dz-6.4.7.2-11.el8.x86_64.rpmUlibreoffice-help-el-6.4.7.2-11.el8.x86_64.rpmVlibreoffice-help-en-6.4.7.2-11.el8.x86_64.rpmWlibreoffice-help-es-6.4.7.2-11.el8.x86_64.rpmXlibreoffice-help-et-6.4.7.2-11.el8.x86_64.rpmYlibreoffice-help-eu-6.4.7.2-11.el8.x86_64.rpmZlibreoffice-help-fi-6.4.7.2-11.el8.x86_64.rpm[libreoffice-help-fr-6.4.7.2-11.el8.x86_64.rpm\libreoffice-help-gl-6.4.7.2-11.el8.x86_64.rpm]libreoffice-help-gu-6.4.7.2-11.el8.x86_64.rpm^libreoffice-help-he-6.4.7.2-11.el8.x86_64.rpm_libreoffice-help-hi-6.4.7.2-11.el8.x86_64.rpm`libreoffice-help-hr-6.4.7.2-11.el8.x86_64.rpmalibreoffice-help-hu-6.4.7.2-11.el8.x86_64.rpmblibreoffice-help-id-6.4.7.2-11.el8.x86_64.rpmclibreoffice-help-it-6.4.7.2-11.el8.x86_64.rpmdlibreoffice-help-ja-6.4.7.2-11.el8.x86_64.rpmelibreoffice-help-ko-6.4.7.2-11.el8.x86_64.rpmflibreoffice-help-lt-6.4.7.2-11.el8.x86_64.rpmglibreoffice-help-lv-6.4.7.2-11.el8.x86_64.rpmhlibreoffice-help-nb-6.4.7.2-11.el8.x86_64.rpmilibreoffice-help-nl-6.4.7.2-11.el8.x86_64.rpmjlibreoffice-help-nn-6.4.7.2-11.el8.x86_64.rpmklibreoffice-help-pl-6.4.7.2-11.el8.x86_64.rpmllibreoffice-help-pt-BR-6.4.7.2-11.el8.x86_64.rpmmlibreoffice-help-pt-PT-6.4.7.2-11.el8.x86_64.rpmnlibreoffice-help-ro-6.4.7.2-11.el8.x86_64.rpmolibreoffice-help-ru-6.4.7.2-11.el8.x86_64.rpmplibreoffice-help-si-6.4.7.2-11.el8.x86_64.rpmqlibreoffice-help-sk-6.4.7.2-11.el8.x86_64.rpmrlibreoffice-help-sl-6.4.7.2-11.el8.x86_64.rpmslibreoffice-help-sv-6.4.7.2-11.el8.x86_64.rpmtlibreoffice-help-ta-6.4.7.2-11.el8.x86_64.rpmulibreoffice-help-tr-6.4.7.2-11.el8.x86_64.rpmvlibreoffice-help-uk-6.4.7.2-11.el8.x86_64.rpmwlibreoffice-help-zh-Hans-6.4.7.2-11.el8.x86_64.rpmxlibreoffice-help-zh-Hant-6.4.7.2-11.el8.x86_64.rpmylibreoffice-impress-6.4.7.2-11.el8.x86_64.rpmHlibreofficekit-6.4.7.2-11.el8.x86_64.rpmzlibreoffice-langpack-af-6.4.7.2-11.el8.x86_64.rpm{libreoffice-langpack-ar-6.4.7.2-11.el8.x86_64.rpm|libreoffice-langpack-as-6.4.7.2-11.el8.x86_64.rpm}libreoffice-langpack-bg-6.4.7.2-11.el8.x86_64.rpm~libreoffice-langpack-bn-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-br-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-ca-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-cs-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-cy-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-da-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-de-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-dz-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-el-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-en-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-es-6.4.7.2-11.el8.x86_64.rpm libreoffice-langpack-et-6.4.7.2-11.el8.x86_64.rpm libreoffice-langpack-eu-6.4.7.2-11.el8.x86_64.rpm libreoffice-langpack-fa-6.4.7.2-11.el8.x86_64.rpm libreoffice-langpack-fi-6.4.7.2-11.el8.x86_64.rpm libreoffice-langpack-fr-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-ga-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-gl-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-gu-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-he-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-hi-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-hr-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-hu-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-id-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-it-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-ja-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-kk-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-kn-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-ko-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-lt-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-lv-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-mai-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-ml-6.4.7.2-11.el8.x86_64.rpmlibreoffice-langpack-mr-6.4.7.2-11.el8.x86_64.rpm libreoffice-langpack-nb-6.4.7.2-11.el8.x86_64.rpm!libreoffice-langpack-nl-6.4.7.2-11.el8.x86_64.rpm"libreoffice-langpack-nn-6.4.7.2-11.el8.x86_64.rpm#libreoffice-langpack-nr-6.4.7.2-11.el8.x86_64.rpm$libreoffice-langpack-nso-6.4.7.2-11.el8.x86_64.rpm%libreoffice-langpack-or-6.4.7.2-11.el8.x86_64.rpm&libreoffice-langpack-pa-6.4.7.2-11.el8.x86_64.rpm'libreoffice-langpack-pl-6.4.7.2-11.el8.x86_64.rpm(libreoffice-langpack-pt-BR-6.4.7.2-11.el8.x86_64.rpm)libreoffice-langpack-pt-PT-6.4.7.2-11.el8.x86_64.rpm*libreoffice-langpack-ro-6.4.7.2-11.el8.x86_64.rpm+libreoffice-langpack-ru-6.4.7.2-11.el8.x86_64.rpm,libreoffice-langpack-si-6.4.7.2-11.el8.x86_64.rpm-libreoffice-langpack-sk-6.4.7.2-11.el8.x86_64.rpm.libreoffice-langpack-sl-6.4.7.2-11.el8.x86_64.rpm/libreoffice-langpack-sr-6.4.7.2-11.el8.x86_64.rpm0libreoffice-langpack-ss-6.4.7.2-11.el8.x86_64.rpm1libreoffice-langpack-st-6.4.7.2-11.el8.x86_64.rpm2libreoffice-langpack-sv-6.4.7.2-11.el8.x86_64.rpm3libreoffice-langpack-ta-6.4.7.2-11.el8.x86_64.rpm4libreoffice-langpack-te-6.4.7.2-11.el8.x86_64.rpm5libreoffice-langpack-th-6.4.7.2-11.el8.x86_64.rpm6libreoffice-langpack-tn-6.4.7.2-11.el8.x86_64.rpm7libreoffice-langpack-tr-6.4.7.2-11.el8.x86_64.rpm8libreoffice-langpack-ts-6.4.7.2-11.el8.x86_64.rpm9libreoffice-langpack-uk-6.4.7.2-11.el8.x86_64.rpm:libreoffice-langpack-ve-6.4.7.2-11.el8.x86_64.rpm;libreoffice-langpack-xh-6.4.7.2-11.el8.x86_64.rpm<libreoffice-langpack-zh-Hans-6.4.7.2-11.el8.x86_64.rpm=libreoffice-langpack-zh-Hant-6.4.7.2-11.el8.x86_64.rpm>libreoffice-langpack-zu-6.4.7.2-11.el8.x86_64.rpm?libreoffice-math-6.4.7.2-11.el8.x86_64.rpm@libreoffice-ogltrans-6.4.7.2-11.el8.x86_64.rpm.libreoffice-opensymbol-fonts-6.4.7.2-11.el8.noarch.rpmAlibreoffice-pdfimport-6.4.7.2-11.el8.x86_64.rpmBlibreoffice-pyuno-6.4.7.2-11.el8.x86_64.rpmClibreoffice-ure-6.4.7.2-11.el8.x86_64.rpm/libreoffice-ure-common-6.4.7.2-11.el8.noarch.rpmDlibreoffice-wiki-publisher-6.4.7.2-11.el8.x86_64.rpmElibreoffice-writer-6.4.7.2-11.el8.x86_64.rpmFlibreoffice-x11-6.4.7.2-11.el8.x86_64.rpmGlibreoffice-xsltfilter-6.4.7.2-11.el8.x86_64.rpmP DBBBBBsecurityModerate: protobuf security updateThttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22570CVE-2021-22570CVE-2021-22570https://bugzilla.redhat.com/show_bug.cgi?id=20494292049429https://errata.rockylinux.org/RLSA-2022:7464RLSA-2022:7464RLSA-2022:7464 7protobuf-3.5.0-15.el8.x86_64.rpm;protobuf-compiler-3.5.0-15.el8.x86_64.rpm<protobuf-lite-3.5.0-15.el8.x86_64.rpm_python3-protobuf-3.5.0-15.el8.noarch.rpm7protobuf-3.5.0-15.el8.x86_64.rpm;protobuf-compiler-3.5.0-15.el8.x86_64.rpm<protobuf-lite-3.5.0-15.el8.x86_64.rpm_python3-protobuf-3.5.0-15.el8.noarch.rpmPa LBBBBbugfixnmstate bug fix and enhancement updatec https://bugzilla.redhat.com/show_bug.cgi?id=19399111939911https://bugzilla.redhat.com/show_bug.cgi?id=20052402005240https://bugzilla.redhat.com/show_bug.cgi?id=20403062040306https://bugzilla.redhat.com/show_bug.cgi?id=20403242040324https://bugzilla.redhat.com/show_bug.cgi?id=20447932044793https://bugzilla.redhat.com/show_bug.cgi?id=20551152055115https://bugzilla.redhat.com/show_bug.cgi?id=20617692061769https://bugzilla.redhat.com/show_bug.cgi?id=20670582067058https://bugzilla.redhat.com/show_bug.cgi?id=20765902076590https://bugzilla.redhat.com/show_bug.cgi?id=20789402078940https://bugzilla.redhat.com/show_bug.cgi?id=20881712088171https://bugzilla.redhat.com/show_bug.cgi?id=20940252094025https://bugzilla.redhat.com/show_bug.cgi?id=20951732095173https://bugzilla.redhat.com/show_bug.cgi?id=21036292103629https://errata.rockylinux.org/RLBA-2022:7465RLBA-2022:7465RLBA-2022:7465 WInmstate-1.3.3-1.el8.x86_64.rpmXInmstate-libs-1.3.3-1.el8.x86_64.rpmuInmstate-plugin-ovsdb-1.3.3-1.el8.noarch.rpmIpython3-libnmstate-1.3.3-1.el8.noarch.rpmWInmstate-1.3.3-1.el8.x86_64.rpmXInmstate-libs-1.3.3-1.el8.x86_64.rpmuInmstate-plugin-ovsdb-1.3.3-1.el8.noarch.rpmIpython3-libnmstate-1.3.3-1.el8.noarch.rpmPb SBBbugfixnetwork-manager-applet bug fix and enhancement updateb https://bugzilla.redhat.com/show_bug.cgi?id=20667462066746https://errata.rockylinux.org/RLBA-2022:7466RLBA-2022:7466RLBA-2022:7466 S.network-manager-applet-1.26.0-1.el8.x86_64.rpmX.nm-connection-editor-1.26.0-1.el8.x86_64.rpmS.network-manager-applet-1.26.0-1.el8.x86_64.rpmX.nm-connection-editor-1.26.0-1.el8.x86_64.rpmPc XBBbugfixannobin bug fix and enhancement updatea https://bugzilla.redhat.com/show_bug.cgi?id=20671482067148https://errata.rockylinux.org/RLBA-2022:7467RLBA-2022:7467RLBA-2022:7467 iAannobin-10.67-3.el8.x86_64.rpmjAannobin-annocheck-10.67-3.el8.x86_64.rpmiAannobin-10.67-3.el8.x86_64.rpmjAannobin-annocheck-10.67-3.el8.x86_64.rpmPd ]bugfixlibnma bug fix and enhancement update` https://bugzilla.redhat.com/show_bug.cgi?id=20575142057514https://bugzilla.redhat.com/show_bug.cgi?id=20603272060327https://bugzilla.redhat.com/show_bug.cgi?id=20626862062686https://errata.rockylinux.org/RLBA-2022:7468RLBA-2022:7468RLBA-2022:7468 %`libnma-1.8.38-1.el8.x86_64.rpm%`libnma-1.8.38-1.el8.x86_64.rpmQ >kBBBBBBBBBBBBBuDBBlBBJBvBBB|BBBBBABBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: container-tools:4.0 security and bug fix update_;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1708CVE-2022-1708CVE-2022-1708https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27191CVE-2022-27191CVE-2022-27191https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29162CVE-2022-29162CVE-2022-29162https://bugzilla.redhat.com/show_bug.cgi?id=20647022064702https://bugzilla.redhat.com/show_bug.cgi?id=20766172076617https://bugzilla.redhat.com/show_bug.cgi?id=20853612085361https://bugzilla.redhat.com/show_bug.cgi?id=20863982086398https://errata.rockylinux.org/RLSA-2022:7469RLSA-2022:7469RLSA-2022:7469 $zW"[aardvark-dns-1.0.1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpmYbuildah-1.24.5-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm}Ybuildah-tests-1.24.5-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpmSAcockpit-podman-46-1.module+el8.7.0+1077+0e4f03d4.noarch.rpmoconmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm9containernetworking-plugins-1.1.1-2.module+el8.7.0+1077+0e4f03d4.x86_64.rpm1containers-common-1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpmcontainer-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm-crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm*criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm!criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm"criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpmZPcrun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmLVfuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmTXlibslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmUXlibslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmB[netavark-1.0.1-35.module+el8.7.0+1077+0e4f03d4.x86_64.rpm\oci-seccomp-bpf-hook-1.2.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm cpodman-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpmcpodman-catatonit-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm cpodman-docker-4.0.2-8.module+el8.7.0+1077+0e4f03d4.noarch.rpmecpodman-gvproxy-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpmcpodman-plugins-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpm;cpodman-remote-4.0.2-8.module+el8.7.0+1077+0e4f03d4.x86_64.rpmlibguestfs-java-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm?libguestfs-java-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmvlibguestfs-javadoc-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpmwlibguestfs-man-pages-ja-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpmxlibguestfs-man-pages-uk-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm@libguestfs-rescue-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmAlibguestfs-rsync-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmylibguestfs-tools-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpmBlibguestfs-tools-c-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm=libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpmClibguestfs-xfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm>?libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm?libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm??libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmJDlibtpms-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpmKDlibtpms-devel-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpmLlibvirt-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmMlibvirt-client-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmNlibvirt-daemon-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmOlibvirt-daemon-config-network-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmPlibvirt-daemon-config-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmQlibvirt-daemon-driver-interface-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmRlibvirt-daemon-driver-network-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmSlibvirt-daemon-driver-nodedev-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmTlibvirt-daemon-driver-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmUlibvirt-daemon-driver-qemu-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmVlibvirt-daemon-driver-secret-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmWlibvirt-daemon-driver-storage-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmXlibvirt-daemon-driver-storage-core-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmYlibvirt-daemon-driver-storage-disk-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmZlibvirt-daemon-driver-storage-gluster-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm[libvirt-daemon-driver-storage-iscsi-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm\libvirt-daemon-driver-storage-iscsi-direct-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm]libvirt-daemon-driver-storage-logical-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm^libvirt-daemon-driver-storage-mpath-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm_libvirt-daemon-driver-storage-rbd-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm`libvirt-daemon-driver-storage-scsi-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmalibvirt-daemon-kvm-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmblibvirt-devel-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmclibvirt-docs-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibvirt-libs-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmelibvirt-lock-sanlock-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmflibvirt-nss-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmglibvirt-wireshark-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmjlua-guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmB?nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmCnbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmnbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpmDnbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmEnbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmFnbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmGnbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmHnbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmInbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmJnbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmKnbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmLnbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmMnbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmNnbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmOnbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmPnbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmQnbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmRnbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmSnbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmTnbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmd=perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm_perl-Sys-Guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmcperl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpme=python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmkpython3-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmf?python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpml`python3-libvirt-8.0.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmx8qemu-guest-agent-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpmy8qemu-img-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpmz8qemu-kvm-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm{8qemu-kvm-block-curl-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm|8qemu-kvm-block-gluster-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm}8qemu-kvm-block-iscsi-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm~8qemu-kvm-block-rbd-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-block-ssh-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-common-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-core-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-docs-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-hw-usbredir-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-ui-opengl-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-ui-spice-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpmq=ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm ruby-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm supermin-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpmsupermin-devel-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmvirt-dib-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmtspAq+=hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm,=hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm8libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm9libguestfs-appliance-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmtlibguestfs-bash-completion-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm:libguestfs-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm;libguestfs-gfs2-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm<libguestfs-gobject-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm=libguestfs-gobject-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmulibguestfs-inspect-icons-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm>libguestfs-java-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm?libguestfs-java-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmvlibguestfs-javadoc-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpmwlibguestfs-man-pages-ja-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpmxlibguestfs-man-pages-uk-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm@libguestfs-rescue-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmAlibguestfs-rsync-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmylibguestfs-tools-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpmBlibguestfs-tools-c-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm=libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpmClibguestfs-xfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm>?libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm?libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm??libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmJDlibtpms-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpmKDlibtpms-devel-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpmLlibvirt-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmMlibvirt-client-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmNlibvirt-daemon-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmOlibvirt-daemon-config-network-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmPlibvirt-daemon-config-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmQlibvirt-daemon-driver-interface-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmRlibvirt-daemon-driver-network-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmSlibvirt-daemon-driver-nodedev-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmTlibvirt-daemon-driver-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmUlibvirt-daemon-driver-qemu-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmVlibvirt-daemon-driver-secret-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmWlibvirt-daemon-driver-storage-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmXlibvirt-daemon-driver-storage-core-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmYlibvirt-daemon-driver-storage-disk-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmZlibvirt-daemon-driver-storage-gluster-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm[libvirt-daemon-driver-storage-iscsi-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm\libvirt-daemon-driver-storage-iscsi-direct-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm]libvirt-daemon-driver-storage-logical-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm^libvirt-daemon-driver-storage-mpath-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm_libvirt-daemon-driver-storage-rbd-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm`libvirt-daemon-driver-storage-scsi-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmalibvirt-daemon-kvm-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmblibvirt-devel-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmclibvirt-docs-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibvirt-libs-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmelibvirt-lock-sanlock-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmflibvirt-nss-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmglibvirt-wireshark-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmjlua-guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmB?nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmCnbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmnbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpmDnbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmEnbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmFnbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmGnbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmHnbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmInbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmJnbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmKnbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmLnbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmMnbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmNnbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmOnbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmPnbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmQnbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmRnbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmSnbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmTnbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmd=perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm_perl-Sys-Guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmcperl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpme=python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmkpython3-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmf?python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpml`python3-libvirt-8.0.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmx8qemu-guest-agent-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpmy8qemu-img-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpmz8qemu-kvm-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm{8qemu-kvm-block-curl-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm|8qemu-kvm-block-gluster-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm}8qemu-kvm-block-iscsi-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm~8qemu-kvm-block-rbd-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-block-ssh-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-common-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-core-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-docs-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-hw-usbredir-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-ui-opengl-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-ui-spice-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpmq=ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm ruby-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm supermin-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpmsupermin-devel-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmvirt-dib-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmf Sbugfixredhat-rpm-config bug fix and enhancement updateK https://bugzilla.redhat.com/show_bug.cgi?id=20671532067153https://bugzilla.redhat.com/show_bug.cgi?id=20671792067179https://errata.rockylinux.org/RLBA-2022:7473RLBA-2022:7473RLBA-2022:7473 `ckernel-rpm-macros-130-1.el8.noarch.rpmcredhat-rpm-config-130-1.el8.noarch.rpm`ckernel-rpm-macros-130-1.el8.noarch.rpmcredhat-rpm-config-130-1.el8.noarch.rpmg VBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbugfixpcp bug fix and enhancement updateJ https://bugzilla.redhat.com/show_bug.cgi?id=20267262026726https://bugzilla.redhat.com/show_bug.cgi?id=20576152057615https://bugzilla.redhat.com/show_bug.cgi?id=20594612059461https://errata.rockylinux.org/RLBA-2022:7474RLBA-2022:7474RLBA-2022:7474 d6pcp-doc-5.3.7-7.el8.noarch.rpm~pcp-export-pcp2json-5.3.7-7.el8.x86_64.rpm{pcp-export-pcp2elasticsearch-5.3.7-7.el8.x86_64.rpm|pcp-export-pcp2graphite-5.3.7-7.el8.x86_64.rpm}pcp-export-pcp2influxdb-5.3.7-7.el8.x86_64.rpmzpcp-devel-5.3.7-7.el8.x86_64.rpmxpcp-5.3.7-7.el8.x86_64.rpmypcp-conf-5.3.7-7.el8.x86_64.rpmpcp-export-pcp2spark-5.3.7-7.el8.x86_64.rpmpcp-export-pcp2xml-5.3.7-7.el8.x86_64.rpmpcp-export-pcp2zabbix-5.3.7-7.el8.x86_64.rpmpcp-export-zabbix-agent-5.3.7-7.el8.x86_64.rpmpcp-gui-5.3.7-7.el8.x86_64.rpmpcp-import-collectl2pcp-5.3.7-7.el8.x86_64.rpmpcp-import-ganglia2pcp-5.3.7-7.el8.x86_64.rpmpcp-import-iostat2pcp-5.3.7-7.el8.x86_64.rpmpcp-import-mrtg2pcp-5.3.7-7.el8.x86_64.rpmpcp-import-sar2pcp-5.3.7-7.el8.x86_64.rpm pcp-libs-5.3.7-7.el8.x86_64.rpm pcp-libs-devel-5.3.7-7.el8.x86_64.rpm pcp-pmda-activemq-5.3.7-7.el8.x86_64.rpm pcp-pmda-apache-5.3.7-7.el8.x86_64.rpm pcp-pmda-bash-5.3.7-7.el8.x86_64.rpmpcp-pmda-bcc-5.3.7-7.el8.x86_64.rpmpcp-pmda-bind2-5.3.7-7.el8.x86_64.rpmpcp-pmda-bonding-5.3.7-7.el8.x86_64.rpmpcp-pmda-bpftrace-5.3.7-7.el8.x86_64.rpmpcp-pmda-cifs-5.3.7-7.el8.x86_64.rpmpcp-pmda-cisco-5.3.7-7.el8.x86_64.rpmpcp-pmda-dbping-5.3.7-7.el8.x86_64.rpmpcp-pmda-denki-5.3.7-7.el8.x86_64.rpmpcp-pmda-dm-5.3.7-7.el8.x86_64.rpmpcp-pmda-docker-5.3.7-7.el8.x86_64.rpmpcp-pmda-ds389-5.3.7-7.el8.x86_64.rpmpcp-pmda-ds389log-5.3.7-7.el8.x86_64.rpmpcp-pmda-elasticsearch-5.3.7-7.el8.x86_64.rpmpcp-pmda-gfs2-5.3.7-7.el8.x86_64.rpmpcp-pmda-gluster-5.3.7-7.el8.x86_64.rpmpcp-pmda-gpfs-5.3.7-7.el8.x86_64.rpmpcp-pmda-gpsd-5.3.7-7.el8.x86_64.rpmpcp-pmda-hacluster-5.3.7-7.el8.x86_64.rpm pcp-pmda-haproxy-5.3.7-7.el8.x86_64.rpm!pcp-pmda-infiniband-5.3.7-7.el8.x86_64.rpm"pcp-pmda-json-5.3.7-7.el8.x86_64.rpm#pcp-pmda-libvirt-5.3.7-7.el8.x86_64.rpm$pcp-pmda-lio-5.3.7-7.el8.x86_64.rpm%pcp-pmda-lmsensors-5.3.7-7.el8.x86_64.rpm&pcp-pmda-logger-5.3.7-7.el8.x86_64.rpm'pcp-pmda-lustre-5.3.7-7.el8.x86_64.rpm(pcp-pmda-lustrecomm-5.3.7-7.el8.x86_64.rpm)pcp-pmda-mailq-5.3.7-7.el8.x86_64.rpm*pcp-pmda-memcache-5.3.7-7.el8.x86_64.rpm+pcp-pmda-mic-5.3.7-7.el8.x86_64.rpm,pcp-pmda-mongodb-5.3.7-7.el8.x86_64.rpm-pcp-pmda-mounts-5.3.7-7.el8.x86_64.rpm.pcp-pmda-mssql-5.3.7-7.el8.x86_64.rpm/pcp-pmda-mysql-5.3.7-7.el8.x86_64.rpm0pcp-pmda-named-5.3.7-7.el8.x86_64.rpm1pcp-pmda-netcheck-5.3.7-7.el8.x86_64.rpm2pcp-pmda-netfilter-5.3.7-7.el8.x86_64.rpm3pcp-pmda-news-5.3.7-7.el8.x86_64.rpm4pcp-pmda-nfsclient-5.3.7-7.el8.x86_64.rpm5pcp-pmda-nginx-5.3.7-7.el8.x86_64.rpm6pcp-pmda-nvidia-gpu-5.3.7-7.el8.x86_64.rpm7pcp-pmda-openmetrics-5.3.7-7.el8.x86_64.rpm8pcp-pmda-openvswitch-5.3.7-7.el8.x86_64.rpm9pcp-pmda-oracle-5.3.7-7.el8.x86_64.rpm:pcp-pmda-pdns-5.3.7-7.el8.x86_64.rpm;pcp-pmda-perfevent-5.3.7-7.el8.x86_64.rpm<pcp-pmda-podman-5.3.7-7.el8.x86_64.rpm=pcp-pmda-postfix-5.3.7-7.el8.x86_64.rpm>pcp-pmda-postgresql-5.3.7-7.el8.x86_64.rpm?pcp-pmda-rabbitmq-5.3.7-7.el8.x86_64.rpm@pcp-pmda-redis-5.3.7-7.el8.x86_64.rpmApcp-pmda-roomtemp-5.3.7-7.el8.x86_64.rpmBpcp-pmda-rsyslog-5.3.7-7.el8.x86_64.rpmCpcp-pmda-samba-5.3.7-7.el8.x86_64.rpmDpcp-pmda-sendmail-5.3.7-7.el8.x86_64.rpmEpcp-pmda-shping-5.3.7-7.el8.x86_64.rpmFpcp-pmda-slurm-5.3.7-7.el8.x86_64.rpmGpcp-pmda-smart-5.3.7-7.el8.x86_64.rpmHpcp-pmda-snmp-5.3.7-7.el8.x86_64.rpmIpcp-pmda-sockets-5.3.7-7.el8.x86_64.rpmJpcp-pmda-statsd-5.3.7-7.el8.x86_64.rpmKpcp-pmda-summary-5.3.7-7.el8.x86_64.rpmLpcp-pmda-systemd-5.3.7-7.el8.x86_64.rpmMpcp-pmda-trace-5.3.7-7.el8.x86_64.rpmNpcp-pmda-unbound-5.3.7-7.el8.x86_64.rpmOpcp-pmda-weblog-5.3.7-7.el8.x86_64.rpmPpcp-pmda-zimbra-5.3.7-7.el8.x86_64.rpmQpcp-pmda-zswap-5.3.7-7.el8.x86_64.rpmRpcp-selinux-5.3.7-7.el8.x86_64.rpmSpcp-system-tools-5.3.7-7.el8.x86_64.rpmTpcp-testsuite-5.3.7-7.el8.x86_64.rpmUpcp-zeroconf-5.3.7-7.el8.x86_64.rpm[perl-PCP-LogImport-5.3.7-7.el8.x86_64.rpm\perl-PCP-LogSummary-5.3.7-7.el8.x86_64.rpm]perl-PCP-MMV-5.3.7-7.el8.x86_64.rpm^perl-PCP-PMDA-5.3.7-7.el8.x86_64.rpmmpython3-pcp-5.3.7-7.el8.x86_64.rpmd6pcp-doc-5.3.7-7.el8.noarch.rpm~pcp-export-pcp2json-5.3.7-7.el8.x86_64.rpm{pcp-export-pcp2elasticsearch-5.3.7-7.el8.x86_64.rpm|pcp-export-pcp2graphite-5.3.7-7.el8.x86_64.rpm}pcp-export-pcp2influxdb-5.3.7-7.el8.x86_64.rpmzpcp-devel-5.3.7-7.el8.x86_64.rpmxpcp-5.3.7-7.el8.x86_64.rpmypcp-conf-5.3.7-7.el8.x86_64.rpmpcp-export-pcp2spark-5.3.7-7.el8.x86_64.rpmpcp-export-pcp2xml-5.3.7-7.el8.x86_64.rpmpcp-export-pcp2zabbix-5.3.7-7.el8.x86_64.rpmpcp-export-zabbix-agent-5.3.7-7.el8.x86_64.rpmpcp-gui-5.3.7-7.el8.x86_64.rpmpcp-import-collectl2pcp-5.3.7-7.el8.x86_64.rpmpcp-import-ganglia2pcp-5.3.7-7.el8.x86_64.rpmpcp-import-iostat2pcp-5.3.7-7.el8.x86_64.rpmpcp-import-mrtg2pcp-5.3.7-7.el8.x86_64.rpmpcp-import-sar2pcp-5.3.7-7.el8.x86_64.rpm pcp-libs-5.3.7-7.el8.x86_64.rpm pcp-libs-devel-5.3.7-7.el8.x86_64.rpm pcp-pmda-activemq-5.3.7-7.el8.x86_64.rpm pcp-pmda-apache-5.3.7-7.el8.x86_64.rpm pcp-pmda-bash-5.3.7-7.el8.x86_64.rpmpcp-pmda-bcc-5.3.7-7.el8.x86_64.rpmpcp-pmda-bind2-5.3.7-7.el8.x86_64.rpmpcp-pmda-bonding-5.3.7-7.el8.x86_64.rpmpcp-pmda-bpftrace-5.3.7-7.el8.x86_64.rpmpcp-pmda-cifs-5.3.7-7.el8.x86_64.rpmpcp-pmda-cisco-5.3.7-7.el8.x86_64.rpmpcp-pmda-dbping-5.3.7-7.el8.x86_64.rpmpcp-pmda-denki-5.3.7-7.el8.x86_64.rpmpcp-pmda-dm-5.3.7-7.el8.x86_64.rpmpcp-pmda-docker-5.3.7-7.el8.x86_64.rpmpcp-pmda-ds389-5.3.7-7.el8.x86_64.rpmpcp-pmda-ds389log-5.3.7-7.el8.x86_64.rpmpcp-pmda-elasticsearch-5.3.7-7.el8.x86_64.rpmpcp-pmda-gfs2-5.3.7-7.el8.x86_64.rpmpcp-pmda-gluster-5.3.7-7.el8.x86_64.rpmpcp-pmda-gpfs-5.3.7-7.el8.x86_64.rpmpcp-pmda-gpsd-5.3.7-7.el8.x86_64.rpmpcp-pmda-hacluster-5.3.7-7.el8.x86_64.rpm pcp-pmda-haproxy-5.3.7-7.el8.x86_64.rpm!pcp-pmda-infiniband-5.3.7-7.el8.x86_64.rpm"pcp-pmda-json-5.3.7-7.el8.x86_64.rpm#pcp-pmda-libvirt-5.3.7-7.el8.x86_64.rpm$pcp-pmda-lio-5.3.7-7.el8.x86_64.rpm%pcp-pmda-lmsensors-5.3.7-7.el8.x86_64.rpm&pcp-pmda-logger-5.3.7-7.el8.x86_64.rpm'pcp-pmda-lustre-5.3.7-7.el8.x86_64.rpm(pcp-pmda-lustrecomm-5.3.7-7.el8.x86_64.rpm)pcp-pmda-mailq-5.3.7-7.el8.x86_64.rpm*pcp-pmda-memcache-5.3.7-7.el8.x86_64.rpm+pcp-pmda-mic-5.3.7-7.el8.x86_64.rpm,pcp-pmda-mongodb-5.3.7-7.el8.x86_64.rpm-pcp-pmda-mounts-5.3.7-7.el8.x86_64.rpm.pcp-pmda-mssql-5.3.7-7.el8.x86_64.rpm/pcp-pmda-mysql-5.3.7-7.el8.x86_64.rpm0pcp-pmda-named-5.3.7-7.el8.x86_64.rpm1pcp-pmda-netcheck-5.3.7-7.el8.x86_64.rpm2pcp-pmda-netfilter-5.3.7-7.el8.x86_64.rpm3pcp-pmda-news-5.3.7-7.el8.x86_64.rpm4pcp-pmda-nfsclient-5.3.7-7.el8.x86_64.rpm5pcp-pmda-nginx-5.3.7-7.el8.x86_64.rpm6pcp-pmda-nvidia-gpu-5.3.7-7.el8.x86_64.rpm7pcp-pmda-openmetrics-5.3.7-7.el8.x86_64.rpm8pcp-pmda-openvswitch-5.3.7-7.el8.x86_64.rpm9pcp-pmda-oracle-5.3.7-7.el8.x86_64.rpm:pcp-pmda-pdns-5.3.7-7.el8.x86_64.rpm;pcp-pmda-perfevent-5.3.7-7.el8.x86_64.rpm<pcp-pmda-podman-5.3.7-7.el8.x86_64.rpm=pcp-pmda-postfix-5.3.7-7.el8.x86_64.rpm>pcp-pmda-postgresql-5.3.7-7.el8.x86_64.rpm?pcp-pmda-rabbitmq-5.3.7-7.el8.x86_64.rpm@pcp-pmda-redis-5.3.7-7.el8.x86_64.rpmApcp-pmda-roomtemp-5.3.7-7.el8.x86_64.rpmBpcp-pmda-rsyslog-5.3.7-7.el8.x86_64.rpmCpcp-pmda-samba-5.3.7-7.el8.x86_64.rpmDpcp-pmda-sendmail-5.3.7-7.el8.x86_64.rpmEpcp-pmda-shping-5.3.7-7.el8.x86_64.rpmFpcp-pmda-slurm-5.3.7-7.el8.x86_64.rpmGpcp-pmda-smart-5.3.7-7.el8.x86_64.rpmHpcp-pmda-snmp-5.3.7-7.el8.x86_64.rpmIpcp-pmda-sockets-5.3.7-7.el8.x86_64.rpmJpcp-pmda-statsd-5.3.7-7.el8.x86_64.rpmKpcp-pmda-summary-5.3.7-7.el8.x86_64.rpmLpcp-pmda-systemd-5.3.7-7.el8.x86_64.rpmMpcp-pmda-trace-5.3.7-7.el8.x86_64.rpmNpcp-pmda-unbound-5.3.7-7.el8.x86_64.rpmOpcp-pmda-weblog-5.3.7-7.el8.x86_64.rpmPpcp-pmda-zimbra-5.3.7-7.el8.x86_64.rpmQpcp-pmda-zswap-5.3.7-7.el8.x86_64.rpmRpcp-selinux-5.3.7-7.el8.x86_64.rpmSpcp-system-tools-5.3.7-7.el8.x86_64.rpmTpcp-testsuite-5.3.7-7.el8.x86_64.rpmUpcp-zeroconf-5.3.7-7.el8.x86_64.rpm[perl-PCP-LogImport-5.3.7-7.el8.x86_64.rpm\perl-PCP-LogSummary-5.3.7-7.el8.x86_64.rpm]perl-PCP-MMV-5.3.7-7.el8.x86_64.rpm^perl-PCP-PMDA-5.3.7-7.el8.x86_64.rpmmpython3-pcp-5.3.7-7.el8.x86_64.rpmh "^BBbugfixflatpak-xdg-utils bug fix and enhancement updateI https://bugzilla.redhat.com/show_bug.cgi?id=20683322068332https://errata.rockylinux.org/RLBA-2022:7475RLBA-2022:7475RLBA-2022:7475 :flatpak-spawn-1.0.5-1.el8.x86_64.rpm:flatpak-xdg-utils-1.0.5-1.el8.x86_64.rpm:flatpak-spawn-1.0.5-1.el8.x86_64.rpm:flatpak-xdg-utils-1.0.5-1.el8.x86_64.rpmi %cbugfixxdg-desktop-portal-gtk bug fix and enhancement updateH https://bugzilla.redhat.com/show_bug.cgi?id=20624322062432https://errata.rockylinux.org/RLBA-2022:7476RLBA-2022:7476RLBA-2022:7476 (\xdg-desktop-portal-gtk-1.8.0-1.el8.x86_64.rpm(\xdg-desktop-portal-gtk-1.8.0-1.el8.x86_64.rpmj ,fBBBBbugfixmotif bug fix and enhancement updateG https://bugzilla.redhat.com/show_bug.cgi?id=20605712060571https://errata.rockylinux.org/RLBA-2022:7477RLBA-2022:7477RLBA-2022:7477 fTmotif-2.3.4-18.el8.x86_64.rpmgTmotif-devel-2.3.4-18.el8.x86_64.rpmhTmotif-static-2.3.4-18.el8.x86_64.rpmfTmotif-2.3.4-18.el8.x86_64.rpmgTmotif-devel-2.3.4-18.el8.x86_64.rpmhTmotif-static-2.3.4-18.el8.x86_64.rpmk /mbugfixxdg-desktop-portal bug fix and enhancement updateF https://bugzilla.redhat.com/show_bug.cgi?id=20624302062430https://errata.rockylinux.org/RLBA-2022:7479RLBA-2022:7479RLBA-2022:7479 ']xdg-desktop-portal-1.8.1-1.el8.x86_64.rpm']xdg-desktop-portal-1.8.1-1.el8.x86_64.rpml 2^BBBPbugfixmod_auth_openidc:2.3 bug fix and enhancement updateE https://bugzilla.redhat.com/show_bug.cgi?id=19581481958148https://bugzilla.redhat.com/show_bug.cgi?id=20253682025368https://errata.rockylinux.org/RLBA-2022:7480RLBA-2022:7480RLBA-2022:7480 /c cjose-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm/dmod_auth_openidc-2.4.9.4-1.module+el8.7.0+1061+55d14382.x86_64.rpm/c cjose-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm cjose-devel-0.6.1-2.module+el8.3.0+129+2feafa46.x86_64.rpm/dmod_auth_openidc-2.4.9.4-1.module+el8.7.0+1061+55d14382.x86_64.rpm m 8sBBBbugfixpython-qt5 bug fix and enhancement updateD https://bugzilla.redhat.com/show_bug.cgi?id=20617292061729https://errata.rockylinux.org/RLBA-2022:7481RLBA-2022:7481RLBA-2022:7481 h(python3-qt5-5.15.0-3.el8.x86_64.rpmi(python3-qt5-base-5.15.0-3.el8.x86_64.rpmI(python-qt5-rpm-macros-5.15.0-3.el8.noarch.rpmh(python3-qt5-5.15.0-3.el8.x86_64.rpmi(python3-qt5-base-5.15.0-3.el8.x86_64.rpmI(python-qt5-rpm-macros-5.15.0-3.el8.noarch.rpm  ;ysecurityModerate: qt5 security, bug fix, and enhancement updateC"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255CVE-2022-25255CVE-2022-25255https://bugzilla.redhat.com/show_bug.cgi?id=20555052055505https://bugzilla.redhat.com/show_bug.cgi?id=20613772061377The following packages have been upgraded to a later upstream version: qt5 (5.15.3).https://errata.rockylinux.org/RLSA-2022:7482RLSA-2022:7482RLSA-2022:7482 qt5-rpm-macros-5.15.3-1.el8.noarch.rpmqt5-srpm-macros-5.15.3-1.el8.noarch.rpmqt5-rpm-macros-5.15.3-1.el8.noarch.rpmqt5-srpm-macros-5.15.3-1.el8.noarch.rpm n |BBbugfixadwaita-qt bug fix and enhancement updatee https://bugzilla.redhat.com/show_bug.cgi?id=20614142061414https://errata.rockylinux.org/RLBA-2022:7483RLBA-2022:7483RLBA-2022:7483 \%adwaita-qt5-1.2.1-4.el8.x86_64.rpmi%libadwaita-qt5-1.2.1-4.el8.x86_64.rpm\%adwaita-qt5-1.2.1-4.el8.x86_64.rpmi%libadwaita-qt5-1.2.1-4.el8.x86_64.rpm o Abugfixqgnomeplatform bug fix and enhancement updated https://bugzilla.redhat.com/show_bug.cgi?id=20614132061413https://errata.rockylinux.org/RLBA-2022:7484RLBA-2022:7484RLBA-2022:7484 ~bqgnomeplatform-0.7.1-3.el8.x86_64.rpm~bqgnomeplatform-0.7.1-3.el8.x86_64.rpm p DBBBBBBBBBBBBBBBBBBBbugfixqt5-doc bug fix and enhancement updatec https://bugzilla.redhat.com/show_bug.cgi?id=20613782061378https://errata.rockylinux.org/RLBA-2022:7485RLBA-2022:7485RLBA-2022:7485 yqt5-qt3d-doc-5.15.3-1.el8.noarch.rpmzqt5-qtbase-doc-5.15.3-1.el8.noarch.rpm{qt5-qtconnectivity-doc-5.15.3-1.el8.noarch.rpm|qt5-qtdeclarative-doc-5.15.3-1.el8.noarch.rpm~qt5-qtgraphicaleffects-doc-5.15.3-1.el8.noarch.rpmqt5-qtimageformats-doc-5.15.3-1.el8.noarch.rpmqt5-qtlocation-doc-5.15.3-1.el8.noarch.rpmqt5-qtmultimedia-doc-5.15.3-1.el8.noarch.rpmqt5-qtquickcontrols2-doc-5.15.3-1.el8.noarch.rpmqt5-qtquickcontrols-doc-5.15.3-1.el8.noarch.rpmqt5-qtscript-doc-5.15.3-1.el8.noarch.rpmqt5-qtsensors-doc-5.15.3-1.el8.noarch.rpmqt5-qtserialbus-doc-5.15.3-1.el8.noarch.rpmqt5-qtserialport-doc-5.15.3-1.el8.noarch.rpmqt5-qtsvg-doc-5.15.3-1.el8.noarch.rpm qt5-qttools-doc-5.15.3-1.el8.noarch.rpm qt5-qtwayland-doc-5.15.3-1.el8.noarch.rpm qt5-qtwebchannel-doc-5.15.3-1.el8.noarch.rpm qt5-qtwebsockets-doc-5.15.3-1.el8.noarch.rpmqt5-qtx11extras-doc-5.15.3-1.el8.noarch.rpmqt5-qtxmlpatterns-doc-5.15.3-1.el8.noarch.rpmyqt5-qt3d-doc-5.15.3-1.el8.noarch.rpmzqt5-qtbase-doc-5.15.3-1.el8.noarch.rpm{qt5-qtconnectivity-doc-5.15.3-1.el8.noarch.rpm|qt5-qtdeclarative-doc-5.15.3-1.el8.noarch.rpm~qt5-qtgraphicaleffects-doc-5.15.3-1.el8.noarch.rpmqt5-qtimageformats-doc-5.15.3-1.el8.noarch.rpmqt5-qtlocation-doc-5.15.3-1.el8.noarch.rpmqt5-qtmultimedia-doc-5.15.3-1.el8.noarch.rpmqt5-qtquickcontrols2-doc-5.15.3-1.el8.noarch.rpmqt5-qtquickcontrols-doc-5.15.3-1.el8.noarch.rpmqt5-qtscript-doc-5.15.3-1.el8.noarch.rpmqt5-qtsensors-doc-5.15.3-1.el8.noarch.rpmqt5-qtserialbus-doc-5.15.3-1.el8.noarch.rpmqt5-qtserialport-doc-5.15.3-1.el8.noarch.rpmqt5-qtsvg-doc-5.15.3-1.el8.noarch.rpm qt5-qttools-doc-5.15.3-1.el8.noarch.rpm qt5-qtwayland-doc-5.15.3-1.el8.noarch.rpm qt5-qtwebchannel-doc-5.15.3-1.el8.noarch.rpm qt5-qtwebsockets-doc-5.15.3-1.el8.noarch.rpmqt5-qtx11extras-doc-5.15.3-1.el8.noarch.rpmqt5-qtxmlpatterns-doc-5.15.3-1.el8.noarch.rpm!q ZBBBBbugfixqt5-qt3d bug fix and enhancement updateb https://bugzilla.redhat.com/show_bug.cgi?id=20613812061381https://errata.rockylinux.org/RLBA-2022:7486RLBA-2022:7486RLBA-2022:7486 qt5-qt3d-5.15.3-1.el8.x86_64.rpmqt5-qt3d-devel-5.15.3-1.el8.x86_64.rpmqt5-qt3d-examples-5.15.3-1.el8.x86_64.rpmqt5-qt3d-5.15.3-1.el8.x86_64.rpmqt5-qt3d-devel-5.15.3-1.el8.x86_64.rpmqt5-qt3d-examples-5.15.3-1.el8.x86_64.rpm!r 2aBBBBBBBBBBBBBBBbugfixqt5-qtbase bug fix and enhancement updatea https://bugzilla.redhat.com/show_bug.cgi?id=20613792061379https://errata.rockylinux.org/RLBA-2022:7487RLBA-2022:7487RLBA-2022:7487 3qt5-qtbase-mysql-5.15.3-1.el8.x86_64.rpm.qt5-qtbase-5.15.3-1.el8.x86_64.rpm/qt5-qtbase-common-5.15.3-1.el8.noarch.rpm0qt5-qtbase-devel-5.15.3-1.el8.x86_64.rpm1qt5-qtbase-examples-5.15.3-1.el8.x86_64.rpm2qt5-qtbase-gui-5.15.3-1.el8.x86_64.rpm4qt5-qtbase-odbc-5.15.3-1.el8.x86_64.rpm5qt5-qtbase-postgresql-5.15.3-1.el8.x86_64.rpm6qt5-qtbase-private-devel-5.15.3-1.el8.x86_64.rpm 3qt5-qtbase-mysql-5.15.3-1.el8.x86_64.rpm.qt5-qtbase-5.15.3-1.el8.x86_64.rpm/qt5-qtbase-common-5.15.3-1.el8.noarch.rpm0qt5-qtbase-devel-5.15.3-1.el8.x86_64.rpm1qt5-qtbase-examples-5.15.3-1.el8.x86_64.rpm2qt5-qtbase-gui-5.15.3-1.el8.x86_64.rpm4qt5-qtbase-odbc-5.15.3-1.el8.x86_64.rpm5qt5-qtbase-postgresql-5.15.3-1.el8.x86_64.rpm6qt5-qtbase-private-devel-5.15.3-1.el8.x86_64.rpm!t 9sBBBBbugfixqt5-qtconnectivity bug fix and enhancement update` https://bugzilla.redhat.com/show_bug.cgi?id=20613822061382https://errata.rockylinux.org/RLBA-2022:7489RLBA-2022:7489RLBA-2022:7489 qt5-qtconnectivity-5.15.3-1.el8.x86_64.rpm qt5-qtconnectivity-devel-5.15.3-1.el8.x86_64.rpm qt5-qtconnectivity-examples-5.15.3-1.el8.x86_64.rpmqt5-qtconnectivity-5.15.3-1.el8.x86_64.rpm qt5-qtconnectivity-devel-5.15.3-1.el8.x86_64.rpm qt5-qtconnectivity-examples-5.15.3-1.el8.x86_64.rpm!s >zBBbugfixqt5-qtcanvas3d bug fix and enhancement update_ https://bugzilla.redhat.com/show_bug.cgi?id=20747952074795https://errata.rockylinux.org/RLBA-2022:7488RLBA-2022:7488RLBA-2022:7488 Dqt5-qtcanvas3d-5.12.5-4.el8.x86_64.rpmDqt5-qtcanvas3d-examples-5.12.5-4.el8.x86_64.rpmDqt5-qtcanvas3d-5.12.5-4.el8.x86_64.rpmDqt5-qtcanvas3d-examples-5.12.5-4.el8.x86_64.rpm!u BBBBbugfixqt5-qtdeclarative bug fix and enhancement update^ https://bugzilla.redhat.com/show_bug.cgi?id=20613802061380https://errata.rockylinux.org/RLBA-2022:7490RLBA-2022:7490RLBA-2022:7490  qt5-qtdeclarative-5.15.3-1.el8.x86_64.rpm qt5-qtdeclarative-devel-5.15.3-1.el8.x86_64.rpm qt5-qtdeclarative-examples-5.15.3-1.el8.x86_64.rpm qt5-qtdeclarative-5.15.3-1.el8.x86_64.rpm qt5-qtdeclarative-devel-5.15.3-1.el8.x86_64.rpm qt5-qtdeclarative-examples-5.15.3-1.el8.x86_64.rpm"v bugfixqt5-qtdoc bug fix and enhancement update] https://bugzilla.redhat.com/show_bug.cgi?id=20613882061388https://errata.rockylinux.org/RLBA-2022:7491RLBA-2022:7491RLBA-2022:7491 }qt5-qtdoc-5.15.3-1.el8.noarch.rpm}qt5-qtdoc-5.15.3-1.el8.noarch.rpm"w Hbugfixqt5-qtgraphicaleffects bug fix and enhancement update\ https://bugzilla.redhat.com/show_bug.cgi?id=20613892061389https://errata.rockylinux.org/RLBA-2022:7492RLBA-2022:7492RLBA-2022:7492 qt5-qtgraphicaleffects-5.15.3-1.el8.x86_64.rpmqt5-qtgraphicaleffects-5.15.3-1.el8.x86_64.rpm"x Kbugfixqt5-qtimageformats bug fix and enhancement update[ https://bugzilla.redhat.com/show_bug.cgi?id=20613952061395https://errata.rockylinux.org/RLBA-2022:7493RLBA-2022:7493RLBA-2022:7493 qt5-qtimageformats-5.15.3-1.el8.x86_64.rpmqt5-qtimageformats-5.15.3-1.el8.x86_64.rpm"y NBBBBbugfixqt5-qtlocation bug fix and enhancement updateZ https://bugzilla.redhat.com/show_bug.cgi?id=20613962061396https://errata.rockylinux.org/RLBA-2022:7494RLBA-2022:7494RLBA-2022:7494 qt5-qtlocation-5.15.3-1.el8.x86_64.rpmqt5-qtlocation-devel-5.15.3-1.el8.x86_64.rpmqt5-qtlocation-examples-5.15.3-1.el8.x86_64.rpmqt5-qtlocation-5.15.3-1.el8.x86_64.rpmqt5-qtlocation-devel-5.15.3-1.el8.x86_64.rpmqt5-qtlocation-examples-5.15.3-1.el8.x86_64.rpm"z UBBBBbugfixsip bug fix and enhancement updateY https://bugzilla.redhat.com/show_bug.cgi?id=20716062071606https://errata.rockylinux.org/RLBA-2022:7495RLBA-2022:7495RLBA-2022:7495 gepython3-pyqt5-sip-4.19.25-1.el8.x86_64.rpmmepython3-wx-siplib-4.19.25-1.el8.x86_64.rpmmesip-4.19.25-1.el8.x86_64.rpmgepython3-pyqt5-sip-4.19.25-1.el8.x86_64.rpmmepython3-wx-siplib-4.19.25-1.el8.x86_64.rpmmesip-4.19.25-1.el8.x86_64.rpm#{ "\BBBBbugfixqt5-qtmultimedia bug fix and enhancement updateX https://bugzilla.redhat.com/show_bug.cgi?id=20613972061397https://errata.rockylinux.org/RLBA-2022:7496RLBA-2022:7496RLBA-2022:7496 qt5-qtmultimedia-5.15.3-1.el8.x86_64.rpmqt5-qtmultimedia-devel-5.15.3-1.el8.x86_64.rpmqt5-qtmultimedia-examples-5.15.3-1.el8.x86_64.rpmqt5-qtmultimedia-5.15.3-1.el8.x86_64.rpmqt5-qtmultimedia-devel-5.15.3-1.el8.x86_64.rpmqt5-qtmultimedia-examples-5.15.3-1.el8.x86_64.rpm#} 'cBBbugfixqt5-qtquickcontrols2 bug fix and enhancement updateW https://bugzilla.redhat.com/show_bug.cgi?id=20613992061399https://errata.rockylinux.org/RLBA-2022:7498RLBA-2022:7498RLBA-2022:7498 qt5-qtquickcontrols2-5.15.3-1.el8.x86_64.rpmqt5-qtquickcontrols2-examples-5.15.3-1.el8.x86_64.rpmqt5-qtquickcontrols2-5.15.3-1.el8.x86_64.rpmqt5-qtquickcontrols2-examples-5.15.3-1.el8.x86_64.rpm#| ,hBBbugfixqt5-qtquickcontrols bug fix and enhancement updateV https://bugzilla.redhat.com/show_bug.cgi?id=20613982061398https://errata.rockylinux.org/RLBA-2022:7497RLBA-2022:7497RLBA-2022:7497 qt5-qtquickcontrols-5.15.3-1.el8.x86_64.rpmqt5-qtquickcontrols-examples-5.15.3-1.el8.x86_64.rpmqt5-qtquickcontrols-5.15.3-1.el8.x86_64.rpmqt5-qtquickcontrols-examples-5.15.3-1.el8.x86_64.rpm#~ 3mBBBBbugfixqt5-qtscript bug fix and enhancement updateU https://bugzilla.redhat.com/show_bug.cgi?id=20614002061400https://errata.rockylinux.org/RLBA-2022:7499RLBA-2022:7499RLBA-2022:7499 qt5-qtscript-5.15.3-1.el8.x86_64.rpmqt5-qtscript-devel-5.15.3-1.el8.x86_64.rpmqt5-qtscript-examples-5.15.3-1.el8.x86_64.rpmqt5-qtscript-5.15.3-1.el8.x86_64.rpmqt5-qtscript-devel-5.15.3-1.el8.x86_64.rpmqt5-qtscript-examples-5.15.3-1.el8.x86_64.rpm$ :tBBBBbugfixqt5-qtsensors bug fix and enhancement updateT https://bugzilla.redhat.com/show_bug.cgi?id=20614012061401https://errata.rockylinux.org/RLBA-2022:7500RLBA-2022:7500RLBA-2022:7500 qt5-qtsensors-5.15.3-1.el8.x86_64.rpmqt5-qtsensors-devel-5.15.3-1.el8.x86_64.rpmqt5-qtsensors-examples-5.15.3-1.el8.x86_64.rpmqt5-qtsensors-5.15.3-1.el8.x86_64.rpmqt5-qtsensors-devel-5.15.3-1.el8.x86_64.rpmqt5-qtsensors-examples-5.15.3-1.el8.x86_64.rpm$ ?{BBbugfixqt5-qtserialbus bug fix and enhancement updateS https://bugzilla.redhat.com/show_bug.cgi?id=20614022061402https://errata.rockylinux.org/RLBA-2022:7501RLBA-2022:7501RLBA-2022:7501  qt5-qtserialbus-5.15.3-1.el8.x86_64.rpm!qt5-qtserialbus-examples-5.15.3-1.el8.x86_64.rpm qt5-qtserialbus-5.15.3-1.el8.x86_64.rpm!qt5-qtserialbus-examples-5.15.3-1.el8.x86_64.rpm$ @BBBBbugfixqt5-qtserialport bug fix and enhancement updateR https://bugzilla.redhat.com/show_bug.cgi?id=20614042061404https://errata.rockylinux.org/RLBA-2022:7502RLBA-2022:7502RLBA-2022:7502 "qt5-qtserialport-5.15.3-1.el8.x86_64.rpm#qt5-qtserialport-devel-5.15.3-1.el8.x86_64.rpm$qt5-qtserialport-examples-5.15.3-1.el8.x86_64.rpm"qt5-qtserialport-5.15.3-1.el8.x86_64.rpm#qt5-qtserialport-devel-5.15.3-1.el8.x86_64.rpm$qt5-qtserialport-examples-5.15.3-1.el8.x86_64.rpm$ GBBBBbugfixqt5-qtsvg bug fix and enhancement updateQ https://bugzilla.redhat.com/show_bug.cgi?id=20614052061405https://errata.rockylinux.org/RLBA-2022:7503RLBA-2022:7503RLBA-2022:7503 %qt5-qtsvg-5.15.3-1.el8.x86_64.rpm&qt5-qtsvg-devel-5.15.3-1.el8.x86_64.rpm'qt5-qtsvg-examples-5.15.3-1.el8.x86_64.rpm%qt5-qtsvg-5.15.3-1.el8.x86_64.rpm&qt5-qtsvg-devel-5.15.3-1.el8.x86_64.rpm'qt5-qtsvg-examples-5.15.3-1.el8.x86_64.rpm$ %NBBBBBBBBBBBBBBBBBBBBBbugfixqt5-qttools bug fix and enhancement updateP https://bugzilla.redhat.com/show_bug.cgi?id=20614062061406https://errata.rockylinux.org/RLBA-2022:7504RLBA-2022:7504RLBA-2022:7504 ) qt5-assistant-5.15.3-2.el8.x86_64.rpm* qt5-designer-5.15.3-2.el8.x86_64.rpm+ qt5-doctools-5.15.3-2.el8.x86_64.rpm, qt5-linguist-5.15.3-2.el8.x86_64.rpm- qt5-qdbusviewer-5.15.3-2.el8.x86_64.rpm7 qt5-qttools-5.15.3-2.el8.x86_64.rpm8 qt5-qttools-common-5.15.3-2.el8.noarch.rpm9 qt5-qttools-devel-5.15.3-2.el8.x86_64.rpm: qt5-qttools-examples-5.15.3-2.el8.x86_64.rpm; qt5-qttools-libs-designer-5.15.3-2.el8.x86_64.rpm< qt5-qttools-libs-designercomponents-5.15.3-2.el8.x86_64.rpm= qt5-qttools-libs-help-5.15.3-2.el8.x86_64.rpm ) qt5-assistant-5.15.3-2.el8.x86_64.rpm* qt5-designer-5.15.3-2.el8.x86_64.rpm+ qt5-doctools-5.15.3-2.el8.x86_64.rpm, qt5-linguist-5.15.3-2.el8.x86_64.rpm- qt5-qdbusviewer-5.15.3-2.el8.x86_64.rpm7 qt5-qttools-5.15.3-2.el8.x86_64.rpm8 qt5-qttools-common-5.15.3-2.el8.noarch.rpm9 qt5-qttools-devel-5.15.3-2.el8.x86_64.rpm: qt5-qttools-examples-5.15.3-2.el8.x86_64.rpm; qt5-qttools-libs-designer-5.15.3-2.el8.x86_64.rpm< qt5-qttools-libs-designercomponents-5.15.3-2.el8.x86_64.rpm= qt5-qttools-libs-help-5.15.3-2.el8.x86_64.rpm% '&bugfixqt5-qttranslations bug fix and enhancement updateO https://bugzilla.redhat.com/show_bug.cgi?id=20614072061407https://errata.rockylinux.org/RLBA-2022:7505RLBA-2022:7505RLBA-2022:7505  qt5-qttranslations-5.15.3-1.el8.noarch.rpm qt5-qttranslations-5.15.3-1.el8.noarch.rpm% ,hBBbugfixqt5-qtwayland bug fix and enhancement updateN https://bugzilla.redhat.com/show_bug.cgi?id=20614082061408https://errata.rockylinux.org/RLBA-2022:7506RLBA-2022:7506RLBA-2022:7506 (qt5-qtwayland-5.15.3-1.el8.x86_64.rpm)qt5-qtwayland-examples-5.15.3-1.el8.x86_64.rpm(qt5-qtwayland-5.15.3-1.el8.x86_64.rpm)qt5-qtwayland-examples-5.15.3-1.el8.x86_64.rpm% 3mBBBBbugfixqt5-qtwebchannel bug fix and enhancement updateM https://bugzilla.redhat.com/show_bug.cgi?id=20614092061409https://errata.rockylinux.org/RLBA-2022:7507RLBA-2022:7507RLBA-2022:7507 *qt5-qtwebchannel-5.15.3-1.el8.x86_64.rpm+qt5-qtwebchannel-devel-5.15.3-1.el8.x86_64.rpm,qt5-qtwebchannel-examples-5.15.3-1.el8.x86_64.rpm*qt5-qtwebchannel-5.15.3-1.el8.x86_64.rpm+qt5-qtwebchannel-devel-5.15.3-1.el8.x86_64.rpm,qt5-qtwebchannel-examples-5.15.3-1.el8.x86_64.rpm% :tBBBBbugfixqt5-qtwebsockets bug fix and enhancement updateL https://bugzilla.redhat.com/show_bug.cgi?id=20614102061410https://errata.rockylinux.org/RLBA-2022:7508RLBA-2022:7508RLBA-2022:7508 -qt5-qtwebsockets-5.15.3-1.el8.x86_64.rpm.qt5-qtwebsockets-devel-5.15.3-1.el8.x86_64.rpm/qt5-qtwebsockets-examples-5.15.3-1.el8.x86_64.rpm-qt5-qtwebsockets-5.15.3-1.el8.x86_64.rpm.qt5-qtwebsockets-devel-5.15.3-1.el8.x86_64.rpm/qt5-qtwebsockets-examples-5.15.3-1.el8.x86_64.rpm% ?{BBbugfixqt5-qtx11extras bug fix and enhancement updateK https://bugzilla.redhat.com/show_bug.cgi?id=20614112061411https://errata.rockylinux.org/RLBA-2022:7509RLBA-2022:7509RLBA-2022:7509 0qt5-qtx11extras-5.15.3-1.el8.x86_64.rpm1qt5-qtx11extras-devel-5.15.3-1.el8.x86_64.rpm0qt5-qtx11extras-5.15.3-1.el8.x86_64.rpm1qt5-qtx11extras-devel-5.15.3-1.el8.x86_64.rpm&  @BBBBbugfixqt5-qtxmlpatterns bug fix and enhancement updateJ https://bugzilla.redhat.com/show_bug.cgi?id=20614122061412https://errata.rockylinux.org/RLBA-2022:7510RLBA-2022:7510RLBA-2022:7510 2qt5-qtxmlpatterns-5.15.3-1.el8.x86_64.rpm3qt5-qtxmlpatterns-devel-5.15.3-1.el8.x86_64.rpm4qt5-qtxmlpatterns-examples-5.15.3-1.el8.x86_64.rpm2qt5-qtxmlpatterns-5.15.3-1.el8.x86_64.rpm3qt5-qtxmlpatterns-devel-5.15.3-1.el8.x86_64.rpm4qt5-qtxmlpatterns-examples-5.15.3-1.el8.x86_64.rpm&  Gbugfixpostgresql-jdbc bug fix and enhancement updateI https://bugzilla.redhat.com/show_bug.cgi?id=20306462030646https://errata.rockylinux.org/RLBA-2022:7512RLBA-2022:7512RLBA-2022:7512 postgresql-jdbc-42.2.14-1.el8.noarch.rpmpostgresql-jdbc-javadoc-42.2.14-1.el8.noarch.rpmpostgresql-jdbc-42.2.14-1.el8.noarch.rpmpostgresql-jdbc-javadoc-42.2.14-1.el8.noarch.rpm&  Jbugfixcrash-gcore-command bug fix and enhancement updateH https://errata.rockylinux.org/RLBA-2022:7513RLBA-2022:7513RLBA-2022:7513 DScrash-gcore-command-1.6.3-2.el8.x86_64.rpmDScrash-gcore-command-1.6.3-2.el8.x86_64.rpm& MBBsecurityModerate: fribidi security updateGohttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25308CVE-2022-25308CVE-2022-25308https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25309CVE-2022-25309CVE-2022-25309https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25310CVE-2022-25310CVE-2022-25310https://bugzilla.redhat.com/show_bug.cgi?id=20478902047890https://bugzilla.redhat.com/show_bug.cgi?id=20478962047896https://bugzilla.redhat.com/show_bug.cgi?id=20479232047923https://errata.rockylinux.org/RLSA-2022:7514RLSA-2022:7514RLSA-2022:7514 !fribidi-1.0.4-9.el8.x86_64.rpm"fribidi-devel-1.0.4-9.el8.x86_64.rpm!fribidi-1.0.4-9.el8.x86_64.rpm"fribidi-devel-1.0.4-9.el8.x86_64.rpm&  RBBBBBBBBbugfixpapi and libpfm bug fix and enhancement update6 https://bugzilla.redhat.com/show_bug.cgi?id=20672182067218https://bugzilla.redhat.com/show_bug.cgi?id=20715582071558https://errata.rockylinux.org/RLBA-2022:7515RLBA-2022:7515RLBA-2022:7515 .;libpfm-4.10.1-5.el8.x86_64.rpm/;libpfm-devel-4.10.1-5.el8.x86_64.rpmsipapi-5.6.0-16.el8.x86_64.rpmtipapi-devel-5.6.0-16.el8.x86_64.rpmuipapi-libs-5.6.0-16.el8.x86_64.rpm.;libpfm-4.10.1-5.el8.x86_64.rpm/;libpfm-devel-4.10.1-5.el8.x86_64.rpmsipapi-5.6.0-16.el8.x86_64.rpmtipapi-devel-5.6.0-16.el8.x86_64.rpmuipapi-libs-5.6.0-16.el8.x86_64.rpm' ]bugfixcscope bug fix and enhancement update5 https://errata.rockylinux.org/RLBA-2022:7517RLBA-2022:7517RLBA-2022:7517 Icscope-15.9-11.el8.x86_64.rpmIcscope-15.9-11.el8.x86_64.rpm'  ! bugfixoscap-anaconda-addon bug fix and enhancement update4 https://bugzilla.redhat.com/show_bug.cgi?id=20627072062707https://errata.rockylinux.org/RLBA-2022:7516RLBA-2022:7516RLBA-2022:7516 |Qoscap-anaconda-addon-1.2.1-8.el8.noarch.rpm|Qoscap-anaconda-addon-1.2.1-8.el8.noarch.rpm' $bbugfixdyninst bug fix and enhancement update3 https://bugzilla.redhat.com/show_bug.cgi?id=20576762057676https://errata.rockylinux.org/RLBA-2022:7518RLBA-2022:7518RLBA-2022:7518 edyninst-12.1.0-1.el8.x86_64.rpmedyninst-12.1.0-1.el8.x86_64.rpm'  'esecurityModerate: grafana security, bug fix, and enhancement update2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23648CVE-2021-23648CVE-2021-23648https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1705CVE-2022-1705CVE-2022-1705https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1962CVE-2022-1962CVE-2022-1962https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21673CVE-2022-21673CVE-2022-21673https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21698CVE-2022-21698CVE-2022-21698https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21702CVE-2022-21702CVE-2022-21702https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21703CVE-2022-21703CVE-2022-21703https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21713CVE-2022-21713CVE-2022-21713https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28131CVE-2022-28131CVE-2022-28131https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30630CVE-2022-30630CVE-2022-30630https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30631CVE-2022-30631CVE-2022-30631https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30632CVE-2022-30632CVE-2022-30632https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30633CVE-2022-30633CVE-2022-30633https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30635CVE-2022-30635CVE-2022-30635https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32148CVE-2022-32148CVE-2022-32148https://bugzilla.redhat.com/show_bug.cgi?id=20446282044628https://bugzilla.redhat.com/show_bug.cgi?id=20458802045880https://bugzilla.redhat.com/show_bug.cgi?id=20506482050648https://bugzilla.redhat.com/show_bug.cgi?id=20507422050742https://bugzilla.redhat.com/show_bug.cgi?id=20507432050743https://bugzilla.redhat.com/show_bug.cgi?id=20553482055348The following packages have been upgraded to a later upstream version: grafana (7.5.15).https://bugzilla.redhat.com/show_bug.cgi?id=20652902065290https://bugzilla.redhat.com/show_bug.cgi?id=21073422107342https://bugzilla.redhat.com/show_bug.cgi?id=21073712107371https://bugzilla.redhat.com/show_bug.cgi?id=21073742107374https://bugzilla.redhat.com/show_bug.cgi?id=21073762107376https://bugzilla.redhat.com/show_bug.cgi?id=21073832107383https://bugzilla.redhat.com/show_bug.cgi?id=21073862107386https://bugzilla.redhat.com/show_bug.cgi?id=21073882107388https://bugzilla.redhat.com/show_bug.cgi?id=21073902107390https://bugzilla.redhat.com/show_bug.cgi?id=21073922107392https://errata.rockylinux.org/RLSA-2022:7519RLSA-2022:7519RLSA-2022:7519 *grafana-7.5.15-3.el8.x86_64.rpm*grafana-7.5.15-3.el8.x86_64.rpm' hBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbugfixfence-agents bug fix and enhancement update6 https://bugzilla.redhat.com/show_bug.cgi?id=17282031728203https://bugzilla.redhat.com/show_bug.cgi?id=18860741886074https://bugzilla.redhat.com/show_bug.cgi?id=20724212072421https://bugzilla.redhat.com/show_bug.cgi?id=20807292080729https://bugzilla.redhat.com/show_bug.cgi?id=20809942080994https://bugzilla.redhat.com/show_bug.cgi?id=20918262091826https://bugzilla.redhat.com/show_bug.cgi?id=20929212092921https://errata.rockylinux.org/RLBA-2022:7520RLBA-2022:7520RLBA-2022:7520 )|!fence-agents-all-4.2.1-103.el8.x86_64.rpm!fence-agents-amt-ws-4.2.1-103.el8.noarch.rpm!fence-agents-apc-4.2.1-103.el8.noarch.rpm!fence-agents-apc-snmp-4.2.1-103.el8.noarch.rpm!fence-agents-bladecenter-4.2.1-103.el8.noarch.rpm!fence-agents-brocade-4.2.1-103.el8.noarch.rpm!fence-agents-cisco-mds-4.2.1-103.el8.noarch.rpm!fence-agents-cisco-ucs-4.2.1-103.el8.noarch.rpm !fence-agents-common-4.2.1-103.el8.noarch.rpm !fence-agents-compute-4.2.1-103.el8.noarch.rpm !fence-agents-drac5-4.2.1-103.el8.noarch.rpm !fence-agents-eaton-snmp-4.2.1-103.el8.noarch.rpm !fence-agents-emerson-4.2.1-103.el8.noarch.rpm!fence-agents-eps-4.2.1-103.el8.noarch.rpm!fence-agents-heuristics-ping-4.2.1-103.el8.noarch.rpm!fence-agents-hpblade-4.2.1-103.el8.noarch.rpm!fence-agents-ibmblade-4.2.1-103.el8.noarch.rpm!fence-agents-ibm-powervs-4.2.1-103.el8.noarch.rpm!fence-agents-ibm-vpc-4.2.1-103.el8.noarch.rpm!fence-agents-ifmib-4.2.1-103.el8.noarch.rpm!fence-agents-ilo2-4.2.1-103.el8.noarch.rpm!fence-agents-ilo-moonshot-4.2.1-103.el8.noarch.rpm!fence-agents-ilo-mp-4.2.1-103.el8.noarch.rpm!fence-agents-ilo-ssh-4.2.1-103.el8.noarch.rpm!fence-agents-intelmodular-4.2.1-103.el8.noarch.rpm!fence-agents-ipdu-4.2.1-103.el8.noarch.rpm!fence-agents-ipmilan-4.2.1-103.el8.noarch.rpm}!fence-agents-kdump-4.2.1-103.el8.x86_64.rpm~!fence-agents-kubevirt-4.2.1-103.el8.x86_64.rpm!fence-agents-lpar-4.2.1-103.el8.noarch.rpm!fence-agents-mpath-4.2.1-103.el8.noarch.rpm!fence-agents-redfish-4.2.1-103.el8.x86_64.rpm!fence-agents-rhevm-4.2.1-103.el8.noarch.rpm!fence-agents-rsa-4.2.1-103.el8.noarch.rpm !fence-agents-rsb-4.2.1-103.el8.noarch.rpm!!fence-agents-sbd-4.2.1-103.el8.noarch.rpm"!fence-agents-scsi-4.2.1-103.el8.noarch.rpm#!fence-agents-virsh-4.2.1-103.el8.noarch.rpm$!fence-agents-vmware-rest-4.2.1-103.el8.noarch.rpm%!fence-agents-vmware-soap-4.2.1-103.el8.noarch.rpm&!fence-agents-wti-4.2.1-103.el8.noarch.rpm)|!fence-agents-all-4.2.1-103.el8.x86_64.rpm!fence-agents-amt-ws-4.2.1-103.el8.noarch.rpm!fence-agents-apc-4.2.1-103.el8.noarch.rpm!fence-agents-apc-snmp-4.2.1-103.el8.noarch.rpm!fence-agents-bladecenter-4.2.1-103.el8.noarch.rpm!fence-agents-brocade-4.2.1-103.el8.noarch.rpm!fence-agents-cisco-mds-4.2.1-103.el8.noarch.rpm!fence-agents-cisco-ucs-4.2.1-103.el8.noarch.rpm !fence-agents-common-4.2.1-103.el8.noarch.rpm !fence-agents-compute-4.2.1-103.el8.noarch.rpm !fence-agents-drac5-4.2.1-103.el8.noarch.rpm !fence-agents-eaton-snmp-4.2.1-103.el8.noarch.rpm !fence-agents-emerson-4.2.1-103.el8.noarch.rpm!fence-agents-eps-4.2.1-103.el8.noarch.rpm!fence-agents-heuristics-ping-4.2.1-103.el8.noarch.rpm!fence-agents-hpblade-4.2.1-103.el8.noarch.rpm!fence-agents-ibmblade-4.2.1-103.el8.noarch.rpm!fence-agents-ibm-powervs-4.2.1-103.el8.noarch.rpm!fence-agents-ibm-vpc-4.2.1-103.el8.noarch.rpm!fence-agents-ifmib-4.2.1-103.el8.noarch.rpm!fence-agents-ilo2-4.2.1-103.el8.noarch.rpm!fence-agents-ilo-moonshot-4.2.1-103.el8.noarch.rpm!fence-agents-ilo-mp-4.2.1-103.el8.noarch.rpm!fence-agents-ilo-ssh-4.2.1-103.el8.noarch.rpm!fence-agents-intelmodular-4.2.1-103.el8.noarch.rpm!fence-agents-ipdu-4.2.1-103.el8.noarch.rpm!fence-agents-ipmilan-4.2.1-103.el8.noarch.rpm}!fence-agents-kdump-4.2.1-103.el8.x86_64.rpm~!fence-agents-kubevirt-4.2.1-103.el8.x86_64.rpm!fence-agents-lpar-4.2.1-103.el8.noarch.rpm!fence-agents-mpath-4.2.1-103.el8.noarch.rpm!fence-agents-redfish-4.2.1-103.el8.x86_64.rpm!fence-agents-rhevm-4.2.1-103.el8.noarch.rpm!fence-agents-rsa-4.2.1-103.el8.noarch.rpm !fence-agents-rsb-4.2.1-103.el8.noarch.rpm!!fence-agents-sbd-4.2.1-103.el8.noarch.rpm"!fence-agents-scsi-4.2.1-103.el8.noarch.rpm#!fence-agents-virsh-4.2.1-103.el8.noarch.rpm$!fence-agents-vmware-rest-4.2.1-103.el8.noarch.rpm%!fence-agents-vmware-soap-4.2.1-103.el8.noarch.rpm&!fence-agents-wti-4.2.1-103.el8.noarch.rpm( VBBbugfixtftp bug fix and enhancement update5 https://bugzilla.redhat.com/show_bug.cgi?id=20668532066853https://bugzilla.redhat.com/show_bug.cgi?id=20668622066862https://errata.rockylinux.org/RLBA-2022:7521RLBA-2022:7521RLBA-2022:7521 Etftp-5.2-26.el8.x86_64.rpmEtftp-server-5.2-26.el8.x86_64.rpmEtftp-5.2-26.el8.x86_64.rpmEtftp-server-5.2-26.el8.x86_64.rpm( 'SBHBBBBBBBBBBbugfixgo-toolset:rhel8 bug fix and enhancement update4 https://bugzilla.redhat.com/show_bug.cgi?id=20765012076501https://bugzilla.redhat.com/show_bug.cgi?id=20779562077956https://errata.rockylinux.org/RLBA-2022:7522RLBA-2022:7522RLBA-2022:7522 *v0T S[delve-1.8.3-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm5golang-1.18.4-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm5golang-bin-1.18.4-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm5golang-docs-1.18.4-1.module+el8.7.0+1073+99e3b3cd.noarch.rpm5golang-misc-1.18.4-1.module+el8.7.0+1073+99e3b3cd.noarch.rpm5golang-race-1.18.4-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm5golang-src-1.18.4-1.module+el8.7.0+1073+99e3b3cd.noarch.rpm5golang-tests-1.18.4-1.module+el8.7.0+1073+99e3b3cd.noarch.rpm*5go-toolset-1.18.4-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm*v0T S[delve-1.8.3-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm5golang-1.18.4-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm5golang-bin-1.18.4-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm5golang-docs-1.18.4-1.module+el8.7.0+1073+99e3b3cd.noarch.rpm5golang-misc-1.18.4-1.module+el8.7.0+1073+99e3b3cd.noarch.rpm5golang-race-1.18.4-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm5golang-src-1.18.4-1.module+el8.7.0+1073+99e3b3cd.noarch.rpm5golang-tests-1.18.4-1.module+el8.7.0+1073+99e3b3cd.noarch.rpm*5go-toolset-1.18.4-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm( )(bugfixcloud-init bug fix and enhancement update3 https://bugzilla.redhat.com/show_bug.cgi?id=20826862082686https://bugzilla.redhat.com/show_bug.cgi?id=21100662110066https://errata.rockylinux.org/RLBA-2022:7523RLBA-2022:7523RLBA-2022:7523  cloud-init-22.1-5.el8.noarch.rpm cloud-init-22.1-5.el8.noarch.rpm(  ,jsecurityModerate: yajl security update2Zhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24795CVE-2022-24795CVE-2022-24795https://bugzilla.redhat.com/show_bug.cgi?id=20729122072912https://errata.rockylinux.org/RLSA-2022:7524RLSA-2022:7524RLSA-2022:7524 )7yajl-2.1.0-11.el8.x86_64.rpm)7yajl-2.1.0-11.el8.x86_64.rpm) 1mBBbugfixvalgrind bug fix and enhancement update  https://bugzilla.redhat.com/show_bug.cgi?id=20576252057625https://errata.rockylinux.org/RLBA-2022:7525RLBA-2022:7525RLBA-2022:7525 ,cvalgrind-3.19.0-1.el8.x86_64.rpm-cvalgrind-devel-3.19.0-1.el8.x86_64.rpm,cvalgrind-3.19.0-1.el8.x86_64.rpm-cvalgrind-devel-3.19.0-1.el8.x86_64.rpm)a fBLBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBenhancementruby:3.1 bug fix and enhancement update  https://errata.rockylinux.org/RLEA-2022:7528RLEA-2022:7528RLEA-2022:7528 GfALruby-3.1.2-141.module+el8.7.0+1081+f0a69743.x86_64.rpmKLruby-bundled-gems-3.1.2-141.module+el8.7.0+1081+f0a69743.x86_64.rpmfLruby-default-gems-3.1.2-141.module+el8.7.0+1081+f0a69743.noarch.rpmTLruby-devel-3.1.2-141.module+el8.7.0+1081+f0a69743.x86_64.rpm9Lruby-doc-3.1.2-141.module+el8.7.0+1081+f0a69743.noarch.rpm4 rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm5 rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpmVrubygem-bigdecimal-3.1.1-141.module+el8.7.0+1081+f0a69743.x86_64.rpmcjrubygem-bundler-2.3.7-141.module+el8.7.0+1081+f0a69743.noarch.rpmWXrubygem-io-console-0.5.11-141.module+el8.7.0+1081+f0a69743.x86_64.rpmXrubygem-irb-1.4.1-141.module+el8.7.0+1081+f0a69743.noarch.rpmYqrubygem-json-2.6.1-141.module+el8.7.0+1081+f0a69743.x86_64.rpm:Jrubygem-minitest-5.15.0-141.module+el8.7.0+1081+f0a69743.noarch.rpm6&rubygem-mysql2-0.5.3-2.module+el8.7.0+1081+f0a69743.x86_64.rpm)&rubygem-mysql2-doc-0.5.3-2.module+el8.7.0+1081+f0a69743.noarch.rpm7=rubygem-pg-1.3.2-1.module+el8.7.0+1081+f0a69743.x86_64.rpm*=rubygem-pg-doc-1.3.2-1.module+el8.7.0+1081+f0a69743.noarch.rpm;Frubygem-power_assert-2.0.1-141.module+el8.7.0+1081+f0a69743.noarch.rpmZ]rubygem-psych-4.0.3-141.module+el8.7.0+1081+f0a69743.x86_64.rpm<rubygem-rake-13.0.6-141.module+el8.7.0+1081+f0a69743.noarch.rpm4:rubygem-rbs-2.1.0-141.module+el8.7.0+1081+f0a69743.x86_64.rpm=Xrubygem-rdoc-6.4.0-141.module+el8.7.0+1081+f0a69743.noarch.rpm? rubygems-3.3.7-141.module+el8.7.0+1081+f0a69743.noarch.rpm@ rubygems-devel-3.3.7-141.module+el8.7.0+1081+f0a69743.noarch.rpm>2rubygem-test-unit-3.5.3-141.module+el8.7.0+1081+f0a69743.noarch.rpmK|rubygem-typeprof-0.21.2-141.module+el8.7.0+1081+f0a69743.noarch.rpmULruby-libs-3.1.2-141.module+el8.7.0+1081+f0a69743.x86_64.rpmGfALruby-3.1.2-141.module+el8.7.0+1081+f0a69743.x86_64.rpmKLruby-bundled-gems-3.1.2-141.module+el8.7.0+1081+f0a69743.x86_64.rpmfLruby-default-gems-3.1.2-141.module+el8.7.0+1081+f0a69743.noarch.rpmTLruby-devel-3.1.2-141.module+el8.7.0+1081+f0a69743.x86_64.rpm9Lruby-doc-3.1.2-141.module+el8.7.0+1081+f0a69743.noarch.rpm4 rubygem-abrt-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpm5 rubygem-abrt-doc-0.4.0-1.module+el8.5.0+668+665814fa.noarch.rpmVrubygem-bigdecimal-3.1.1-141.module+el8.7.0+1081+f0a69743.x86_64.rpmcjrubygem-bundler-2.3.7-141.module+el8.7.0+1081+f0a69743.noarch.rpmWXrubygem-io-console-0.5.11-141.module+el8.7.0+1081+f0a69743.x86_64.rpmXrubygem-irb-1.4.1-141.module+el8.7.0+1081+f0a69743.noarch.rpmYqrubygem-json-2.6.1-141.module+el8.7.0+1081+f0a69743.x86_64.rpm:Jrubygem-minitest-5.15.0-141.module+el8.7.0+1081+f0a69743.noarch.rpm6&rubygem-mysql2-0.5.3-2.module+el8.7.0+1081+f0a69743.x86_64.rpm)&rubygem-mysql2-doc-0.5.3-2.module+el8.7.0+1081+f0a69743.noarch.rpm7=rubygem-pg-1.3.2-1.module+el8.7.0+1081+f0a69743.x86_64.rpm*=rubygem-pg-doc-1.3.2-1.module+el8.7.0+1081+f0a69743.noarch.rpm;Frubygem-power_assert-2.0.1-141.module+el8.7.0+1081+f0a69743.noarch.rpmZ]rubygem-psych-4.0.3-141.module+el8.7.0+1081+f0a69743.x86_64.rpm<rubygem-rake-13.0.6-141.module+el8.7.0+1081+f0a69743.noarch.rpm4:rubygem-rbs-2.1.0-141.module+el8.7.0+1081+f0a69743.x86_64.rpm=Xrubygem-rdoc-6.4.0-141.module+el8.7.0+1081+f0a69743.noarch.rpm? rubygems-3.3.7-141.module+el8.7.0+1081+f0a69743.noarch.rpm@ rubygems-devel-3.3.7-141.module+el8.7.0+1081+f0a69743.noarch.rpm>2rubygem-test-unit-3.5.3-141.module+el8.7.0+1081+f0a69743.noarch.rpmK|rubygem-typeprof-0.21.2-141.module+el8.7.0+1081+f0a69743.noarch.rpmULruby-libs-3.1.2-141.module+el8.7.0+1081+f0a69743.x86_64.rpm+  ,FBBBBBOBBBBBLBRJWBPBGhBBBjBOBQBsBBBBBBBBBBBBBBBBBBBsecurityModerate: container-tools:3.0 security update {https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1705CVE-2022-1705CVE-2022-1705https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1708CVE-2022-1708CVE-2022-1708https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1962CVE-2022-1962CVE-2022-1962https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21698CVE-2022-21698CVE-2022-21698https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28131CVE-2022-28131CVE-2022-28131https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30630CVE-2022-30630CVE-2022-30630https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30631CVE-2022-30631CVE-2022-30631https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30632CVE-2022-30632CVE-2022-30632https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30633CVE-2022-30633CVE-2022-30633https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32148CVE-2022-32148CVE-2022-32148https://bugzilla.redhat.com/show_bug.cgi?id=20458802045880https://bugzilla.redhat.com/show_bug.cgi?id=20853612085361https://bugzilla.redhat.com/show_bug.cgi?id=21073422107342https://bugzilla.redhat.com/show_bug.cgi?id=21073712107371https://bugzilla.redhat.com/show_bug.cgi?id=21073742107374https://bugzilla.redhat.com/show_bug.cgi?id=21073762107376https://bugzilla.redhat.com/show_bug.cgi?id=21073832107383https://bugzilla.redhat.com/show_bug.cgi?id=21073862107386https://bugzilla.redhat.com/show_bug.cgi?id=21073902107390https://bugzilla.redhat.com/show_bug.cgi?id=21073922107392https://errata.rockylinux.org/RLSA-2022:7529RLSA-2022:7529RLSA-2022:7529 pW#buildah-1.19.9-6.module+el8.7.0+1076+9b1c11c1.x86_64.rpm}#buildah-tests-1.19.9-6.module+el8.7.0+1076+9b1c11c1.x86_64.rpmScockpit-podman-29-2.module+el8.7.0+1076+9b1c11c1.noarch.rpmconmon-2.0.26-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm9containernetworking-plugins-0.9.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm1Lcontainers-common-1.2.4-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpmcontainer-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm-0crit-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm*0criu-3.15-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmZYcrun-0.18-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpmL fuse-overlayfs-1.4.0-2.module+el8.7.0+1076+9b1c11c1.x86_64.rpmTKlibslirp-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpmUKlibslirp-devel-4.3.1-1.module+el8.7.0+1076+9b1c11c1.x86_64.rpm\Qoci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+1076+9b1c11c1.x86_64.rpm Bpodman-3.0.1-13.module+el8.7.0+1076+9b1c11c1.x86_64.rpmBpodman-catatonit-3.0.1-13.module+el8.7.0+1076+9b1c11c1.x86_64.rpm Bpodman-docker-3.0.1-13.module+el8.7.0+1076+9b1c11c1.noarch.rpmBpodman-plugins-3.0.1-13.module+el8.7.0+1076+9b1c11c1.x86_64.rpm;Bpodman-remote-3.0.1-13.module+el8.7.0+1076+9b1c11c1.x86_64.rpm 4oBBBbugfixevolution-data-server bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=20817462081746https://errata.rockylinux.org/RLBA-2022:7531RLBA-2022:7531RLBA-2022:7531 cevolution-data-server-3.28.5-20.el8.x86_64.rpmdevolution-data-server-devel-3.28.5-20.el8.x86_64.rpmeevolution-data-server-langpacks-3.28.5-20.el8.noarch.rpmcevolution-data-server-3.28.5-20.el8.x86_64.rpmdevolution-data-server-devel-3.28.5-20.el8.x86_64.rpmeevolution-data-server-langpacks-3.28.5-20.el8.noarch.rpm> 8uBbugfixevolution-ews bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=20822452082245https://errata.rockylinux.org/RLBA-2022:7532RLBA-2022:7532RLBA-2022:7532 x]evolution-ews-3.28.5-13.el8.x86_64.rpm*]evolution-ews-langpacks-3.28.5-13.el8.noarch.rpmx]evolution-ews-3.28.5-13.el8.x86_64.rpm*]evolution-ews-langpacks-3.28.5-13.el8.noarch.rpm> 9CBBbugfixcheese bug fix and enhancement update https://errata.rockylinux.org/RLBA-2022:7533RLBA-2022:7533RLBA-2022:7533 E]cheese-3.28.0-4.el8_6.x86_64.rpmF]cheese-libs-3.28.0-4.el8_6.x86_64.rpmE]cheese-3.28.0-4.el8_6.x86_64.rpmF]cheese-libs-3.28.0-4.el8_6.x86_64.rpm>  ?}bugfixstress-ng bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=20675842067584https://errata.rockylinux.org/RLBA-2022:7535RLBA-2022:7535RLBA-2022:7535 0stress-ng-0.14.00-1.el8.x86_64.rpm0stress-ng-0.14.00-1.el8.x86_64.rpm? 3@BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbugfixllvm-toolset:rhel8 bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=20825082082508https://bugzilla.redhat.com/show_bug.cgi?id=20825252082525https://errata.rockylinux.org/RLBA-2022:7537RLBA-2022:7537RLBA-2022:7537 PvcA11clang-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm1clang-analyzer-14.0.6-1.module+el8.7.0+1080+d88dc670.noarch.rpm21clang-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm31clang-libs-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm41clang-resource-filesystem-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm51clang-tools-extra-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm>1compiler-rt-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpmt1git-clang-format-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm)Klibomp-14.0.6-2.module+el8.7.0+1080+d88dc670.x86_64.rpm*Klibomp-devel-14.0.6-2.module+el8.7.0+1080+d88dc670.x86_64.rpm+Klibomp-test-14.0.6-2.module+el8.7.0+1080+d88dc670.x86_64.rpm1lld-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm1lldb-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm1lldb-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm1lld-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm1lld-libs-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 1llvm-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 1llvm-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpmf1llvm-doc-14.0.6-1.module+el8.7.0+1080+d88dc670.noarch.rpm 1llvm-googletest-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 1llvm-libs-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 1llvm-static-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm1llvm-test-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpmP1llvm-toolset-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpmQ1python3-clang-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpmY1python3-lit-14.0.6-1.module+el8.7.0+1080+d88dc670.noarch.rpm]1python3-lldb-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpmPvcA11clang-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm1clang-analyzer-14.0.6-1.module+el8.7.0+1080+d88dc670.noarch.rpm21clang-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm31clang-libs-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm41clang-resource-filesystem-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm51clang-tools-extra-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm>1compiler-rt-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpmt1git-clang-format-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm)Klibomp-14.0.6-2.module+el8.7.0+1080+d88dc670.x86_64.rpm*Klibomp-devel-14.0.6-2.module+el8.7.0+1080+d88dc670.x86_64.rpm+Klibomp-test-14.0.6-2.module+el8.7.0+1080+d88dc670.x86_64.rpm1lld-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm1lldb-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm1lldb-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm1lld-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm1lld-libs-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 1llvm-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 1llvm-devel-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpmf1llvm-doc-14.0.6-1.module+el8.7.0+1080+d88dc670.noarch.rpm 1llvm-googletest-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 1llvm-libs-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm 1llvm-static-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm1llvm-test-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpmP1llvm-toolset-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpmQ1python3-clang-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpmY1python3-lit-14.0.6-1.module+el8.7.0+1080+d88dc670.noarch.rpm]1python3-lldb-14.0.6-1.module+el8.7.0+1080+d88dc670.x86_64.rpm@ 8tBBbugfixnautilus bug fix and enhancement update~ https://bugzilla.redhat.com/show_bug.cgi?id=20680892068089https://bugzilla.redhat.com/show_bug.cgi?id=20680922068092https://bugzilla.redhat.com/show_bug.cgi?id=20944312094431https://bugzilla.redhat.com/show_bug.cgi?id=20999812099981https://bugzilla.redhat.com/show_bug.cgi?id=21062412106241https://errata.rockylinux.org/RLBA-2022:7536RLBA-2022:7536RLBA-2022:7536 L!nautilus-3.28.1-21.el8.x86_64.rpmM!nautilus-extensions-3.28.1-21.el8.x86_64.rpmL!nautilus-3.28.1-21.el8.x86_64.rpmM!nautilus-extensions-3.28.1-21.el8.x86_64.rpm@ yBBBBBBBBBBBBBBBBBBBBBBbugfixsystemtap bug fix and enhancement update} https://bugzilla.redhat.com/show_bug.cgi?id=20288402028840https://bugzilla.redhat.com/show_bug.cgi?id=20297582029758https://bugzilla.redhat.com/show_bug.cgi?id=20406492040649https://bugzilla.redhat.com/show_bug.cgi?id=20575652057565https://bugzilla.redhat.com/show_bug.cgi?id=20727982072798https://errata.rockylinux.org/RLBA-2022:7538RLBA-2022:7538RLBA-2022:7538 systemtap-4.7-1.el8.x86_64.rpmsystemtap-client-4.7-1.el8.x86_64.rpmsystemtap-devel-4.7-1.el8.x86_64.rpmsystemtap-exporter-4.7-1.el8.x86_64.rpmsystemtap-initscript-4.7-1.el8.x86_64.rpm systemtap-runtime-4.7-1.el8.x86_64.rpm systemtap-runtime-java-4.7-1.el8.x86_64.rpm systemtap-runtime-python3-4.7-1.el8.x86_64.rpm systemtap-runtime-virtguest-4.7-1.el8.x86_64.rpm systemtap-runtime-virthost-4.7-1.el8.x86_64.rpmsystemtap-sdt-devel-4.7-1.el8.x86_64.rpmsystemtap-server-4.7-1.el8.x86_64.rpm systemtap-4.7-1.el8.x86_64.rpmsystemtap-client-4.7-1.el8.x86_64.rpmsystemtap-devel-4.7-1.el8.x86_64.rpmsystemtap-exporter-4.7-1.el8.x86_64.rpmsystemtap-initscript-4.7-1.el8.x86_64.rpm systemtap-runtime-4.7-1.el8.x86_64.rpm systemtap-runtime-java-4.7-1.el8.x86_64.rpm systemtap-runtime-python3-4.7-1.el8.x86_64.rpm systemtap-runtime-virtguest-4.7-1.el8.x86_64.rpm systemtap-runtime-virthost-4.7-1.el8.x86_64.rpmsystemtap-sdt-devel-4.7-1.el8.x86_64.rpmsystemtap-server-4.7-1.el8.x86_64.rpm@ RBBbugfixlibgdata bug fix and enhancement update| https://bugzilla.redhat.com/show_bug.cgi?id=20460982046098https://errata.rockylinux.org/RLBA-2022:7539RLBA-2022:7539RLBA-2022:7539 plibgdata-0.17.9-4.el8.x86_64.rpmplibgdata-devel-0.17.9-4.el8.x86_64.rpmplibgdata-0.17.9-4.el8.x86_64.rpmplibgdata-devel-0.17.9-4.el8.x86_64.rpm@ 7vBEBTNBBBBBaBFFBBJBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbugfixidm:client and idm:DL1 bug fix and enhancement update{ "https://bugzilla.redhat.com/show_bug.cgi?id=17841721784172https://bugzilla.redhat.com/show_bug.cgi?id=18724671872467https://bugzilla.redhat.com/show_bug.cgi?id=19096301909630https://bugzilla.redhat.com/show_bug.cgi?id=19587771958777https://bugzilla.redhat.com/show_bug.cgi?id=19840101984010https://bugzilla.redhat.com/show_bug.cgi?id=20000602000060https://bugzilla.redhat.com/show_bug.cgi?id=20046462004646https://bugzilla.redhat.com/show_bug.cgi?id=20220282022028https://bugzilla.redhat.com/show_bug.cgi?id=20378472037847https://bugzilla.redhat.com/show_bug.cgi?id=20582392058239https://bugzilla.redhat.com/show_bug.cgi?id=20593962059396https://bugzilla.redhat.com/show_bug.cgi?id=20608412060841https://bugzilla.redhat.com/show_bug.cgi?id=20619572061957https://bugzilla.redhat.com/show_bug.cgi?id=20623792062379https://bugzilla.redhat.com/show_bug.cgi?id=20631552063155https://bugzilla.redhat.com/show_bug.cgi?id=20663082066308https://bugzilla.redhat.com/show_bug.cgi?id=20680882068088https://bugzilla.redhat.com/show_bug.cgi?id=20705752070575https://bugzilla.redhat.com/show_bug.cgi?id=20794662079466https://bugzilla.redhat.com/show_bug.cgi?id=20920152092015https://bugzilla.redhat.com/show_bug.cgi?id=20946722094672https://bugzilla.redhat.com/show_bug.cgi?id=20948802094880https://bugzilla.redhat.com/show_bug.cgi?id=20978002097800https://bugzilla.redhat.com/show_bug.cgi?id=20978032097803https://bugzilla.redhat.com/show_bug.cgi?id=21001152100115https://bugzilla.redhat.com/show_bug.cgi?id=21017702101770https://bugzilla.redhat.com/show_bug.cgi?id=21049292104929https://bugzilla.redhat.com/show_bug.cgi?id=21063462106346https://bugzilla.redhat.com/show_bug.cgi?id=21092362109236https://bugzilla.redhat.com/show_bug.cgi?id=21092432109243https://bugzilla.redhat.com/show_bug.cgi?id=21154752115475https://bugzilla.redhat.com/show_bug.cgi?id=21173032117303https://bugzilla.redhat.com/show_bug.cgi?id=782917782917https://errata.rockylinux.org/RLBA-2022:7540RLBA-2022:7540RLBA-2022:7540 2/oq%9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm ipa-client-4.9.10-3.module+el8.7.0+1074+aae18f3a.x86_64.rpm }ipa-client-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm)ipa-client-common-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm)}ipa-client-common-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm!ipa-client-epn-4.9.10-3.module+el8.7.0+1074+aae18f3a.x86_64.rpm!}ipa-client-epn-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm"ipa-client-samba-4.9.10-3.module+el8.7.0+1074+aae18f3a.x86_64.rpm"}ipa-client-samba-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm*ipa-common-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm*}ipa-common-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpmt.ipa-healthcheck-core-0.7-14.module+el8.7.0+1074+aae18f3a.noarch.rpm+ipa-python-compat-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm+}ipa-python-compat-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm,ipa-selinux-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm,}ipa-selinux-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm+}ipa-server-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm,}ipa-server-common-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm-}ipa-server-dns-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm.}ipa-server-trust-ad-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm7opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmZpython3-ipaclient-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpmZ}python3-ipaclient-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm[python3-ipalib-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm[}python3-ipalib-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm}python3-ipaserver-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm}python3-ipatests-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm -python3-jwcrypto-0.5.0-1.1.module+el8.7.0+1074+aae18f3a.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm 5python3-pyusb-1.0.0-9.1.module+el8.7.0+1074+aae18f3a.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpmApython3-yubico-1.3.2-9.1.module+el8.7.0+1074+aae18f3a.noarch.rpm slapi-nis-0.60.0-1.module+el8.7.0+1075+05db0c1d.x86_64.rpm9softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm:softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm2/oq%9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm ipa-client-4.9.10-3.module+el8.7.0+1074+aae18f3a.x86_64.rpm }ipa-client-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm)ipa-client-common-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm)}ipa-client-common-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm!ipa-client-epn-4.9.10-3.module+el8.7.0+1074+aae18f3a.x86_64.rpm!}ipa-client-epn-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm"ipa-client-samba-4.9.10-3.module+el8.7.0+1074+aae18f3a.x86_64.rpm"}ipa-client-samba-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm*ipa-common-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm*}ipa-common-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpmt.ipa-healthcheck-core-0.7-14.module+el8.7.0+1074+aae18f3a.noarch.rpm+ipa-python-compat-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm+}ipa-python-compat-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm,ipa-selinux-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm,}ipa-selinux-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm+}ipa-server-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm,}ipa-server-common-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm-}ipa-server-dns-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm.}ipa-server-trust-ad-4.9.10-6.module+el8.7.0+1075+05db0c1d.x86_64.rpm7opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmZpython3-ipaclient-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpmZ}python3-ipaclient-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm[python3-ipalib-4.9.10-3.module+el8.7.0+1074+aae18f3a.noarch.rpm[}python3-ipalib-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm}python3-ipaserver-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm}python3-ipatests-4.9.10-6.module+el8.7.0+1075+05db0c1d.noarch.rpm -python3-jwcrypto-0.5.0-1.1.module+el8.7.0+1074+aae18f3a.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm 5python3-pyusb-1.0.0-9.1.module+el8.7.0+1074+aae18f3a.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpmApython3-yubico-1.3.2-9.1.module+el8.7.0+1074+aae18f3a.noarch.rpm slapi-nis-0.60.0-1.module+el8.7.0+1075+05db0c1d.x86_64.rpm9softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm:softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpmK  =xBBBsecurityLow: redis:6 security, bug fix, and enhancement updatez)lhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24735CVE-2022-24735CVE-2022-24735https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24736CVE-2022-24736CVE-2022-24736https://bugzilla.redhat.com/show_bug.cgi?id=19998731999873The following packages have been upgraded to a later upstream version: redis (6.2.7).https://bugzilla.redhat.com/show_bug.cgi?id=20802862080286https://bugzilla.redhat.com/show_bug.cgi?id=20802892080289https://errata.rockylinux.org/RLSA-2022:7541RLSA-2022:7541RLSA-2022:7541  v_A *redis-6.2.7-1.module+el8.7.0+1105+8815ce78.x86_64.rpm*redis-devel-6.2.7-1.module+el8.7.0+1105+8815ce78.x86_64.rpme*redis-doc-6.2.7-1.module+el8.7.0+1105+8815ce78.noarch.rpm v_A *redis-6.2.7-1.module+el8.7.0+1105+8815ce78.x86_64.rpm*redis-devel-6.2.7-1.module+el8.7.0+1105+8815ce78.x86_64.rpme*redis-doc-6.2.7-1.module+el8.7.0+1105+8815ce78.noarch.rpmK  >IBcBBBBBBBBBBBBBBBBTbugfixsubversion:1.14 bug fix and enhancement update# https://bugzilla.redhat.com/show_bug.cgi?id=20972372097237https://errata.rockylinux.org/RLBA-2022:7542RLBA-2022:7542RLBA-2022:7542 xG elibserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpmAimod_dav_svn-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpmipython3-subversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpmxisubversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm)isubversion-devel-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm*isubversion-gnome-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm+isubversion-javahl-1.14.1-2.module+el8.7.0+1066+f8abeb19.noarch.rpm,isubversion-libs-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm-isubversion-perl-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm.isubversion-tools-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpmuutf8proc-2.6.1-3.module+el8.7.0+1065+42200b2e.x86_64.rpmxG elibserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpmAimod_dav_svn-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpmipython3-subversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpmxisubversion-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm)isubversion-devel-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm*isubversion-gnome-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm+isubversion-javahl-1.14.1-2.module+el8.7.0+1066+f8abeb19.noarch.rpm,isubversion-libs-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm-isubversion-perl-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpm.isubversion-tools-1.14.1-2.module+el8.7.0+1066+f8abeb19.x86_64.rpmuutf8proc-2.6.1-3.module+el8.7.0+1065+42200b2e.x86_64.rpmNb ?IBPBBBBBBBBBBBBBBienhancementsubversion bug fix and enhancement update" https://bugzilla.redhat.com/show_bug.cgi?id=19962371996237https://bugzilla.redhat.com/show_bug.cgi?id=20785572078557https://errata.rockylinux.org/RLEA-2022:7543RLEA-2022:7543RLEA-2022:7543 xG elibserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpmAmod_dav_svn-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpmxsubversion-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm)subversion-devel-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm*subversion-gnome-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm+subversion-javahl-1.10.2-5.module+el8.7.0+1065+42200b2e.noarch.rpm,subversion-libs-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm-subversion-perl-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm.subversion-tools-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpmuutf8proc-2.6.1-3.module+el8.7.0+1065+42200b2e.x86_64.rpmxG elibserf-1.3.9-9.module+el8.7.0+1065+42200b2e.x86_64.rpmAmod_dav_svn-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpmxsubversion-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm)subversion-devel-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm*subversion-gnome-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm+subversion-javahl-1.10.2-5.module+el8.7.0+1065+42200b2e.noarch.rpm,subversion-libs-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm-subversion-perl-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpm.subversion-tools-1.10.2-5.module+el8.7.0+1065+42200b2e.x86_64.rpmuutf8proc-2.6.1-3.module+el8.7.0+1065+42200b2e.x86_64.rpmQ! @bugfixzenity bug fix and enhancement update! https://bugzilla.redhat.com/show_bug.cgi?id=20535302053530https://errata.rockylinux.org/RLBA-2022:7545RLBA-2022:7545RLBA-2022:7545 `/zenity-3.28.1-2.el8.x86_64.rpm`/zenity-3.28.1-2.el8.x86_64.rpmQ" CBBBBBBbugfixcreaterepo_c bug fix and enhancement update  https://bugzilla.redhat.com/show_bug.cgi?id=20627672062767https://errata.rockylinux.org/RLBA-2022:7546RLBA-2022:7546RLBA-2022:7546 F>createrepo_c-0.17.7-6.el8.x86_64.rpmG>createrepo_c-devel-0.17.7-6.el8.x86_64.rpmH>createrepo_c-libs-0.17.7-6.el8.x86_64.rpmS>python3-createrepo_c-0.17.7-6.el8.x86_64.rpmF>createrepo_c-0.17.7-6.el8.x86_64.rpmG>createrepo_c-devel-0.17.7-6.el8.x86_64.rpmH>createrepo_c-libs-0.17.7-6.el8.x86_64.rpmS>python3-createrepo_c-0.17.7-6.el8.x86_64.rpmQ# Lbugfixgnome-shell bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=19827791982779https://bugzilla.redhat.com/show_bug.cgi?id=19934201993420https://bugzilla.redhat.com/show_bug.cgi?id=20752312075231https://bugzilla.redhat.com/show_bug.cgi?id=20785642078564https://bugzilla.redhat.com/show_bug.cgi?id=21165552116555https://errata.rockylinux.org/RLBA-2022:7547RLBA-2022:7547RLBA-2022:7547 7gnome-shell-3.32.2-48.el8.x86_64.rpm7gnome-shell-3.32.2-48.el8.x86_64.rpmQ  OBBBBBBBsecurityLow: Image Builder security, bug fix, and enhancement updatel https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32189CVE-2022-32189CVE-2022-32189https://bugzilla.redhat.com/show_bug.cgi?id=20598672059867https://bugzilla.redhat.com/show_bug.cgi?id=20598682059868https://bugzilla.redhat.com/show_bug.cgi?id=20600632060063https://bugzilla.redhat.com/show_bug.cgi?id=20626942062694https://bugzilla.redhat.com/show_bug.cgi?id=20657342065734https://bugzilla.redhat.com/show_bug.cgi?id=21044642104464https://bugzilla.redhat.com/show_bug.cgi?id=21138142113814https://bugzilla.redhat.com/show_bug.cgi?id=21188292118829https://errata.rockylinux.org/RLSA-2022:7548RLSA-2022:7548RLSA-2022:7548 @cockpit-composer-41-1.el8.noarch.rpm&Vweldr-client-35.5-4.el8.x86_64.rpm1uosbuild-65-1.el8.rocky.0.1.noarch.rpm2uosbuild-luks2-65-1.el8.rocky.0.1.noarch.rpm3uosbuild-lvm2-65-1.el8.rocky.0.1.noarch.rpm4uosbuild-ostree-65-1.el8.rocky.0.1.noarch.rpm5uosbuild-selinux-65-1.el8.rocky.0.1.noarch.rpm\upython3-osbuild-65-1.el8.rocky.0.1.noarch.rpm@cockpit-composer-41-1.el8.noarch.rpm&Vweldr-client-35.5-4.el8.x86_64.rpm1uosbuild-65-1.el8.rocky.0.1.noarch.rpm2uosbuild-luks2-65-1.el8.rocky.0.1.noarch.rpm3uosbuild-lvm2-65-1.el8.rocky.0.1.noarch.rpm4uosbuild-ostree-65-1.el8.rocky.0.1.noarch.rpm5uosbuild-selinux-65-1.el8.rocky.0.1.noarch.rpm\upython3-osbuild-65-1.el8.rocky.0.1.noarch.rpmR$ 4YBBBBBBBBBBBBBBBBBBBBBBBBBbugfixrust-toolset:rhel8 bug fix and enhancement update0 https://errata.rockylinux.org/RLBA-2022:7549RLBA-2022:7549RLBA-2022:7549 Lvd?-Ycargo-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpmYcargo-doc-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpm6Yclippy-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm6Yrls-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpmLYrust-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpmMYrust-analysis-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpmYrust-debugger-common-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpmNYrust-doc-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpmRYrustfmt-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpmYrust-gdb-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpmYrust-lldb-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpmYrust-src-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpmOYrust-std-static-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpmPYrust-std-static-wasm32-unknown-unknown-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpmQYrust-std-static-wasm32-wasi-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpmLYrust-toolset-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpmLvd?-Ycargo-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpmYcargo-doc-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpm6Yclippy-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpm6Yrls-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpmLYrust-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpmMYrust-analysis-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpmYrust-debugger-common-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpmNYrust-doc-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpmRYrustfmt-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpmYrust-gdb-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpmYrust-lldb-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpmYrust-src-1.62.1-1.module+el8.7.0+1079+7c7e1744.noarch.rpmOYrust-std-static-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpmPYrust-std-static-wasm32-unknown-unknown-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpmQYrust-std-static-wasm32-wasi-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpmLYrust-toolset-1.62.1-1.module+el8.7.0+1079+7c7e1744.x86_64.rpmR% 9uBBbugfixgcc-toolset-12 bug fix and enhancement update/ https://bugzilla.redhat.com/show_bug.cgi?id=21023562102356https://errata.rockylinux.org/RLBA-2022:7550RLBA-2022:7550RLBA-2022:7550 Kgcc-toolset-12-12.0-5.el8.x86_64.rpmKgcc-toolset-12-runtime-12.0-5.el8.x86_64.rpmKgcc-toolset-12-12.0-5.el8.x86_64.rpmKgcc-toolset-12-runtime-12.0-5.el8.x86_64.rpmR& zBBBBBBbugfixopen-vm-tools bug fix and enhancement update. https://errata.rockylinux.org/RLBA-2022:7551RLBA-2022:7551RLBA-2022:7551 1Xopen-vm-tools-12.0.5-2.el8.x86_64.rpm2Xopen-vm-tools-desktop-12.0.5-2.el8.x86_64.rpm3Xopen-vm-tools-salt-minion-12.0.5-2.el8.x86_64.rpm4Xopen-vm-tools-sdmp-12.0.5-2.el8.x86_64.rpm1Xopen-vm-tools-12.0.5-2.el8.x86_64.rpm2Xopen-vm-tools-desktop-12.0.5-2.el8.x86_64.rpm3Xopen-vm-tools-salt-minion-12.0.5-2.el8.x86_64.rpm4Xopen-vm-tools-sdmp-12.0.5-2.el8.x86_64.rpmR( CBBbugfixnmap bug fix and enhancement update- https://bugzilla.redhat.com/show_bug.cgi?id=18998241899824https://bugzilla.redhat.com/show_bug.cgi?id=21202942120294https://errata.rockylinux.org/RLBA-2022:7553RLBA-2022:7553RLBA-2022:7553 Ynmap-7.70-8.el8.x86_64.rpmZnmap-ncat-7.70-8.el8.x86_64.rpmYnmap-7.70-8.el8.x86_64.rpmZnmap-ncat-7.70-8.el8.x86_64.rpmS' HBBBBBBBBBbugfix389-ds:1.4 bug fix and enhancement update, https://bugzilla.redhat.com/show_bug.cgi?id=19659281965928https://bugzilla.redhat.com/show_bug.cgi?id=20230562023056https://bugzilla.redhat.com/show_bug.cgi?id=20327422032742https://bugzilla.redhat.com/show_bug.cgi?id=20525282052528https://bugzilla.redhat.com/show_bug.cgi?id=20570582057058https://bugzilla.redhat.com/show_bug.cgi?id=20651932065193https://bugzilla.redhat.com/show_bug.cgi?id=20855622085562https://bugzilla.redhat.com/show_bug.cgi?id=21130022113002https://errata.rockylinux.org/RLBA-2022:7552RLBA-2022:7552RLBA-2022:7552 HB`LW<389-ds-base-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpmX<389-ds-base-devel-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpmY<389-ds-base-legacy-tools-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpmZ<389-ds-base-libs-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpm[<389-ds-base-snmp-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpmW<python3-lib389-1.4.3.30-6.module+el8.7.0+1060+852806e7.noarch.rpmHB`LW<389-ds-base-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpmX<389-ds-base-devel-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpmY<389-ds-base-legacy-tools-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpmZ<389-ds-base-libs-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpm[<389-ds-base-snmp-1.4.3.30-6.module+el8.7.0+1060+852806e7.x86_64.rpmW<python3-lib389-1.4.3.30-6.module+el8.7.0+1060+852806e7.noarch.rpmS) TBBBbugfixcockpit-appstream bug fix and enhancement update+ https://bugzilla.redhat.com/show_bug.cgi?id=18674781867478https://bugzilla.redhat.com/show_bug.cgi?id=19701191970119https://bugzilla.redhat.com/show_bug.cgi?id=20183892018389https://bugzilla.redhat.com/show_bug.cgi?id=20335992033599https://bugzilla.redhat.com/show_bug.cgi?id=20336002033600https://bugzilla.redhat.com/show_bug.cgi?id=20363302036330https://bugzilla.redhat.com/show_bug.cgi?id=20399892039989https://bugzilla.redhat.com/show_bug.cgi?id=20626932062693https://bugzilla.redhat.com/show_bug.cgi?id=20636802063680https://bugzilla.redhat.com/show_bug.cgi?id=21059842105984https://bugzilla.redhat.com/show_bug.cgi?id=21182362118236https://errata.rockylinux.org/RLBA-2022:7554RLBA-2022:7554RLBA-2022:7554 ~cockpit-machines-276-1.el8.noarch.rpmcockpit-packagekit-276-1.el8.noarch.rpmcockpit-pcp-276-1.el8.x86_64.rpmcockpit-storaged-276-1.el8.noarch.rpm~cockpit-machines-276-1.el8.noarch.rpmcockpit-packagekit-276-1.el8.noarch.rpmcockpit-pcp-276-1.el8.x86_64.rpmcockpit-storaged-276-1.el8.noarch.rpmS* bugfixosinfo-db bug fix and enhancement update* https://bugzilla.redhat.com/show_bug.cgi?id=20836632083663https://bugzilla.redhat.com/show_bug.cgi?id=21039082103908https://errata.rockylinux.org/RLBA-2022:7555RLBA-2022:7555RLBA-2022:7555 }osinfo-db-20220727-2.el8.noarch.rpm}osinfo-db-20220727-2.el8.noarch.rpmS+ $\BBBBBBbugfixostree bug fix and enhancement update) https://bugzilla.redhat.com/show_bug.cgi?id=20574972057497https://bugzilla.redhat.com/show_bug.cgi?id=21194442119444https://bugzilla.redhat.com/show_bug.cgi?id=21205222120522https://errata.rockylinux.org/RLBA-2022:7557RLBA-2022:7557RLBA-2022:7557 vqostree-devel-2022.2-5.el8.x86_64.rpmuqostree-2022.2-5.el8.x86_64.rpmwqostree-grub2-2022.2-5.el8.x86_64.rpmxqostree-libs-2022.2-5.el8.x86_64.rpmvqostree-devel-2022.2-5.el8.x86_64.rpmuqostree-2022.2-5.el8.x86_64.rpmwqostree-grub2-2022.2-5.el8.x86_64.rpmxqostree-libs-2022.2-5.el8.x86_64.rpmT, )eBBbugfixlasso bug fix and enhancement update( https://bugzilla.redhat.com/show_bug.cgi?id=18881951888195https://bugzilla.redhat.com/show_bug.cgi?id=20326522032652https://errata.rockylinux.org/RLBA-2022:7559RLBA-2022:7559RLBA-2022:7559 R lasso-2.6.0-13.el8.x86_64.rpmY python3-lasso-2.6.0-13.el8.x86_64.rpmR lasso-2.6.0-13.el8.x86_64.rpmY python3-lasso-2.6.0-13.el8.x86_64.rpmT ,jsecurityLow: wavpack security update'7lhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44269CVE-2021-44269CVE-2021-44269https://bugzilla.redhat.com/show_bug.cgi?id=20644572064457https://errata.rockylinux.org/RLSA-2022:7558RLSA-2022:7558RLSA-2022:7558 >wavpack-5.1.0-16.el8.x86_64.rpm>wavpack-5.1.0-16.el8.x86_64.rpmT- 0mBbugfixfrr bug fix and enhancement update^ https://bugzilla.redhat.com/show_bug.cgi?id=17149841714984https://bugzilla.redhat.com/show_bug.cgi?id=19417651941765https://bugzilla.redhat.com/show_bug.cgi?id=20184512018451https://bugzilla.redhat.com/show_bug.cgi?id=20541602054160https://bugzilla.redhat.com/show_bug.cgi?id=21260402126040https://errata.rockylinux.org/RLBA-2022:7560RLBA-2022:7560RLBA-2022:7560 jqfrr-7.5.1-4.el8.x86_64.rpmkqfrr-selinux-7.5.1-4.el8.noarch.rpmjqfrr-7.5.1-4.el8.x86_64.rpmkqfrr-selinux-7.5.1-4.el8.noarch.rpmT. 3qbugfixcrash bug fix and enhancement update] https://bugzilla.redhat.com/show_bug.cgi?id=19017381901738https://bugzilla.redhat.com/show_bug.cgi?id=20684622068462https://errata.rockylinux.org/RLBA-2022:7561RLBA-2022:7561RLBA-2022:7561 Ncrash-7.3.2-2.el8.x86_64.rpmNcrash-7.3.2-2.el8.x86_64.rpmU/ 54bugfixmariadb-java-client bug fix and enhancement update\ https://bugzilla.redhat.com/show_bug.cgi?id=20432122043212https://bugzilla.redhat.com/show_bug.cgi?id=20896272089627https://errata.rockylinux.org/RLBA-2022:7562RLBA-2022:7562RLBA-2022:7562 rzmariadb-java-client-2.7.1-2.el8.noarch.rpmrzmariadb-java-client-2.7.1-2.el8.noarch.rpmU1 8vbugfixgdm bug fix and enhancement update[ https://bugzilla.redhat.com/show_bug.cgi?id=20600382060038https://errata.rockylinux.org/RLBA-2022:7564RLBA-2022:7564RLBA-2022:7564 Z$gdm-40.0-24.el8.x86_64.rpmZ$gdm-40.0-24.el8.x86_64.rpm\2 ;ybugfixgcc-toolset-12-gdb bug fix and enhancement updateZ https://errata.rockylinux.org/RLBA-2022:7565RLBA-2022:7565RLBA-2022:7565  wgcc-toolset-12-gdb-11.2-3.el8.x86_64.rpm wgcc-toolset-12-gdb-11.2-3.el8.x86_64.rpm\3 =enhancementRocky Linux-system-roles bug fix and enhancement updateX 3https://bugzilla.redhat.com/show_bug.cgi?id=19967311996731https://bugzilla.redhat.com/show_bug.cgi?id=20430092043009https://bugzilla.redhat.com/show_bug.cgi?id=20564802056480https://bugzilla.redhat.com/show_bug.cgi?id=20588072058807https://bugzilla.redhat.com/show_bug.cgi?id=20603772060377https://bugzilla.redhat.com/show_bug.cgi?id=20603782060378https://bugzilla.redhat.com/show_bug.cgi?id=20640672064067https://bugzilla.redhat.com/show_bug.cgi?id=20652152065215https://bugzilla.redhat.com/show_bug.cgi?id=20652162065216https://bugzilla.redhat.com/show_bug.cgi?id=20652172065217https://bugzilla.redhat.com/show_bug.cgi?id=20652182065218https://bugzilla.redhat.com/show_bug.cgi?id=20653392065339https://bugzilla.redhat.com/show_bug.cgi?id=20656702065670https://bugzilla.redhat.com/show_bug.cgi?id=20668682066868https://bugzilla.redhat.com/show_bug.cgi?id=20668762066876https://bugzilla.redhat.com/show_bug.cgi?id=20668802066880https://bugzilla.redhat.com/show_bug.cgi?id=20668812066881https://bugzilla.redhat.com/show_bug.cgi?id=20710112071011https://bugzilla.redhat.com/show_bug.cgi?id=20727492072749https://bugzilla.redhat.com/show_bug.cgi?id=20735182073518https://bugzilla.redhat.com/show_bug.cgi?id=20751162075116https://bugzilla.redhat.com/show_bug.cgi?id=20753382075338https://bugzilla.redhat.com/show_bug.cgi?id=20786502078650https://bugzilla.redhat.com/show_bug.cgi?id=20790082079008https://bugzilla.redhat.com/show_bug.cgi?id=20791142079114https://bugzilla.redhat.com/show_bug.cgi?id=20818392081839https://bugzilla.redhat.com/show_bug.cgi?id=20823912082391https://bugzilla.redhat.com/show_bug.cgi?id=20833782083378https://bugzilla.redhat.com/show_bug.cgi?id=20834262083426https://bugzilla.redhat.com/show_bug.cgi?id=20868692086869https://bugzilla.redhat.com/show_bug.cgi?id=20869342086934https://bugzilla.redhat.com/show_bug.cgi?id=20869352086935https://bugzilla.redhat.com/show_bug.cgi?id=20898682089868https://bugzilla.redhat.com/show_bug.cgi?id=20934372093437https://bugzilla.redhat.com/show_bug.cgi?id=20935002093500https://bugzilla.redhat.com/show_bug.cgi?id=20963972096397https://bugzilla.redhat.com/show_bug.cgi?id=21002852100285https://bugzilla.redhat.com/show_bug.cgi?id=21002972100297https://bugzilla.redhat.com/show_bug.cgi?id=21002982100298https://bugzilla.redhat.com/show_bug.cgi?id=21009392100939https://bugzilla.redhat.com/show_bug.cgi?id=21009792100979https://bugzilla.redhat.com/show_bug.cgi?id=21016072101607https://bugzilla.redhat.com/show_bug.cgi?id=21099972109997https://bugzilla.redhat.com/show_bug.cgi?id=21121432112143https://bugzilla.redhat.com/show_bug.cgi?id=21151592115159https://bugzilla.redhat.com/show_bug.cgi?id=21151602115160https://bugzilla.redhat.com/show_bug.cgi?id=21151612115161https://bugzilla.redhat.com/show_bug.cgi?id=21151622115162https://bugzilla.redhat.com/show_bug.cgi?id=21158842115884https://bugzilla.redhat.com/show_bug.cgi?id=21298752129875https://errata.rockylinux.org/RLEA-2022:7568RLEA-2022:7568RLEA-2022:7568 8Vrhel-system-roles-1.20.1-1.el8.noarch.rpm8Vrhel-system-roles-1.20.1-1.el8.noarch.rpm]4 @BBBbugfixevolution-mapi bug fix and enhancement updateW https://bugzilla.redhat.com/show_bug.cgi?id=20816202081620https://errata.rockylinux.org/RLBA-2022:7567RLBA-2022:7567RLBA-2022:7567 y\evolution-mapi-3.28.3-6.el8.x86_64.rpm+\evolution-mapi-langpacks-3.28.3-6.el8.noarch.rpmeUopenchange-2.3-30.el8.x86_64.rpmy\evolution-mapi-3.28.3-6.el8.x86_64.rpm+\evolution-mapi-langpacks-3.28.3-6.el8.noarch.rpmeUopenchange-2.3-30.el8.x86_64.rpm]5 Fbugfixgcc-toolset-12-dwz bug fix and enhancement updateV https://errata.rockylinux.org/RLBA-2022:7569RLBA-2022:7569RLBA-2022:7569  kgcc-toolset-12-dwz-0.14-2.el8.x86_64.rpm kgcc-toolset-12-dwz-0.14-2.el8.x86_64.rpm]6 /IBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbugfixgcc-toolset-12-gcc bug fix and enhancement updateU https://errata.rockylinux.org/RLBA-2022:7570RLBA-2022:7570RLBA-2022:7570 Dgcc-toolset-12-gcc-12.1.1-3.2.el8.x86_64.rpmDgcc-toolset-12-gcc-c++-12.1.1-3.2.el8.x86_64.rpmDgcc-toolset-12-gcc-gfortran-12.1.1-3.2.el8.x86_64.rpmDgcc-toolset-12-gcc-plugin-devel-12.1.1-3.2.el8.x86_64.rpm Dgcc-toolset-12-libasan-devel-12.1.1-3.2.el8.x86_64.rpm Dgcc-toolset-12-libatomic-devel-12.1.1-3.2.el8.x86_64.rpm Dgcc-toolset-12-libgccjit-12.1.1-3.2.el8.x86_64.rpm Dgcc-toolset-12-libgccjit-devel-12.1.1-3.2.el8.x86_64.rpm Dgcc-toolset-12-libgccjit-docs-12.1.1-3.2.el8.x86_64.rpmDgcc-toolset-12-libitm-devel-12.1.1-3.2.el8.x86_64.rpmDgcc-toolset-12-liblsan-devel-12.1.1-3.2.el8.x86_64.rpmDgcc-toolset-12-libquadmath-devel-12.1.1-3.2.el8.x86_64.rpmDgcc-toolset-12-libstdc++-devel-12.1.1-3.2.el8.x86_64.rpmDgcc-toolset-12-libstdc++-docs-12.1.1-3.2.el8.x86_64.rpmDgcc-toolset-12-libtsan-devel-12.1.1-3.2.el8.x86_64.rpmDgcc-toolset-12-libubsan-devel-12.1.1-3.2.el8.x86_64.rpmDgcc-toolset-12-offload-nvptx-12.1.1-3.2.el8.x86_64.rpm7Dlibasan8-12.1.1-3.2.el8.x86_64.rpm>Dlibtsan2-12.1.1-3.2.el8.x86_64.rpmDgcc-toolset-12-gcc-12.1.1-3.2.el8.x86_64.rpmDgcc-toolset-12-gcc-c++-12.1.1-3.2.el8.x86_64.rpmDgcc-toolset-12-gcc-gfortran-12.1.1-3.2.el8.x86_64.rpmDgcc-toolset-12-gcc-plugin-devel-12.1.1-3.2.el8.x86_64.rpm Dgcc-toolset-12-libasan-devel-12.1.1-3.2.el8.x86_64.rpm Dgcc-toolset-12-libatomic-devel-12.1.1-3.2.el8.x86_64.rpm Dgcc-toolset-12-libgccjit-12.1.1-3.2.el8.x86_64.rpm Dgcc-toolset-12-libgccjit-devel-12.1.1-3.2.el8.x86_64.rpm Dgcc-toolset-12-libgccjit-docs-12.1.1-3.2.el8.x86_64.rpmDgcc-toolset-12-libitm-devel-12.1.1-3.2.el8.x86_64.rpmDgcc-toolset-12-liblsan-devel-12.1.1-3.2.el8.x86_64.rpmDgcc-toolset-12-libquadmath-devel-12.1.1-3.2.el8.x86_64.rpmDgcc-toolset-12-libstdc++-devel-12.1.1-3.2.el8.x86_64.rpmDgcc-toolset-12-libstdc++-docs-12.1.1-3.2.el8.x86_64.rpmDgcc-toolset-12-libtsan-devel-12.1.1-3.2.el8.x86_64.rpmDgcc-toolset-12-libubsan-devel-12.1.1-3.2.el8.x86_64.rpmDgcc-toolset-12-offload-nvptx-12.1.1-3.2.el8.x86_64.rpm7Dlibasan8-12.1.1-3.2.el8.x86_64.rpm>Dlibtsan2-12.1.1-3.2.el8.x86_64.rpm]7 7pBBBBBbugfixgdb bug fix and enhancement updateT https://bugzilla.redhat.com/show_bug.cgi?id=20151312015131https://errata.rockylinux.org/RLBA-2022:7571RLBA-2022:7571RLBA-2022:7571 Wgdb-8.2-19.el8.x86_64.rpm8gdb-doc-8.2-19.el8.noarch.rpmXgdb-gdbserver-8.2-19.el8.x86_64.rpmYgdb-headless-8.2-19.el8.x86_64.rpmWgdb-8.2-19.el8.x86_64.rpm8gdb-doc-8.2-19.el8.noarch.rpmXgdb-gdbserver-8.2-19.el8.x86_64.rpmYgdb-headless-8.2-19.el8.x86_64.rpm]8 ;xBbugfixpython-rpm-macros bug fix and enhancement updateS https://bugzilla.redhat.com/show_bug.cgi?id=20900072090007https://bugzilla.redhat.com/show_bug.cgi?id=20914622091462https://errata.rockylinux.org/RLBA-2022:7572RLBA-2022:7572RLBA-2022:7572 Ypython3-rpm-macros-3-43.el8.noarch.rpmYpython-rpm-macros-3-43.el8.noarch.rpmYpython-srpm-macros-3-43.el8.noarch.rpmYpython3-rpm-macros-3-43.el8.noarch.rpmYpython-rpm-macros-3-43.el8.noarch.rpmYpython-srpm-macros-3-43.el8.noarch.rpm^: = MBBBBBBBBBBBBbugfixpulseaudio bug fix and enhancement updateO https://bugzilla.redhat.com/show_bug.cgi?id=19699441969944https://errata.rockylinux.org/RLBA-2022:7578RLBA-2022:7578RLBA-2022:7578 =7pulseaudio-14.0-4.el8.x86_64.rpm>7pulseaudio-libs-14.0-4.el8.x86_64.rpm?7pulseaudio-libs-devel-14.0-4.el8.x86_64.rpm@7pulseaudio-libs-glib2-14.0-4.el8.x86_64.rpmA7pulseaudio-module-bluetooth-14.0-4.el8.x86_64.rpmB7pulseaudio-module-x11-14.0-4.el8.x86_64.rpmC7pulseaudio-utils-14.0-4.el8.x86_64.rpm=7pulseaudio-14.0-4.el8.x86_64.rpm>7pulseaudio-libs-14.0-4.el8.x86_64.rpm?7pulseaudio-libs-devel-14.0-4.el8.x86_64.rpm@7pulseaudio-libs-glib2-14.0-4.el8.x86_64.rpmA7pulseaudio-module-bluetooth-14.0-4.el8.x86_64.rpmB7pulseaudio-module-x11-14.0-4.el8.x86_64.rpmC7pulseaudio-utils-14.0-4.el8.x86_64.rpm_? bugfixcockpit-session-recording bug fix and enhancement updateN https://bugzilla.redhat.com/show_bug.cgi?id=20884622088462https://errata.rockylinux.org/RLBA-2022:7579RLBA-2022:7579RLBA-2022:7579 Lcockpit-session-recording-12-1.el8.noarch.rpmLcockpit-session-recording-12-1.el8.noarch.rpm_d XBenhancementnodejs:18 bug fix and enhancement updateM https://bugzilla.redhat.com/show_bug.cgi?id=21210932121093https://errata.rockylinux.org/RLEA-2022:7580RLEA-2022:7580RLEA-2022:7580 /f2ACQnodejs-nodemon-2.0.19-1.module+el8.7.0+1072+5b168780.noarch.rpm:[nodejs-packaging-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpmz[nodejs-packaging-bundler-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpm/f2ACQnodejs-nodemon-2.0.19-1.module+el8.7.0+1072+5b168780.noarch.rpm:[nodejs-packaging-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpmz[nodejs-packaging-bundler-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpm_ 3@BBBBBBBBBBBBBBBBBBBBBBLBBVB[BBBBBBBBBBBBuBLBBBBBBBBBBBBBBBBBBsecurityModerate: python38:3.8 and python38-devel:3.8 security updateL`https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107CVE-2015-20107CVE-2015-20107https://bugzilla.redhat.com/show_bug.cgi?id=20753902075390https://bugzilla.redhat.com/show_bug.cgi?id=20861412086141https://bugzilla.redhat.com/show_bug.cgi?id=20900062090006https://bugzilla.redhat.com/show_bug.cgi?id=20952652095265https://errata.rockylinux.org/RLSA-2022:7581RLSA-2022:7581RLSA-2022:7581 b^* python38-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm1|python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm!Ppython38-babel-2.7.0-11.module+el8.5.0+672+ab6eb015.noarch.rpmhHpython38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm2python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpmilpython38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpmg?python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpmu python38-debug-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpmv python38-devel-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpmw python38-idle-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm3 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpmsYpython38-jinja2-2.11.3-1.module+el8.7.0+1063+20f2b9a4.noarch.rpmx python38-libs-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpmpython38-lxml-4.4.1-7.module+el8.6.0+794+eba84017.x86_64.rpmjFpython38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpmyppython38-mod_wsgi-4.6.8-4.module+el8.7.0+1063+20f2b9a4.x86_64.rpmt;python38-numpy-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm";python38-numpy-doc-1.17.3-6.module+el8.5.0+672+ab6eb015.noarch.rpmu;python38-numpy-f2py-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpmtgpython38-pip-19.3.1-6.module+el8.7.0+1063+20f2b9a4.noarch.rpmugpython38-pip-wheel-19.3.1-6.module+el8.7.0+1063+20f2b9a4.noarch.rpmNpython38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpmvFpython38-psutil-5.6.4-4.module+el8.5.0+672+ab6eb015.x86_64.rpmkpython38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmlpython38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmmpython38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm4 python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpmMhpython38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm5python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm6python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm%upython38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.x86_64.rpm7 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpmw python38-rpm-macros-3.8.13-1.module+el8.7.0+1063+20f2b9a4.noarch.rpmnSpython38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm#\python38-setuptools-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpm$\python38-setuptools-wheel-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpmOppython38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpmz python38-test-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm{ python38-tkinter-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm%;python38-urllib3-1.25.7-5.module+el8.5.0+672+ab6eb015.noarch.rpm&Cpython38-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpm'Cpython38-wheel-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpmb^* python38-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm1|python38-asn1crypto-1.2.0-3.module+el8.4.0+570+c2eaf144.noarch.rpm!Ppython38-babel-2.7.0-11.module+el8.5.0+672+ab6eb015.noarch.rpmhHpython38-cffi-1.13.2-3.module+el8.4.0+570+c2eaf144.x86_64.rpm2python38-chardet-3.0.4-19.module+el8.4.0+570+c2eaf144.noarch.rpmilpython38-cryptography-2.8-3.module+el8.5.0+672+ab6eb015.x86_64.rpmg?python38-Cython-0.29.14-4.module+el8.4.0+570+c2eaf144.x86_64.rpmu python38-debug-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpmv python38-devel-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpmw python38-idle-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm3 python38-idna-2.8-6.module+el8.4.0+570+c2eaf144.noarch.rpmsYpython38-jinja2-2.11.3-1.module+el8.7.0+1063+20f2b9a4.noarch.rpmx python38-libs-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpmpython38-lxml-4.4.1-7.module+el8.6.0+794+eba84017.x86_64.rpmjFpython38-markupsafe-1.1.1-6.module+el8.4.0+570+c2eaf144.x86_64.rpmyppython38-mod_wsgi-4.6.8-4.module+el8.7.0+1063+20f2b9a4.x86_64.rpmt;python38-numpy-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpm";python38-numpy-doc-1.17.3-6.module+el8.5.0+672+ab6eb015.noarch.rpmu;python38-numpy-f2py-1.17.3-6.module+el8.5.0+672+ab6eb015.x86_64.rpmtgpython38-pip-19.3.1-6.module+el8.7.0+1063+20f2b9a4.noarch.rpmugpython38-pip-wheel-19.3.1-6.module+el8.7.0+1063+20f2b9a4.noarch.rpmNpython38-ply-3.11-10.module+el8.4.0+570+c2eaf144.noarch.rpmvFpython38-psutil-5.6.4-4.module+el8.5.0+672+ab6eb015.x86_64.rpmkpython38-psycopg2-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmlpython38-psycopg2-doc-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpmmpython38-psycopg2-tests-2.8.4-4.module+el8.6.0+794+eba84017.x86_64.rpm4 python38-pycparser-2.19-3.module+el8.4.0+570+c2eaf144.noarch.rpmMhpython38-PyMySQL-0.10.1-1.module+el8.5.0+672+ab6eb015.noarch.rpm5python38-pysocks-1.7.1-4.module+el8.4.0+570+c2eaf144.noarch.rpm6python38-pytz-2019.3-3.module+el8.4.0+570+c2eaf144.noarch.rpm%upython38-pyyaml-5.4.1-1.module+el8.5.0+672+ab6eb015.x86_64.rpm7 python38-requests-2.22.0-9.module+el8.4.0+570+c2eaf144.noarch.rpmw python38-rpm-macros-3.8.13-1.module+el8.7.0+1063+20f2b9a4.noarch.rpmnSpython38-scipy-1.3.1-4.module+el8.5.0+672+ab6eb015.x86_64.rpm#\python38-setuptools-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpm$\python38-setuptools-wheel-41.6.0-5.module+el8.5.0+672+ab6eb015.noarch.rpmOppython38-six-1.12.0-10.module+el8.4.0+570+c2eaf144.noarch.rpmz python38-test-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm{ python38-tkinter-3.8.13-1.module+el8.7.0+1063+20f2b9a4.x86_64.rpm%;python38-urllib3-1.25.7-5.module+el8.5.0+672+ab6eb015.noarch.rpm&Cpython38-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpm'Cpython38-wheel-wheel-0.33.6-6.module+el8.5.0+672+ab6eb015.noarch.rpms@ 9tBBBbugfixgcc-toolset-12-annobin bug fix and enhancement update, https://errata.rockylinux.org/RLBA-2022:7582RLBA-2022:7582RLBA-2022:7582 gcc-toolset-12-annobin-plugin-gcc-10.76-5.el8.x86_64.rpmgcc-toolset-12-annobin-annocheck-10.76-5.el8.x86_64.rpm6gcc-toolset-12-annobin-docs-10.76-5.el8.noarch.rpmgcc-toolset-12-annobin-plugin-gcc-10.76-5.el8.x86_64.rpmgcc-toolset-12-annobin-annocheck-10.76-5.el8.x86_64.rpm6gcc-toolset-12-annobin-docs-10.76-5.el8.noarch.rpms zBBBBBBBBBBBBsecurityModerate: xorg-x11-server and xorg-x11-server-Xwayland security and bug fix update+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319CVE-2022-2319CVE-2022-2319https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320CVE-2022-2320CVE-2022-2320https://bugzilla.redhat.com/show_bug.cgi?id=20751322075132https://bugzilla.redhat.com/show_bug.cgi?id=21066712106671https://bugzilla.redhat.com/show_bug.cgi?id=21066832106683https://errata.rockylinux.org/RLSA-2022:7583RLSA-2022:7583RLSA-2022:7583 5 xorg-x11-server-common-1.20.11-9.el8.x86_64.rpm0 xorg-x11-server-Xdmx-1.20.11-9.el8.x86_64.rpm1 xorg-x11-server-Xephyr-1.20.11-9.el8.x86_64.rpm2 xorg-x11-server-Xnest-1.20.11-9.el8.x86_64.rpm3 xorg-x11-server-Xorg-1.20.11-9.el8.x86_64.rpm4 xorg-x11-server-Xvfb-1.20.11-9.el8.x86_64.rpm xorg-x11-server-Xwayland-21.1.3-6.el8.x86_64.rpm5 xorg-x11-server-common-1.20.11-9.el8.x86_64.rpm0 xorg-x11-server-Xdmx-1.20.11-9.el8.x86_64.rpm1 xorg-x11-server-Xephyr-1.20.11-9.el8.x86_64.rpm2 xorg-x11-server-Xnest-1.20.11-9.el8.x86_64.rpm3 xorg-x11-server-Xorg-1.20.11-9.el8.x86_64.rpm4 xorg-x11-server-Xvfb-1.20.11-9.el8.x86_64.rpm xorg-x11-server-Xwayland-21.1.3-6.el8.x86_64.rpmtA IBBBBBBBBBBbugfixlorax bug fix and enhancement updateJ https://bugzilla.redhat.com/show_bug.cgi?id=20421012042101https://bugzilla.redhat.com/show_bug.cgi?id=20950532095053https://errata.rockylinux.org/RLBA-2022:7584RLBA-2022:7584RLBA-2022:7584 Mcomposer-cli-28.14.70-1.el8.x86_64.rpmQlorax-28.14.70-1.el8.x86_64.rpmRlorax-composer-28.14.70-1.el8.x86_64.rpmSlorax-lmc-novirt-28.14.70-1.el8.x86_64.rpmTlorax-lmc-virt-28.14.70-1.el8.x86_64.rpmUlorax-templates-generic-28.14.70-1.el8.x86_64.rpmMcomposer-cli-28.14.70-1.el8.x86_64.rpmQlorax-28.14.70-1.el8.x86_64.rpmRlorax-composer-28.14.70-1.el8.x86_64.rpmSlorax-lmc-novirt-28.14.70-1.el8.x86_64.rpmTlorax-lmc-virt-28.14.70-1.el8.x86_64.rpmUlorax-templates-generic-28.14.70-1.el8.x86_64.rpmt VBBsecurityModerate: libtiff security updateIthttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561CVE-2022-0561CVE-2022-0561https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562CVE-2022-0562CVE-2022-0562https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865CVE-2022-0865CVE-2022-0865https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891CVE-2022-0891CVE-2022-0891https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0908CVE-2022-0908CVE-2022-0908https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0909CVE-2022-0909CVE-2022-0909https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0924CVE-2022-0924CVE-2022-0924https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1355CVE-2022-1355CVE-2022-1355https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844CVE-2022-22844CVE-2022-22844https://bugzilla.redhat.com/show_bug.cgi?id=20426032042603https://bugzilla.redhat.com/show_bug.cgi?id=20544942054494https://bugzilla.redhat.com/show_bug.cgi?id=20544952054495https://bugzilla.redhat.com/show_bug.cgi?id=20641452064145https://bugzilla.redhat.com/show_bug.cgi?id=20641462064146https://bugzilla.redhat.com/show_bug.cgi?id=20641482064148https://bugzilla.redhat.com/show_bug.cgi?id=20644062064406https://bugzilla.redhat.com/show_bug.cgi?id=20644112064411https://bugzilla.redhat.com/show_bug.cgi?id=20744152074415https://errata.rockylinux.org/RLSA-2022:7585RLSA-2022:7585RLSA-2022:7585 @4libtiff-4.0.9-23.el8.x86_64.rpmA4libtiff-devel-4.0.9-23.el8.x86_64.rpm@4libtiff-4.0.9-23.el8.x86_64.rpmA4libtiff-devel-4.0.9-23.el8.x86_64.rpmtB [bugfixtlog bug fix and enhancement update= https://bugzilla.redhat.com/show_bug.cgi?id=20709712070971https://bugzilla.redhat.com/show_bug.cgi?id=20884562088456https://errata.rockylinux.org/RLBA-2022:7586RLBA-2022:7586RLBA-2022:7586 tlog-12.1-2.el8.x86_64.rpmtlog-12.1-2.el8.x86_64.rpmtC 4^BBBBBBBBBBBBBBBBBBBBbugfixgvfs bug fix and enhancement update< https://bugzilla.redhat.com/show_bug.cgi?id=20804782080478https://bugzilla.redhat.com/show_bug.cgi?id=20834812083481https://bugzilla.redhat.com/show_bug.cgi?id=20957122095712https://errata.rockylinux.org/RLBA-2022:7587RLBA-2022:7587RLBA-2022:7587 gvfs-1.36.2-14.el8.x86_64.rpm gvfs-afc-1.36.2-14.el8.x86_64.rpm!gvfs-afp-1.36.2-14.el8.x86_64.rpm"gvfs-archive-1.36.2-14.el8.x86_64.rpm#gvfs-client-1.36.2-14.el8.x86_64.rpm$gvfs-devel-1.36.2-14.el8.x86_64.rpm%gvfs-fuse-1.36.2-14.el8.x86_64.rpm&gvfs-goa-1.36.2-14.el8.x86_64.rpm'gvfs-gphoto2-1.36.2-14.el8.x86_64.rpm(gvfs-mtp-1.36.2-14.el8.x86_64.rpm)gvfs-smb-1.36.2-14.el8.x86_64.rpm gvfs-1.36.2-14.el8.x86_64.rpm gvfs-afc-1.36.2-14.el8.x86_64.rpm!gvfs-afp-1.36.2-14.el8.x86_64.rpm"gvfs-archive-1.36.2-14.el8.x86_64.rpm#gvfs-client-1.36.2-14.el8.x86_64.rpm$gvfs-devel-1.36.2-14.el8.x86_64.rpm%gvfs-fuse-1.36.2-14.el8.x86_64.rpm&gvfs-goa-1.36.2-14.el8.x86_64.rpm'gvfs-gphoto2-1.36.2-14.el8.x86_64.rpm(gvfs-mtp-1.36.2-14.el8.x86_64.rpm)gvfs-smb-1.36.2-14.el8.x86_64.rpmuE 7ubugfixyara bug fix and enhancement update; https://bugzilla.redhat.com/show_bug.cgi?id=21198932119893https://errata.rockylinux.org/RLBA-2022:7589RLBA-2022:7589RLBA-2022:7589 ^hyara-4.2.3-1.el8.x86_64.rpm^hyara-4.2.3-1.el8.x86_64.rpmu dBBBBBBBBBBBBBBBBBBBBBCBBBBBBBBBqBBBPBrBBBBBBBBBBBsecurityModerate: python39:3.9 and python39-devel:3.9 security update:_https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107CVE-2015-20107CVE-2015-20107https://bugzilla.redhat.com/show_bug.cgi?id=20753902075390https://bugzilla.redhat.com/show_bug.cgi?id=20952712095271https://errata.rockylinux.org/RLSA-2022:7592RLSA-2022:7592RLSA-2022:7592 or3~!odpython39-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpmJ?python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpmKbpython39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpmdpython39-devel-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm dpython39-idle-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpmQpython39-idna-2.10-3.module+el8.4.0+574+843c4898.noarch.rpm!dpython39-libs-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpmw?python39-lxml-4.6.5-1.module+el8.6.0+795+de4edbcc.x86_64.rpm"python39-mod_wsgi-4.7.1-5.module+el8.7.0+1064+ad564229.x86_64.rpm&'python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm_'python39-numpy-doc-1.19.4-3.module+el8.5.0+673+10283621.noarch.rpm''python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm(Zpython39-pip-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpm)Zpython39-pip-wheel-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpmLkpython39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpmMSpython39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpmNSpython39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpmOSpython39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpmRpython39-pycparser-2.20-3.module+el8.4.0+574+843c4898.noarch.rpmPipython39-PyMySQL-0.10.1-2.module+el8.5.0+673+10283621.noarch.rpmPhpython39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpmSpython39-requests-2.25.0-2.module+el8.4.0+574+843c4898.noarch.rpm#dpython39-rpm-macros-3.9.13-1.module+el8.7.0+1064+ad564229.noarch.rpmQHpython39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm`spython39-setuptools-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpmaspython39-setuptools-wheel-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpmTspython39-six-1.15.0-3.module+el8.4.0+574+843c4898.noarch.rpm$dpython39-test-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm%dpython39-tkinter-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpmUjpython39-toml-0.10.1-5.module+el8.4.0+574+843c4898.noarch.rpmbEpython39-urllib3-1.25.10-4.module+el8.5.0+673+10283621.noarch.rpmchpython39-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpmdhpython39-wheel-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpmor3~!odpython39-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpmJ?python39-cffi-1.14.3-2.module+el8.4.0+574+843c4898.x86_64.rpmKbpython39-cryptography-3.3.1-2.module+el8.5.0+673+10283621.x86_64.rpmdpython39-devel-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm dpython39-idle-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpmQpython39-idna-2.10-3.module+el8.4.0+574+843c4898.noarch.rpm!dpython39-libs-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpmw?python39-lxml-4.6.5-1.module+el8.6.0+795+de4edbcc.x86_64.rpm"python39-mod_wsgi-4.7.1-5.module+el8.7.0+1064+ad564229.x86_64.rpm&'python39-numpy-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm_'python39-numpy-doc-1.19.4-3.module+el8.5.0+673+10283621.noarch.rpm''python39-numpy-f2py-1.19.4-3.module+el8.5.0+673+10283621.x86_64.rpm(Zpython39-pip-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpm)Zpython39-pip-wheel-20.2.4-7.module+el8.7.0+1064+ad564229.noarch.rpmLkpython39-psutil-5.8.0-4.module+el8.5.0+673+10283621.x86_64.rpmMSpython39-psycopg2-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpmNSpython39-psycopg2-doc-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpmOSpython39-psycopg2-tests-2.8.6-2.module+el8.6.0+795+de4edbcc.x86_64.rpmRpython39-pycparser-2.20-3.module+el8.4.0+574+843c4898.noarch.rpmPipython39-PyMySQL-0.10.1-2.module+el8.5.0+673+10283621.noarch.rpmPhpython39-pyyaml-5.4.1-1.module+el8.5.0+673+10283621.x86_64.rpmSpython39-requests-2.25.0-2.module+el8.4.0+574+843c4898.noarch.rpm#dpython39-rpm-macros-3.9.13-1.module+el8.7.0+1064+ad564229.noarch.rpmQHpython39-scipy-1.5.4-3.module+el8.5.0+673+10283621.x86_64.rpm`spython39-setuptools-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpmaspython39-setuptools-wheel-50.3.2-4.module+el8.5.0+673+10283621.noarch.rpmTspython39-six-1.15.0-3.module+el8.4.0+574+843c4898.noarch.rpm$dpython39-test-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpm%dpython39-tkinter-3.9.13-1.module+el8.7.0+1064+ad564229.x86_64.rpmUjpython39-toml-0.10.1-5.module+el8.4.0+574+843c4898.noarch.rpmbEpython39-urllib3-1.25.10-4.module+el8.5.0+673+10283621.noarch.rpmchpython39-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpmdhpython39-wheel-wheel-0.35.1-4.module+el8.5.0+673+10283621.noarch.rpm fBBBBBBBBBBBBBBBBBBBBBqQBB@^BSBBBBBBBBBBBDMBBfBBBWBBBBBBBBBBBBsecurityModerate: python27:2.7 security updaterhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107CVE-2015-20107CVE-2015-20107https://bugzilla.redhat.com/show_bug.cgi?id=20753902075390https://errata.rockylinux.org/RLSA-2022:7593RLSA-2022:7593RLSA-2022:7593 u9pq^xBBBBbugfixghostscript bug fix and enhancement update https://errata.rockylinux.org/RLBA-2022:7631RLBA-2022:7631RLBA-2022:7631 xghostscript-9.27-4.el8.x86_64.rpmxghostscript-x11-9.27-4.el8.x86_64.rpm-xlibgs-9.27-4.el8.x86_64.rpmxghostscript-9.27-4.el8.x86_64.rpmxghostscript-x11-9.27-4.el8.x86_64.rpm-xlibgs-9.27-4.el8.x86_64.rpm4a bugfixthermald bug fix and enhancement update https://errata.rockylinux.org/RLBA-2022:7632RLBA-2022:7632RLBA-2022:7632 gthermald-2.5-3.el8.x86_64.rpmgthermald-2.5-3.el8.x86_64.rpm4 BBBsecurityModerate: dnsmasq security and bug fix update6https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0934CVE-2022-0934CVE-2022-0934https://bugzilla.redhat.com/show_bug.cgi?id=20496912049691https://bugzilla.redhat.com/show_bug.cgi?id=20570752057075https://bugzilla.redhat.com/show_bug.cgi?id=21203572120357https://errata.rockylinux.org/RLSA-2022:7633RLSA-2022:7633RLSA-2022:7633 v dnsmasq-2.79-24.el8.x86_64.rpmw dnsmasq-utils-2.79-24.el8.x86_64.rpmv dnsmasq-2.79-24.el8.x86_64.rpmw dnsmasq-utils-2.79-24.el8.x86_64.rpm4b GBBbugfixusbredir bug fix and enhancement updateL https://bugzilla.redhat.com/show_bug.cgi?id=21113512111351https://errata.rockylinux.org/RLBA-2022:7634RLBA-2022:7634RLBA-2022:7634 (musbredir-0.12.0-2.el8.x86_64.rpm)musbredir-devel-0.12.0-2.el8.x86_64.rpm(musbredir-0.12.0-2.el8.x86_64.rpm)musbredir-devel-0.12.0-2.el8.x86_64.rpm4d bugfixedk2 bug fix and enhancement updateK https://bugzilla.redhat.com/show_bug.cgi?id=20748342074834https://bugzilla.redhat.com/show_bug.cgi?id=21123072112307https://errata.rockylinux.org/RLBA-2022:7636RLBA-2022:7636RLBA-2022:7636 edk2-ovmf-20220126gitbb1bba3d77-3.el8.noarch.rpmedk2-ovmf-20220126gitbb1bba3d77-3.el8.noarch.rpm4i -NBBBBBBBBBBBBBBBBBBBBBBBBBBBBBenhancementmaven:3.8 bug fix and enhancement updateJ https://bugzilla.redhat.com/show_bug.cgi?id=20884732088473https://errata.rockylinux.org/RLEA-2022:7637RLEA-2022:7637RLEA-2022:7637 ,enTapache-commons-cli-1.5.0-4.module+el8.7.0+1082+b3a88d23.noarch.rpmUIapache-commons-codec-1.15-7.module+el8.7.0+1082+b3a88d23.noarch.rpmV:apache-commons-io-2.11.0-2.module+el8.7.0+1082+b3a88d23.noarch.rpmWapache-commons-lang3-3.12.0-7.module+el8.7.0+1082+b3a88d23.noarch.rpmX&atinject-1.0.5-4.module+el8.7.0+1082+b3a88d23.noarch.rpmYGcdi-api-2.0.2-6.module+el8.7.0+1082+b3a88d23.noarch.rpmZ<google-guice-4.2.3-9.module+el8.7.0+1082+b3a88d23.noarch.rpmr3guava-31.0.1-4.module+el8.7.0+1082+b3a88d23.noarch.rpm>httpcomponents-client-4.5.13-5.module+el8.7.0+1082+b3a88d23.noarch.rpm[=httpcomponents-core-4.4.13-7.module+el8.7.0+1082+b3a88d23.noarch.rpmMpjakarta-annotations-1.3.5-14.module+el8.7.0+1082+b3a88d23.noarch.rpm7bjansi-2.4.0-6.module+el8.7.0+1082+b3a88d23.x86_64.rpm\Zjcl-over-slf4j-1.7.32-4.module+el8.7.0+1082+b3a88d23.noarch.rpm|jsr-305-3.0.2-6.module+el8.7.0+1082+b3a88d23.noarch.rpm, maven-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpm maven-lib-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpmk maven-openjdk11-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpml maven-openjdk17-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpmm maven-openjdk8-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpm~7maven-resolver-1.7.3-5.module+el8.7.0+1082+b3a88d23.noarch.rpm0,maven-shared-utils-3.3.4-5.module+el8.7.0+1082+b3a88d23.noarch.rpm1maven-wagon-3.5.1-2.module+el8.7.0+1082+b3a88d23.noarch.rpm]Dplexus-cipher-2.0-2.module+el8.7.0+1082+b3a88d23.noarch.rpm^xplexus-classworlds-2.6.0-12.module+el8.7.0+1082+b3a88d23.noarch.rpm_Rplexus-containers-component-annotations-2.1.1-2.module+el8.7.0+1082+b3a88d23.noarch.rpm`gplexus-interpolation-1.26-12.module+el8.7.0+1082+b3a88d23.noarch.rpmaEplexus-sec-dispatcher-2.0-4.module+el8.7.0+1082+b3a88d23.noarch.rpmb'plexus-utils-3.3.0-10.module+el8.7.0+1082+b3a88d23.noarch.rpm .sisu-0.3.5-2.module+el8.7.0+1082+b3a88d23.noarch.rpmmZslf4j-1.7.32-4.module+el8.7.0+1082+b3a88d23.noarch.rpm,enTapache-commons-cli-1.5.0-4.module+el8.7.0+1082+b3a88d23.noarch.rpmUIapache-commons-codec-1.15-7.module+el8.7.0+1082+b3a88d23.noarch.rpmV:apache-commons-io-2.11.0-2.module+el8.7.0+1082+b3a88d23.noarch.rpmWapache-commons-lang3-3.12.0-7.module+el8.7.0+1082+b3a88d23.noarch.rpmX&atinject-1.0.5-4.module+el8.7.0+1082+b3a88d23.noarch.rpmYGcdi-api-2.0.2-6.module+el8.7.0+1082+b3a88d23.noarch.rpmZ<google-guice-4.2.3-9.module+el8.7.0+1082+b3a88d23.noarch.rpmr3guava-31.0.1-4.module+el8.7.0+1082+b3a88d23.noarch.rpm>httpcomponents-client-4.5.13-5.module+el8.7.0+1082+b3a88d23.noarch.rpm[=httpcomponents-core-4.4.13-7.module+el8.7.0+1082+b3a88d23.noarch.rpmMpjakarta-annotations-1.3.5-14.module+el8.7.0+1082+b3a88d23.noarch.rpm7bjansi-2.4.0-6.module+el8.7.0+1082+b3a88d23.x86_64.rpm\Zjcl-over-slf4j-1.7.32-4.module+el8.7.0+1082+b3a88d23.noarch.rpm|jsr-305-3.0.2-6.module+el8.7.0+1082+b3a88d23.noarch.rpm, maven-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpm maven-lib-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpmk maven-openjdk11-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpml maven-openjdk17-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpmm maven-openjdk8-3.8.5-3.module+el8.7.0+1082+b3a88d23.noarch.rpm~7maven-resolver-1.7.3-5.module+el8.7.0+1082+b3a88d23.noarch.rpm0,maven-shared-utils-3.3.4-5.module+el8.7.0+1082+b3a88d23.noarch.rpm1maven-wagon-3.5.1-2.module+el8.7.0+1082+b3a88d23.noarch.rpm]Dplexus-cipher-2.0-2.module+el8.7.0+1082+b3a88d23.noarch.rpm^xplexus-classworlds-2.6.0-12.module+el8.7.0+1082+b3a88d23.noarch.rpm_Rplexus-containers-component-annotations-2.1.1-2.module+el8.7.0+1082+b3a88d23.noarch.rpm`gplexus-interpolation-1.26-12.module+el8.7.0+1082+b3a88d23.noarch.rpmaEplexus-sec-dispatcher-2.0-4.module+el8.7.0+1082+b3a88d23.noarch.rpmb'plexus-utils-3.3.0-10.module+el8.7.0+1082+b3a88d23.noarch.rpm .sisu-0.3.5-2.module+el8.7.0+1082+b3a88d23.noarch.rpmmZslf4j-1.7.32-4.module+el8.7.0+1082+b3a88d23.noarch.rpm5j 4nBBBBenhancementmercurial:6.2 bug fix and enhancement updateI https://errata.rockylinux.org/RLEA-2022:7638RLEA-2022:7638RLEA-2022:7638 cMbIcnmercurial-6.2-1.module+el8.7.0+1070+25eee955.x86_64.rpmnmercurial-chg-6.2-1.module+el8.7.0+1070+25eee955.x86_64.rpm nmercurial-hgk-6.2-1.module+el8.7.0+1070+25eee955.x86_64.rpmcMbIcnmercurial-6.2-1.module+el8.7.0+1070+25eee955.x86_64.rpmnmercurial-chg-6.2-1.module+el8.7.0+1070+25eee955.x86_64.rpm nmercurial-hgk-6.2-1.module+el8.7.0+1070+25eee955.x86_64.rpm5 9uBBsecurityModerate: openblas security updateHihttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4048CVE-2021-4048CVE-2021-4048https://bugzilla.redhat.com/show_bug.cgi?id=20243582024358https://errata.rockylinux.org/RLSA-2022:7639RLSA-2022:7639RLSA-2022:7639 ctopenblas-0.3.15-4.el8.x86_64.rpmdtopenblas-threads-0.3.15-4.el8.x86_64.rpmctopenblas-0.3.15-4.el8.x86_64.rpmdtopenblas-threads-0.3.15-4.el8.x86_64.rpm6 y Mbugfixqatengine bug fix and enhancement update` https://errata.rockylinux.org/RLBA-2022:7666RLBA-2022:7666RLBA-2022:7666 |]qatengine-0.6.15-2.el8.x86_64.rpm|]qatengine-0.6.15-2.el8.x86_64.rpm>z PBBbugfixqatzip bug fix and enhancement update_ https://errata.rockylinux.org/RLBA-2022:7667RLBA-2022:7667RLBA-2022:7667 'qatzip-1.0.9-1.el8.x86_64.rpm(qatzip-libs-1.0.9-1.el8.x86_64.rpm'qatzip-1.0.9-1.el8.x86_64.rpm(qatzip-libs-1.0.9-1.el8.x86_64.rpm>{ Ubugfixqatlib bug fix and enhancement update^ https://errata.rockylinux.org/RLBA-2022:7668RLBA-2022:7668RLBA-2022:7668 & qatlib-22.07.0-1.el8.x86_64.rpm& qatlib-22.07.0-1.el8.x86_64.rpm>k XBBenhancementipxe bug fix and enhancement update] https://bugzilla.redhat.com/show_bug.cgi?id=20680092068009https://errata.rockylinux.org/RLEA-2022:7669RLEA-2022:7669RLEA-2022:7669 HZipxe-bootimgs-aarch64-20181214-11.git133f4c47.el8.noarch.rpmIZipxe-bootimgs-x86-20181214-11.git133f4c47.el8.noarch.rpmJZipxe-roms-20181214-11.git133f4c47.el8.noarch.rpmKZipxe-roms-qemu-20181214-11.git133f4c47.el8.noarch.rpmHZipxe-bootimgs-aarch64-20181214-11.git133f4c47.el8.noarch.rpmIZipxe-bootimgs-x86-20181214-11.git133f4c47.el8.noarch.rpmJZipxe-roms-20181214-11.git133f4c47.el8.noarch.rpmKZipxe-roms-qemu-20181214-11.git133f4c47.el8.noarch.rpm>| ]bugfixmod_wsgi bug fix and enhancement update\ https://errata.rockylinux.org/RLBA-2022:7670RLBA-2022:7670RLBA-2022:7670 _opython3-mod_wsgi-4.6.4-5.el8.x86_64.rpm_opython3-mod_wsgi-4.6.4-5.el8.x86_64.rpm?~ "`bugfixspice-vdagent-win bug fix and enhancement update[ https://bugzilla.redhat.com/show_bug.cgi?id=21211222121122https://errata.rockylinux.org/RLBA-2022:7672RLBA-2022:7672RLBA-2022:7672 ,Aspice-vdagent-win-x64-0.10.0-6.el8.noarch.rpm-Aspice-vdagent-win-x86-0.10.0-6.el8.noarch.rpm,Aspice-vdagent-win-x64-0.10.0-6.el8.noarch.rpm-Aspice-vdagent-win-x86-0.10.0-6.el8.noarch.rpm?} $#bugfixpython-simpleline bug fix and enhancement updateZ https://bugzilla.redhat.com/show_bug.cgi?id=21219142121914https://errata.rockylinux.org/RLBA-2022:7671RLBA-2022:7671RLBA-2022:7671 e3python3-simpleline-1.1.1-3.el8.noarch.rpme3python3-simpleline-1.1.1-3.el8.noarch.rpm? 'ebugfixwsmancli bug fix and enhancement updateY https://bugzilla.redhat.com/show_bug.cgi?id=21248912124891https://errata.rockylinux.org/RLBA-2022:7673RLBA-2022:7673RLBA-2022:7673 Gpwsmancli-2.6.0-11.el8.x86_64.rpmGpwsmancli-2.6.0-11.el8.x86_64.rpm? 0hBBBBBBbugfixopenwsman bug fix and enhancement updateX https://bugzilla.redhat.com/show_bug.cgi?id=21248942124894https://errata.rockylinux.org/RLBA-2022:7674RLBA-2022:7674RLBA-2022:7674 yklibwsman1-2.6.5-9.el8.x86_64.rpmmkopenwsman-client-2.6.5-9.el8.x86_64.rpmnkopenwsman-python3-2.6.5-9.el8.x86_64.rpmokopenwsman-server-2.6.5-9.el8.x86_64.rpmyklibwsman1-2.6.5-9.el8.x86_64.rpmmkopenwsman-client-2.6.5-9.el8.x86_64.rpmnkopenwsman-python3-2.6.5-9.el8.x86_64.rpmokopenwsman-server-2.6.5-9.el8.x86_64.rpm? 3qbugfixspice-client-win bug fix and enhancement updateW https://bugzilla.redhat.com/show_bug.cgi?id=20626842062684https://errata.rockylinux.org/RLBA-2022:7675RLBA-2022:7675RLBA-2022:7675 (spice-client-win-x64-8.7-1.el8.noarch.rpm)spice-client-win-x86-8.7-1.el8.noarch.rpm(spice-client-win-x64-8.7-1.el8.noarch.rpm)spice-client-win-x86-8.7-1.el8.noarch.rpm@ 4_BBbugfixprometheus-jmx-exporter bug fix and enhancement updateV https://errata.rockylinux.org/RLBA-2022:7676RLBA-2022:7676RLBA-2022:7676 f prometheus-jmx-exporter-0.12.0-8.el8.noarch.rpmg prometheus-jmx-exporter-openjdk11-0.12.0-8.el8.noarch.rpmh prometheus-jmx-exporter-openjdk17-0.12.0-8.el8.noarch.rpmi prometheus-jmx-exporter-openjdk8-0.12.0-8.el8.noarch.rpmf prometheus-jmx-exporter-0.12.0-8.el8.noarch.rpmg prometheus-jmx-exporter-openjdk11-0.12.0-8.el8.noarch.rpmh prometheus-jmx-exporter-openjdk17-0.12.0-8.el8.noarch.rpmi prometheus-jmx-exporter-openjdk8-0.12.0-8.el8.noarch.rpm@! 5WBBBBBBsecurityModerate: webkit2gtk3 security and bug fix updateU*https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624CVE-2022-22624CVE-2022-22624https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628CVE-2022-22628CVE-2022-22628https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629CVE-2022-22629CVE-2022-22629https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662CVE-2022-22662CVE-2022-22662https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700CVE-2022-26700CVE-2022-26700https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709CVE-2022-26709CVE-2022-26709https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26710CVE-2022-26710CVE-2022-26710https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716CVE-2022-26716CVE-2022-26716https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717CVE-2022-26717CVE-2022-26717https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719CVE-2022-26719CVE-2022-26719https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293CVE-2022-30293CVE-2022-30293https://bugzilla.redhat.com/show_bug.cgi?id=20619942061994https://bugzilla.redhat.com/show_bug.cgi?id=20738932073893https://bugzilla.redhat.com/show_bug.cgi?id=20738962073896https://bugzilla.redhat.com/show_bug.cgi?id=20738992073899https://bugzilla.redhat.com/show_bug.cgi?id=20825482082548https://bugzilla.redhat.com/show_bug.cgi?id=20927322092732https://bugzilla.redhat.com/show_bug.cgi?id=20927332092733https://bugzilla.redhat.com/show_bug.cgi?id=20927342092734https://bugzilla.redhat.com/show_bug.cgi?id=20927352092735https://bugzilla.redhat.com/show_bug.cgi?id=20927362092736https://bugzilla.redhat.com/show_bug.cgi?id=20993342099334https://bugzilla.redhat.com/show_bug.cgi?id=21047872104787https://bugzilla.redhat.com/show_bug.cgi?id=21047892104789https://errata.rockylinux.org/RLSA-2022:7704RLSA-2022:7704RLSA-2022:7704 ywebkit2gtk3-2.36.7-1.el8_6.x86_64.rpmzwebkit2gtk3-devel-2.36.7-1.el8_6.x86_64.rpm{webkit2gtk3-jsc-2.36.7-1.el8_6.x86_64.rpm|webkit2gtk3-jsc-devel-2.36.7-1.el8_6.x86_64.rpmywebkit2gtk3-2.36.7-1.el8_6.x86_64.rpmzwebkit2gtk3-devel-2.36.7-1.el8_6.x86_64.rpm{webkit2gtk3-jsc-2.36.7-1.el8_6.x86_64.rpm|webkit2gtk3-jsc-devel-2.36.7-1.el8_6.x86_64.rpm@ 6ZBBBBBBBBBBBUBwBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBZBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBzBBBBBBB^BBBBBBBBBBBBBBBBB[BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbugfixvirt:rhel and virt-devel:rhel bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=21323912132391* irtiofsd debug log's timestamp is NULLhttps://errata.rockylinux.org/RLBA-2022:7820RLBA-2022:7820RLBA-2022:7820 tspAq+=hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm,=hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm8libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm9libguestfs-appliance-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmtlibguestfs-bash-completion-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm:libguestfs-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm;libguestfs-gfs2-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm<libguestfs-gobject-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm=libguestfs-gobject-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmulibguestfs-inspect-icons-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm>libguestfs-java-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm?libguestfs-java-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmvlibguestfs-javadoc-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpmwlibguestfs-man-pages-ja-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpmxlibguestfs-man-pages-uk-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm@libguestfs-rescue-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmAlibguestfs-rsync-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmylibguestfs-tools-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpmBlibguestfs-tools-c-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm=libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpmClibguestfs-xfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm>?libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm?libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm??libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmJDlibtpms-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpmKDlibtpms-devel-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpmLlibvirt-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmMlibvirt-client-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmNlibvirt-daemon-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmOlibvirt-daemon-config-network-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmPlibvirt-daemon-config-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmQlibvirt-daemon-driver-interface-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmRlibvirt-daemon-driver-network-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmSlibvirt-daemon-driver-nodedev-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmTlibvirt-daemon-driver-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmUlibvirt-daemon-driver-qemu-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmVlibvirt-daemon-driver-secret-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmWlibvirt-daemon-driver-storage-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmXlibvirt-daemon-driver-storage-core-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmYlibvirt-daemon-driver-storage-disk-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmZlibvirt-daemon-driver-storage-gluster-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm[libvirt-daemon-driver-storage-iscsi-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm\libvirt-daemon-driver-storage-iscsi-direct-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm]libvirt-daemon-driver-storage-logical-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm^libvirt-daemon-driver-storage-mpath-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm_libvirt-daemon-driver-storage-rbd-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm`libvirt-daemon-driver-storage-scsi-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmalibvirt-daemon-kvm-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmblibvirt-devel-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmclibvirt-docs-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibvirt-libs-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmelibvirt-lock-sanlock-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmflibvirt-nss-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmglibvirt-wireshark-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmjlua-guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmB?nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmCnbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmnbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpmDnbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmEnbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmFnbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmGnbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmHnbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmInbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmJnbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmKnbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmLnbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmMnbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmNnbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmOnbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmPnbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmQnbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmRnbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmSnbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmTnbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmd=perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm_perl-Sys-Guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmcperl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpme=python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmkpython3-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmf?python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpml`python3-libvirt-8.0.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmx8qemu-guest-agent-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpmy8qemu-img-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpmz8qemu-kvm-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm{8qemu-kvm-block-curl-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm|8qemu-kvm-block-gluster-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm}8qemu-kvm-block-iscsi-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm~8qemu-kvm-block-rbd-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-block-ssh-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-common-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-core-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-docs-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-hw-usbredir-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-ui-opengl-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-ui-spice-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpmq=ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm ruby-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm supermin-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpmsupermin-devel-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmvirt-dib-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmtspAq+=hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm,=hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm8libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm9libguestfs-appliance-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmtlibguestfs-bash-completion-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm:libguestfs-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm;libguestfs-gfs2-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm<libguestfs-gobject-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm=libguestfs-gobject-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmulibguestfs-inspect-icons-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm>libguestfs-java-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm?libguestfs-java-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmvlibguestfs-javadoc-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpmwlibguestfs-man-pages-ja-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpmxlibguestfs-man-pages-uk-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm@libguestfs-rescue-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmAlibguestfs-rsync-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmylibguestfs-tools-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpmBlibguestfs-tools-c-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm=libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpmClibguestfs-xfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm>?libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm?libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm??libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmJDlibtpms-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpmKDlibtpms-devel-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpmLlibvirt-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmMlibvirt-client-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmNlibvirt-daemon-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmOlibvirt-daemon-config-network-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmPlibvirt-daemon-config-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmQlibvirt-daemon-driver-interface-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmRlibvirt-daemon-driver-network-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmSlibvirt-daemon-driver-nodedev-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmTlibvirt-daemon-driver-nwfilter-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmUlibvirt-daemon-driver-qemu-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmVlibvirt-daemon-driver-secret-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmWlibvirt-daemon-driver-storage-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmXlibvirt-daemon-driver-storage-core-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmYlibvirt-daemon-driver-storage-disk-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmZlibvirt-daemon-driver-storage-gluster-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm[libvirt-daemon-driver-storage-iscsi-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm\libvirt-daemon-driver-storage-iscsi-direct-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm]libvirt-daemon-driver-storage-logical-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm^libvirt-daemon-driver-storage-mpath-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm_libvirt-daemon-driver-storage-rbd-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm`libvirt-daemon-driver-storage-scsi-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmalibvirt-daemon-kvm-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmblibvirt-devel-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmclibvirt-docs-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibvirt-libs-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmelibvirt-lock-sanlock-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmflibvirt-nss-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmglibvirt-wireshark-8.0.0-10.module+el8.7.0+1084+97b81f61.x86_64.rpmjlua-guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmB?nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmCnbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmnbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpmDnbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmEnbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmFnbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmGnbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmHnbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmInbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmJnbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmKnbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmLnbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmMnbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmNnbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmOnbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmPnbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmQnbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmRnbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmSnbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmTnbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmd=perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm_perl-Sys-Guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmcperl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpme=python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmkpython3-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmf?python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpml`python3-libvirt-8.0.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmx8qemu-guest-agent-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpmy8qemu-img-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpmz8qemu-kvm-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm{8qemu-kvm-block-curl-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm|8qemu-kvm-block-gluster-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm}8qemu-kvm-block-iscsi-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm~8qemu-kvm-block-rbd-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-block-ssh-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-common-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-core-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-docs-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-hw-usbredir-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-ui-opengl-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpm8qemu-kvm-ui-spice-6.2.0-20.module+el8.7.0+1084+97b81f61.2.x86_64.rpmq=ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm ruby-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm supermin-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpmsupermin-devel-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmvirt-dib-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm_$ XBYGBBBBBBBsecurityImportant: nodejs:18 security updatehhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35255CVE-2022-35255CVE-2022-35255https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256CVE-2022-35256CVE-2022-35256https://bugzilla.redhat.com/show_bug.cgi?id=21305172130517https://bugzilla.redhat.com/show_bug.cgi?id=21305182130518https://errata.rockylinux.org/RLSA-2022:7821RLSA-2022:7821RLSA-2022:7821 /f2A/nodejs-18.9.1-1.module+el8.7.0+1072+5b168780.x86_64.rpmnodejs-devel-18.9.1-1.module+el8.7.0+1072+5b168780.x86_64.rpm6nodejs-docs-18.9.1-1.module+el8.7.0+1072+5b168780.noarch.rpmnodejs-full-i18n-18.9.1-1.module+el8.7.0+1072+5b168780.x86_64.rpmCQnodejs-nodemon-2.0.19-1.module+el8.7.0+1072+5b168780.noarch.rpm:[nodejs-packaging-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpmz[nodejs-packaging-bundler-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpm+npm-8.19.1-1.18.9.1.1.module+el8.7.0+1072+5b168780.x86_64.rpm/f2A/nodejs-18.9.1-1.module+el8.7.0+1072+5b168780.x86_64.rpmnodejs-devel-18.9.1-1.module+el8.7.0+1072+5b168780.x86_64.rpm6nodejs-docs-18.9.1-1.module+el8.7.0+1072+5b168780.noarch.rpmnodejs-full-i18n-18.9.1-1.module+el8.7.0+1072+5b168780.x86_64.rpmCQnodejs-nodemon-2.0.19-1.module+el8.7.0+1072+5b168780.noarch.rpm:[nodejs-packaging-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpmz[nodejs-packaging-bundler-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpm+npm-8.19.1-1.18.9.1.1.module+el8.7.0+1072+5b168780.x86_64.rpm_% kBBBBBBBBBBBBBxBBnBBBBBBBBBB`BVBBBdZBBBBBBBB^BBBBBBBBBBBBBBBBBsecurityLow: container-tools:rhel8 security, bug fix, and enhancement updateolhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2989CVE-2022-2989CVE-2022-2989https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2990CVE-2022-2990CVE-2022-2990https://bugzilla.redhat.com/show_bug.cgi?id=21214452121445https://bugzilla.redhat.com/show_bug.cgi?id=21214532121453https://bugzilla.redhat.com/show_bug.cgi?id=21256442125644* podman creates lock file in /etc/cni/net.d/cni.lock instead of /run/lock/https://bugzilla.redhat.com/show_bug.cgi?id=21256452125645* (podman image trust) does not support the new trust type "sigstoreSigned "https://bugzilla.redhat.com/show_bug.cgi?id=21256472125647* podman kill may deadlockhttps://bugzilla.redhat.com/show_bug.cgi?id=21256482125648* Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied [RHEL 8.7]https://bugzilla.redhat.com/show_bug.cgi?id=21256862125686* containers-common-1-44 is missing RPM-GPG-KEY-redhat-beta [RHEL 8.7]https://bugzilla.redhat.com/show_bug.cgi?id=21297672129767* ADD Dockerfile reference is not validating HTTP status code [rhel8-8.7.0]https://bugzilla.redhat.com/show_bug.cgi?id=21302342130234* Two aardvark-dns instances trying to use the same port on the same interface. [rhel-8.7.0.z] (netavark)https://bugzilla.redhat.com/show_bug.cgi?id=21302362130236* containers config.json gets empty after sudden power losshttps://bugzilla.redhat.com/show_bug.cgi?id=21309112130911* [RFE]Podman support to perform custom actions on unhealthy containershttps://bugzilla.redhat.com/show_bug.cgi?id=21323602132360* [RFE] python-podman: Podman support to perform custom actions on unhealthy containershttps://bugzilla.redhat.com/show_bug.cgi?id=21324122132412* PANIC podman API service endpoint handler panichttps://bugzilla.redhat.com/show_bug.cgi?id=21329922132992* Podman volume plugin timeout should be configurablehttps://bugzilla.redhat.com/show_bug.cgi?id=21333902133390* Podman container got global IPv6 address unexpectedly even when macvlan network is created for pure IPv4 networkhttps://bugzilla.redhat.com/show_bug.cgi?id=21364062136406* Skopeo push image to redhat quay with sigstore was failedhttps://bugzilla.redhat.com/show_bug.cgi?id=21364332136433* Podman push image to redhat quay with sigstore was failedhttps://bugzilla.redhat.com/show_bug.cgi?id=21364382136438* Buildah push image to redhat quay with sigstore was failedhttps://bugzilla.redhat.com/show_bug.cgi?id=21372952137295* Two aardvark-dns instances trying to use the same port on the same interface. [rhel-8.8] (aardvark-dns)https://errata.rockylinux.org/RLSA-2022:7822RLSA-2022:7822RLSA-2022:7822 v}W"aardvark-dns-1.1.0-5.module+el8.7.0+1078+e72fcd4f.x86_64.rpmZbuildah-1.27.2-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpm}Zbuildah-tests-1.27.2-2.module+el8.7.0+1078+e72fcd4f.x86_64.rpmSecockpit-podman-53-1.module+el8.7.0+1078+e72fcd4f.noarch.rpmoconmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm9Scontainernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm1containers-common-1-43.module+el8.7.0+1078+e72fcd4f.x86_64.rpmcontainer-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm-crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm*criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm!criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm"criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpmZPcrun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmLVfuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmTXlibslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmUXlibslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmBnetavark-1.1.0-7.module+el8.7.0+1078+e72fcd4f.x86_64.rpm\Coci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm fpodman-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpmfpodman-catatonit-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm fpodman-docker-4.2.0-4.module+el8.7.0+1078+e72fcd4f.noarch.rpmefpodman-gvproxy-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpmfpodman-plugins-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpm;fpodman-remote-4.2.0-4.module+el8.7.0+1078+e72fcd4f.x86_64.rpmQBgBBBBsecurityImportant: varnish:6 security update}Vhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45060CVE-2022-45060CVE-2022-45060https://bugzilla.redhat.com/show_bug.cgi?id=21418442141844https://errata.rockylinux.org/RLSA-2022:8649RLSA-2022:8649RLSA-2022:8649  vhA mvarnish-6.0.8-2.module+el8.7.0+1094+66cdd070.1.x86_64.rpmmvarnish-devel-6.0.8-2.module+el8.7.0+1094+66cdd070.1.x86_64.rpmmvarnish-docs-6.0.8-2.module+el8.7.0+1094+66cdd070.1.x86_64.rpmovarnish-modules-0.15.0-6.module+el8.5.0+677+2a78a869.x86_64.rpm vhA mvarnish-6.0.8-2.module+el8.7.0+1094+66cdd070.1.x86_64.rpmmvarnish-devel-6.0.8-2.module+el8.7.0+1094+66cdd070.1.x86_64.rpmmvarnish-docs-6.0.8-2.module+el8.7.0+1094+66cdd070.1.x86_64.rpmovarnish-modules-0.15.0-6.module+el8.5.0+677+2a78a869.x86_64.rpm{+ XBgBBBBBBBBsecurityModerate: nodejs:18 security, bug fix, and enhancement updateSshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3517CVE-2022-3517CVE-2022-3517https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548CVE-2022-43548CVE-2022-43548https://bugzilla.redhat.com/show_bug.cgi?id=21346092134609https://bugzilla.redhat.com/show_bug.cgi?id=21409112140911https://bugzilla.redhat.com/show_bug.cgi?id=21428182142818The following packages have been upgraded to a later upstream version: nodejs (18.12.1), nodejs-nodemon (2.0.20).https://errata.rockylinux.org/RLSA-2022:8833RLSA-2022:8833RLSA-2022:8833 /fiA/nodejs-18.12.1-2.module+el8.7.0+1104+549f92a6.x86_64.rpmnodejs-devel-18.12.1-2.module+el8.7.0+1104+549f92a6.x86_64.rpm6nodejs-docs-18.12.1-2.module+el8.7.0+1104+549f92a6.noarch.rpmnodejs-full-i18n-18.12.1-2.module+el8.7.0+1104+549f92a6.x86_64.rpmCHnodejs-nodemon-2.0.20-1.module+el8.7.0+1104+549f92a6.noarch.rpm:[nodejs-packaging-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpmz[nodejs-packaging-bundler-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpm-npm-8.19.2-1.18.12.1.2.module+el8.7.0+1104+549f92a6.x86_64.rpm/fiA/nodejs-18.12.1-2.module+el8.7.0+1104+549f92a6.x86_64.rpmnodejs-devel-18.12.1-2.module+el8.7.0+1104+549f92a6.x86_64.rpm6nodejs-docs-18.12.1-2.module+el8.7.0+1104+549f92a6.noarch.rpmnodejs-full-i18n-18.12.1-2.module+el8.7.0+1104+549f92a6.x86_64.rpmCHnodejs-nodemon-2.0.20-1.module+el8.7.0+1104+549f92a6.noarch.rpm:[nodejs-packaging-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpmz[nodejs-packaging-bundler-2021.06-4.module+el8.7.0+1072+5b168780.noarch.rpm-npm-8.19.2-1.18.12.1.2.module+el8.7.0+1104+549f92a6.x86_64.rpm{# JBBBBBBBBBBBBBBbugfix.NET Core 3.1 bugfix updateF https://errata.rockylinux.org/RLBA-2022:9018RLBA-2022:9018RLBA-2022:9018 ;aspnetcore-runtime-3.1-3.1.32-1.el8_7.x86_64.rpm<aspnetcore-targeting-pack-3.1-3.1.32-1.el8_7.x86_64.rpmTdotnet-apphost-pack-3.1-3.1.32-1.el8_7.x86_64.rpmUdotnet-hostfxr-3.1-3.1.32-1.el8_7.x86_64.rpmVdotnet-runtime-3.1-3.1.32-1.el8_7.x86_64.rpmWdotnet-sdk-3.1-3.1.426-1.el8_7.x86_64.rpmXdotnet-targeting-pack-3.1-3.1.32-1.el8_7.x86_64.rpmYdotnet-templates-3.1-3.1.426-1.el8_7.x86_64.rpm;aspnetcore-runtime-3.1-3.1.32-1.el8_7.x86_64.rpm<aspnetcore-targeting-pack-3.1-3.1.32-1.el8_7.x86_64.rpmTdotnet-apphost-pack-3.1-3.1.32-1.el8_7.x86_64.rpmUdotnet-hostfxr-3.1-3.1.32-1.el8_7.x86_64.rpmVdotnet-runtime-3.1-3.1.32-1.el8_7.x86_64.rpmWdotnet-sdk-3.1-3.1.426-1.el8_7.x86_64.rpmXdotnet-targeting-pack-3.1-3.1.32-1.el8_7.x86_64.rpmYdotnet-templates-3.1-3.1.426-1.el8_7.x86_64.rpm|$ +[BBBBBBBBBBBBBBbugfix.NET 6.0 bugfix update] https://errata.rockylinux.org/RLBA-2022:9019RLBA-2022:9019RLBA-2022:9019 Z aspnetcore-runtime-6.0-6.0.12-1.el8_7.x86_64.rpm[ aspnetcore-targeting-pack-6.0-6.0.12-1.el8_7.x86_64.rpm\ dotnet-apphost-pack-6.0-6.0.12-1.el8_7.x86_64.rpm] dotnet-hostfxr-6.0-6.0.12-1.el8_7.x86_64.rpm^ dotnet-runtime-6.0-6.0.12-1.el8_7.x86_64.rpm_Idotnet-sdk-6.0-6.0.112-1.el8_7.x86_64.rpm` dotnet-targeting-pack-6.0-6.0.12-1.el8_7.x86_64.rpmaIdotnet-templates-6.0-6.0.112-1.el8_7.x86_64.rpmZ aspnetcore-runtime-6.0-6.0.12-1.el8_7.x86_64.rpm[ aspnetcore-targeting-pack-6.0-6.0.12-1.el8_7.x86_64.rpm\ dotnet-apphost-pack-6.0-6.0.12-1.el8_7.x86_64.rpm] dotnet-hostfxr-6.0-6.0.12-1.el8_7.x86_64.rpm^ dotnet-runtime-6.0-6.0.12-1.el8_7.x86_64.rpm_Idotnet-sdk-6.0-6.0.112-1.el8_7.x86_64.rpm` dotnet-targeting-pack-6.0-6.0.12-1.el8_7.x86_64.rpmaIdotnet-templates-6.0-6.0.112-1.el8_7.x86_64.rpm|% lBBBBBBBBBBBBBBBBBBBBbugfix.NET 7.0 bugfix updateo https://errata.rockylinux.org/RLBA-2022:9020RLBA-2022:9020RLBA-2022:9020 SCaspnetcore-runtime-7.0-7.0.1-1.el8_7.x86_64.rpmTCaspnetcore-targeting-pack-7.0-7.0.1-1.el8_7.x86_64.rpm dotnet-7.0.101-1.el8_7.x86_64.rpmUCdotnet-apphost-pack-7.0-7.0.1-1.el8_7.x86_64.rpmCdotnet-host-7.0.1-1.el8_7.x86_64.rpmVCdotnet-hostfxr-7.0-7.0.1-1.el8_7.x86_64.rpmWCdotnet-runtime-7.0-7.0.1-1.el8_7.x86_64.rpmX dotnet-sdk-7.0-7.0.101-1.el8_7.x86_64.rpmYCdotnet-targeting-pack-7.0-7.0.1-1.el8_7.x86_64.rpmZ dotnet-templates-7.0-7.0.101-1.el8_7.x86_64.rpm netstandard-targeting-pack-2.1-7.0.101-1.el8_7.x86_64.rpm SCaspnetcore-runtime-7.0-7.0.1-1.el8_7.x86_64.rpmTCaspnetcore-targeting-pack-7.0-7.0.1-1.el8_7.x86_64.rpm dotnet-7.0.101-1.el8_7.x86_64.rpmUCdotnet-apphost-pack-7.0-7.0.1-1.el8_7.x86_64.rpmCdotnet-host-7.0.1-1.el8_7.x86_64.rpmVCdotnet-hostfxr-7.0-7.0.1-1.el8_7.x86_64.rpmWCdotnet-runtime-7.0-7.0.1-1.el8_7.x86_64.rpmX dotnet-sdk-7.0-7.0.101-1.el8_7.x86_64.rpmYCdotnet-targeting-pack-7.0-7.0.1-1.el8_7.x86_64.rpmZ dotnet-templates-7.0-7.0.101-1.el8_7.x86_64.rpm netstandard-targeting-pack-2.1-7.0.101-1.el8_7.x86_64.rpm|, CBBsecurityImportant: prometheus-jmx-exporter security update*https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1471CVE-2022-1471CVE-2022-1471https://bugzilla.redhat.com/show_bug.cgi?id=21500092150009https://errata.rockylinux.org/RLSA-2022:9058RLSA-2022:9058RLSA-2022:9058 f)prometheus-jmx-exporter-0.12.0-9.el8_7.noarch.rpmg)prometheus-jmx-exporter-openjdk11-0.12.0-9.el8_7.noarch.rpmh)prometheus-jmx-exporter-openjdk17-0.12.0-9.el8_7.noarch.rpmi)prometheus-jmx-exporter-openjdk8-0.12.0-9.el8_7.noarch.rpmf)prometheus-jmx-exporter-0.12.0-9.el8_7.noarch.rpmg)prometheus-jmx-exporter-openjdk11-0.12.0-9.el8_7.noarch.rpmh)prometheus-jmx-exporter-openjdk17-0.12.0-9.el8_7.noarch.rpmi)prometheus-jmx-exporter-openjdk8-0.12.0-9.el8_7.noarch.rpm|- HsecurityImportant: firefox security update*8 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872CVE-2022-46872CVE-2022-46872https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874CVE-2022-46874CVE-2022-46874https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878CVE-2022-46878CVE-2022-46878https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880CVE-2022-46880CVE-2022-46880https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881CVE-2022-46881CVE-2022-46881https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882CVE-2022-46882CVE-2022-46882https://bugzilla.redhat.com/show_bug.cgi?id=21534412153441https://bugzilla.redhat.com/show_bug.cgi?id=21534492153449https://bugzilla.redhat.com/show_bug.cgi?id=21534542153454https://bugzilla.redhat.com/show_bug.cgi?id=21534632153463https://bugzilla.redhat.com/show_bug.cgi?id=21534662153466https://bugzilla.redhat.com/show_bug.cgi?id=21534672153467https://errata.rockylinux.org/RLSA-2022:9067RLSA-2022:9067RLSA-2022:9067 rqfirefox-102.6.0-1.el8_7.x86_64.rpmrqfirefox-102.6.0-1.el8_7.x86_64.rpm}. WpFBBBBBBBsecurityModerate: nodejs:16 security, bug fix, and enhancement updatebUhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531CVE-2021-44531CVE-2021-44531https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532CVE-2021-44532CVE-2021-44532https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533CVE-2021-44533CVE-2021-44533https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44906CVE-2021-44906CVE-2021-44906https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824CVE-2022-21824CVE-2022-21824https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3517CVE-2022-3517CVE-2022-3517https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548CVE-2022-43548CVE-2022-43548https://bugzilla.redhat.com/show_bug.cgi?id=20408392040839https://bugzilla.redhat.com/show_bug.cgi?id=20408462040846https://bugzilla.redhat.com/show_bug.cgi?id=20408562040856https://bugzilla.redhat.com/show_bug.cgi?id=20408622040862https://bugzilla.redhat.com/show_bug.cgi?id=20660092066009https://bugzilla.redhat.com/show_bug.cgi?id=21346092134609https://bugzilla.redhat.com/show_bug.cgi?id=21409112140911https://bugzilla.redhat.com/show_bug.cgi?id=21428062142806https://errata.rockylinux.org/RLSA-2022:9073RLSA-2022:9073RLSA-2022:9073 /RjA/nodejs-16.18.1-3.module+el8.7.0+1108+49363b0d.x86_64.rpmnodejs-devel-16.18.1-3.module+el8.7.0+1108+49363b0d.x86_64.rpm6nodejs-docs-16.18.1-3.module+el8.7.0+1108+49363b0d.noarch.rpmnodejs-full-i18n-16.18.1-3.module+el8.7.0+1108+49363b0d.x86_64.rpmCRnodejs-nodemon-2.0.20-2.module+el8.7.0+1108+49363b0d.noarch.rpm:nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm,npm-8.19.2-1.16.18.1.3.module+el8.7.0+1108+49363b0d.x86_64.rpm/RjA/nodejs-16.18.1-3.module+el8.7.0+1108+49363b0d.x86_64.rpmnodejs-devel-16.18.1-3.module+el8.7.0+1108+49363b0d.x86_64.rpm6nodejs-docs-16.18.1-3.module+el8.7.0+1108+49363b0d.noarch.rpmnodejs-full-i18n-16.18.1-3.module+el8.7.0+1108+49363b0d.x86_64.rpmCRnodejs-nodemon-2.0.20-2.module+el8.7.0+1108+49363b0d.noarch.rpm:nodejs-packaging-25-1.module+el8.6.0+1046+80feca58.noarch.rpm,npm-8.19.2-1.16.18.1.3.module+el8.7.0+1108+49363b0d.x86_64.rpm}/ UBBBBBBsecurityImportant: webkit2gtk3 security update7https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856CVE-2022-42856CVE-2022-42856https://bugzilla.redhat.com/show_bug.cgi?id=21536832153683https://errata.rockylinux.org/RLSA-2023:0016RLSA-2023:0016RLSA-2023:0016 y`webkit2gtk3-2.36.7-1.el8_7.1.x86_64.rpmz`webkit2gtk3-devel-2.36.7-1.el8_7.1.x86_64.rpm{`webkit2gtk3-jsc-2.36.7-1.el8_7.1.x86_64.rpm|`webkit2gtk3-jsc-devel-2.36.7-1.el8_7.1.x86_64.rpmy`webkit2gtk3-2.36.7-1.el8_7.1.x86_64.rpmz`webkit2gtk3-devel-2.36.7-1.el8_7.1.x86_64.rpm{`webkit2gtk3-jsc-2.36.7-1.el8_7.1.x86_64.rpm|`webkit2gtk3-jsc-devel-2.36.7-1.el8_7.1.x86_64.rpm~0 'AFYBBBBBBBsecurityModerate: nodejs:14 security, bug fix, and enhancement updateQL https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44906CVE-2021-44906CVE-2021-44906https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0235CVE-2022-0235CVE-2022-0235https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24999CVE-2022-24999CVE-2022-24999https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3517CVE-2022-3517CVE-2022-3517https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548CVE-2022-43548CVE-2022-43548https://bugzilla.redhat.com/show_bug.cgi?id=20445912044591https://bugzilla.redhat.com/show_bug.cgi?id=20660092066009https://bugzilla.redhat.com/show_bug.cgi?id=21346092134609https://bugzilla.redhat.com/show_bug.cgi?id=21409112140911https://bugzilla.redhat.com/show_bug.cgi?id=21428212142821https://bugzilla.redhat.com/show_bug.cgi?id=21503232150323https://errata.rockylinux.org/RLSA-2023:0050RLSA-2023:0050RLSA-2023:0050 /d4A/nodejs-14.21.1-2.module+el8.7.0+1116+bd2a84b4.x86_64.rpmnodejs-devel-14.21.1-2.module+el8.7.0+1116+bd2a84b4.x86_64.rpm6nodejs-docs-14.21.1-2.module+el8.7.0+1116+bd2a84b4.noarch.rpmnodejs-full-i18n-14.21.1-2.module+el8.7.0+1116+bd2a84b4.x86_64.rpmCRnodejs-nodemon-2.0.20-2.module+el8.7.0+1108+49363b0d.noarch.rpm:mnodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm(npm-6.14.17-1.14.21.1.2.module+el8.7.0+1116+bd2a84b4.x86_64.rpm/d4A/nodejs-14.21.1-2.module+el8.7.0+1116+bd2a84b4.x86_64.rpmnodejs-devel-14.21.1-2.module+el8.7.0+1116+bd2a84b4.x86_64.rpm6nodejs-docs-14.21.1-2.module+el8.7.0+1116+bd2a84b4.noarch.rpmnodejs-full-i18n-14.21.1-2.module+el8.7.0+1116+bd2a84b4.x86_64.rpmCRnodejs-nodemon-2.0.20-2.module+el8.7.0+1108+49363b0d.noarch.rpm:mnodejs-packaging-23-3.module+el8.7.0+1071+4bdda2a8.noarch.rpm(npm-6.14.17-1.14.21.1.2.module+el8.7.0+1116+bd2a84b4.x86_64.rpm1 8hBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security, bug fix, and enhancement update`https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21538CVE-2023-21538CVE-2023-21538https://bugzilla.redhat.com/show_bug.cgi?id=21583422158342https://errata.rockylinux.org/RLSA-2023:0079RLSA-2023:0079RLSA-2023:0079 Z!aspnetcore-runtime-6.0-6.0.13-1.el8_7.x86_64.rpm[!aspnetcore-targeting-pack-6.0-6.0.13-1.el8_7.x86_64.rpm\!dotnet-apphost-pack-6.0-6.0.13-1.el8_7.x86_64.rpm]!dotnet-hostfxr-6.0-6.0.13-1.el8_7.x86_64.rpm^!dotnet-runtime-6.0-6.0.13-1.el8_7.x86_64.rpm_Jdotnet-sdk-6.0-6.0.113-1.el8_7.x86_64.rpm`!dotnet-targeting-pack-6.0-6.0.13-1.el8_7.x86_64.rpmaJdotnet-templates-6.0-6.0.113-1.el8_7.x86_64.rpmZ!aspnetcore-runtime-6.0-6.0.13-1.el8_7.x86_64.rpm[!aspnetcore-targeting-pack-6.0-6.0.13-1.el8_7.x86_64.rpm\!dotnet-apphost-pack-6.0-6.0.13-1.el8_7.x86_64.rpm]!dotnet-hostfxr-6.0-6.0.13-1.el8_7.x86_64.rpm^!dotnet-runtime-6.0-6.0.13-1.el8_7.x86_64.rpm_Jdotnet-sdk-6.0-6.0.113-1.el8_7.x86_64.rpm`!dotnet-targeting-pack-6.0-6.0.13-1.el8_7.x86_64.rpmaJdotnet-templates-6.0-6.0.113-1.el8_7.x86_64.rpm& yBBBBBBBBBBBBBBBBBBBBbugfix.NET 7.0 bugfix update} https://errata.rockylinux.org/RLBA-2023:0081RLBA-2023:0081RLBA-2023:0081  dotnet-7.0.102-1.el8_7.x86_64.rpmSEaspnetcore-runtime-7.0-7.0.2-1.el8_7.x86_64.rpmTEaspnetcore-targeting-pack-7.0-7.0.2-1.el8_7.x86_64.rpmUEdotnet-apphost-pack-7.0-7.0.2-1.el8_7.x86_64.rpmEdotnet-host-7.0.2-1.el8_7.x86_64.rpmVEdotnet-hostfxr-7.0-7.0.2-1.el8_7.x86_64.rpmWEdotnet-runtime-7.0-7.0.2-1.el8_7.x86_64.rpmX dotnet-sdk-7.0-7.0.102-1.el8_7.x86_64.rpmYEdotnet-targeting-pack-7.0-7.0.2-1.el8_7.x86_64.rpmZ dotnet-templates-7.0-7.0.102-1.el8_7.x86_64.rpm netstandard-targeting-pack-2.1-7.0.102-1.el8_7.x86_64.rpm  dotnet-7.0.102-1.el8_7.x86_64.rpmSEaspnetcore-runtime-7.0-7.0.2-1.el8_7.x86_64.rpmTEaspnetcore-targeting-pack-7.0-7.0.2-1.el8_7.x86_64.rpmUEdotnet-apphost-pack-7.0-7.0.2-1.el8_7.x86_64.rpmEdotnet-host-7.0.2-1.el8_7.x86_64.rpmVEdotnet-hostfxr-7.0-7.0.2-1.el8_7.x86_64.rpmWEdotnet-runtime-7.0-7.0.2-1.el8_7.x86_64.rpmX dotnet-sdk-7.0-7.0.102-1.el8_7.x86_64.rpmYEdotnet-targeting-pack-7.0-7.0.2-1.el8_7.x86_64.rpmZ dotnet-templates-7.0-7.0.102-1.el8_7.x86_64.rpm netstandard-targeting-pack-2.1-7.0.102-1.el8_7.x86_64.rpm' Pbugfixstalld bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=21264942126494* Stalld is running in unconfined_service_t typehttps://bugzilla.redhat.com/show_bug.cgi?id=21365592136559* Rebase stalld to latest upstream versionhttps://errata.rockylinux.org/RLBA-2023:0084RLBA-2023:0084RLBA-2023:0084 Rstalld-1.17.1-1.el8_7.x86_64.rpmRstalld-1.17.1-1.el8_7.x86_64.rpm2 SBBBBBBBsecurityModerate: usbguard security update*https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25058CVE-2019-25058CVE-2019-25058https://bugzilla.redhat.com/show_bug.cgi?id=20584652058465https://errata.rockylinux.org/RLSA-2023:0087RLSA-2023:0087RLSA-2023:0087 Busbguard-1.0.0-8.el8_7.2.x86_64.rpmBusbguard-dbus-1.0.0-8.el8_7.2.x86_64.rpmBusbguard-notifier-1.0.0-8.el8_7.2.x86_64.rpmBusbguard-selinux-1.0.0-8.el8_7.2.noarch.rpmBusbguard-tools-1.0.0-8.el8_7.2.x86_64.rpmBusbguard-1.0.0-8.el8_7.2.x86_64.rpmBusbguard-dbus-1.0.0-8.el8_7.2.x86_64.rpmBusbguard-notifier-1.0.0-8.el8_7.2.x86_64.rpmBusbguard-selinux-1.0.0-8.el8_7.2.noarch.rpmBusbguard-tools-1.0.0-8.el8_7.2.x86_64.rpm3 ]BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libreoffice security updateH} https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26305CVE-2022-26305CVE-2022-26305https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26306CVE-2022-26306CVE-2022-26306https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26307CVE-2022-26307CVE-2022-26307https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3140CVE-2022-3140CVE-2022-3140https://bugzilla.redhat.com/show_bug.cgi?id=21186102118610https://bugzilla.redhat.com/show_bug.cgi?id=21186112118611https://bugzilla.redhat.com/show_bug.cgi?id=21186132118613https://bugzilla.redhat.com/show_bug.cgi?id=21346972134697https://errata.rockylinux.org/RLSA-2023:0089RLSA-2023:0089RLSA-2023:0089 )aautocorr-af-6.4.7.2-12.el8_7.noarch.rpmbautocorr-bg-6.4.7.2-12.el8_7.noarch.rpmcautocorr-ca-6.4.7.2-12.el8_7.noarch.rpmdautocorr-cs-6.4.7.2-12.el8_7.noarch.rpmeautocorr-da-6.4.7.2-12.el8_7.noarch.rpmfautocorr-de-6.4.7.2-12.el8_7.noarch.rpmgautocorr-en-6.4.7.2-12.el8_7.noarch.rpmhautocorr-es-6.4.7.2-12.el8_7.noarch.rpmiautocorr-fa-6.4.7.2-12.el8_7.noarch.rpmjautocorr-fi-6.4.7.2-12.el8_7.noarch.rpmkautocorr-fr-6.4.7.2-12.el8_7.noarch.rpmlautocorr-ga-6.4.7.2-12.el8_7.noarch.rpmmautocorr-hr-6.4.7.2-12.el8_7.noarch.rpmnautocorr-hu-6.4.7.2-12.el8_7.noarch.rpmoautocorr-is-6.4.7.2-12.el8_7.noarch.rpmpautocorr-it-6.4.7.2-12.el8_7.noarch.rpmqautocorr-ja-6.4.7.2-12.el8_7.noarch.rpmrautocorr-ko-6.4.7.2-12.el8_7.noarch.rpmsautocorr-lb-6.4.7.2-12.el8_7.noarch.rpmtautocorr-lt-6.4.7.2-12.el8_7.noarch.rpmuautocorr-mn-6.4.7.2-12.el8_7.noarch.rpmvautocorr-nl-6.4.7.2-12.el8_7.noarch.rpmwautocorr-pl-6.4.7.2-12.el8_7.noarch.rpmxautocorr-pt-6.4.7.2-12.el8_7.noarch.rpmyautocorr-ro-6.4.7.2-12.el8_7.noarch.rpmzautocorr-ru-6.4.7.2-12.el8_7.noarch.rpm{autocorr-sk-6.4.7.2-12.el8_7.noarch.rpm|autocorr-sl-6.4.7.2-12.el8_7.noarch.rpm}autocorr-sr-6.4.7.2-12.el8_7.noarch.rpm~autocorr-sv-6.4.7.2-12.el8_7.noarch.rpmautocorr-tr-6.4.7.2-12.el8_7.noarch.rpmautocorr-vi-6.4.7.2-12.el8_7.noarch.rpmautocorr-zh-6.4.7.2-12.el8_7.noarch.rpmDlibreoffice-base-6.4.7.2-12.el8_7.x86_64.rpmElibreoffice-calc-6.4.7.2-12.el8_7.x86_64.rpmFlibreoffice-core-6.4.7.2-12.el8_7.x86_64.rpm-libreoffice-data-6.4.7.2-12.el8_7.noarch.rpmGlibreoffice-draw-6.4.7.2-12.el8_7.x86_64.rpmHlibreoffice-emailmerge-6.4.7.2-12.el8_7.x86_64.rpmIlibreoffice-filters-6.4.7.2-12.el8_7.x86_64.rpmJlibreoffice-gdb-debug-support-6.4.7.2-12.el8_7.x86_64.rpmKlibreoffice-graphicfilter-6.4.7.2-12.el8_7.x86_64.rpmLlibreoffice-gtk3-6.4.7.2-12.el8_7.x86_64.rpmMlibreoffice-help-ar-6.4.7.2-12.el8_7.x86_64.rpmNlibreoffice-help-bg-6.4.7.2-12.el8_7.x86_64.rpmOlibreoffice-help-bn-6.4.7.2-12.el8_7.x86_64.rpmPlibreoffice-help-ca-6.4.7.2-12.el8_7.x86_64.rpmQlibreoffice-help-cs-6.4.7.2-12.el8_7.x86_64.rpmRlibreoffice-help-da-6.4.7.2-12.el8_7.x86_64.rpmSlibreoffice-help-de-6.4.7.2-12.el8_7.x86_64.rpmTlibreoffice-help-dz-6.4.7.2-12.el8_7.x86_64.rpmUlibreoffice-help-el-6.4.7.2-12.el8_7.x86_64.rpmVlibreoffice-help-en-6.4.7.2-12.el8_7.x86_64.rpmWlibreoffice-help-es-6.4.7.2-12.el8_7.x86_64.rpmXlibreoffice-help-et-6.4.7.2-12.el8_7.x86_64.rpmYlibreoffice-help-eu-6.4.7.2-12.el8_7.x86_64.rpmZlibreoffice-help-fi-6.4.7.2-12.el8_7.x86_64.rpm[libreoffice-help-fr-6.4.7.2-12.el8_7.x86_64.rpm\libreoffice-help-gl-6.4.7.2-12.el8_7.x86_64.rpm]libreoffice-help-gu-6.4.7.2-12.el8_7.x86_64.rpm^libreoffice-help-he-6.4.7.2-12.el8_7.x86_64.rpm_libreoffice-help-hi-6.4.7.2-12.el8_7.x86_64.rpm`libreoffice-help-hr-6.4.7.2-12.el8_7.x86_64.rpmalibreoffice-help-hu-6.4.7.2-12.el8_7.x86_64.rpmblibreoffice-help-id-6.4.7.2-12.el8_7.x86_64.rpmclibreoffice-help-it-6.4.7.2-12.el8_7.x86_64.rpmdlibreoffice-help-ja-6.4.7.2-12.el8_7.x86_64.rpmelibreoffice-help-ko-6.4.7.2-12.el8_7.x86_64.rpmflibreoffice-help-lt-6.4.7.2-12.el8_7.x86_64.rpmglibreoffice-help-lv-6.4.7.2-12.el8_7.x86_64.rpmhlibreoffice-help-nb-6.4.7.2-12.el8_7.x86_64.rpmilibreoffice-help-nl-6.4.7.2-12.el8_7.x86_64.rpmjlibreoffice-help-nn-6.4.7.2-12.el8_7.x86_64.rpmklibreoffice-help-pl-6.4.7.2-12.el8_7.x86_64.rpmllibreoffice-help-pt-BR-6.4.7.2-12.el8_7.x86_64.rpmmlibreoffice-help-pt-PT-6.4.7.2-12.el8_7.x86_64.rpmnlibreoffice-help-ro-6.4.7.2-12.el8_7.x86_64.rpmolibreoffice-help-ru-6.4.7.2-12.el8_7.x86_64.rpmplibreoffice-help-si-6.4.7.2-12.el8_7.x86_64.rpmqlibreoffice-help-sk-6.4.7.2-12.el8_7.x86_64.rpmrlibreoffice-help-sl-6.4.7.2-12.el8_7.x86_64.rpmslibreoffice-help-sv-6.4.7.2-12.el8_7.x86_64.rpmtlibreoffice-help-ta-6.4.7.2-12.el8_7.x86_64.rpmulibreoffice-help-tr-6.4.7.2-12.el8_7.x86_64.rpmvlibreoffice-help-uk-6.4.7.2-12.el8_7.x86_64.rpmwlibreoffice-help-zh-Hans-6.4.7.2-12.el8_7.x86_64.rpmxlibreoffice-help-zh-Hant-6.4.7.2-12.el8_7.x86_64.rpmylibreoffice-impress-6.4.7.2-12.el8_7.x86_64.rpmHlibreofficekit-6.4.7.2-12.el8_7.x86_64.rpmzlibreoffice-langpack-af-6.4.7.2-12.el8_7.x86_64.rpm{libreoffice-langpack-ar-6.4.7.2-12.el8_7.x86_64.rpm|libreoffice-langpack-as-6.4.7.2-12.el8_7.x86_64.rpm}libreoffice-langpack-bg-6.4.7.2-12.el8_7.x86_64.rpm~libreoffice-langpack-bn-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-br-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-ca-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-cs-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-cy-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-da-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-de-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-dz-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-el-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-en-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-es-6.4.7.2-12.el8_7.x86_64.rpm libreoffice-langpack-et-6.4.7.2-12.el8_7.x86_64.rpm libreoffice-langpack-eu-6.4.7.2-12.el8_7.x86_64.rpm libreoffice-langpack-fa-6.4.7.2-12.el8_7.x86_64.rpm libreoffice-langpack-fi-6.4.7.2-12.el8_7.x86_64.rpm libreoffice-langpack-fr-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-ga-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-gl-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-gu-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-he-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-hi-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-hr-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-hu-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-id-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-it-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-ja-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-kk-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-kn-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-ko-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-lt-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-lv-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-mai-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-ml-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-mr-6.4.7.2-12.el8_7.x86_64.rpm libreoffice-langpack-nb-6.4.7.2-12.el8_7.x86_64.rpm!libreoffice-langpack-nl-6.4.7.2-12.el8_7.x86_64.rpm"libreoffice-langpack-nn-6.4.7.2-12.el8_7.x86_64.rpm#libreoffice-langpack-nr-6.4.7.2-12.el8_7.x86_64.rpm$libreoffice-langpack-nso-6.4.7.2-12.el8_7.x86_64.rpm%libreoffice-langpack-or-6.4.7.2-12.el8_7.x86_64.rpm&libreoffice-langpack-pa-6.4.7.2-12.el8_7.x86_64.rpm'libreoffice-langpack-pl-6.4.7.2-12.el8_7.x86_64.rpm(libreoffice-langpack-pt-BR-6.4.7.2-12.el8_7.x86_64.rpm)libreoffice-langpack-pt-PT-6.4.7.2-12.el8_7.x86_64.rpm*libreoffice-langpack-ro-6.4.7.2-12.el8_7.x86_64.rpm+libreoffice-langpack-ru-6.4.7.2-12.el8_7.x86_64.rpm,libreoffice-langpack-si-6.4.7.2-12.el8_7.x86_64.rpm-libreoffice-langpack-sk-6.4.7.2-12.el8_7.x86_64.rpm.libreoffice-langpack-sl-6.4.7.2-12.el8_7.x86_64.rpm/libreoffice-langpack-sr-6.4.7.2-12.el8_7.x86_64.rpm0libreoffice-langpack-ss-6.4.7.2-12.el8_7.x86_64.rpm1libreoffice-langpack-st-6.4.7.2-12.el8_7.x86_64.rpm2libreoffice-langpack-sv-6.4.7.2-12.el8_7.x86_64.rpm3libreoffice-langpack-ta-6.4.7.2-12.el8_7.x86_64.rpm4libreoffice-langpack-te-6.4.7.2-12.el8_7.x86_64.rpm5libreoffice-langpack-th-6.4.7.2-12.el8_7.x86_64.rpm6libreoffice-langpack-tn-6.4.7.2-12.el8_7.x86_64.rpm7libreoffice-langpack-tr-6.4.7.2-12.el8_7.x86_64.rpm8libreoffice-langpack-ts-6.4.7.2-12.el8_7.x86_64.rpm9libreoffice-langpack-uk-6.4.7.2-12.el8_7.x86_64.rpm:libreoffice-langpack-ve-6.4.7.2-12.el8_7.x86_64.rpm;libreoffice-langpack-xh-6.4.7.2-12.el8_7.x86_64.rpm<libreoffice-langpack-zh-Hans-6.4.7.2-12.el8_7.x86_64.rpm=libreoffice-langpack-zh-Hant-6.4.7.2-12.el8_7.x86_64.rpm>libreoffice-langpack-zu-6.4.7.2-12.el8_7.x86_64.rpm?libreoffice-math-6.4.7.2-12.el8_7.x86_64.rpm@libreoffice-ogltrans-6.4.7.2-12.el8_7.x86_64.rpm.libreoffice-opensymbol-fonts-6.4.7.2-12.el8_7.noarch.rpmAlibreoffice-pdfimport-6.4.7.2-12.el8_7.x86_64.rpmBlibreoffice-pyuno-6.4.7.2-12.el8_7.x86_64.rpmClibreoffice-ure-6.4.7.2-12.el8_7.x86_64.rpm/libreoffice-ure-common-6.4.7.2-12.el8_7.noarch.rpmDlibreoffice-wiki-publisher-6.4.7.2-12.el8_7.x86_64.rpmElibreoffice-writer-6.4.7.2-12.el8_7.x86_64.rpmFlibreoffice-x11-6.4.7.2-12.el8_7.x86_64.rpmGlibreoffice-xsltfilter-6.4.7.2-12.el8_7.x86_64.rpm)aautocorr-af-6.4.7.2-12.el8_7.noarch.rpmbautocorr-bg-6.4.7.2-12.el8_7.noarch.rpmcautocorr-ca-6.4.7.2-12.el8_7.noarch.rpmdautocorr-cs-6.4.7.2-12.el8_7.noarch.rpmeautocorr-da-6.4.7.2-12.el8_7.noarch.rpmfautocorr-de-6.4.7.2-12.el8_7.noarch.rpmgautocorr-en-6.4.7.2-12.el8_7.noarch.rpmhautocorr-es-6.4.7.2-12.el8_7.noarch.rpmiautocorr-fa-6.4.7.2-12.el8_7.noarch.rpmjautocorr-fi-6.4.7.2-12.el8_7.noarch.rpmkautocorr-fr-6.4.7.2-12.el8_7.noarch.rpmlautocorr-ga-6.4.7.2-12.el8_7.noarch.rpmmautocorr-hr-6.4.7.2-12.el8_7.noarch.rpmnautocorr-hu-6.4.7.2-12.el8_7.noarch.rpmoautocorr-is-6.4.7.2-12.el8_7.noarch.rpmpautocorr-it-6.4.7.2-12.el8_7.noarch.rpmqautocorr-ja-6.4.7.2-12.el8_7.noarch.rpmrautocorr-ko-6.4.7.2-12.el8_7.noarch.rpmsautocorr-lb-6.4.7.2-12.el8_7.noarch.rpmtautocorr-lt-6.4.7.2-12.el8_7.noarch.rpmuautocorr-mn-6.4.7.2-12.el8_7.noarch.rpmvautocorr-nl-6.4.7.2-12.el8_7.noarch.rpmwautocorr-pl-6.4.7.2-12.el8_7.noarch.rpmxautocorr-pt-6.4.7.2-12.el8_7.noarch.rpmyautocorr-ro-6.4.7.2-12.el8_7.noarch.rpmzautocorr-ru-6.4.7.2-12.el8_7.noarch.rpm{autocorr-sk-6.4.7.2-12.el8_7.noarch.rpm|autocorr-sl-6.4.7.2-12.el8_7.noarch.rpm}autocorr-sr-6.4.7.2-12.el8_7.noarch.rpm~autocorr-sv-6.4.7.2-12.el8_7.noarch.rpmautocorr-tr-6.4.7.2-12.el8_7.noarch.rpmautocorr-vi-6.4.7.2-12.el8_7.noarch.rpmautocorr-zh-6.4.7.2-12.el8_7.noarch.rpmDlibreoffice-base-6.4.7.2-12.el8_7.x86_64.rpmElibreoffice-calc-6.4.7.2-12.el8_7.x86_64.rpmFlibreoffice-core-6.4.7.2-12.el8_7.x86_64.rpm-libreoffice-data-6.4.7.2-12.el8_7.noarch.rpmGlibreoffice-draw-6.4.7.2-12.el8_7.x86_64.rpmHlibreoffice-emailmerge-6.4.7.2-12.el8_7.x86_64.rpmIlibreoffice-filters-6.4.7.2-12.el8_7.x86_64.rpmJlibreoffice-gdb-debug-support-6.4.7.2-12.el8_7.x86_64.rpmKlibreoffice-graphicfilter-6.4.7.2-12.el8_7.x86_64.rpmLlibreoffice-gtk3-6.4.7.2-12.el8_7.x86_64.rpmMlibreoffice-help-ar-6.4.7.2-12.el8_7.x86_64.rpmNlibreoffice-help-bg-6.4.7.2-12.el8_7.x86_64.rpmOlibreoffice-help-bn-6.4.7.2-12.el8_7.x86_64.rpmPlibreoffice-help-ca-6.4.7.2-12.el8_7.x86_64.rpmQlibreoffice-help-cs-6.4.7.2-12.el8_7.x86_64.rpmRlibreoffice-help-da-6.4.7.2-12.el8_7.x86_64.rpmSlibreoffice-help-de-6.4.7.2-12.el8_7.x86_64.rpmTlibreoffice-help-dz-6.4.7.2-12.el8_7.x86_64.rpmUlibreoffice-help-el-6.4.7.2-12.el8_7.x86_64.rpmVlibreoffice-help-en-6.4.7.2-12.el8_7.x86_64.rpmWlibreoffice-help-es-6.4.7.2-12.el8_7.x86_64.rpmXlibreoffice-help-et-6.4.7.2-12.el8_7.x86_64.rpmYlibreoffice-help-eu-6.4.7.2-12.el8_7.x86_64.rpmZlibreoffice-help-fi-6.4.7.2-12.el8_7.x86_64.rpm[libreoffice-help-fr-6.4.7.2-12.el8_7.x86_64.rpm\libreoffice-help-gl-6.4.7.2-12.el8_7.x86_64.rpm]libreoffice-help-gu-6.4.7.2-12.el8_7.x86_64.rpm^libreoffice-help-he-6.4.7.2-12.el8_7.x86_64.rpm_libreoffice-help-hi-6.4.7.2-12.el8_7.x86_64.rpm`libreoffice-help-hr-6.4.7.2-12.el8_7.x86_64.rpmalibreoffice-help-hu-6.4.7.2-12.el8_7.x86_64.rpmblibreoffice-help-id-6.4.7.2-12.el8_7.x86_64.rpmclibreoffice-help-it-6.4.7.2-12.el8_7.x86_64.rpmdlibreoffice-help-ja-6.4.7.2-12.el8_7.x86_64.rpmelibreoffice-help-ko-6.4.7.2-12.el8_7.x86_64.rpmflibreoffice-help-lt-6.4.7.2-12.el8_7.x86_64.rpmglibreoffice-help-lv-6.4.7.2-12.el8_7.x86_64.rpmhlibreoffice-help-nb-6.4.7.2-12.el8_7.x86_64.rpmilibreoffice-help-nl-6.4.7.2-12.el8_7.x86_64.rpmjlibreoffice-help-nn-6.4.7.2-12.el8_7.x86_64.rpmklibreoffice-help-pl-6.4.7.2-12.el8_7.x86_64.rpmllibreoffice-help-pt-BR-6.4.7.2-12.el8_7.x86_64.rpmmlibreoffice-help-pt-PT-6.4.7.2-12.el8_7.x86_64.rpmnlibreoffice-help-ro-6.4.7.2-12.el8_7.x86_64.rpmolibreoffice-help-ru-6.4.7.2-12.el8_7.x86_64.rpmplibreoffice-help-si-6.4.7.2-12.el8_7.x86_64.rpmqlibreoffice-help-sk-6.4.7.2-12.el8_7.x86_64.rpmrlibreoffice-help-sl-6.4.7.2-12.el8_7.x86_64.rpmslibreoffice-help-sv-6.4.7.2-12.el8_7.x86_64.rpmtlibreoffice-help-ta-6.4.7.2-12.el8_7.x86_64.rpmulibreoffice-help-tr-6.4.7.2-12.el8_7.x86_64.rpmvlibreoffice-help-uk-6.4.7.2-12.el8_7.x86_64.rpmwlibreoffice-help-zh-Hans-6.4.7.2-12.el8_7.x86_64.rpmxlibreoffice-help-zh-Hant-6.4.7.2-12.el8_7.x86_64.rpmylibreoffice-impress-6.4.7.2-12.el8_7.x86_64.rpmHlibreofficekit-6.4.7.2-12.el8_7.x86_64.rpmzlibreoffice-langpack-af-6.4.7.2-12.el8_7.x86_64.rpm{libreoffice-langpack-ar-6.4.7.2-12.el8_7.x86_64.rpm|libreoffice-langpack-as-6.4.7.2-12.el8_7.x86_64.rpm}libreoffice-langpack-bg-6.4.7.2-12.el8_7.x86_64.rpm~libreoffice-langpack-bn-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-br-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-ca-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-cs-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-cy-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-da-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-de-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-dz-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-el-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-en-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-es-6.4.7.2-12.el8_7.x86_64.rpm libreoffice-langpack-et-6.4.7.2-12.el8_7.x86_64.rpm libreoffice-langpack-eu-6.4.7.2-12.el8_7.x86_64.rpm libreoffice-langpack-fa-6.4.7.2-12.el8_7.x86_64.rpm libreoffice-langpack-fi-6.4.7.2-12.el8_7.x86_64.rpm libreoffice-langpack-fr-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-ga-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-gl-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-gu-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-he-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-hi-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-hr-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-hu-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-id-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-it-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-ja-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-kk-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-kn-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-ko-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-lt-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-lv-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-mai-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-ml-6.4.7.2-12.el8_7.x86_64.rpmlibreoffice-langpack-mr-6.4.7.2-12.el8_7.x86_64.rpm libreoffice-langpack-nb-6.4.7.2-12.el8_7.x86_64.rpm!libreoffice-langpack-nl-6.4.7.2-12.el8_7.x86_64.rpm"libreoffice-langpack-nn-6.4.7.2-12.el8_7.x86_64.rpm#libreoffice-langpack-nr-6.4.7.2-12.el8_7.x86_64.rpm$libreoffice-langpack-nso-6.4.7.2-12.el8_7.x86_64.rpm%libreoffice-langpack-or-6.4.7.2-12.el8_7.x86_64.rpm&libreoffice-langpack-pa-6.4.7.2-12.el8_7.x86_64.rpm'libreoffice-langpack-pl-6.4.7.2-12.el8_7.x86_64.rpm(libreoffice-langpack-pt-BR-6.4.7.2-12.el8_7.x86_64.rpm)libreoffice-langpack-pt-PT-6.4.7.2-12.el8_7.x86_64.rpm*libreoffice-langpack-ro-6.4.7.2-12.el8_7.x86_64.rpm+libreoffice-langpack-ru-6.4.7.2-12.el8_7.x86_64.rpm,libreoffice-langpack-si-6.4.7.2-12.el8_7.x86_64.rpm-libreoffice-langpack-sk-6.4.7.2-12.el8_7.x86_64.rpm.libreoffice-langpack-sl-6.4.7.2-12.el8_7.x86_64.rpm/libreoffice-langpack-sr-6.4.7.2-12.el8_7.x86_64.rpm0libreoffice-langpack-ss-6.4.7.2-12.el8_7.x86_64.rpm1libreoffice-langpack-st-6.4.7.2-12.el8_7.x86_64.rpm2libreoffice-langpack-sv-6.4.7.2-12.el8_7.x86_64.rpm3libreoffice-langpack-ta-6.4.7.2-12.el8_7.x86_64.rpm4libreoffice-langpack-te-6.4.7.2-12.el8_7.x86_64.rpm5libreoffice-langpack-th-6.4.7.2-12.el8_7.x86_64.rpm6libreoffice-langpack-tn-6.4.7.2-12.el8_7.x86_64.rpm7libreoffice-langpack-tr-6.4.7.2-12.el8_7.x86_64.rpm8libreoffice-langpack-ts-6.4.7.2-12.el8_7.x86_64.rpm9libreoffice-langpack-uk-6.4.7.2-12.el8_7.x86_64.rpm:libreoffice-langpack-ve-6.4.7.2-12.el8_7.x86_64.rpm;libreoffice-langpack-xh-6.4.7.2-12.el8_7.x86_64.rpm<libreoffice-langpack-zh-Hans-6.4.7.2-12.el8_7.x86_64.rpm=libreoffice-langpack-zh-Hant-6.4.7.2-12.el8_7.x86_64.rpm>libreoffice-langpack-zu-6.4.7.2-12.el8_7.x86_64.rpm?libreoffice-math-6.4.7.2-12.el8_7.x86_64.rpm@libreoffice-ogltrans-6.4.7.2-12.el8_7.x86_64.rpm.libreoffice-opensymbol-fonts-6.4.7.2-12.el8_7.noarch.rpmAlibreoffice-pdfimport-6.4.7.2-12.el8_7.x86_64.rpmBlibreoffice-pyuno-6.4.7.2-12.el8_7.x86_64.rpmClibreoffice-ure-6.4.7.2-12.el8_7.x86_64.rpm/libreoffice-ure-common-6.4.7.2-12.el8_7.noarch.rpmDlibreoffice-wiki-publisher-6.4.7.2-12.el8_7.x86_64.rpmElibreoffice-writer-6.4.7.2-12.el8_7.x86_64.rpmFlibreoffice-x11-6.4.7.2-12.el8_7.x86_64.rpmGlibreoffice-xsltfilter-6.4.7.2-12.el8_7.x86_64.rpm) vBEBTNBBBBBaBHB~FBBBBBBBBBBBBBBBBBBBBbugfixidm:client and idm:DL1 bug fix and enhancement updateE https://bugzilla.redhat.com/show_bug.cgi?id=21330352133035* named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind-dyndb-ldap]https://bugzilla.redhat.com/show_bug.cgi?id=21330502133050* Attempt to log in as "root" user with admin's password in Web UI does not properly failhttps://bugzilla.redhat.com/show_bug.cgi?id=21482552148255* vault interoperability with older RHEL systems is brokenhttps://bugzilla.redhat.com/show_bug.cgi?id=21502432150243* rpm -v ipa-selinux produces warninghttps://bugzilla.redhat.com/show_bug.cgi?id=21502462150246* ipa-client-install does not maintain server affinity during installationhttps://errata.rockylinux.org/RLBA-2023:0091RLBA-2023:0091RLBA-2023:0091 2/1SAbbind-dyndb-ldap-11.6-4.module+el8.7.0+1075+05db0c1d.x86_64.rpm9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm ~ipa-client-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm)~ipa-client-common-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm!~ipa-client-epn-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm"~ipa-client-samba-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm*~ipa-common-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpmt.ipa-healthcheck-core-0.7-14.module+el8.7.0+1074+aae18f3a.noarch.rpm+~ipa-python-compat-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm,~ipa-selinux-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm+~ipa-server-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm,~ipa-server-common-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm-~ipa-server-dns-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm.~ipa-server-trust-ad-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm7opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmZ~python3-ipaclient-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm[~python3-ipalib-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm~python3-ipaserver-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm~python3-ipatests-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm -python3-jwcrypto-0.5.0-1.1.module+el8.7.0+1074+aae18f3a.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm 5python3-pyusb-1.0.0-9.1.module+el8.7.0+1074+aae18f3a.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpmApython3-yubico-1.3.2-9.1.module+el8.7.0+1074+aae18f3a.noarch.rpm slapi-nis-0.60.0-1.module+el8.7.0+1075+05db0c1d.x86_64.rpm9softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm:softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm2/1SAbbind-dyndb-ldap-11.6-4.module+el8.7.0+1075+05db0c1d.x86_64.rpm9Hcustodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpm ~ipa-client-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm)~ipa-client-common-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm!~ipa-client-epn-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm"~ipa-client-samba-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm*~ipa-common-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpmt.ipa-healthcheck-core-0.7-14.module+el8.7.0+1074+aae18f3a.noarch.rpm+~ipa-python-compat-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm,~ipa-selinux-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm+~ipa-server-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm,~ipa-server-common-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm-~ipa-server-dns-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm.~ipa-server-trust-ad-4.9.10-9.module+el8.7.0+1119+c1de6b59.x86_64.rpm7opendnssec-2.1.7-1.module+el8.4.0+429+6bd33fea.x86_64.rpm:Hpython3-custodia-0.6.0-3.module+el8.4.0+429+6bd33fea.noarch.rpmZ~python3-ipaclient-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm[~python3-ipalib-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm~python3-ipaserver-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm~python3-ipatests-4.9.10-9.module+el8.7.0+1119+c1de6b59.noarch.rpm -python3-jwcrypto-0.5.0-1.1.module+el8.7.0+1074+aae18f3a.noarch.rpmxtpython3-kdcproxy-0.4-5.module+el8.3.0+244+0b2ae752.noarch.rpm 5python3-pyusb-1.0.0-9.1.module+el8.7.0+1074+aae18f3a.noarch.rpm,Bpython3-qrcode-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpm-Bpython3-qrcode-core-5.1-12.module+el8.4.0+429+6bd33fea.noarch.rpmApython3-yubico-1.3.2-9.1.module+el8.7.0+1074+aae18f3a.noarch.rpm slapi-nis-0.60.0-1.module+el8.7.0+1075+05db0c1d.x86_64.rpm9softhsm-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm:softhsm-devel-2.6.0-5.module+el8.4.0+429+6bd33fea.x86_64.rpm + !pbugfixgnome-settings-daemon bug fix and enhancement updateX3 https://bugzilla.redhat.com/show_bug.cgi?id=21229622122962* Automatic logout function logs out of GDM session, causing GUI to failhttps://errata.rockylinux.org/RLBA-2023:0093RLBA-2023:0093RLBA-2023:0093 (gnome-settings-daemon-3.32.0-16.el8_6.1.x86_64.rpm(gnome-settings-daemon-3.32.0-16.el8_6.1.x86_64.rpm * %bBbugfixfapolicyd bug fix and enhancement update ~ https://errata.rockylinux.org/RLBA-2023:0092RLBA-2023:0092RLBA-2023:0092 g5fapolicyd-selinux-1.1.3-8.el8_7.1.noarch.rpmf5fapolicyd-1.1.3-8.el8_7.1.x86_64.rpmg5fapolicyd-selinux-1.1.3-8.el8_7.1.noarch.rpmf5fapolicyd-1.1.3-8.el8_7.1.x86_64.rpm 4 *fBBsecurityModerate: libtiff security update ihttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2056CVE-2022-2056CVE-2022-2056https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2057CVE-2022-2057CVE-2022-2057https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2058CVE-2022-2058CVE-2022-2058https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2519CVE-2022-2519CVE-2022-2519https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2520CVE-2022-2520CVE-2022-2520https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2521CVE-2022-2521CVE-2022-2521https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2867CVE-2022-2867CVE-2022-2867https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2868CVE-2022-2868CVE-2022-2868https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2869CVE-2022-2869CVE-2022-2869https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2953CVE-2022-2953CVE-2022-2953https://bugzilla.redhat.com/show_bug.cgi?id=21032222103222https://bugzilla.redhat.com/show_bug.cgi?id=21188472118847https://bugzilla.redhat.com/show_bug.cgi?id=21188632118863https://bugzilla.redhat.com/show_bug.cgi?id=21188692118869https://bugzilla.redhat.com/show_bug.cgi?id=21227892122789https://bugzilla.redhat.com/show_bug.cgi?id=21227922122792https://bugzilla.redhat.com/show_bug.cgi?id=21227992122799https://bugzilla.redhat.com/show_bug.cgi?id=21344322134432https://errata.rockylinux.org/RLSA-2023:0095RLSA-2023:0095RLSA-2023:0095 @5libtiff-4.0.9-26.el8_7.x86_64.rpmA5libtiff-devel-4.0.9-26.el8_7.x86_64.rpm@5libtiff-4.0.9-26.el8_7.x86_64.rpmA5libtiff-devel-4.0.9-26.el8_7.x86_64.rpm 6 ?ZBBBBBBBBBBBUBwBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBZBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBzBBBBBBB^BBBBBBBBBBBBBBBBBYBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: virt:rhel and virt-devel:rhel security and bug fix updaterhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4144CVE-2022-4144CVE-2022-4144https://bugzilla.redhat.com/show_bug.cgi?id=21321762132176* libvirt kills virtual machine on restart when 2M and 1G hugepages are mountedhttps://bugzilla.redhat.com/show_bug.cgi?id=21485062148506https://errata.rockylinux.org/RLSA-2023:0099RLSA-2023:0099RLSA-2023:0099 tspAq+=hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm,=hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm8libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm9libguestfs-appliance-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmtlibguestfs-bash-completion-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm:libguestfs-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm;libguestfs-gfs2-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm<libguestfs-gobject-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm=libguestfs-gobject-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmulibguestfs-inspect-icons-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm>libguestfs-java-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm?libguestfs-java-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmvlibguestfs-javadoc-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpmwlibguestfs-man-pages-ja-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpmxlibguestfs-man-pages-uk-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm@libguestfs-rescue-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmAlibguestfs-rsync-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmylibguestfs-tools-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpmBlibguestfs-tools-c-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm=libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpmClibguestfs-xfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm>?libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm?libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm??libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmJDlibtpms-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpmKDlibtpms-devel-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpmL$libvirt-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmM$libvirt-client-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmN$libvirt-daemon-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmO$libvirt-daemon-config-network-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmP$libvirt-daemon-config-nwfilter-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmQ$libvirt-daemon-driver-interface-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmR$libvirt-daemon-driver-network-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmS$libvirt-daemon-driver-nodedev-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmT$libvirt-daemon-driver-nwfilter-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmU$libvirt-daemon-driver-qemu-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmV$libvirt-daemon-driver-secret-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmW$libvirt-daemon-driver-storage-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmX$libvirt-daemon-driver-storage-core-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmY$libvirt-daemon-driver-storage-disk-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmZ$libvirt-daemon-driver-storage-gluster-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm[$libvirt-daemon-driver-storage-iscsi-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm\$libvirt-daemon-driver-storage-iscsi-direct-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm]$libvirt-daemon-driver-storage-logical-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm^$libvirt-daemon-driver-storage-mpath-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm_$libvirt-daemon-driver-storage-rbd-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm`$libvirt-daemon-driver-storage-scsi-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpma$libvirt-daemon-kvm-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmb$libvirt-devel-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmc$libvirt-docs-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmd$libvirt-libs-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpme$libvirt-lock-sanlock-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmf$libvirt-nss-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmg$libvirt-wireshark-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmjlua-guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmB?nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmCnbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmnbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpmDnbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmEnbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmFnbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmGnbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmHnbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmInbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmJnbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmKnbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmLnbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmMnbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmNnbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmOnbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmPnbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmQnbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmRnbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmSnbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmTnbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmd=perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm_perl-Sys-Guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmcperl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpme=python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmkpython3-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmf?python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpml`python3-libvirt-8.0.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmx`qemu-guest-agent-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpmy`qemu-img-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpmz`qemu-kvm-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm{`qemu-kvm-block-curl-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm|`qemu-kvm-block-gluster-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm}`qemu-kvm-block-iscsi-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm~`qemu-kvm-block-rbd-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm`qemu-kvm-block-ssh-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm`qemu-kvm-common-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm`qemu-kvm-core-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm`qemu-kvm-docs-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm`qemu-kvm-hw-usbredir-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm`qemu-kvm-ui-opengl-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm`qemu-kvm-ui-spice-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpmq=ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm ruby-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm supermin-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpmsupermin-devel-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmvirt-dib-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmtspAq+=hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm,=hivex-devel-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm8libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm9libguestfs-appliance-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmtlibguestfs-bash-completion-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm:libguestfs-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm;libguestfs-gfs2-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm<libguestfs-gobject-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm=libguestfs-gobject-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmulibguestfs-inspect-icons-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm>libguestfs-java-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm?libguestfs-java-devel-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmvlibguestfs-javadoc-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpmwlibguestfs-man-pages-ja-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpmxlibguestfs-man-pages-uk-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpm@libguestfs-rescue-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmAlibguestfs-rsync-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmylibguestfs-tools-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.noarch.rpmBlibguestfs-tools-c-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm=libguestfs-winsupport-8.6-1.module+el8.7.0+1084+97b81f61.x86_64.rpmClibguestfs-xfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmblibiscsi-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmclibiscsi-devel-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpmdlibiscsi-utils-1.18.0-8.module+el8.7.0+1084+97b81f61.x86_64.rpm>?libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpm?libnbd-bash-completion-1.6.0-5.module+el8.7.0+1084+97b81f61.noarch.rpm??libnbd-devel-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmJDlibtpms-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpmKDlibtpms-devel-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+1084+97b81f61.x86_64.rpmL$libvirt-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmM$libvirt-client-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmN$libvirt-daemon-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmO$libvirt-daemon-config-network-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmP$libvirt-daemon-config-nwfilter-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmQ$libvirt-daemon-driver-interface-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmR$libvirt-daemon-driver-network-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmS$libvirt-daemon-driver-nodedev-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmT$libvirt-daemon-driver-nwfilter-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmU$libvirt-daemon-driver-qemu-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmV$libvirt-daemon-driver-secret-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmW$libvirt-daemon-driver-storage-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmX$libvirt-daemon-driver-storage-core-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmY$libvirt-daemon-driver-storage-disk-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmZ$libvirt-daemon-driver-storage-gluster-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm[$libvirt-daemon-driver-storage-iscsi-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm\$libvirt-daemon-driver-storage-iscsi-direct-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm]$libvirt-daemon-driver-storage-logical-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm^$libvirt-daemon-driver-storage-mpath-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm_$libvirt-daemon-driver-storage-rbd-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm`$libvirt-daemon-driver-storage-scsi-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpma$libvirt-daemon-kvm-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpm( libvirt-dbus-1.3.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmb$libvirt-devel-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmc$libvirt-docs-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmd$libvirt-libs-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpme$libvirt-lock-sanlock-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmf$libvirt-nss-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmg$libvirt-wireshark-8.0.0-10.1.module+el8.7.0+1125+fc135c6d.x86_64.rpmjlua-guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmB?nbdfuse-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpmCnbdkit-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmnbdkit-bash-completion-1.24.0-4.module+el8.6.0+847+b490afdd.noarch.rpmDnbdkit-basic-filters-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmEnbdkit-basic-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmFnbdkit-curl-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmGnbdkit-devel-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmHnbdkit-example-plugins-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmInbdkit-gzip-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmJnbdkit-gzip-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmKnbdkit-linuxdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmLnbdkit-nbd-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmMnbdkit-python-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmNnbdkit-server-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmOnbdkit-ssh-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmPnbdkit-tar-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmQnbdkit-tar-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmRnbdkit-tmpdisk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmSnbdkit-vddk-plugin-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmTnbdkit-xz-filter-1.24.0-4.module+el8.6.0+847+b490afdd.x86_64.rpmenetcf-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmfnetcf-devel-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmgnetcf-libs-0.2.8-12.module+el8.7.0+1084+97b81f61.x86_64.rpmd=perl-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm_perl-Sys-Guestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmcperl-Sys-Virt-8.0.0-1.module+el8.7.0+1084+97b81f61.x86_64.rpme=python3-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpmkpython3-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpmf?python3-libnbd-1.6.0-5.module+el8.7.0+1084+97b81f61.x86_64.rpml`python3-libvirt-8.0.0-2.module+el8.7.0+1084+97b81f61.x86_64.rpmx`qemu-guest-agent-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpmy`qemu-img-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpmz`qemu-kvm-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm{`qemu-kvm-block-curl-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm|`qemu-kvm-block-gluster-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm}`qemu-kvm-block-iscsi-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm~`qemu-kvm-block-rbd-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm`qemu-kvm-block-ssh-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm`qemu-kvm-common-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm`qemu-kvm-core-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm`qemu-kvm-docs-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm`qemu-kvm-hw-usbredir-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm`qemu-kvm-ui-opengl-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpm`qemu-kvm-ui-spice-6.2.0-21.module+el8.7.0+1125+fc135c6d.2.x86_64.rpmq=ruby-hivex-1.3.18-23.module+el8.7.0+1084+97b81f61.x86_64.rpm ruby-libguestfs-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm supermin-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpmsupermin-devel-5.2.1-2.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmswtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.7.0+1084+97b81f61.x86_64.rpmvirt-dib-1.44.0-9.module+el8.7.0+1084+97b81f61.rocky.x86_64.rpm1- @BBBBbugfixnmstate bug fix and enhancement update P https://bugzilla.redhat.com/show_bug.cgi?id=21285552128555* nmstate verificationError on OpenshiftSDNhttps://bugzilla.redhat.com/show_bug.cgi?id=21396982139698* kubernetes-nmstate-operator deletes Virtual Functions created by sriov-fec-operatorhttps://bugzilla.redhat.com/show_bug.cgi?id=21490482149048* Addresses configured at different order than specified at statehttps://bugzilla.redhat.com/show_bug.cgi?id=21507052150705* fail to create many veth interfaceshttps://errata.rockylinux.org/RLBA-2023:0102RLBA-2023:0102RLBA-2023:0102 WJnmstate-1.3.3-4.el8_7.x86_64.rpmXJnmstate-libs-1.3.3-4.el8_7.x86_64.rpmuJnmstate-plugin-ovsdb-1.3.3-4.el8_7.noarch.rpmJpython3-libnmstate-1.3.3-4.el8_7.noarch.rpmWJnmstate-1.3.3-4.el8_7.x86_64.rpmXJnmstate-libs-1.3.3-4.el8_7.x86_64.rpmuJnmstate-plugin-ovsdb-1.3.3-4.el8_7.noarch.rpmJpython3-libnmstate-1.3.3-4.el8_7.noarch.rpm18 !GBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: postgresql:10 security update[https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625CVE-2022-2625CVE-2022-2625https://bugzilla.redhat.com/show_bug.cgi?id=21138252113825https://errata.rockylinux.org/RLSA-2023:0113RLSA-2023:0113RLSA-2023:0113 AkA kpostgresql-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm=kpostgresql-contrib-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm>kpostgresql-docs-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm?kpostgresql-plperl-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm@kpostgresql-plpython3-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpmAkpostgresql-pltcl-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpmBkpostgresql-server-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpmCkpostgresql-server-devel-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpmDkpostgresql-static-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpmEkpostgresql-test-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm kpostgresql-test-rpm-macros-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpmkpostgresql-upgrade-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpmkpostgresql-upgrade-devel-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpmAkA kpostgresql-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm=kpostgresql-contrib-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm>kpostgresql-docs-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm?kpostgresql-plperl-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm@kpostgresql-plpython3-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpmAkpostgresql-pltcl-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpmBkpostgresql-server-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpmCkpostgresql-server-devel-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpmDkpostgresql-static-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpmEkpostgresql-test-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm kpostgresql-test-rpm-macros-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpmkpostgresql-upgrade-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpmkpostgresql-upgrade-devel-10.23-1.module+el8.7.0+1118+c6c6f44a.x86_64.rpm20 5kBBBBBBBBBBBBBxBBoBBBBBBBBB`BREBBBdZBBBBBBBBBBBBBBBBBBBBBBBBBbugfixcontainer-tools:rhel8 bug fix and enhancement update\ https://bugzilla.redhat.com/show_bug.cgi?id=21431712143171* The udica version in RHEL 8.7(0.2.6-3) is lower than RHEL 8.6(0.2.6-4)https://bugzilla.redhat.com/show_bug.cgi?id=21497752149775* FailingStreak is not reset to 0 when the container starts again.https://bugzilla.redhat.com/show_bug.cgi?id=21504162150416* SIGSEGV: segmentation violation on s390xhttps://bugzilla.redhat.com/show_bug.cgi?id=21504282150428* SIGSEGV: segmentation violation on s390xhttps://bugzilla.redhat.com/show_bug.cgi?id=21520172152017* buildah: ubi8 sticky bit removed from /tmphttps://bugzilla.redhat.com/show_bug.cgi?id=21520272152027* podman: ubi8 sticky bit removed from /tmphttps://bugzilla.redhat.com/show_bug.cgi?id=21544032154403* podman gating test issues in RHEL8.7https://errata.rockylinux.org/RLBA-2023:0115RLBA-2023:0115RLBA-2023:0115 v}W"aardvark-dns-1.1.0-5.module+el8.7.0+1078+e72fcd4f.x86_64.rpm[buildah-1.27.3-1.module+el8.7.0+1122+04a7498b.x86_64.rpm}[buildah-tests-1.27.3-1.module+el8.7.0+1122+04a7498b.x86_64.rpmSecockpit-podman-53-1.module+el8.7.0+1078+e72fcd4f.noarch.rpmoconmon-2.1.4-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpm9Scontainernetworking-plugins-1.1.1-3.module+el8.7.0+1078+e72fcd4f.x86_64.rpm1containers-common-1-44.module+el8.7.0+1122+04a7498b.x86_64.rpmcontainer-selinux-2.189.0-1.module+el8.7.0+1076+9b1c11c1.noarch.rpm-crit-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm*criu-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm!criu-devel-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpm"criu-libs-3.15-3.module+el8.7.0+1077+0e4f03d4.x86_64.rpmZPcrun-1.5-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmLVfuse-overlayfs-1.9-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmTXlibslirp-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmUXlibslirp-devel-4.4.0-1.module+el8.7.0+1077+0e4f03d4.x86_64.rpmBnetavark-1.1.0-7.module+el8.7.0+1078+e72fcd4f.x86_64.rpm\Coci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+1078+e72fcd4f.x86_64.rpm gpodman-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpmgpodman-catatonit-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm gpodman-docker-4.2.0-6.module+el8.7.0+1122+04a7498b.noarch.rpmegpodman-gvproxy-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpmgpodman-plugins-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpm;gpodman-remote-4.2.0-6.module+el8.7.0+1122+04a7498b.x86_64.rpmElibtsan2-12.1.1-3.4.el8_7.x86_64.rpmEgcc-toolset-12-gcc-gfortran-12.1.1-3.4.el8_7.x86_64.rpmEgcc-toolset-12-libquadmath-devel-12.1.1-3.4.el8_7.x86_64.rpmEgcc-toolset-12-libstdc++-devel-12.1.1-3.4.el8_7.x86_64.rpmEgcc-toolset-12-gcc-12.1.1-3.4.el8_7.x86_64.rpmEgcc-toolset-12-gcc-c++-12.1.1-3.4.el8_7.x86_64.rpmEgcc-toolset-12-gcc-plugin-devel-12.1.1-3.4.el8_7.x86_64.rpm Egcc-toolset-12-libasan-devel-12.1.1-3.4.el8_7.x86_64.rpm Egcc-toolset-12-libatomic-devel-12.1.1-3.4.el8_7.x86_64.rpm Egcc-toolset-12-libgccjit-12.1.1-3.4.el8_7.x86_64.rpm Egcc-toolset-12-libgccjit-devel-12.1.1-3.4.el8_7.x86_64.rpm Egcc-toolset-12-libgccjit-docs-12.1.1-3.4.el8_7.x86_64.rpmEgcc-toolset-12-libitm-devel-12.1.1-3.4.el8_7.x86_64.rpmEgcc-toolset-12-liblsan-devel-12.1.1-3.4.el8_7.x86_64.rpmEgcc-toolset-12-libstdc++-docs-12.1.1-3.4.el8_7.x86_64.rpmEgcc-toolset-12-libtsan-devel-12.1.1-3.4.el8_7.x86_64.rpmEgcc-toolset-12-libubsan-devel-12.1.1-3.4.el8_7.x86_64.rpmEgcc-toolset-12-offload-nvptx-12.1.1-3.4.el8_7.x86_64.rpm7Elibasan8-12.1.1-3.4.el8_7.x86_64.rpm>Elibtsan2-12.1.1-3.4.el8_7.x86_64.rpm<3 *_BBBBBBBBBbugfixtigervnc bug fix and enhancement update# https://bugzilla.redhat.com/show_bug.cgi?id=21509152150915* x0vncserver incorrectly maps keysym from vncclient running german keyboardhttps://errata.rockylinux.org/RLBA-2023:0119RLBA-2023:0119RLBA-2023:0119 t~tigervnc-server-1.12.0-8.el8_7.x86_64.rpms~tigervnc-1.12.0-8.el8_7.x86_64.rpm~tigervnc-icons-1.12.0-8.el8_7.noarch.rpm~tigervnc-license-1.12.0-8.el8_7.noarch.rpm ~tigervnc-selinux-1.12.0-8.el8_7.noarch.rpmu~tigervnc-server-minimal-1.12.0-8.el8_7.x86_64.rpmv~tigervnc-server-module-1.12.0-8.el8_7.x86_64.rpmt~tigervnc-server-1.12.0-8.el8_7.x86_64.rpms~tigervnc-1.12.0-8.el8_7.x86_64.rpm~tigervnc-icons-1.12.0-8.el8_7.noarch.rpm~tigervnc-license-1.12.0-8.el8_7.noarch.rpm ~tigervnc-selinux-1.12.0-8.el8_7.noarch.rpmu~tigervnc-server-minimal-1.12.0-8.el8_7.x86_64.rpmv~tigervnc-server-module-1.12.0-8.el8_7.x86_64.rpm<5 /kBBbugfixansible-core bug fix and enhancement update$6 https://bugzilla.redhat.com/show_bug.cgi?id=21519022151902https://errata.rockylinux.org/RLBA-2023:0122RLBA-2023:0122RLBA-2023:0122 mransible-core-2.13.3-2.el8_7.x86_64.rpmnransible-test-2.13.3-2.el8_7.x86_64.rpmmransible-core-2.13.3-2.el8_7.x86_64.rpmnransible-test-2.13.3-2.el8_7.x86_64.rpm<7 2pbugfixsysstat bug fix and enhancement updateZf https://errata.rockylinux.org/RLBA-2023:0125RLBA-2023:0125RLBA-2023:0125 zsysstat-11.7.3-7.el8_7.1.x86_64.rpmzsysstat-11.7.3-7.el8_7.1.x86_64.rpm=8 =sBBBBBBBBbugfixhyperv-daemons bug fix update@o https://errata.rockylinux.org/RLBA-2023:0126RLBA-2023:0126RLBA-2023:0126 Hhyperv-daemons-0-0.34.20180415git.el8_7.x86_64.rpmHhyperv-daemons-license-0-0.34.20180415git.el8_7.noarch.rpm Hhypervfcopyd-0-0.34.20180415git.el8_7.x86_64.rpm!Hhypervkvpd-0-0.34.20180415git.el8_7.x86_64.rpmHhyperv-tools-0-0.34.20180415git.el8_7.noarch.rpm"Hhypervvssd-0-0.34.20180415git.el8_7.x86_64.rpmHhyperv-daemons-0-0.34.20180415git.el8_7.x86_64.rpmHhyperv-daemons-license-0-0.34.20180415git.el8_7.noarch.rpm Hhypervfcopyd-0-0.34.20180415git.el8_7.x86_64.rpm!Hhypervkvpd-0-0.34.20180415git.el8_7.x86_64.rpmHhyperv-tools-0-0.34.20180415git.el8_7.noarch.rpm"Hhypervvssd-0-0.34.20180415git.el8_7.x86_64.rpm=: ~BBBBBsecurityImportant: dpdk security update/Khttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2132CVE-2022-2132CVE-2022-2132https://bugzilla.redhat.com/show_bug.cgi?id=20994752099475https://errata.rockylinux.org/RLSA-2023:0171RLSA-2023:0171RLSA-2023:0171 dpdk-21.11-2.el8_7.x86_64.rpmZdpdk-devel-21.11-2.el8_7.x86_64.rpmdpdk-doc-21.11-2.el8_7.noarch.rpmdpdk-tools-21.11-2.el8_7.x86_64.rpmdpdk-21.11-2.el8_7.x86_64.rpmZdpdk-devel-21.11-2.el8_7.x86_64.rpmdpdk-doc-21.11-2.el8_7.noarch.rpmdpdk-tools-21.11-2.el8_7.x86_64.rpm=< FBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix updatezLhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835CVE-2023-21835CVE-2023-21835https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843CVE-2023-21843CVE-2023-21843https://bugzilla.redhat.com/show_bug.cgi?id=21474732147473* In FIPS mode, the use of a SQLite database provided by NSS was assumed, which was opened in read-only mode and with no PIN expected. This prevented the use of other databases or setting a PIN on the NSS database. This update allows more control over database use using two new properties - fips.nssdb.path and fips.nssdb.pin - which can be configured permanently in the java.security file or temporarily via command-line arguments to the Java virtual machine (RHBZ#2147473)https://bugzilla.redhat.com/show_bug.cgi?id=21530102153010* Prepare for the next quarterly OpenJDK upstream release (2023-01, 17.0.6) [rhel-8]https://bugzilla.redhat.com/show_bug.cgi?id=21604212160421https://bugzilla.redhat.com/show_bug.cgi?id=21604752160475https://errata.rockylinux.org/RLSA-2023:0192RLSA-2023:0192RLSA-2023:0192 sLjava-17-openjdk-17.0.6.0.10-3.el8_7.x86_64.rpmtLjava-17-openjdk-demo-17.0.6.0.10-3.el8_7.x86_64.rpmuLjava-17-openjdk-devel-17.0.6.0.10-3.el8_7.x86_64.rpmvLjava-17-openjdk-headless-17.0.6.0.10-3.el8_7.x86_64.rpmwLjava-17-openjdk-javadoc-17.0.6.0.10-3.el8_7.x86_64.rpmxLjava-17-openjdk-javadoc-zip-17.0.6.0.10-3.el8_7.x86_64.rpmyLjava-17-openjdk-jmods-17.0.6.0.10-3.el8_7.x86_64.rpmzLjava-17-openjdk-src-17.0.6.0.10-3.el8_7.x86_64.rpm{Ljava-17-openjdk-static-libs-17.0.6.0.10-3.el8_7.x86_64.rpm sLjava-17-openjdk-17.0.6.0.10-3.el8_7.x86_64.rpmtLjava-17-openjdk-demo-17.0.6.0.10-3.el8_7.x86_64.rpmuLjava-17-openjdk-devel-17.0.6.0.10-3.el8_7.x86_64.rpmvLjava-17-openjdk-headless-17.0.6.0.10-3.el8_7.x86_64.rpmwLjava-17-openjdk-javadoc-17.0.6.0.10-3.el8_7.x86_64.rpmxLjava-17-openjdk-javadoc-zip-17.0.6.0.10-3.el8_7.x86_64.rpmyLjava-17-openjdk-jmods-17.0.6.0.10-3.el8_7.x86_64.rpmzLjava-17-openjdk-src-17.0.6.0.10-3.el8_7.x86_64.rpm{Ljava-17-openjdk-static-libs-17.0.6.0.10-3.el8_7.x86_64.rpm== +YBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix updateFohttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835CVE-2023-21835CVE-2023-21835https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843CVE-2023-21843CVE-2023-21843https://bugzilla.redhat.com/show_bug.cgi?id=21577972157797* Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) [rhel-8]https://bugzilla.redhat.com/show_bug.cgi?id=21604212160421https://bugzilla.redhat.com/show_bug.cgi?id=21604752160475https://errata.rockylinux.org/RLSA-2023:0200RLSA-2023:0200RLSA-2023:0200 3Djava-11-openjdk-11.0.18.0.10-2.el8_7.x86_64.rpm4Djava-11-openjdk-demo-11.0.18.0.10-2.el8_7.x86_64.rpm5Djava-11-openjdk-devel-11.0.18.0.10-2.el8_7.x86_64.rpm6Djava-11-openjdk-headless-11.0.18.0.10-2.el8_7.x86_64.rpm7Djava-11-openjdk-javadoc-11.0.18.0.10-2.el8_7.x86_64.rpm8Djava-11-openjdk-javadoc-zip-11.0.18.0.10-2.el8_7.x86_64.rpm9Djava-11-openjdk-jmods-11.0.18.0.10-2.el8_7.x86_64.rpm:Djava-11-openjdk-src-11.0.18.0.10-2.el8_7.x86_64.rpm;Djava-11-openjdk-static-libs-11.0.18.0.10-2.el8_7.x86_64.rpm 3Djava-11-openjdk-11.0.18.0.10-2.el8_7.x86_64.rpm4Djava-11-openjdk-demo-11.0.18.0.10-2.el8_7.x86_64.rpm5Djava-11-openjdk-devel-11.0.18.0.10-2.el8_7.x86_64.rpm6Djava-11-openjdk-headless-11.0.18.0.10-2.el8_7.x86_64.rpm7Djava-11-openjdk-javadoc-11.0.18.0.10-2.el8_7.x86_64.rpm8Djava-11-openjdk-javadoc-zip-11.0.18.0.10-2.el8_7.x86_64.rpm9Djava-11-openjdk-jmods-11.0.18.0.10-2.el8_7.x86_64.rpm:Djava-11-openjdk-src-11.0.18.0.10-2.el8_7.x86_64.rpm;Djava-11-openjdk-static-libs-11.0.18.0.10-2.el8_7.x86_64.rpm=? .lsecurityImportant: firefox security update5Dhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871CVE-2022-46871CVE-2022-46871https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877CVE-2022-46877CVE-2022-46877https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598CVE-2023-23598CVE-2023-23598https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23599CVE-2023-23599CVE-2023-23599https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601CVE-2023-23601CVE-2023-23601https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602CVE-2023-23602CVE-2023-23602https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603CVE-2023-23603CVE-2023-23603https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605CVE-2023-23605CVE-2023-23605https://bugzilla.redhat.com/show_bug.cgi?id=21623362162336https://bugzilla.redhat.com/show_bug.cgi?id=21623382162338https://bugzilla.redhat.com/show_bug.cgi?id=21623392162339https://bugzilla.redhat.com/show_bug.cgi?id=21623402162340https://bugzilla.redhat.com/show_bug.cgi?id=21623412162341https://bugzilla.redhat.com/show_bug.cgi?id=21623422162342https://bugzilla.redhat.com/show_bug.cgi?id=21623432162343https://bugzilla.redhat.com/show_bug.cgi?id=21623442162344https://errata.rockylinux.org/RLSA-2023:0288RLSA-2023:0288RLSA-2023:0288 rrfirefox-102.7.0-1.el8_7.x86_64.rpmrrfirefox-102.7.0-1.el8_7.x86_64.rpm>@ 3oBBsecurityImportant: libXpm security updatey=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44617CVE-2022-44617CVE-2022-44617https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46285CVE-2022-46285CVE-2022-46285https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4883CVE-2022-4883CVE-2022-4883https://bugzilla.redhat.com/show_bug.cgi?id=21600922160092https://bugzilla.redhat.com/show_bug.cgi?id=21601932160193https://bugzilla.redhat.com/show_bug.cgi?id=21602132160213https://errata.rockylinux.org/RLSA-2023:0379RLSA-2023:0379RLSA-2023:0379 &.libXpm-3.5.12-9.el8_7.x86_64.rpm'.libXpm-devel-3.5.12-9.el8_7.x86_64.rpm&.libXpm-3.5.12-9.el8_7.x86_64.rpm'.libXpm-devel-3.5.12-9.el8_7.x86_64.rpm>A SBaBBBBBBBBBBsecurityModerate: go-toolset:rhel8 security and bug fix update6Z https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2879CVE-2022-2879CVE-2022-2879https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2880CVE-2022-2880CVE-2022-2880https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41715CVE-2022-41715CVE-2022-41715https://bugzilla.redhat.com/show_bug.cgi?id=21328672132867https://bugzilla.redhat.com/show_bug.cgi?id=21328682132868https://bugzilla.redhat.com/show_bug.cgi?id=21328722132872https://bugzilla.redhat.com/show_bug.cgi?id=21397182139718https://bugzilla.redhat.com/show_bug.cgi?id=21493132149313* crypto testcases fail on golang on s390x [rhel-8]https://errata.rockylinux.org/RLSA-2023:0446RLSA-2023:0446RLSA-2023:0446 *v0T S[delve-1.8.3-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm6golang-1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm6golang-bin-1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm6golang-docs-1.18.9-1.module+el8.7.0+1133+56289a01.noarch.rpm6golang-misc-1.18.9-1.module+el8.7.0+1133+56289a01.noarch.rpm6golang-race-1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm6golang-src-1.18.9-1.module+el8.7.0+1133+56289a01.noarch.rpm6golang-tests-1.18.9-1.module+el8.7.0+1133+56289a01.noarch.rpm*6go-toolset-1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm*v0T S[delve-1.8.3-1.module+el8.7.0+1073+99e3b3cd.x86_64.rpm6golang-1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm6golang-bin-1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm6golang-docs-1.18.9-1.module+el8.7.0+1133+56289a01.noarch.rpm6golang-misc-1.18.9-1.module+el8.7.0+1133+56289a01.noarch.rpm6golang-race-1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm6golang-src-1.18.9-1.module+el8.7.0+1133+56289a01.noarch.rpm6golang-tests-1.18.9-1.module+el8.7.0+1133+56289a01.noarch.rpm*6go-toolset-1.18.9-1.module+el8.7.0+1133+56289a01.x86_64.rpm>B AsecurityImportant: thunderbird security updatehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871CVE-2022-46871CVE-2022-46871https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877CVE-2022-46877CVE-2022-46877https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598CVE-2023-23598CVE-2023-23598https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23599CVE-2023-23599CVE-2023-23599https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601CVE-2023-23601CVE-2023-23601https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602CVE-2023-23602CVE-2023-23602https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603CVE-2023-23603CVE-2023-23603https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605CVE-2023-23605CVE-2023-23605https://bugzilla.redhat.com/show_bug.cgi?id=21623362162336https://bugzilla.redhat.com/show_bug.cgi?id=21623382162338https://bugzilla.redhat.com/show_bug.cgi?id=21623392162339https://bugzilla.redhat.com/show_bug.cgi?id=21623402162340https://bugzilla.redhat.com/show_bug.cgi?id=21623412162341https://bugzilla.redhat.com/show_bug.cgi?id=21623422162342https://bugzilla.redhat.com/show_bug.cgi?id=21623432162343https://bugzilla.redhat.com/show_bug.cgi?id=21623442162344https://errata.rockylinux.org/RLSA-2023:0463RLSA-2023:0463RLSA-2023:0463 hsthunderbird-102.7.1-1.el8_7.x86_64.rpmhsthunderbird-102.7.1-1.el8_7.x86_64.rpm>' Denhancementdtc bug fix and enhancement update#) https://errata.rockylinux.org/RLEA-2020:4838RLEA-2020:4838RLEA-2020:4838 Nlibfdt-1.6.0-1.el8.x86_64.rpmNlibfdt-1.6.0-1.el8.x86_64.rpm@] cbugfixaide bug fix and enhancement updateL) https://bugzilla.redhat.com/show_bug.cgi?id=17407541740754https://bugzilla.redhat.com/show_bug.cgi?id=18063231806323https://bugzilla.redhat.com/show_bug.cgi?id=18524071852407https://errata.rockylinux.org/RLBA-2020:4718RLBA-2020:4718RLBA-2020:4718 )Caide-0.16-14.el8_5.1.x86_64.rpm)Caide-0.16-14.el8_5.1.x86_64.rpm? tBBBBBBBBbugfixclevis bug fix and enhancement updateu) https://bugzilla.redhat.com/show_bug.cgi?id=18536511853651https://bugzilla.redhat.com/show_bug.cgi?id=18744601874460https://bugzilla.redhat.com/show_bug.cgi?id=18878361887836https://errata.rockylinux.org/RLBA-2021:1808RLBA-2021:1808RLBA-2021:1808 Gclevis-15-11.el8.x86_64.rpmHclevis-dracut-15-11.el8.x86_64.rpmIclevis-luks-15-11.el8.x86_64.rpmJclevis-systemd-15-11.el8.x86_64.rpmKclevis-udisks2-15-11.el8.x86_64.rpmGclevis-15-11.el8.x86_64.rpmHclevis-dracut-15-11.el8.x86_64.rpmIclevis-luks-15-11.el8.x86_64.rpmJclevis-systemd-15-11.el8.x86_64.rpmKclevis-udisks2-15-11.el8.x86_64.rpmQi IBBBBBBsecurityModerate: freerdp security, bug fix, and enhancement updateVhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11095CVE-2020-11095CVE-2020-11095https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11096CVE-2020-11096CVE-2020-11096https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11097CVE-2020-11097CVE-2020-11097https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11098CVE-2020-11098CVE-2020-11098https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11099CVE-2020-11099CVE-2020-11099https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15103CVE-2020-15103CVE-2020-15103https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4030CVE-2020-4030CVE-2020-4030https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4033CVE-2020-4033CVE-2020-4033https://bugzilla.redhat.com/show_bug.cgi?id=18548431854843https://bugzilla.redhat.com/show_bug.cgi?id=18548471854847https://bugzilla.redhat.com/show_bug.cgi?id=18548501854850https://bugzilla.redhat.com/show_bug.cgi?id=18548761854876https://bugzilla.redhat.com/show_bug.cgi?id=18548951854895https://bugzilla.redhat.com/show_bug.cgi?id=18548991854899https://bugzilla.redhat.com/show_bug.cgi?id=18549101854910https://bugzilla.redhat.com/show_bug.cgi?id=18589091858909https://bugzilla.redhat.com/show_bug.cgi?id=18819711881971The following packages have been upgraded to a later upstream version: freerdp (2.2.0).https://errata.rockylinux.org/RLSA-2021:1849RLSA-2021:1849RLSA-2021:1849 sfreerdp-2.2.0-10.el8.x86_64.rpmsfreerdp-libs-2.2.0-10.el8.x86_64.rpmhslibwinpr-2.2.0-10.el8.x86_64.rpmislibwinpr-devel-2.2.0-10.el8.x86_64.rpmsfreerdp-2.2.0-10.el8.x86_64.rpmsfreerdp-libs-2.2.0-10.el8.x86_64.rpmhslibwinpr-2.2.0-10.el8.x86_64.rpmislibwinpr-devel-2.2.0-10.el8.x86_64.rpmVj RBBBBsecurityModerate: ghostscript security, bug fix, and enhancement updatet>7https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14373CVE-2020-14373CVE-2020-14373https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287CVE-2020-16287CVE-2020-16287https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288CVE-2020-16288CVE-2020-16288https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289CVE-2020-16289CVE-2020-16289https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290CVE-2020-16290CVE-2020-16290https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291CVE-2020-16291CVE-2020-16291https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292CVE-2020-16292CVE-2020-16292https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293CVE-2020-16293CVE-2020-16293https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294CVE-2020-16294CVE-2020-16294https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295CVE-2020-16295CVE-2020-16295https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296CVE-2020-16296CVE-2020-16296https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297CVE-2020-16297CVE-2020-16297https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298CVE-2020-16298CVE-2020-16298https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299CVE-2020-16299CVE-2020-16299https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300CVE-2020-16300CVE-2020-16300https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301CVE-2020-16301CVE-2020-16301https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302CVE-2020-16302CVE-2020-16302https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303CVE-2020-16303CVE-2020-16303https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304CVE-2020-16304CVE-2020-16304https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305CVE-2020-16305CVE-2020-16305https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306CVE-2020-16306CVE-2020-16306https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307CVE-2020-16307CVE-2020-16307https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308CVE-2020-16308CVE-2020-16308https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309CVE-2020-16309CVE-2020-16309https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310CVE-2020-16310CVE-2020-16310https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538CVE-2020-17538CVE-2020-17538https://bugzilla.redhat.com/show_bug.cgi?id=18701491870149https://bugzilla.redhat.com/show_bug.cgi?id=18701521870152https://bugzilla.redhat.com/show_bug.cgi?id=18701591870159https://bugzilla.redhat.com/show_bug.cgi?id=18701621870162https://bugzilla.redhat.com/show_bug.cgi?id=18701651870165https://bugzilla.redhat.com/show_bug.cgi?id=18701671870167https://bugzilla.redhat.com/show_bug.cgi?id=18701691870169https://bugzilla.redhat.com/show_bug.cgi?id=18701711870171https://bugzilla.redhat.com/show_bug.cgi?id=18701751870175https://bugzilla.redhat.com/show_bug.cgi?id=18701791870179https://bugzilla.redhat.com/show_bug.cgi?id=18702271870227https://bugzilla.redhat.com/show_bug.cgi?id=18702291870229https://bugzilla.redhat.com/show_bug.cgi?id=18702311870231https://bugzilla.redhat.com/show_bug.cgi?id=18702371870237https://bugzilla.redhat.com/show_bug.cgi?id=18702401870240https://bugzilla.redhat.com/show_bug.cgi?id=18702421870242https://bugzilla.redhat.com/show_bug.cgi?id=18702441870244https://bugzilla.redhat.com/show_bug.cgi?id=18702481870248https://bugzilla.redhat.com/show_bug.cgi?id=18702491870249https://bugzilla.redhat.com/show_bug.cgi?id=18702561870256https://bugzilla.redhat.com/show_bug.cgi?id=18702571870257https://bugzilla.redhat.com/show_bug.cgi?id=18702581870258https://bugzilla.redhat.com/show_bug.cgi?id=18702621870262https://bugzilla.redhat.com/show_bug.cgi?id=18702661870266https://bugzilla.redhat.com/show_bug.cgi?id=18702671870267https://bugzilla.redhat.com/show_bug.cgi?id=18732391873239https://bugzilla.redhat.com/show_bug.cgi?id=18745231874523The following packages have been upgraded to a later upstream version: ghostscript (9.27).https://bugzilla.redhat.com/show_bug.cgi?id=18999021899902https://errata.rockylinux.org/RLSA-2021:1852RLSA-2021:1852RLSA-2021:1852 tghostscript-9.27-11.el8.x86_64.rpmtghostscript-x11-9.27-11.el8.x86_64.rpm-tlibgs-9.27-11.el8.x86_64.rpmtghostscript-9.27-11.el8.x86_64.rpmtghostscript-x11-9.27-11.el8.x86_64.rpm-tlibgs-9.27-11.el8.x86_64.rpmW2 UBBbugfixmod_auth_mellon bug fix and enhancement update2) https://bugzilla.redhat.com/show_bug.cgi?id=17912621791262https://errata.rockylinux.org/RLBA-2021:1934RLBA-2021:1934RLBA-2021:1934 d*mod_auth_mellon-0.14.0-12.el8.1.x86_64.rpme*mod_auth_mellon-diagnostics-0.14.0-12.el8.1.x86_64.rpmd*mod_auth_mellon-0.14.0-12.el8.1.x86_64.rpme*mod_auth_mellon-diagnostics-0.14.0-12.el8.1.x86_64.rpmbV ZBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbugfixabrt bug fix and enhancement update[) https://bugzilla.redhat.com/show_bug.cgi?id=18447391844739https://errata.rockylinux.org/RLBA-2021:4247RLBA-2021:4247RLBA-2021:4247 H5abrt-addon-ccpp-2.10.9-21.el8.rocky.0.x86_64.rpmG5abrt-2.10.9-21.el8.rocky.0.x86_64.rpmI5abrt-addon-coredump-helper-2.10.9-21.el8.rocky.0.x86_64.rpmJ5abrt-addon-kerneloops-2.10.9-21.el8.rocky.0.x86_64.rpmK5abrt-addon-pstoreoops-2.10.9-21.el8.rocky.0.x86_64.rpmL5abrt-addon-vmcore-2.10.9-21.el8.rocky.0.x86_64.rpmM5abrt-addon-xorg-2.10.9-21.el8.rocky.0.x86_64.rpmN5abrt-cli-2.10.9-21.el8.rocky.0.x86_64.rpmO5abrt-cli-ng-2.10.9-21.el8.rocky.0.x86_64.rpmP5abrt-console-notification-2.10.9-21.el8.rocky.0.x86_64.rpmQ5abrt-dbus-2.10.9-21.el8.rocky.0.x86_64.rpmR5abrt-desktop-2.10.9-21.el8.rocky.0.x86_64.rpmS5abrt-gui-2.10.9-21.el8.rocky.0.x86_64.rpmT5abrt-gui-libs-2.10.9-21.el8.rocky.0.x86_64.rpmV5abrt-libs-2.10.9-21.el8.rocky.0.x86_64.rpmW5abrt-plugin-machine-id-2.10.9-21.el8.rocky.0.x86_64.rpmX5abrt-plugin-sosreport-2.10.9-21.el8.rocky.0.x86_64.rpmY5abrt-tui-2.10.9-21.el8.rocky.0.x86_64.rpmK5python3-abrt-2.10.9-21.el8.rocky.0.x86_64.rpmL5python3-abrt-addon-2.10.9-21.el8.rocky.0.x86_64.rpmM5python3-abrt-container-addon-2.10.9-21.el8.rocky.0.x86_64.rpmK5python3-abrt-doc-2.10.9-21.el8.rocky.0.noarch.rpmH5abrt-addon-ccpp-2.10.9-21.el8.rocky.0.x86_64.rpmG5abrt-2.10.9-21.el8.rocky.0.x86_64.rpmI5abrt-addon-coredump-helper-2.10.9-21.el8.rocky.0.x86_64.rpmJ5abrt-addon-kerneloops-2.10.9-21.el8.rocky.0.x86_64.rpmK5abrt-addon-pstoreoops-2.10.9-21.el8.rocky.0.x86_64.rpmL5abrt-addon-vmcore-2.10.9-21.el8.rocky.0.x86_64.rpmM5abrt-addon-xorg-2.10.9-21.el8.rocky.0.x86_64.rpmN5abrt-cli-2.10.9-21.el8.rocky.0.x86_64.rpmO5abrt-cli-ng-2.10.9-21.el8.rocky.0.x86_64.rpmP5abrt-console-notification-2.10.9-21.el8.rocky.0.x86_64.rpmQ5abrt-dbus-2.10.9-21.el8.rocky.0.x86_64.rpmR5abrt-desktop-2.10.9-21.el8.rocky.0.x86_64.rpmS5abrt-gui-2.10.9-21.el8.rocky.0.x86_64.rpmT5abrt-gui-libs-2.10.9-21.el8.rocky.0.x86_64.rpmV5abrt-libs-2.10.9-21.el8.rocky.0.x86_64.rpmW5abrt-plugin-machine-id-2.10.9-21.el8.rocky.0.x86_64.rpmX5abrt-plugin-sosreport-2.10.9-21.el8.rocky.0.x86_64.rpmY5abrt-tui-2.10.9-21.el8.rocky.0.x86_64.rpmK5python3-abrt-2.10.9-21.el8.rocky.0.x86_64.rpmL5python3-abrt-addon-2.10.9-21.el8.rocky.0.x86_64.rpmM5python3-abrt-container-addon-2.10.9-21.el8.rocky.0.x86_64.rpmK5python3-abrt-doc-2.10.9-21.el8.rocky.0.noarch.rpm*y FsecurityImportant: firefox security update, https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42927CVE-2022-42927CVE-2022-42927https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42928CVE-2022-42928CVE-2022-42928https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42929CVE-2022-42929CVE-2022-42929https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42932CVE-2022-42932CVE-2022-42932https://bugzilla.redhat.com/show_bug.cgi?id=21361562136156https://bugzilla.redhat.com/show_bug.cgi?id=21361572136157https://bugzilla.redhat.com/show_bug.cgi?id=21361582136158https://bugzilla.redhat.com/show_bug.cgi?id=21361592136159https://errata.rockylinux.org/RLSA-2022:7070RLSA-2022:7070RLSA-2022:7070 rHfirefox-102.4.0-1.el8_6.0.1.x86_64.rpmrHfirefox-102.4.0-1.el8_6.0.1.x86_64.rpm IsecurityImportant: thunderbird security update0Ehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39236CVE-2022-39236CVE-2022-39236https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39249CVE-2022-39249CVE-2022-39249https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39250CVE-2022-39250CVE-2022-39250https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39251CVE-2022-39251CVE-2022-39251https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42927CVE-2022-42927CVE-2022-42927https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42928CVE-2022-42928CVE-2022-42928https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42929CVE-2022-42929CVE-2022-42929https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42932CVE-2022-42932CVE-2022-42932https://bugzilla.redhat.com/show_bug.cgi?id=21353912135391https://bugzilla.redhat.com/show_bug.cgi?id=21353932135393https://bugzilla.redhat.com/show_bug.cgi?id=21353952135395https://bugzilla.redhat.com/show_bug.cgi?id=21353962135396https://bugzilla.redhat.com/show_bug.cgi?id=21361562136156https://bugzilla.redhat.com/show_bug.cgi?id=21361572136157https://bugzilla.redhat.com/show_bug.cgi?id=21361582136158https://bugzilla.redhat.com/show_bug.cgi?id=21361592136159https://errata.rockylinux.org/RLSA-2022:7190RLSA-2022:7190RLSA-2022:7190 hHthunderbird-102.4.0-1.el8_6.0.1.x86_64.rpmhHthunderbird-102.4.0-1.el8_6.0.1.x86_64.rpm> LBBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security and bug fix updateuLhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21830CVE-2023-21830CVE-2023-21830https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843CVE-2023-21843CVE-2023-21843https://bugzilla.redhat.com/show_bug.cgi?id=21397052139705* Leak File Descriptors Because of ResolverLocalFilesystem#engineResolveURI()https://bugzilla.redhat.com/show_bug.cgi?id=21599102159910* Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) [rhel-8]https://bugzilla.redhat.com/show_bug.cgi?id=21604752160475https://bugzilla.redhat.com/show_bug.cgi?id=21604902160490https://bugzilla.redhat.com/show_bug.cgi?id=21635952163595* solr broken due to access denied ("java.io.FilePermission" "/etc/pki/java/cacerts" "read") [rhel-8, openjdk-8]https://errata.rockylinux.org/RLSA-2023:0208RLSA-2023:0208RLSA-2023:0208 -java-1.8.0-openjdk-1.8.0.362.b09-2.el8_7.x86_64.rpm.java-1.8.0-openjdk-accessibility-1.8.0.362.b09-2.el8_7.x86_64.rpm/java-1.8.0-openjdk-demo-1.8.0.362.b09-2.el8_7.x86_64.rpm0java-1.8.0-openjdk-devel-1.8.0.362.b09-2.el8_7.x86_64.rpm1java-1.8.0-openjdk-headless-1.8.0.362.b09-2.el8_7.x86_64.rpm8java-1.8.0-openjdk-javadoc-1.8.0.362.b09-2.el8_7.noarch.rpm9java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b09-2.el8_7.noarch.rpm2java-1.8.0-openjdk-src-1.8.0.362.b09-2.el8_7.x86_64.rpm-java-1.8.0-openjdk-1.8.0.362.b09-2.el8_7.x86_64.rpm.java-1.8.0-openjdk-accessibility-1.8.0.362.b09-2.el8_7.x86_64.rpm/java-1.8.0-openjdk-demo-1.8.0.362.b09-2.el8_7.x86_64.rpm0java-1.8.0-openjdk-devel-1.8.0.362.b09-2.el8_7.x86_64.rpm1java-1.8.0-openjdk-headless-1.8.0.362.b09-2.el8_7.x86_64.rpm8java-1.8.0-openjdk-javadoc-1.8.0.362.b09-2.el8_7.noarch.rpm9java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b09-2.el8_7.noarch.rpm2java-1.8.0-openjdk-src-1.8.0.362.b09-2.el8_7.x86_64.rpm3v sBBBBBBbugfixpython3 bug fix updateAY https://errata.rockylinux.org/RLBA-2019:1957RLBA-2019:1957RLBA-2019:1957 platform-python-debug-3.6.8-48.el8_7.rocky.0.x86_64.rpmplatform-python-devel-3.6.8-48.el8_7.rocky.0.x86_64.rpm python3-idle-3.6.8-48.el8_7.rocky.0.x86_64.rpm python3-tkinter-3.6.8-48.el8_7.rocky.0.x86_64.rpmplatform-python-debug-3.6.8-48.el8_7.rocky.0.x86_64.rpmplatform-python-devel-3.6.8-48.el8_7.rocky.0.x86_64.rpm python3-idle-3.6.8-48.el8_7.rocky.0.x86_64.rpm python3-tkinter-3.6.8-48.el8_7.rocky.0.x86_64.rpmwu \BBbugfixglusterfs bug fix update  https://bugzilla.redhat.com/show_bug.cgi?id=16683031668303https://bugzilla.redhat.com/show_bug.cgi?id=18536311853631https://bugzilla.redhat.com/show_bug.cgi?id=19014681901468https://bugzilla.redhat.com/show_bug.cgi?id=19735661973566https://bugzilla.redhat.com/show_bug.cgi?id=19945931994593* Previously, granular entry self heal took more time than the full entry self heal when there were many entry self heals pending due to the creation and deletion heavy workloads. With this update, the extra lookup to delete the stale index is removed from the code path of the granular entry self heal, which improves the heal performance in the creation and deletion heavy workloads when the granular entry self heal is enabled.https://bugzilla.redhat.com/show_bug.cgi?id=19950291995029https://bugzilla.redhat.com/show_bug.cgi?id=20062052006205https://bugzilla.redhat.com/show_bug.cgi?id=20429622042962https://bugzilla.redhat.com/show_bug.cgi?id=20429712042971https://errata.rockylinux.org/RLBA-2022:0315RLBA-2022:0315RLBA-2022:0315 wGglusterfs-api-6.0-61.3.el8.x86_64.rpmxGglusterfs-cli-6.0-61.3.el8.x86_64.rpmwGglusterfs-api-6.0-61.3.el8.x86_64.rpmxGglusterfs-cli-6.0-61.3.el8.x86_64.rpm ? "!bugfixpython-pip bug fix and enhancement update# https://bugzilla.redhat.com/show_bug.cgi?id=20001352000135https://bugzilla.redhat.com/show_bug.cgi?id=20067882006788https://errata.rockylinux.org/RLBA-2022:2006RLBA-2022:2006RLBA-2022:2006 ]apython3-pip-9.0.3-22.el8.rocky.0.noarch.rpm]apython3-pip-9.0.3-22.el8.rocky.0.noarch.rpm  #hbugfixsssd bug fix and enhancement update" https://bugzilla.redhat.com/show_bug.cgi?id=20267992026799https://bugzilla.redhat.com/show_bug.cgi?id=20333472033347https://bugzilla.redhat.com/show_bug.cgi?id=20560352056035https://bugzilla.redhat.com/show_bug.cgi?id=20564832056483https://bugzilla.redhat.com/show_bug.cgi?id=20626892062689https://bugzilla.redhat.com/show_bug.cgi?id=20630162063016https://bugzilla.redhat.com/show_bug.cgi?id=20656922065692https://bugzilla.redhat.com/show_bug.cgi?id=20693792069379https://bugzilla.redhat.com/show_bug.cgi?id=20720502072050https://bugzilla.redhat.com/show_bug.cgi?id=20729312072931https://bugzilla.redhat.com/show_bug.cgi?id=20870882087088https://bugzilla.redhat.com/show_bug.cgi?id=20877442087744https://bugzilla.redhat.com/show_bug.cgi?id=20877452087745https://bugzilla.redhat.com/show_bug.cgi?id=20877462087746https://bugzilla.redhat.com/show_bug.cgi?id=20888172088817https://bugzilla.redhat.com/show_bug.cgi?id=20986152098615https://bugzilla.redhat.com/show_bug.cgi?id=20986162098616https://bugzilla.redhat.com/show_bug.cgi?id=20986172098617https://bugzilla.redhat.com/show_bug.cgi?id=20986192098619https://bugzilla.redhat.com/show_bug.cgi?id=20986202098620https://bugzilla.redhat.com/show_bug.cgi?id=21163952116395https://bugzilla.redhat.com/show_bug.cgi?id=21164872116487https://bugzilla.redhat.com/show_bug.cgi?id=21164882116488https://bugzilla.redhat.com/show_bug.cgi?id=21197262119726https://bugzilla.redhat.com/show_bug.cgi?id=21206692120669https://errata.rockylinux.org/RLBA-2022:7739RLBA-2022:7739RLBA-2022:7739 rxsssd-idp-2.7.3-4.el8_7.1.x86_64.rpmrxsssd-idp-2.7.3-4.el8_7.1.x86_64.rpm# $JBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: bind security update!Qhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25220CVE-2021-25220CVE-2021-25220https://bugzilla.redhat.com/show_bug.cgi?id=20645122064512https://errata.rockylinux.org/RLSA-2022:7790RLSA-2022:7790RLSA-2022:7790 e4bind-9.11.36-5.el8_7.2.x86_64.rpmf4bind-chroot-9.11.36-5.el8_7.2.x86_64.rpmg4bind-devel-9.11.36-5.el8_7.2.x86_64.rpmh4bind-libs-9.11.36-5.el8_7.2.x86_64.rpmi4bind-libs-lite-9.11.36-5.el8_7.2.x86_64.rpm&4bind-license-9.11.36-5.el8_7.2.noarch.rpmj4bind-lite-devel-9.11.36-5.el8_7.2.x86_64.rpmk4bind-pkcs11-9.11.36-5.el8_7.2.x86_64.rpml4bind-pkcs11-devel-9.11.36-5.el8_7.2.x86_64.rpmm4bind-pkcs11-libs-9.11.36-5.el8_7.2.x86_64.rpmn4bind-pkcs11-utils-9.11.36-5.el8_7.2.x86_64.rpmo4bind-sdb-9.11.36-5.el8_7.2.x86_64.rpmp4bind-sdb-chroot-9.11.36-5.el8_7.2.x86_64.rpmq4bind-utils-9.11.36-5.el8_7.2.x86_64.rpm44python3-bind-9.11.36-5.el8_7.2.noarch.rpme4bind-9.11.36-5.el8_7.2.x86_64.rpmf4bind-chroot-9.11.36-5.el8_7.2.x86_64.rpmg4bind-devel-9.11.36-5.el8_7.2.x86_64.rpmh4bind-libs-9.11.36-5.el8_7.2.x86_64.rpmi4bind-libs-lite-9.11.36-5.el8_7.2.x86_64.rpm&4bind-license-9.11.36-5.el8_7.2.noarch.rpmj4bind-lite-devel-9.11.36-5.el8_7.2.x86_64.rpmk4bind-pkcs11-9.11.36-5.el8_7.2.x86_64.rpml4bind-pkcs11-devel-9.11.36-5.el8_7.2.x86_64.rpmm4bind-pkcs11-libs-9.11.36-5.el8_7.2.x86_64.rpmn4bind-pkcs11-utils-9.11.36-5.el8_7.2.x86_64.rpmo4bind-sdb-9.11.36-5.el8_7.2.x86_64.rpmp4bind-sdb-chroot-9.11.36-5.el8_7.2.x86_64.rpmq4bind-utils-9.11.36-5.el8_7.2.x86_64.rpm44python3-bind-9.11.36-5.el8_7.2.noarch.rpm# %sBBBBBBbugfixpython3 bug fix updaterv https://bugzilla.redhat.com/show_bug.cgi?id=21364362136436* python3: Bump the release of python3 to fix the upgrade path.https://errata.rockylinux.org/RLBA-2022:7832RLBA-2022:7832RLBA-2022:7832 platform-python-debug-3.6.8-48.el8_7.rocky.0.x86_64.rpmplatform-python-devel-3.6.8-48.el8_7.rocky.0.x86_64.rpm python3-idle-3.6.8-48.el8_7.rocky.0.x86_64.rpm python3-tkinter-3.6.8-48.el8_7.rocky.0.x86_64.rpmplatform-python-debug-3.6.8-48.el8_7.rocky.0.x86_64.rpmplatform-python-devel-3.6.8-48.el8_7.rocky.0.x86_64.rpm python3-idle-3.6.8-48.el8_7.rocky.0.x86_64.rpm python3-tkinter-3.6.8-48.el8_7.rocky.0.x86_64.rpm' 5fBBBBBBBBBBBBBbugfixbacula bug fix and enhancement updateh https://errata.rockylinux.org/RLBA-2019:3504RLBA-2019:3504RLBA-2019:3504 s bacula-logwatch-9.0.6-6.el8.1.noarch.rpmv bacula-client-9.0.6-6.el8.1.x86_64.rpmw bacula-common-9.0.6-6.el8.1.x86_64.rpmx bacula-console-9.0.6-6.el8.1.x86_64.rpmy bacula-director-9.0.6-6.el8.1.x86_64.rpmz bacula-libs-9.0.6-6.el8.1.x86_64.rpm{ bacula-libs-sql-9.0.6-6.el8.1.x86_64.rpm| bacula-storage-9.0.6-6.el8.1.x86_64.rpms bacula-logwatch-9.0.6-6.el8.1.noarch.rpmv bacula-client-9.0.6-6.el8.1.x86_64.rpmw bacula-common-9.0.6-6.el8.1.x86_64.rpmx bacula-console-9.0.6-6.el8.1.x86_64.rpmy bacula-director-9.0.6-6.el8.1.x86_64.rpmz bacula-libs-9.0.6-6.el8.1.x86_64.rpm{ bacula-libs-sql-9.0.6-6.el8.1.x86_64.rpm| bacula-storage-9.0.6-6.el8.1.x86_64.rpmW, vBBBBBBBBBBBBBBbugfix.NET Core 2.1 and 3.0 bugfix updategL https://bugzilla.redhat.com/show_bug.cgi?id=18069551806955https://bugzilla.redhat.com/show_bug.cgi?id=18069561806956https://bugzilla.redhat.com/show_bug.cgi?id=18161971816197https://errata.rockylinux.org/RLBA-2020:1362RLBA-2020:1362RLBA-2020:1362 naspnetcore-runtime-3.0-3.0.3-1.el8_1.rocky.x86_64.rpmpaspnetcore-targeting-pack-3.0-3.0.3-1.el8_1.rocky.x86_64.rpmSdotnet-apphost-pack-3.0-3.0.3-1.el8_1.rocky.x86_64.rpmVdotnet-hostfxr-3.0-3.0.3-1.el8_1.rocky.x86_64.rpmYdotnet-runtime-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm]dotnet-sdk-3.0-3.0.103-1.el8_1.rocky.x86_64.rpm_dotnet-targeting-pack-3.0-3.0.3-1.el8_1.rocky.x86_64.rpmadotnet-templates-3.0-3.0.103-1.el8_1.rocky.x86_64.rpmnaspnetcore-runtime-3.0-3.0.3-1.el8_1.rocky.x86_64.rpmpaspnetcore-targeting-pack-3.0-3.0.3-1.el8_1.rocky.x86_64.rpmSdotnet-apphost-pack-3.0-3.0.3-1.el8_1.rocky.x86_64.rpmVdotnet-hostfxr-3.0-3.0.3-1.el8_1.rocky.x86_64.rpmYdotnet-runtime-3.0-3.0.3-1.el8_1.rocky.x86_64.rpm]dotnet-sdk-3.0-3.0.103-1.el8_1.rocky.x86_64.rpm_dotnet-targeting-pack-3.0-3.0.3-1.el8_1.rocky.x86_64.rpmadotnet-templates-3.0-3.0.103-1.el8_1.rocky.x86_64.rpmj Genhancementautogen bug fix and enhancement update3) https://bugzilla.redhat.com/show_bug.cgi?id=17875111787511https://errata.rockylinux.org/RLEA-2020:4672RLEA-2020:4672RLEA-2020:4672 tautogen-libopts-5.18.12-8.el8.1.x86_64.rpmtautogen-libopts-5.18.12-8.el8.1.x86_64.rpm` JBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbugfixlibblockdev bug fix and enhancement update\) https://bugzilla.redhat.com/show_bug.cgi?id=17780571778057https://bugzilla.redhat.com/show_bug.cgi?id=17849271784927https://bugzilla.redhat.com/show_bug.cgi?id=18328381832838https://errata.rockylinux.org/RLBA-2020:4734RLBA-2020:4734RLBA-2020:4734 ()libblockdev-2.24-11.el8.x86_64.rpm))libblockdev-crypto-2.24-11.el8.x86_64.rpm*)libblockdev-dm-2.24-11.el8.x86_64.rpm+)libblockdev-fs-2.24-11.el8.x86_64.rpm,)libblockdev-kbd-2.24-11.el8.x86_64.rpm-)libblockdev-loop-2.24-11.el8.x86_64.rpm.)libblockdev-lvm-2.24-11.el8.x86_64.rpm/)libblockdev-lvm-dbus-2.24-11.el8.x86_64.rpm0)libblockdev-mdraid-2.24-11.el8.x86_64.rpm1)libblockdev-mpath-2.24-11.el8.x86_64.rpm2)libblockdev-nvdimm-2.24-11.el8.x86_64.rpm3)libblockdev-part-2.24-11.el8.x86_64.rpm4)libblockdev-plugins-all-2.24-11.el8.x86_64.rpm5)libblockdev-swap-2.24-11.el8.x86_64.rpm6)libblockdev-utils-2.24-11.el8.x86_64.rpm7)libblockdev-vdo-2.24-11.el8.x86_64.rpmj)python3-blockdev-2.24-11.el8.x86_64.rpm()libblockdev-2.24-11.el8.x86_64.rpm))libblockdev-crypto-2.24-11.el8.x86_64.rpm*)libblockdev-dm-2.24-11.el8.x86_64.rpm+)libblockdev-fs-2.24-11.el8.x86_64.rpm,)libblockdev-kbd-2.24-11.el8.x86_64.rpm-)libblockdev-loop-2.24-11.el8.x86_64.rpm.)libblockdev-lvm-2.24-11.el8.x86_64.rpm/)libblockdev-lvm-dbus-2.24-11.el8.x86_64.rpm0)libblockdev-mdraid-2.24-11.el8.x86_64.rpm1)libblockdev-mpath-2.24-11.el8.x86_64.rpm2)libblockdev-nvdimm-2.24-11.el8.x86_64.rpm3)libblockdev-part-2.24-11.el8.x86_64.rpm4)libblockdev-plugins-all-2.24-11.el8.x86_64.rpm5)libblockdev-swap-2.24-11.el8.x86_64.rpm6)libblockdev-utils-2.24-11.el8.x86_64.rpm7)libblockdev-vdo-2.24-11.el8.x86_64.rpmj)python3-blockdev-2.24-11.el8.x86_64.rpm'u bugfixanaconda-user-help bug fix and enhancement update) https://bugzilla.redhat.com/show_bug.cgi?id=18613741861374https://errata.rockylinux.org/RLBA-2020:4842RLBA-2020:4842RLBA-2020:4842 jBanaconda-user-help-8.3.3-1.el8.rocky.3.2.noarch.rpmjBanaconda-user-help-8.3.3-1.el8.rocky.3.2.noarch.rpm4 MBBbugfixinitial-setup bug fix and enhancement update.) https://bugzilla.redhat.com/show_bug.cgi?id=18149521814952https://errata.rockylinux.org/RLBA-2021:1864RLBA-2021:1864RLBA-2021:1864 =uinitial-setup-0.3.81.7-1.el8.rocky.x86_64.rpm>uinitial-setup-gui-0.3.81.7-1.el8.rocky.x86_64.rpm=uinitial-setup-0.3.81.7-1.el8.rocky.x86_64.rpm>uinitial-setup-gui-0.3.81.7-1.el8.rocky.x86_64.rpmd= RBBBBBBbugfix.NET Core 2.1 bugfix updateWP https://errata.rockylinux.org/RLBA-2021:3240RLBA-2021:3240RLBA-2021:3240 Umdotnet-host-fxr-2.1-2.1.30-1.el8_4.rocky.x86_64.rpmXmdotnet-runtime-2.1-2.1.30-1.el8_4.rocky.x86_64.rpm[ndotnet-sdk-2.1-2.1.526-1.el8_4.rocky.x86_64.rpm\ndotnet-sdk-2.1.5xx-2.1.526-1.el8_4.rocky.x86_64.rpmUmdotnet-host-fxr-2.1-2.1.30-1.el8_4.rocky.x86_64.rpmXmdotnet-runtime-2.1-2.1.30-1.el8_4.rocky.x86_64.rpm[ndotnet-sdk-2.1-2.1.526-1.el8_4.rocky.x86_64.rpm\ndotnet-sdk-2.1.5xx-2.1.526-1.el8_4.rocky.x86_64.rpm ` )[BBBBBBBBBBBBbugfixanaconda bug fix and enhancement update' https://bugzilla.redhat.com/show_bug.cgi?id=18267601826760https://bugzilla.redhat.com/show_bug.cgi?id=18444231844423https://bugzilla.redhat.com/show_bug.cgi?id=18858791885879https://bugzilla.redhat.com/show_bug.cgi?id=18994941899494https://bugzilla.redhat.com/show_bug.cgi?id=20006502000650https://bugzilla.redhat.com/show_bug.cgi?id=20291012029101https://bugzilla.redhat.com/show_bug.cgi?id=20503562050356https://bugzilla.redhat.com/show_bug.cgi?id=20512352051235https://bugzilla.redhat.com/show_bug.cgi?id=20603762060376https://bugzilla.redhat.com/show_bug.cgi?id=20626762062676https://bugzilla.redhat.com/show_bug.cgi?id=20681952068195https://bugzilla.redhat.com/show_bug.cgi?id=20691782069178https://bugzilla.redhat.com/show_bug.cgi?id=20693052069305https://bugzilla.redhat.com/show_bug.cgi?id=20754192075419https://errata.rockylinux.org/RLBA-2022:7462RLBA-2022:7462RLBA-2022:7462 *>anaconda-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm+>anaconda-core-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm,>anaconda-dracut-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm->anaconda-gui-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm.>anaconda-install-env-deps-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm/>anaconda-tui-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm0>anaconda-widgets-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm*>anaconda-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm+>anaconda-core-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm,>anaconda-dracut-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm->anaconda-gui-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm.>anaconda-install-env-deps-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm/>anaconda-tui-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm0>anaconda-widgets-33.16.7.12-1.el8.rocky.0.1.x86_64.rpm10 ,jbugfixscap-security-guide bug fix and enhancement update& https://bugzilla.redhat.com/show_bug.cgi?id=20324032032403https://bugzilla.redhat.com/show_bug.cgi?id=20582032058203https://bugzilla.redhat.com/show_bug.cgi?id=20646962064696https://bugzilla.redhat.com/show_bug.cgi?id=20705642070564https://bugzilla.redhat.com/show_bug.cgi?id=20775312077531https://bugzilla.redhat.com/show_bug.cgi?id=20789742078974https://bugzilla.redhat.com/show_bug.cgi?id=20792412079241https://bugzilla.redhat.com/show_bug.cgi?id=20831092083109https://bugzilla.redhat.com/show_bug.cgi?id=21096022109602https://bugzilla.redhat.com/show_bug.cgi?id=21129372112937https://bugzilla.redhat.com/show_bug.cgi?id=21171922117192https://errata.rockylinux.org/RLBA-2022:7563RLBA-2022:7563RLBA-2022:7563 A<scap-security-guide-0.1.63-4.el8.rocky.0.1.noarch.rpmB<scap-security-guide-doc-0.1.63-4.el8.rocky.0.1.noarch.rpmA<scap-security-guide-0.1.63-4.el8.rocky.0.1.noarch.rpmB<scap-security-guide-doc-0.1.63-4.el8.rocky.0.1.noarch.rpmW9 -eBBBbugfixpacemaker bug fix and enhancement update% https://bugzilla.redhat.com/show_bug.cgi?id=13841721384172https://bugzilla.redhat.com/show_bug.cgi?id=17243101724310https://bugzilla.redhat.com/show_bug.cgi?id=18724831872483https://bugzilla.redhat.com/show_bug.cgi?id=19305781930578https://bugzilla.redhat.com/show_bug.cgi?id=20368152036815https://bugzilla.redhat.com/show_bug.cgi?id=20450962045096https://bugzilla.redhat.com/show_bug.cgi?id=20497222049722https://bugzilla.redhat.com/show_bug.cgi?id=20559352055935https://bugzilla.redhat.com/show_bug.cgi?id=20596382059638https://bugzilla.redhat.com/show_bug.cgi?id=20658122065812https://bugzilla.redhat.com/show_bug.cgi?id=20658182065818https://bugzilla.redhat.com/show_bug.cgi?id=20721072072107https://bugzilla.redhat.com/show_bug.cgi?id=20862302086230https://bugzilla.redhat.com/show_bug.cgi?id=20948552094855https://bugzilla.redhat.com/show_bug.cgi?id=21183372118337https://errata.rockylinux.org/RLBA-2022:7573RLBA-2022:7573RLBA-2022:7573 pacemaker-cluster-libs-2.1.4-5.el8_7.2.x86_64.rpmpacemaker-libs-2.1.4-5.el8_7.2.x86_64.rpm0pacemaker-schemas-2.1.4-5.el8_7.2.noarch.rpmpacemaker-cluster-libs-2.1.4-5.el8_7.2.x86_64.rpmpacemaker-libs-2.1.4-5.el8_7.2.x86_64.rpm0pacemaker-schemas-2.1.4-5.el8_7.2.noarch.rpmY< 0nbugfixWALinuxAgent bug fix and enhancement update$ https://bugzilla.redhat.com/show_bug.cgi?id=20808262080826https://errata.rockylinux.org/RLBA-2022:7576RLBA-2022:7576RLBA-2022:7576 &vWALinuxAgent-2.7.0.6-6.el8.rocky.0.1.noarch.rpm'vWALinuxAgent-udev-2.7.0.6-6.el8.rocky.0.1.noarch.rpm&vWALinuxAgent-2.7.0.6-6.el8.rocky.0.1.noarch.rpm'vWALinuxAgent-udev-2.7.0.6-6.el8.rocky.0.1.noarch.rpmZD 21bugfixlorax-templates-Rocky Linux bug fix and enhancement update# https://bugzilla.redhat.com/show_bug.cgi?id=20521542052154https://errata.rockylinux.org/RLBA-2022:7588RLBA-2022:7588RLBA-2022:7588 i`lorax-templates-rhel-8.7-1.el8.rocky.0.1.noarch.rpmi`lorax-templates-rhel-8.7-1.el8.rocky.0.1.noarch.rpm`c ?sBBBBBBBBBBbugfixopenscap bug fix and enhancement update" https://bugzilla.redhat.com/show_bug.cgi?id=21110402111040https://bugzilla.redhat.com/show_bug.cgi?id=21113602111360https://errata.rockylinux.org/RLBA-2022:7635RLBA-2022:7635RLBA-2022:7635 m openscap-1.3.6-4.el8.rocky.0.2.x86_64.rpmn openscap-devel-1.3.6-4.el8.rocky.0.2.x86_64.rpmo openscap-engine-sce-1.3.6-4.el8.rocky.0.2.x86_64.rpmp openscap-python3-1.3.6-4.el8.rocky.0.2.x86_64.rpmq openscap-scanner-1.3.6-4.el8.rocky.0.2.x86_64.rpmr openscap-utils-1.3.6-4.el8.rocky.0.2.x86_64.rpmm openscap-1.3.6-4.el8.rocky.0.2.x86_64.rpmn openscap-devel-1.3.6-4.el8.rocky.0.2.x86_64.rpmo openscap-engine-sce-1.3.6-4.el8.rocky.0.2.x86_64.rpmp openscap-python3-1.3.6-4.el8.rocky.0.2.x86_64.rpmq openscap-scanner-1.3.6-4.el8.rocky.0.2.x86_64.rpmr openscap-utils-1.3.6-4.el8.rocky.0.2.x86_64.rpmp @BBBBBBbugfixosbuild-composer bug fix and enhancement update!8 https://bugzilla.redhat.com/show_bug.cgi?id=21365322136532* osbuild-composer can't access /var/cache/osbuild-composer/rpmmd on package upgrade from 8.6https://errata.rockylinux.org/RLBA-2022:7831RLBA-2022:7831RLBA-2022:7831 uosbuild-composer-62-3.el8_7.rocky.0.1.x86_64.rpmvosbuild-composer-core-62-3.el8_7.rocky.0.1.x86_64.rpmsosbuild-composer-dnf-json-62-3.el8_7.rocky.0.1.x86_64.rpmwosbuild-composer-worker-62-3.el8_7.rocky.0.1.x86_64.rpmuosbuild-composer-62-3.el8_7.rocky.0.1.x86_64.rpmvosbuild-composer-core-62-3.el8_7.rocky.0.1.x86_64.rpmsosbuild-composer-dnf-json-62-3.el8_7.rocky.0.1.x86_64.rpmwosbuild-composer-worker-62-3.el8_7.rocky.0.1.x86_64.rpmC IsecurityImportant: thunderbird security updateY%https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430CVE-2023-0430CVE-2023-0430https://bugzilla.redhat.com/show_bug.cgi?id=21665912166591https://errata.rockylinux.org/RLSA-2023:0606RLSA-2023:0606RLSA-2023:0606 htthunderbird-102.7.1-2.el8_7.x86_64.rpmhtthunderbird-102.7.1-2.el8_7.x86_64.rpmD LBBBBBBBBBBBBBBBBBBsecurityImportant: git security update~Zhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521CVE-2022-23521CVE-2022-23521https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41903CVE-2022-41903CVE-2022-41903https://bugzilla.redhat.com/show_bug.cgi?id=21620552162055https://bugzilla.redhat.com/show_bug.cgi?id=21620562162056https://errata.rockylinux.org/RLSA-2023:0610RLSA-2023:0610RLSA-2023:0610 !zgit-2.31.1-3.el8_7.x86_64.rpmzgit-all-2.31.1-3.el8_7.noarch.rpm"zgit-core-2.31.1-3.el8_7.x86_64.rpm zgit-core-doc-2.31.1-3.el8_7.noarch.rpm#zgit-credential-libsecret-2.31.1-3.el8_7.x86_64.rpm$zgit-daemon-2.31.1-3.el8_7.x86_64.rpm zgit-email-2.31.1-3.el8_7.noarch.rpm zgit-gui-2.31.1-3.el8_7.noarch.rpm zgit-instaweb-2.31.1-3.el8_7.noarch.rpmzgitk-2.31.1-3.el8_7.noarch.rpm%zgit-subtree-2.31.1-3.el8_7.x86_64.rpmzgit-svn-2.31.1-3.el8_7.noarch.rpmzgitweb-2.31.1-3.el8_7.noarch.rpm6zperl-Git-2.31.1-3.el8_7.noarch.rpm7zperl-Git-SVN-2.31.1-3.el8_7.noarch.rpm!zgit-2.31.1-3.el8_7.x86_64.rpmzgit-all-2.31.1-3.el8_7.noarch.rpm"zgit-core-2.31.1-3.el8_7.x86_64.rpm zgit-core-doc-2.31.1-3.el8_7.noarch.rpm#zgit-credential-libsecret-2.31.1-3.el8_7.x86_64.rpm$zgit-daemon-2.31.1-3.el8_7.x86_64.rpm zgit-email-2.31.1-3.el8_7.noarch.rpm zgit-gui-2.31.1-3.el8_7.noarch.rpm zgit-instaweb-2.31.1-3.el8_7.noarch.rpmzgitk-2.31.1-3.el8_7.noarch.rpm%zgit-subtree-2.31.1-3.el8_7.x86_64.rpmzgit-svn-2.31.1-3.el8_7.noarch.rpmzgitweb-2.31.1-3.el8_7.noarch.rpm6zperl-Git-2.31.1-3.el8_7.noarch.rpm7zperl-Git-SVN-2.31.1-3.el8_7.noarch.rpmE ,aBBBBBBBBBsecurityImportant: tigervnc security updateX_https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0494CVE-2023-0494CVE-2023-0494https://bugzilla.redhat.com/show_bug.cgi?id=21659952165995https://errata.rockylinux.org/RLSA-2023:0662RLSA-2023:0662RLSA-2023:0662 stigervnc-1.12.0-9.el8_7.1.x86_64.rpmtigervnc-icons-1.12.0-9.el8_7.1.noarch.rpmtigervnc-license-1.12.0-9.el8_7.1.noarch.rpm tigervnc-selinux-1.12.0-9.el8_7.1.noarch.rpmttigervnc-server-1.12.0-9.el8_7.1.x86_64.rpmutigervnc-server-minimal-1.12.0-9.el8_7.1.x86_64.rpmvtigervnc-server-module-1.12.0-9.el8_7.1.x86_64.rpmstigervnc-1.12.0-9.el8_7.1.x86_64.rpmtigervnc-icons-1.12.0-9.el8_7.1.noarch.rpmtigervnc-license-1.12.0-9.el8_7.1.noarch.rpm tigervnc-selinux-1.12.0-9.el8_7.1.noarch.rpmttigervnc-server-1.12.0-9.el8_7.1.x86_64.rpmutigervnc-server-minimal-1.12.0-9.el8_7.1.x86_64.rpmvtigervnc-server-module-1.12.0-9.el8_7.1.x86_64.rpm|9 mBBBBBBBBBBBBBBBBBBBBbugfix.NET 7.0 bugfix update7 https://errata.rockylinux.org/RLBA-2023:0783RLBA-2023:0783RLBA-2023:0783 SFaspnetcore-runtime-7.0-7.0.3-1.el8_7.x86_64.rpmTFaspnetcore-targeting-pack-7.0-7.0.3-1.el8_7.x86_64.rpm dotnet-7.0.103-1.el8_7.x86_64.rpmUFdotnet-apphost-pack-7.0-7.0.3-1.el8_7.x86_64.rpmFdotnet-host-7.0.3-1.el8_7.x86_64.rpmVFdotnet-hostfxr-7.0-7.0.3-1.el8_7.x86_64.rpmWFdotnet-runtime-7.0-7.0.3-1.el8_7.x86_64.rpmX dotnet-sdk-7.0-7.0.103-1.el8_7.x86_64.rpmYFdotnet-targeting-pack-7.0-7.0.3-1.el8_7.x86_64.rpmZ dotnet-templates-7.0-7.0.103-1.el8_7.x86_64.rpm netstandard-targeting-pack-2.1-7.0.103-1.el8_7.x86_64.rpm SFaspnetcore-runtime-7.0-7.0.3-1.el8_7.x86_64.rpmTFaspnetcore-targeting-pack-7.0-7.0.3-1.el8_7.x86_64.rpm dotnet-7.0.103-1.el8_7.x86_64.rpmUFdotnet-apphost-pack-7.0-7.0.3-1.el8_7.x86_64.rpmFdotnet-host-7.0.3-1.el8_7.x86_64.rpmVFdotnet-hostfxr-7.0-7.0.3-1.el8_7.x86_64.rpmWFdotnet-runtime-7.0-7.0.3-1.el8_7.x86_64.rpmX dotnet-sdk-7.0-7.0.103-1.el8_7.x86_64.rpmYFdotnet-targeting-pack-7.0-7.0.3-1.el8_7.x86_64.rpmZ dotnet-templates-7.0-7.0.103-1.el8_7.x86_64.rpm netstandard-targeting-pack-2.1-7.0.103-1.el8_7.x86_64.rpm|: DBBBBBBBBBBBBBBbugfix.NET 6.0 bugfix update6w https://errata.rockylinux.org/RLBA-2023:0784RLBA-2023:0784RLBA-2023:0784 Z"aspnetcore-runtime-6.0-6.0.14-1.el8_7.x86_64.rpm["aspnetcore-targeting-pack-6.0-6.0.14-1.el8_7.x86_64.rpm\"dotnet-apphost-pack-6.0-6.0.14-1.el8_7.x86_64.rpm]"dotnet-hostfxr-6.0-6.0.14-1.el8_7.x86_64.rpm^"dotnet-runtime-6.0-6.0.14-1.el8_7.x86_64.rpm_Kdotnet-sdk-6.0-6.0.114-1.el8_7.x86_64.rpm`"dotnet-targeting-pack-6.0-6.0.14-1.el8_7.x86_64.rpmaKdotnet-templates-6.0-6.0.114-1.el8_7.x86_64.rpmZ"aspnetcore-runtime-6.0-6.0.14-1.el8_7.x86_64.rpm["aspnetcore-targeting-pack-6.0-6.0.14-1.el8_7.x86_64.rpm\"dotnet-apphost-pack-6.0-6.0.14-1.el8_7.x86_64.rpm]"dotnet-hostfxr-6.0-6.0.14-1.el8_7.x86_64.rpm^"dotnet-runtime-6.0-6.0.14-1.el8_7.x86_64.rpm_Kdotnet-sdk-6.0-6.0.114-1.el8_7.x86_64.rpm`"dotnet-targeting-pack-6.0-6.0.14-1.el8_7.x86_64.rpmaKdotnet-templates-6.0-6.0.114-1.el8_7.x86_64.rpm|H UBBBBBBsecurityModerate: python3 security update-1https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10735CVE-2020-10735CVE-2020-10735https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28861CVE-2021-28861CVE-2021-28861https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45061CVE-2022-45061CVE-2022-45061https://bugzilla.redhat.com/show_bug.cgi?id=18344231834423https://bugzilla.redhat.com/show_bug.cgi?id=21206422120642https://bugzilla.redhat.com/show_bug.cgi?id=21440722144072https://errata.rockylinux.org/RLSA-2023:0833RLSA-2023:0833RLSA-2023:0833 ~platform-python-debug-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm~platform-python-devel-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm ~python3-idle-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm ~python3-tkinter-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm~platform-python-debug-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm~platform-python-devel-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm ~python3-idle-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm ~python3-tkinter-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm < ^bugfixOpenSSH bug fix and enhancement update^3 https://bugzilla.redhat.com/show_bug.cgi?id=21627322162732* backport Incorrect parsing of IPv6 IPs in sftp client [RHEL 8]https://errata.rockylinux.org/RLBA-2023:0836RLBA-2023:0836RLBA-2023:0836 t#openssh-askpass-8.0p1-17.el8_7.x86_64.rpmt#openssh-askpass-8.0p1-17.el8_7.x86_64.rpm I #asecurityImportant: samba security updatehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38023CVE-2022-38023CVE-2022-38023https://bugzilla.redhat.com/show_bug.cgi?id=21543622154362https://errata.rockylinux.org/RLSA-2023:0838RLSA-2023:0838RLSA-2023:0838 (dsamba-vfs-iouring-4.16.4-4.el8_7.x86_64.rpm(dsamba-vfs-iouring-4.16.4-4.el8_7.x86_64.rpm F &dsecurityImportant: firefox security update%Xhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767CVE-2023-0767CVE-2023-0767https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728CVE-2023-25728CVE-2023-25728https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729CVE-2023-25729CVE-2023-25729https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730CVE-2023-25730CVE-2023-25730https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732CVE-2023-25732CVE-2023-25732https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735CVE-2023-25735CVE-2023-25735https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737CVE-2023-25737CVE-2023-25737https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739CVE-2023-25739CVE-2023-25739https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742CVE-2023-25742CVE-2023-25742https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25743CVE-2023-25743CVE-2023-25743https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744CVE-2023-25744CVE-2023-25744https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746CVE-2023-25746CVE-2023-25746https://bugzilla.redhat.com/show_bug.cgi?id=21703742170374https://bugzilla.redhat.com/show_bug.cgi?id=21703752170375https://bugzilla.redhat.com/show_bug.cgi?id=21703762170376https://bugzilla.redhat.com/show_bug.cgi?id=21703772170377https://bugzilla.redhat.com/show_bug.cgi?id=21703782170378https://bugzilla.redhat.com/show_bug.cgi?id=21703792170379https://bugzilla.redhat.com/show_bug.cgi?id=21703812170381https://bugzilla.redhat.com/show_bug.cgi?id=21703822170382https://bugzilla.redhat.com/show_bug.cgi?id=21703832170383https://bugzilla.redhat.com/show_bug.cgi?id=21703902170390https://bugzilla.redhat.com/show_bug.cgi?id=21703912170391https://bugzilla.redhat.com/show_bug.cgi?id=21704022170402https://errata.rockylinux.org/RLSA-2023:0808RLSA-2023:0808RLSA-2023:0808 rIfirefox-102.8.0-2.el8_7.x86_64.rpmrIfirefox-102.8.0-2.el8_7.x86_64.rpm G )gsecurityImportant: thunderbird security update}https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616CVE-2023-0616CVE-2023-0616https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767CVE-2023-0767CVE-2023-0767https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728CVE-2023-25728CVE-2023-25728https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729CVE-2023-25729CVE-2023-25729https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730CVE-2023-25730CVE-2023-25730https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732CVE-2023-25732CVE-2023-25732https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735CVE-2023-25735CVE-2023-25735https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737CVE-2023-25737CVE-2023-25737https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739CVE-2023-25739CVE-2023-25739https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742CVE-2023-25742CVE-2023-25742https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25743CVE-2023-25743CVE-2023-25743https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744CVE-2023-25744CVE-2023-25744https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746CVE-2023-25746CVE-2023-25746https://bugzilla.redhat.com/show_bug.cgi?id=21703742170374https://bugzilla.redhat.com/show_bug.cgi?id=21703752170375https://bugzilla.redhat.com/show_bug.cgi?id=21703762170376https://bugzilla.redhat.com/show_bug.cgi?id=21703772170377https://bugzilla.redhat.com/show_bug.cgi?id=21703782170378https://bugzilla.redhat.com/show_bug.cgi?id=21703792170379https://bugzilla.redhat.com/show_bug.cgi?id=21703812170381https://bugzilla.redhat.com/show_bug.cgi?id=21703822170382https://bugzilla.redhat.com/show_bug.cgi?id=21703832170383https://bugzilla.redhat.com/show_bug.cgi?id=21703902170390https://bugzilla.redhat.com/show_bug.cgi?id=21703912170391https://bugzilla.redhat.com/show_bug.cgi?id=21704022170402https://bugzilla.redhat.com/show_bug.cgi?id=21713972171397https://errata.rockylinux.org/RLSA-2023:0821RLSA-2023:0821RLSA-2023:0821 hIthunderbird-102.8.0-2.el8_7.x86_64.rpmhIthunderbird-102.8.0-2.el8_7.x86_64.rpm ; ,jbugfixscap-security-guide bug fix and enhancement updateK https://bugzilla.redhat.com/show_bug.cgi?id=21680502168050* [SCAP] PCI-DSS Rsyslog log files related rules fails for Rsyslog 8 RainerScript syntaxhttps://bugzilla.redhat.com/show_bug.cgi?id=21680542168054* DISA STIG: SCAP kerberos related findings after realm joinhttps://bugzilla.redhat.com/show_bug.cgi?id=21680572168057* file_permissions_sshd_private_key is not aligned with DISA STIG benchmarkhttps://bugzilla.redhat.com/show_bug.cgi?id=21680602168060* audit_rules_usergroup_modification_shadow don't remediate existing audit rulehttps://bugzilla.redhat.com/show_bug.cgi?id=21680632168063* Rules concerning audit check for content of specific files, and not /etc/audit/audit.rules ( ex xccdf_org.ssgproject.content_rule_audit_immutable_login_uids)https://bugzilla.redhat.com/show_bug.cgi?id=21680662168066* The stig rule xccdf_org.ssgproject.content_rule_sudo_require_reauthentication fails due to space in in the "timestamp_timeout" valuehttps://bugzilla.redhat.com/show_bug.cgi?id=21680692168069* Some rules have proper STIG references but they are not part of STIG profilehttps://bugzilla.redhat.com/show_bug.cgi?id=21680722168072* Two CIS Level 2 Benchmarks are listed in scap-security-guide under CIS Level 1 Profilehttps://bugzilla.redhat.com/show_bug.cgi?id=21680752168075* Update RHEL8 DISA STIG profile to V1R9https://bugzilla.redhat.com/show_bug.cgi?id=21680792168079* Rebase SSG to the latest upstream version in RHEL 8.8https://errata.rockylinux.org/RLBA-2023:0829RLBA-2023:0829RLBA-2023:0829 A=scap-security-guide-0.1.66-2.el8_7.rocky.0.1.noarch.rpmB=scap-security-guide-doc-0.1.66-2.el8_7.rocky.0.1.noarch.rpmA=scap-security-guide-0.1.66-2.el8_7.rocky.0.1.noarch.rpmB=scap-security-guide-doc-0.1.66-2.el8_7.rocky.0.1.noarch.rpm = mBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbugfixfence-agents bug fix and enhancement updateL. https://errata.rockylinux.org/RLBA-2023:0843RLBA-2023:0843RLBA-2023:0843 )|"fence-agents-all-4.2.1-103.el8_7.1.x86_64.rpm"fence-agents-amt-ws-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-apc-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-apc-snmp-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-bladecenter-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-brocade-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-cisco-mds-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-cisco-ucs-4.2.1-103.el8_7.1.noarch.rpm "fence-agents-common-4.2.1-103.el8_7.1.noarch.rpm "fence-agents-compute-4.2.1-103.el8_7.1.noarch.rpm "fence-agents-drac5-4.2.1-103.el8_7.1.noarch.rpm "fence-agents-eaton-snmp-4.2.1-103.el8_7.1.noarch.rpm "fence-agents-emerson-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-eps-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-heuristics-ping-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-hpblade-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-ibmblade-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-ibm-powervs-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-ibm-vpc-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-ifmib-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-ilo2-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-ilo-moonshot-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-ilo-mp-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-ilo-ssh-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-intelmodular-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-ipdu-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-ipmilan-4.2.1-103.el8_7.1.noarch.rpm}"fence-agents-kdump-4.2.1-103.el8_7.1.x86_64.rpm~"fence-agents-kubevirt-4.2.1-103.el8_7.1.x86_64.rpm"fence-agents-lpar-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-mpath-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-redfish-4.2.1-103.el8_7.1.x86_64.rpm"fence-agents-rhevm-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-rsa-4.2.1-103.el8_7.1.noarch.rpm "fence-agents-rsb-4.2.1-103.el8_7.1.noarch.rpm!"fence-agents-sbd-4.2.1-103.el8_7.1.noarch.rpm""fence-agents-scsi-4.2.1-103.el8_7.1.noarch.rpm#"fence-agents-virsh-4.2.1-103.el8_7.1.noarch.rpm$"fence-agents-vmware-rest-4.2.1-103.el8_7.1.noarch.rpm%"fence-agents-vmware-soap-4.2.1-103.el8_7.1.noarch.rpm&"fence-agents-wti-4.2.1-103.el8_7.1.noarch.rpm)|"fence-agents-all-4.2.1-103.el8_7.1.x86_64.rpm"fence-agents-amt-ws-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-apc-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-apc-snmp-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-bladecenter-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-brocade-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-cisco-mds-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-cisco-ucs-4.2.1-103.el8_7.1.noarch.rpm "fence-agents-common-4.2.1-103.el8_7.1.noarch.rpm "fence-agents-compute-4.2.1-103.el8_7.1.noarch.rpm "fence-agents-drac5-4.2.1-103.el8_7.1.noarch.rpm "fence-agents-eaton-snmp-4.2.1-103.el8_7.1.noarch.rpm "fence-agents-emerson-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-eps-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-heuristics-ping-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-hpblade-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-ibmblade-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-ibm-powervs-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-ibm-vpc-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-ifmib-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-ilo2-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-ilo-moonshot-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-ilo-mp-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-ilo-ssh-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-intelmodular-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-ipdu-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-ipmilan-4.2.1-103.el8_7.1.noarch.rpm}"fence-agents-kdump-4.2.1-103.el8_7.1.x86_64.rpm~"fence-agents-kubevirt-4.2.1-103.el8_7.1.x86_64.rpm"fence-agents-lpar-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-mpath-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-redfish-4.2.1-103.el8_7.1.x86_64.rpm"fence-agents-rhevm-4.2.1-103.el8_7.1.noarch.rpm"fence-agents-rsa-4.2.1-103.el8_7.1.noarch.rpm "fence-agents-rsb-4.2.1-103.el8_7.1.noarch.rpm!"fence-agents-sbd-4.2.1-103.el8_7.1.noarch.rpm""fence-agents-scsi-4.2.1-103.el8_7.1.noarch.rpm#"fence-agents-virsh-4.2.1-103.el8_7.1.noarch.rpm$"fence-agents-vmware-rest-4.2.1-103.el8_7.1.noarch.rpm%"fence-agents-vmware-soap-4.2.1-103.el8_7.1.noarch.rpm&"fence-agents-wti-4.2.1-103.el8_7.1.noarch.rpm n [BBenhancementrpm-ostree bug fix and enhancement updatez https://bugzilla.redhat.com/show_bug.cgi?id=21379052137905* backport support for embedded container whiteoutshttps://errata.rockylinux.org/RLEA-2023:0844RLEA-2023:0844RLEA-2023:0844 Rrpm-ostree-2022.10.90.g4abaf4b4-5.el8_7.x86_64.rpmSrpm-ostree-libs-2022.10.90.g4abaf4b4-5.el8_7.x86_64.rpmRrpm-ostree-2022.10.90.g4abaf4b4-5.el8_7.x86_64.rpmSrpm-ostree-libs-2022.10.90.g4abaf4b4-5.el8_7.x86_64.rpm o "`enhancementnew package: synce4l # https://errata.rockylinux.org/RLEA-2023:0847RLEA-2023:0847RLEA-2023:0847 "synce4l-0-3.20221122git9564b5.el8_7.1.x86_64.rpm"synce4l-0-3.20221122git9564b5.el8_7.1.x86_64.rpm > $#bugfixcloud-init bug fix and enhancement update0Q https://errata.rockylinux.org/RLBA-2023:0846RLBA-2023:0846RLBA-2023:0846 cloud-init-22.1-6.el8_7.2.0.1.noarch.rpmcloud-init-22.1-6.el8_7.2.0.1.noarch.rpm ? 1eBBBBBBBBBBbugfixopenscap bug fix and enhancement updateC https://bugzilla.redhat.com/show_bug.cgi?id=21655772165577* xmlfilecontent probe produces invalid OVAL resultshttps://errata.rockylinux.org/RLBA-2023:0850RLBA-2023:0850RLBA-2023:0850 n openscap-devel-1.3.6-5.el8_7.rocky.0.2.x86_64.rpmm openscap-1.3.6-5.el8_7.rocky.0.2.x86_64.rpmo openscap-engine-sce-1.3.6-5.el8_7.rocky.0.2.x86_64.rpmp openscap-python3-1.3.6-5.el8_7.rocky.0.2.x86_64.rpmq openscap-scanner-1.3.6-5.el8_7.rocky.0.2.x86_64.rpmr openscap-utils-1.3.6-5.el8_7.rocky.0.2.x86_64.rpmn openscap-devel-1.3.6-5.el8_7.rocky.0.2.x86_64.rpmm openscap-1.3.6-5.el8_7.rocky.0.2.x86_64.rpmo openscap-engine-sce-1.3.6-5.el8_7.rocky.0.2.x86_64.rpmp openscap-python3-1.3.6-5.el8_7.rocky.0.2.x86_64.rpmq openscap-scanner-1.3.6-5.el8_7.rocky.0.2.x86_64.rpmr openscap-utils-1.3.6-5.el8_7.rocky.0.2.x86_64.rpm J :rBBBBBBsecurityImportant: webkit2gtk3 security updateD https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23529CVE-2023-23529CVE-2023-23529https://bugzilla.redhat.com/show_bug.cgi?id=21699342169934https://errata.rockylinux.org/RLSA-2023:0902RLSA-2023:0902RLSA-2023:0902 yawebkit2gtk3-2.36.7-1.el8_7.2.x86_64.rpmzawebkit2gtk3-devel-2.36.7-1.el8_7.2.x86_64.rpm{awebkit2gtk3-jsc-2.36.7-1.el8_7.2.x86_64.rpm|awebkit2gtk3-jsc-devel-2.36.7-1.el8_7.2.x86_64.rpmyawebkit2gtk3-2.36.7-1.el8_7.2.x86_64.rpmzawebkit2gtk3-devel-2.36.7-1.el8_7.2.x86_64.rpm{awebkit2gtk3-jsc-2.36.7-1.el8_7.2.x86_64.rpm|awebkit2gtk3-jsc-devel-2.36.7-1.el8_7.2.x86_64.rpmg@ {BBBBBBBBBBBBBBBBBBBBbugfix.NET 7.0 bugfix updated  https://errata.rockylinux.org/RLBA-2023:1245RLBA-2023:1245RLBA-2023:1245 SGaspnetcore-runtime-7.0-7.0.4-1.el8_7.x86_64.rpmTGaspnetcore-targeting-pack-7.0-7.0.4-1.el8_7.x86_64.rpmdotnet-7.0.104-1.el8_7.x86_64.rpmUGdotnet-apphost-pack-7.0-7.0.4-1.el8_7.x86_64.rpmGdotnet-host-7.0.4-1.el8_7.x86_64.rpmVGdotnet-hostfxr-7.0-7.0.4-1.el8_7.x86_64.rpmWGdotnet-runtime-7.0-7.0.4-1.el8_7.x86_64.rpmXdotnet-sdk-7.0-7.0.104-1.el8_7.x86_64.rpmYGdotnet-targeting-pack-7.0-7.0.4-1.el8_7.x86_64.rpmZdotnet-templates-7.0-7.0.104-1.el8_7.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.104-1.el8_7.x86_64.rpm SGaspnetcore-runtime-7.0-7.0.4-1.el8_7.x86_64.rpmTGaspnetcore-targeting-pack-7.0-7.0.4-1.el8_7.x86_64.rpmdotnet-7.0.104-1.el8_7.x86_64.rpmUGdotnet-apphost-pack-7.0-7.0.4-1.el8_7.x86_64.rpmGdotnet-host-7.0.4-1.el8_7.x86_64.rpmVGdotnet-hostfxr-7.0-7.0.4-1.el8_7.x86_64.rpmWGdotnet-runtime-7.0-7.0.4-1.el8_7.x86_64.rpmXdotnet-sdk-7.0-7.0.104-1.el8_7.x86_64.rpmYGdotnet-targeting-pack-7.0-7.0.4-1.el8_7.x86_64.rpmZdotnet-templates-7.0-7.0.104-1.el8_7.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.104-1.el8_7.x86_64.rpmGK &RBBBBBBBBBBBBBBBBBBsecurityImportant: nss security updaten)https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767CVE-2023-0767CVE-2023-0767https://bugzilla.redhat.com/show_bug.cgi?id=21703772170377https://errata.rockylinux.org/RLSA-2023:1252RLSA-2023:1252RLSA-2023:1252 Y$nss-3.79.0-11.el8_7.x86_64.rpmZ$nss-devel-3.79.0-11.el8_7.x86_64.rpm[$nss-softokn-3.79.0-11.el8_7.x86_64.rpm\$nss-softokn-devel-3.79.0-11.el8_7.x86_64.rpm]$nss-softokn-freebl-3.79.0-11.el8_7.x86_64.rpm^$nss-softokn-freebl-devel-3.79.0-11.el8_7.x86_64.rpm_$nss-sysinit-3.79.0-11.el8_7.x86_64.rpm`$nss-tools-3.79.0-11.el8_7.x86_64.rpma$nss-util-3.79.0-11.el8_7.x86_64.rpmb$nss-util-devel-3.79.0-11.el8_7.x86_64.rpm Y$nss-3.79.0-11.el8_7.x86_64.rpmZ$nss-devel-3.79.0-11.el8_7.x86_64.rpm[$nss-softokn-3.79.0-11.el8_7.x86_64.rpm\$nss-softokn-devel-3.79.0-11.el8_7.x86_64.rpm]$nss-softokn-freebl-3.79.0-11.el8_7.x86_64.rpm^$nss-softokn-freebl-devel-3.79.0-11.el8_7.x86_64.rpm_$nss-sysinit-3.79.0-11.el8_7.x86_64.rpm`$nss-tools-3.79.0-11.el8_7.x86_64.rpma$nss-util-3.79.0-11.el8_7.x86_64.rpmb$nss-util-devel-3.79.0-11.el8_7.x86_64.rpmGL )gsecurityImportant: firefox security update) https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25751CVE-2023-25751CVE-2023-25751https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25752CVE-2023-25752CVE-2023-25752https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28162CVE-2023-28162CVE-2023-28162https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28164CVE-2023-28164CVE-2023-28164https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28176CVE-2023-28176CVE-2023-28176https://bugzilla.redhat.com/show_bug.cgi?id=21784582178458https://bugzilla.redhat.com/show_bug.cgi?id=21784602178460https://bugzilla.redhat.com/show_bug.cgi?id=21784662178466https://bugzilla.redhat.com/show_bug.cgi?id=21784702178470https://bugzilla.redhat.com/show_bug.cgi?id=21784722178472https://errata.rockylinux.org/RLSA-2023:1336RLSA-2023:1336RLSA-2023:1336 rvfirefox-102.9.0-3.el8_7.x86_64.rpmrvfirefox-102.9.0-3.el8_7.x86_64.rpm^M ,jsecurityImportant: thunderbird security update@x https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25751CVE-2023-25751CVE-2023-25751https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25752CVE-2023-25752CVE-2023-25752https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28162CVE-2023-28162CVE-2023-28162https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28164CVE-2023-28164CVE-2023-28164https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28176CVE-2023-28176CVE-2023-28176https://bugzilla.redhat.com/show_bug.cgi?id=21784582178458https://bugzilla.redhat.com/show_bug.cgi?id=21784602178460https://bugzilla.redhat.com/show_bug.cgi?id=21784662178466https://bugzilla.redhat.com/show_bug.cgi?id=21784702178470https://bugzilla.redhat.com/show_bug.cgi?id=21784722178472https://errata.rockylinux.org/RLSA-2023:1403RLSA-2023:1403RLSA-2023:1403 huthunderbird-102.9.0-1.el8_7.x86_64.rpmhuthunderbird-102.9.0-1.el8_7.x86_64.rpm^A /mbugfixsamba bug fix and enhancement update8q https://bugzilla.redhat.com/show_bug.cgi?id=21703942170394* Samba shares not accessible from MacOS Ventura after upgrade to Samba 4.16.4-2.el8https://bugzilla.redhat.com/show_bug.cgi?id=21704672170467* ctdb should have dependency for package samba-winbind-clientshttps://bugzilla.redhat.com/show_bug.cgi?id=21704682170468* Samba with Winbind can not retrieve user groups from Active Directoryhttps://bugzilla.redhat.com/show_bug.cgi?id=21704692170469* samba-tool reports an uncaught exceptionhttps://bugzilla.redhat.com/show_bug.cgi?id=21739752173975* Ship new samba subpackageshttps://errata.rockylinux.org/RLBA-2023:1567RLBA-2023:1567RLBA-2023:1567 (esamba-vfs-iouring-4.16.4-6.el8_7.x86_64.rpm(esamba-vfs-iouring-4.16.4-6.el8_7.x86_64.rpm8N 8pBBBBBBsecurityModerate: gnutls security and bug fix update)Khttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0361CVE-2023-0361CVE-2023-0361https://bugzilla.redhat.com/show_bug.cgi?id=21311522131152* trap invalid opcode ip:7feef81809fe sp:7fee997419c0 error:0 in libgnutls.so.30.28.2[7feef8040000+1dd000]https://bugzilla.redhat.com/show_bug.cgi?id=21625962162596https://errata.rockylinux.org/RLSA-2023:1569RLSA-2023:1569RLSA-2023:1569 &{gnutls-c++-3.6.16-6.el8_7.x86_64.rpm'{gnutls-dane-3.6.16-6.el8_7.x86_64.rpm({gnutls-devel-3.6.16-6.el8_7.x86_64.rpm){gnutls-utils-3.6.16-6.el8_7.x86_64.rpm&{gnutls-c++-3.6.16-6.el8_7.x86_64.rpm'{gnutls-dane-3.6.16-6.el8_7.x86_64.rpm({gnutls-devel-3.6.16-6.el8_7.x86_64.rpm){gnutls-utils-3.6.16-6.el8_7.x86_64.rpm8B ;ybugfixNetworkManager bug fix and enhancement updatet) https://bugzilla.redhat.com/show_bug.cgi?id=21743622174362* NetworkManager hostname lookup fails with IPv6https://errata.rockylinux.org/RLBA-2023:1570RLBA-2023:1570RLBA-2023:1570 dNetworkManager-cloud-setup-1.40.0-6.el8_7.x86_64.rpmdNetworkManager-cloud-setup-1.40.0-6.el8_7.x86_64.rpm8O >|securityImportant: pesign security update https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3560CVE-2022-3560CVE-2022-3560https://bugzilla.redhat.com/show_bug.cgi?id=21354202135420https://errata.rockylinux.org/RLSA-2023:1572RLSA-2023:1572RLSA-2023:1572 x+pesign-0.112-27.el8_7.x86_64.rpmx+pesign-0.112-27.el8_7.x86_64.rpm8p BBBBenhancementnmstate bug fix and enhancement update*H https://bugzilla.redhat.com/show_bug.cgi?id=21696422169642* SR-IOV VF not disabled as desired, gets IPv4 and default route via DHCPhttps://bugzilla.redhat.com/show_bug.cgi?id=21700782170078* Dual stack profiles do not set may-fail correctlyhttps://errata.rockylinux.org/RLEA-2023:1574RLEA-2023:1574RLEA-2023:1574 WKnmstate-1.3.3-8.el8_7.x86_64.rpmXKnmstate-libs-1.3.3-8.el8_7.x86_64.rpmuKnmstate-plugin-ovsdb-1.3.3-8.el8_7.noarch.rpmKpython3-libnmstate-1.3.3-8.el8_7.noarch.rpmWKnmstate-1.3.3-8.el8_7.x86_64.rpmXKnmstate-libs-1.3.3-8.el8_7.x86_64.rpmuKnmstate-plugin-ovsdb-1.3.3-8.el8_7.noarch.rpmKpython3-libnmstate-1.3.3-8.el8_7.noarch.rpm:C FBBbugfixrpm-ostree bug fix updater https://bugzilla.redhat.com/show_bug.cgi?id=21674762167476* rpm-ostree status does not show ostree commit hashhttps://errata.rockylinux.org/RLBA-2023:1577RLBA-2023:1577RLBA-2023:1577 Rrpm-ostree-2022.10.90.g4abaf4b4-6.el8_7.x86_64.rpmSrpm-ostree-libs-2022.10.90.g4abaf4b4-6.el8_7.x86_64.rpmRrpm-ostree-2022.10.90.g4abaf4b4-6.el8_7.x86_64.rpmSrpm-ostree-libs-2022.10.90.g4abaf4b4-6.el8_7.x86_64.rpm:D Kbugfixupower bug fix and enhancement update# https://errata.rockylinux.org/RLBA-2023:1579RLBA-2023:1579RLBA-2023:1579 'mupower-0.99.7-4.el8_7.x86_64.rpm'mupower-0.99.7-4.el8_7.x86_64.rpm:E NBBbugfixdnsmasq bug fix update)S https://bugzilla.redhat.com/show_bug.cgi?id=21723572172357* Dnsmasq no longer sends Client Link-Layer Address option in relayed DHCPv6 response.https://bugzilla.redhat.com/show_bug.cgi?id=21777552177755* Dnsmasq no longer responds with Advertise to DHCPv6 Relay-requesthttps://errata.rockylinux.org/RLBA-2023:1581RLBA-2023:1581RLBA-2023:1581 v dnsmasq-2.79-24.el8_7.1.x86_64.rpmw dnsmasq-utils-2.79-24.el8_7.1.x86_64.rpmv dnsmasq-2.79-24.el8_7.1.x86_64.rpmw dnsmasq-utils-2.79-24.el8_7.1.x86_64.rpm:R SBBBBBBBsecurityImportant: emacs security update|Rhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28617CVE-2023-28617CVE-2023-28617https://bugzilla.redhat.com/show_bug.cgi?id=21805442180544https://errata.rockylinux.org/RLSA-2023:1930RLSA-2023:1930RLSA-2023:1930 ]Femacs-26.1-7.el8_7.1.x86_64.rpm^Femacs-common-26.1-7.el8_7.1.x86_64.rpm_Femacs-lucid-26.1-7.el8_7.1.x86_64.rpm`Femacs-nox-26.1-7.el8_7.1.x86_64.rpmaFemacs-terminal-26.1-7.el8_7.1.noarch.rpm]Femacs-26.1-7.el8_7.1.x86_64.rpm^Femacs-common-26.1-7.el8_7.1.x86_64.rpm_Femacs-lucid-26.1-7.el8_7.1.x86_64.rpm`Femacs-nox-26.1-7.el8_7.1.x86_64.rpmaFemacs-terminal-26.1-7.el8_7.1.noarch.rpmuF -]BBBBBBBBBBBBBBbugfix.NET 6.0 bug fix updateNs https://errata.rockylinux.org/RLBA-2023:1755RLBA-2023:1755RLBA-2023:1755 Z#aspnetcore-runtime-6.0-6.0.16-1.el8_7.x86_64.rpm[#aspnetcore-targeting-pack-6.0-6.0.16-1.el8_7.x86_64.rpm\#dotnet-apphost-pack-6.0-6.0.16-1.el8_7.x86_64.rpm]#dotnet-hostfxr-6.0-6.0.16-1.el8_7.x86_64.rpm^#dotnet-runtime-6.0-6.0.16-1.el8_7.x86_64.rpm_Ldotnet-sdk-6.0-6.0.116-1.el8_7.x86_64.rpm`#dotnet-targeting-pack-6.0-6.0.16-1.el8_7.x86_64.rpmaLdotnet-templates-6.0-6.0.116-1.el8_7.x86_64.rpmZ#aspnetcore-runtime-6.0-6.0.16-1.el8_7.x86_64.rpm[#aspnetcore-targeting-pack-6.0-6.0.16-1.el8_7.x86_64.rpm\#dotnet-apphost-pack-6.0-6.0.16-1.el8_7.x86_64.rpm]#dotnet-hostfxr-6.0-6.0.16-1.el8_7.x86_64.rpm^#dotnet-runtime-6.0-6.0.16-1.el8_7.x86_64.rpm_Ldotnet-sdk-6.0-6.0.116-1.el8_7.x86_64.rpm`#dotnet-targeting-pack-6.0-6.0.16-1.el8_7.x86_64.rpmaLdotnet-templates-6.0-6.0.116-1.el8_7.x86_64.rpmuP 0nsecurityImportant: thunderbird security updateA5https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0547CVE-2023-0547CVE-2023-0547https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1945CVE-2023-1945CVE-2023-1945https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28427CVE-2023-28427CVE-2023-28427https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29479CVE-2023-29479CVE-2023-29479https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29533CVE-2023-29533CVE-2023-29533https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29535CVE-2023-29535CVE-2023-29535https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29536CVE-2023-29536CVE-2023-29536https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29539CVE-2023-29539CVE-2023-29539https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29541CVE-2023-29541CVE-2023-29541https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29548CVE-2023-29548CVE-2023-29548https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29550CVE-2023-29550CVE-2023-29550https://bugzilla.redhat.com/show_bug.cgi?id=21832782183278https://bugzilla.redhat.com/show_bug.cgi?id=21861012186101https://bugzilla.redhat.com/show_bug.cgi?id=21861022186102* MFSA-TMP-2023-0001 Mozilla: Double-free in libwebphttps://bugzilla.redhat.com/show_bug.cgi?id=21861032186103https://bugzilla.redhat.com/show_bug.cgi?id=21861042186104https://bugzilla.redhat.com/show_bug.cgi?id=21861052186105https://bugzilla.redhat.com/show_bug.cgi?id=21861062186106https://bugzilla.redhat.com/show_bug.cgi?id=21861092186109https://bugzilla.redhat.com/show_bug.cgi?id=21861102186110https://bugzilla.redhat.com/show_bug.cgi?id=21861112186111https://bugzilla.redhat.com/show_bug.cgi?id=21867342186734https://bugzilla.redhat.com/show_bug.cgi?id=21867352186735https://errata.rockylinux.org/RLSA-2023:1802RLSA-2023:1802RLSA-2023:1802 hkthunderbird-102.10.0-2.el8_7.x86_64.rpmhkthunderbird-102.10.0-2.el8_7.x86_64.rpmvQ qBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security and bug fix updatev$https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930CVE-2023-21930CVE-2023-21930https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937CVE-2023-21937CVE-2023-21937https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938CVE-2023-21938CVE-2023-21938https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939CVE-2023-21939CVE-2023-21939https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954CVE-2023-21954CVE-2023-21954https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967CVE-2023-21967CVE-2023-21967https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968CVE-2023-21968CVE-2023-21968https://bugzilla.redhat.com/show_bug.cgi?id=21868272186827* Previously, the XML signature provider was unable to operate in FIPS mode. Following recent enhancements to FIPS mode support, the XML signature provider can now be supported. It is now enabled in FIPS mode. (RHBZ#2186827)https://bugzilla.redhat.com/show_bug.cgi?id=21868312186831* The PKCS#11 provider used by FIPS mode can be supported by different PKCS#11 tokens. It was found that some PKCS#11 tokens may not be initialised fully before use, leading to an exception being thrown by the provider. With this release, this exception is now expected and handled by the FIPS support code. (RHBZ#2186831)https://bugzilla.redhat.com/show_bug.cgi?id=21868352186835* In FIPS mode, the list of cryptographic services and algorithms available is limited to those that are FIPS compliant. It was found that this filtering was too strict and was also excluding service attributes. These attributes are now made available in FIPS mode, as they are in non-FIPS mode. (RHBZ#2186835)https://bugzilla.redhat.com/show_bug.cgi?id=21874352187435https://bugzilla.redhat.com/show_bug.cgi?id=21874412187441https://bugzilla.redhat.com/show_bug.cgi?id=21877042187704https://bugzilla.redhat.com/show_bug.cgi?id=21877242187724https://bugzilla.redhat.com/show_bug.cgi?id=21877582187758https://bugzilla.redhat.com/show_bug.cgi?id=21877902187790https://bugzilla.redhat.com/show_bug.cgi?id=21878022187802https://errata.rockylinux.org/RLSA-2023:1898RLSA-2023:1898RLSA-2023:1898 sMjava-17-openjdk-17.0.7.0.7-1.el8_7.x86_64.rpmtMjava-17-openjdk-demo-17.0.7.0.7-1.el8_7.x86_64.rpmuMjava-17-openjdk-devel-17.0.7.0.7-1.el8_7.x86_64.rpmvMjava-17-openjdk-headless-17.0.7.0.7-1.el8_7.x86_64.rpmwMjava-17-openjdk-javadoc-17.0.7.0.7-1.el8_7.x86_64.rpmxMjava-17-openjdk-javadoc-zip-17.0.7.0.7-1.el8_7.x86_64.rpmyMjava-17-openjdk-jmods-17.0.7.0.7-1.el8_7.x86_64.rpmzMjava-17-openjdk-src-17.0.7.0.7-1.el8_7.x86_64.rpm{Mjava-17-openjdk-static-libs-17.0.7.0.7-1.el8_7.x86_64.rpm sMjava-17-openjdk-17.0.7.0.7-1.el8_7.x86_64.rpmtMjava-17-openjdk-demo-17.0.7.0.7-1.el8_7.x86_64.rpmuMjava-17-openjdk-devel-17.0.7.0.7-1.el8_7.x86_64.rpmvMjava-17-openjdk-headless-17.0.7.0.7-1.el8_7.x86_64.rpmwMjava-17-openjdk-javadoc-17.0.7.0.7-1.el8_7.x86_64.rpmxMjava-17-openjdk-javadoc-zip-17.0.7.0.7-1.el8_7.x86_64.rpmyMjava-17-openjdk-jmods-17.0.7.0.7-1.el8_7.x86_64.rpmzMjava-17-openjdk-src-17.0.7.0.7-1.el8_7.x86_64.rpm{Mjava-17-openjdk-static-libs-17.0.7.0.7-1.el8_7.x86_64.rpmvW (DBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: apr-util security update%https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25147CVE-2022-25147CVE-2022-25147https://bugzilla.redhat.com/show_bug.cgi?id=21696522169652https://errata.rockylinux.org/RLSA-2023:3109RLSA-2023:3109RLSA-2023:3109 2?apr-util-1.6.1-6.el8.1.x86_64.rpm3?apr-util-bdb-1.6.1-6.el8.1.x86_64.rpm4?apr-util-devel-1.6.1-6.el8.1.x86_64.rpm5?apr-util-ldap-1.6.1-6.el8.1.x86_64.rpm6?apr-util-mysql-1.6.1-6.el8.1.x86_64.rpm7?apr-util-odbc-1.6.1-6.el8.1.x86_64.rpm8?apr-util-openssl-1.6.1-6.el8.1.x86_64.rpm9?apr-util-pgsql-1.6.1-6.el8.1.x86_64.rpm:?apr-util-sqlite-1.6.1-6.el8.1.x86_64.rpm2@apr-util-1.6.1-6.el8_8.1.x86_64.rpm3@apr-util-bdb-1.6.1-6.el8_8.1.x86_64.rpm4@apr-util-devel-1.6.1-6.el8_8.1.x86_64.rpm5@apr-util-ldap-1.6.1-6.el8_8.1.x86_64.rpm6@apr-util-mysql-1.6.1-6.el8_8.1.x86_64.rpm7@apr-util-odbc-1.6.1-6.el8_8.1.x86_64.rpm8@apr-util-openssl-1.6.1-6.el8_8.1.x86_64.rpm9@apr-util-pgsql-1.6.1-6.el8_8.1.x86_64.rpm:@apr-util-sqlite-1.6.1-6.el8_8.1.x86_64.rpm2?apr-util-1.6.1-6.el8.1.x86_64.rpm3?apr-util-bdb-1.6.1-6.el8.1.x86_64.rpm4?apr-util-devel-1.6.1-6.el8.1.x86_64.rpm5?apr-util-ldap-1.6.1-6.el8.1.x86_64.rpm6?apr-util-mysql-1.6.1-6.el8.1.x86_64.rpm7?apr-util-odbc-1.6.1-6.el8.1.x86_64.rpm8?apr-util-openssl-1.6.1-6.el8.1.x86_64.rpm9?apr-util-pgsql-1.6.1-6.el8.1.x86_64.rpm:?apr-util-sqlite-1.6.1-6.el8.1.x86_64.rpm2@apr-util-1.6.1-6.el8_8.1.x86_64.rpm3@apr-util-bdb-1.6.1-6.el8_8.1.x86_64.rpm4@apr-util-devel-1.6.1-6.el8_8.1.x86_64.rpm5@apr-util-ldap-1.6.1-6.el8_8.1.x86_64.rpm6@apr-util-mysql-1.6.1-6.el8_8.1.x86_64.rpm7@apr-util-odbc-1.6.1-6.el8_8.1.x86_64.rpm8@apr-util-openssl-1.6.1-6.el8_8.1.x86_64.rpm9@apr-util-pgsql-1.6.1-6.el8_8.1.x86_64.rpm:@apr-util-sqlite-1.6.1-6.el8_8.1.x86_64.rpm^a *)bugfixtzdata bug fix and enhancement update?) https://errata.rockylinux.org/RLBA-2023:3103RLBA-2023:3103RLBA-2023:3103 > tzdata-java-2023c-1.el8.noarch.rpm> tzdata-java-2023c-1.el8.noarch.rpm^S -kbugfixsubscription-manager bug fix and enhancement updateh https://bugzilla.redhat.com/show_bug.cgi?id=19566541956654https://bugzilla.redhat.com/show_bug.cgi?id=19719951971995https://bugzilla.redhat.com/show_bug.cgi?id=20968522096852https://bugzilla.redhat.com/show_bug.cgi?id=20976722097672https://bugzilla.redhat.com/show_bug.cgi?id=21015102101510https://bugzilla.redhat.com/show_bug.cgi?id=21184862118486https://bugzilla.redhat.com/show_bug.cgi?id=21341652134165https://bugzilla.redhat.com/show_bug.cgi?id=21397622139762https://bugzilla.redhat.com/show_bug.cgi?id=21663172166317https://bugzilla.redhat.com/show_bug.cgi?id=21666232166623https://bugzilla.redhat.com/show_bug.cgi?id=21685762168576https://errata.rockylinux.org/RLBA-2023:2984RLBA-2023:2984RLBA-2023:2984  -subscription-manager-migration-1.28.36-2.el8.x86_64.rpm -subscription-manager-migration-1.28.36-2.el8.x86_64.rpmET 0nbugfixcryptsetup bug fix and enhancement updateg https://bugzilla.redhat.com/show_bug.cgi?id=21502542150254https://errata.rockylinux.org/RLBA-2023:2996RLBA-2023:2996RLBA-2023:2996 PXcryptsetup-devel-2.3.7-5.el8.x86_64.rpmPXcryptsetup-devel-2.3.7-5.el8.x86_64.rpmEU qBBBBBBBBBBBBBBBBBBBBBBbugfixperl bug fix and enhancement updatef https://bugzilla.redhat.com/show_bug.cgi?id=21520122152012https://errata.rockylinux.org/RLBA-2023:3043RLBA-2023:3043RLBA-2023:3043 ]perl-5.26.3-422.el8.x86_64.rpm perl-Attribute-Handlers-0.99-422.el8.noarch.rpm:perl-devel-5.26.3-422.el8.x86_64.rpm5'perl-Devel-Peek-1.26-422.el8.x86_64.rpm!Kperl-Devel-SelfStubber-1.06-422.el8.noarch.rpm"zperl-ExtUtils-Embed-1.34-422.el8.noarch.rpm#Kperl-ExtUtils-Miniperl-1.06-422.el8.noarch.rpm+perl-libnetcfg-5.26.3-422.el8.noarch.rpm$'perl-Locale-Maketext-Simple-0.21-422.el8.noarch.rpm%/perl-Memoize-1.03-422.el8.noarch.rpm&!perl-Module-Loaded-0.08-422.el8.noarch.rpm'wperl-Net-Ping-2.55-422.el8.noarch.rpm,Fperl-open-1.11-422.el8.noarch.rpm(]perl-Pod-Html-1.22.02-422.el8.noarch.rpm)_perl-SelfLoader-1.23-422.el8.noarch.rpm*tperl-Test-1.30-422.el8.noarch.rpm}perl-tests-5.26.3-422.el8.x86_64.rpm98perl-Time-Piece-1.31-422.el8.x86_64.rpm-Nperl-utils-5.26.3-422.el8.noarch.rpm]perl-5.26.3-422.el8.x86_64.rpm perl-Attribute-Handlers-0.99-422.el8.noarch.rpm:perl-devel-5.26.3-422.el8.x86_64.rpm5'perl-Devel-Peek-1.26-422.el8.x86_64.rpm!Kperl-Devel-SelfStubber-1.06-422.el8.noarch.rpm"zperl-ExtUtils-Embed-1.34-422.el8.noarch.rpm#Kperl-ExtUtils-Miniperl-1.06-422.el8.noarch.rpm+perl-libnetcfg-5.26.3-422.el8.noarch.rpm$'perl-Locale-Maketext-Simple-0.21-422.el8.noarch.rpm%/perl-Memoize-1.03-422.el8.noarch.rpm&!perl-Module-Loaded-0.08-422.el8.noarch.rpm'wperl-Net-Ping-2.55-422.el8.noarch.rpm,Fperl-open-1.11-422.el8.noarch.rpm(]perl-Pod-Html-1.22.02-422.el8.noarch.rpm)_perl-SelfLoader-1.23-422.el8.noarch.rpm*tperl-Test-1.30-422.el8.noarch.rpm}perl-tests-5.26.3-422.el8.x86_64.rpm98perl-Time-Piece-1.31-422.el8.x86_64.rpm-Nperl-utils-5.26.3-422.el8.noarch.rpmEH Jbugfixwpebackend-fdo bug fix and enhancement updatee https://bugzilla.redhat.com/show_bug.cgi?id=21354802135480https://errata.rockylinux.org/RLBA-2023:2783RLBA-2023:2783RLBA-2023:2783 Fwpebackend-fdo-1.10.0-3.el8.x86_64.rpmFwpebackend-fdo-1.10.0-3.el8.x86_64.rpmET MBBBBBBsecurityModerate: poppler security updatedhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38784CVE-2022-38784CVE-2022-38784https://bugzilla.redhat.com/show_bug.cgi?id=21245272124527https://errata.rockylinux.org/RLSA-2023:2810RLSA-2023:2810RLSA-2023:2810 opoppler-20.11.0-6.el8.x86_64.rpmopoppler-glib-20.11.0-6.el8.x86_64.rpmopoppler-qt5-20.11.0-6.el8.x86_64.rpmopoppler-utils-20.11.0-6.el8.x86_64.rpmopoppler-20.11.0-6.el8.x86_64.rpmopoppler-glib-20.11.0-6.el8.x86_64.rpmopoppler-qt5-20.11.0-6.el8.x86_64.rpmopoppler-utils-20.11.0-6.el8.x86_64.rpmFK Vbugfixvirt-top bug fix and enhancement update https://errata.rockylinux.org/RLBA-2023:2825RLBA-2023:2825RLBA-2023:2825 5zvirt-top-1.0.8-37.el8.x86_64.rpm5zvirt-top-1.0.8-37.el8.x86_64.rpmFL 4YBBBBBBBBBBBBBBBBBBBBBBBBBbugfixgnome-shell-extensions bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=20335722033572https://bugzilla.redhat.com/show_bug.cgi?id=21381092138109https://bugzilla.redhat.com/show_bug.cgi?id=21438252143825https://bugzilla.redhat.com/show_bug.cgi?id=21496702149670https://bugzilla.redhat.com/show_bug.cgi?id=21501072150107https://bugzilla.redhat.com/show_bug.cgi?id=21620172162017https://errata.rockylinux.org/RLBA-2023:2840RLBA-2023:2840RLBA-2023:2840 <gnome-classic-session-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-apps-menu-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-auto-move-windows-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-classification-banner-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-common-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-dash-to-dock-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-dash-to-panel-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-desktop-icons-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-disable-screenshield-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-drive-menu-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-gesture-inhibitor-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-heads-up-display-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-horizontal-workspaces-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-launch-new-instance-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-native-window-placement-3.32.1-33.el8.noarch.rpm <gnome-shell-extension-no-hot-corner-3.32.1-33.el8.noarch.rpm!<gnome-shell-extension-panel-favorites-3.32.1-33.el8.noarch.rpm"<gnome-shell-extension-places-menu-3.32.1-33.el8.noarch.rpm#<gnome-shell-extension-screenshot-window-sizer-3.32.1-33.el8.noarch.rpm$<gnome-shell-extension-systemMonitor-3.32.1-33.el8.noarch.rpm%<gnome-shell-extension-top-icons-3.32.1-33.el8.noarch.rpm&<gnome-shell-extension-updates-dialog-3.32.1-33.el8.noarch.rpm'<gnome-shell-extension-user-theme-3.32.1-33.el8.noarch.rpm(<gnome-shell-extension-window-grouper-3.32.1-33.el8.noarch.rpm)<gnome-shell-extension-window-list-3.32.1-33.el8.noarch.rpm*<gnome-shell-extension-windowsNavigator-3.32.1-33.el8.noarch.rpm+<gnome-shell-extension-workspace-indicator-3.32.1-33.el8.noarch.rpm<gnome-classic-session-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-apps-menu-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-auto-move-windows-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-classification-banner-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-common-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-dash-to-dock-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-dash-to-panel-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-desktop-icons-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-disable-screenshield-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-drive-menu-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-gesture-inhibitor-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-heads-up-display-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-horizontal-workspaces-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-launch-new-instance-3.32.1-33.el8.noarch.rpm<gnome-shell-extension-native-window-placement-3.32.1-33.el8.noarch.rpm <gnome-shell-extension-no-hot-corner-3.32.1-33.el8.noarch.rpm!<gnome-shell-extension-panel-favorites-3.32.1-33.el8.noarch.rpm"<gnome-shell-extension-places-menu-3.32.1-33.el8.noarch.rpm#<gnome-shell-extension-screenshot-window-sizer-3.32.1-33.el8.noarch.rpm$<gnome-shell-extension-systemMonitor-3.32.1-33.el8.noarch.rpm%<gnome-shell-extension-top-icons-3.32.1-33.el8.noarch.rpm&<gnome-shell-extension-updates-dialog-3.32.1-33.el8.noarch.rpm'<gnome-shell-extension-user-theme-3.32.1-33.el8.noarch.rpm(<gnome-shell-extension-window-grouper-3.32.1-33.el8.noarch.rpm)<gnome-shell-extension-window-list-3.32.1-33.el8.noarch.rpm*<gnome-shell-extension-windowsNavigator-3.32.1-33.el8.noarch.rpm+<gnome-shell-extension-workspace-indicator-3.32.1-33.el8.noarch.rpmFO 8uBbugfixgnome-control-center bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=19269951926995https://errata.rockylinux.org/RLBA-2023:2906RLBA-2023:2906RLBA-2023:2906 [gnome-control-center-3.28.2-37.el8.x86_64.rpm[gnome-control-center-filesystem-3.28.2-37.el8.noarch.rpm[gnome-control-center-3.28.2-37.el8.x86_64.rpm[gnome-control-center-filesystem-3.28.2-37.el8.noarch.rpmFR ;ybugfixWALinuxAgent bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=21701042170104https://errata.rockylinux.org/RLBA-2023:2944RLBA-2023:2944RLBA-2023:2944 &wWALinuxAgent-2.7.0.6-8.el8_8.rocky.0.1.noarch.rpm'wWALinuxAgent-udev-2.7.0.6-8.el8_8.rocky.0.1.noarch.rpm&wWALinuxAgent-2.7.0.6-8.el8_8.rocky.0.1.noarch.rpm'wWALinuxAgent-udev-2.7.0.6-8.el8_8.rocky.0.1.noarch.rpmFU >|securityImportant: libreswan security updatePhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2295CVE-2023-2295CVE-2023-2295https://bugzilla.redhat.com/show_bug.cgi?id=21897772189777https://errata.rockylinux.org/RLSA-2023:3107RLSA-2023:3107RLSA-2023:3107 :qlibreswan-4.9-3.el8_8.x86_64.rpm:qlibreswan-4.9-3.el8_8.x86_64.rpmFV BBBBBBsecurityImportant: webkit2gtk3 security updateO|https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2203CVE-2023-2203CVE-2023-2203https://bugzilla.redhat.com/show_bug.cgi?id=21885432188543https://errata.rockylinux.org/RLSA-2023:3108RLSA-2023:3108RLSA-2023:3108 ybwebkit2gtk3-2.38.5-1.el8_8.3.x86_64.rpmzbwebkit2gtk3-devel-2.38.5-1.el8_8.3.x86_64.rpm{bwebkit2gtk3-jsc-2.38.5-1.el8_8.3.x86_64.rpm|bwebkit2gtk3-jsc-devel-2.38.5-1.el8_8.3.x86_64.rpmybwebkit2gtk3-2.38.5-1.el8_8.3.x86_64.rpmzbwebkit2gtk3-devel-2.38.5-1.el8_8.3.x86_64.rpm{bwebkit2gtk3-jsc-2.38.5-1.el8_8.3.x86_64.rpm|bwebkit2gtk3-jsc-devel-2.38.5-1.el8_8.3.x86_64.rpmF` Hbugfixutil-linux bug fix and enhancement updateK https://bugzilla.redhat.com/show_bug.cgi?id=21804422180442* Backport hint about systemd daemon-reload.https://errata.rockylinux.org/RLBA-2023:3102RLBA-2023:3102RLBA-2023:3102 H^python3-libmount-2.32.1-42.el8_8.x86_64.rpmH^python3-libmount-2.32.1-42.el8_8.x86_64.rpmFG Kbugfixgnome-software bug fix and enhancement updateY https://errata.rockylinux.org/RLBA-2023:2765RLBA-2023:2765RLBA-2023:2765 Bgnome-software-3.36.1-11.el8.x86_64.rpmBgnome-software-3.36.1-11.el8.x86_64.rpmFq enhancementRocky Linux-system-roles bug fix and enhancement updateX "https://bugzilla.redhat.com/show_bug.cgi?id=20668642066864https://bugzilla.redhat.com/show_bug.cgi?id=21196002119600https://bugzilla.redhat.com/show_bug.cgi?id=21269602126960https://bugzilla.redhat.com/show_bug.cgi?id=21274972127497https://bugzilla.redhat.com/show_bug.cgi?id=21296202129620https://bugzilla.redhat.com/show_bug.cgi?id=21300192130019https://bugzilla.redhat.com/show_bug.cgi?id=21303322130332https://bugzilla.redhat.com/show_bug.cgi?id=21303452130345https://bugzilla.redhat.com/show_bug.cgi?id=21303622130362https://bugzilla.redhat.com/show_bug.cgi?id=21309212130921https://bugzilla.redhat.com/show_bug.cgi?id=21335322133532https://bugzilla.redhat.com/show_bug.cgi?id=21338562133856https://bugzilla.redhat.com/show_bug.cgi?id=21339312133931https://bugzilla.redhat.com/show_bug.cgi?id=21342012134201https://bugzilla.redhat.com/show_bug.cgi?id=21376672137667https://bugzilla.redhat.com/show_bug.cgi?id=21433852143385https://bugzilla.redhat.com/show_bug.cgi?id=21434012143401https://bugzilla.redhat.com/show_bug.cgi?id=21434582143458https://bugzilla.redhat.com/show_bug.cgi?id=21438142143814https://bugzilla.redhat.com/show_bug.cgi?id=21448762144876https://bugzilla.redhat.com/show_bug.cgi?id=21448772144877https://bugzilla.redhat.com/show_bug.cgi?id=21496832149683https://bugzilla.redhat.com/show_bug.cgi?id=21513422151342https://bugzilla.redhat.com/show_bug.cgi?id=21513512151351https://bugzilla.redhat.com/show_bug.cgi?id=21513552151355https://bugzilla.redhat.com/show_bug.cgi?id=21530802153080https://bugzilla.redhat.com/show_bug.cgi?id=21530812153081https://bugzilla.redhat.com/show_bug.cgi?id=21541432154143https://bugzilla.redhat.com/show_bug.cgi?id=21627882162788https://bugzilla.redhat.com/show_bug.cgi?id=21648792164879https://bugzilla.redhat.com/show_bug.cgi?id=21651762165176https://bugzilla.redhat.com/show_bug.cgi?id=21679412167941https://bugzilla.redhat.com/show_bug.cgi?id=21687332168733https://errata.rockylinux.org/RLEA-2023:2804RLEA-2023:2804RLEA-2023:2804 8Yrhel-system-roles-1.21.1-1.el8_8.noarch.rpm8Yrhel-system-roles-1.21.1-1.el8_8.noarch.rpmFI 'PBBBBBBBBBBBBBBBBBBBBBbugfixqt5-qttools bug fix and enhancement updateW https://bugzilla.redhat.com/show_bug.cgi?id=21190382119038https://bugzilla.redhat.com/show_bug.cgi?id=21447982144798https://errata.rockylinux.org/RLBA-2023:2812RLBA-2023:2812RLBA-2023:2812 ) qt5-assistant-5.15.3-4.el8.x86_64.rpm* qt5-designer-5.15.3-4.el8.x86_64.rpm+ qt5-doctools-5.15.3-4.el8.x86_64.rpm, qt5-linguist-5.15.3-4.el8.x86_64.rpm- qt5-qdbusviewer-5.15.3-4.el8.x86_64.rpm7 qt5-qttools-5.15.3-4.el8.x86_64.rpm8 qt5-qttools-common-5.15.3-4.el8.noarch.rpm9 qt5-qttools-devel-5.15.3-4.el8.x86_64.rpm: qt5-qttools-examples-5.15.3-4.el8.x86_64.rpm; qt5-qttools-libs-designer-5.15.3-4.el8.x86_64.rpm< qt5-qttools-libs-designercomponents-5.15.3-4.el8.x86_64.rpm= qt5-qttools-libs-help-5.15.3-4.el8.x86_64.rpm ) qt5-assistant-5.15.3-4.el8.x86_64.rpm* qt5-designer-5.15.3-4.el8.x86_64.rpm+ qt5-doctools-5.15.3-4.el8.x86_64.rpm, qt5-linguist-5.15.3-4.el8.x86_64.rpm- qt5-qdbusviewer-5.15.3-4.el8.x86_64.rpm7 qt5-qttools-5.15.3-4.el8.x86_64.rpm8 qt5-qttools-common-5.15.3-4.el8.noarch.rpm9 qt5-qttools-devel-5.15.3-4.el8.x86_64.rpm: qt5-qttools-examples-5.15.3-4.el8.x86_64.rpm; qt5-qttools-libs-designer-5.15.3-4.el8.x86_64.rpm< qt5-qttools-libs-designercomponents-5.15.3-4.el8.x86_64.rpm= qt5-qttools-libs-help-5.15.3-4.el8.x86_64.rpmFJ +hBbugfixpython-rpm-macros bug fix and enhancement updateV https://bugzilla.redhat.com/show_bug.cgi?id=21697802169780https://errata.rockylinux.org/RLBA-2023:2820RLBA-2023:2820RLBA-2023:2820 Zpython3-rpm-macros-3-45.el8.noarch.rpmZpython-rpm-macros-3-45.el8.noarch.rpmZpython-srpm-macros-3-45.el8.noarch.rpmZpython3-rpm-macros-3-45.el8.noarch.rpmZpython-rpm-macros-3-45.el8.noarch.rpmZpython-srpm-macros-3-45.el8.noarch.rpmFM .lbugfixpowertop bug fix and enhancement updateU https://errata.rockylinux.org/RLBA-2023:2848RLBA-2023:2848RLBA-2023:2848 Hpowertop-2.15-1.el8.x86_64.rpmHpowertop-2.15-1.el8.x86_64.rpmFN 3oBBbugfixalsa-utils bug fix and enhancement updateT https://bugzilla.redhat.com/show_bug.cgi?id=21255742125574https://errata.rockylinux.org/RLBA-2023:2877RLBA-2023:2877RLBA-2023:2877 k*alsa-utils-1.2.8-1.el8.x86_64.rpml*alsa-utils-alsabat-1.2.8-1.el8.x86_64.rpmk*alsa-utils-1.2.8-1.el8.x86_64.rpml*alsa-utils-alsabat-1.2.8-1.el8.x86_64.rpmFP 6tbugfixpython3.11-psycopg2 bug fix and enhancement updateS https://bugzilla.redhat.com/show_bug.cgi?id=21576802157680https://errata.rockylinux.org/RLBA-2023:2922RLBA-2023:2922RLBA-2023:2922 n~python3.11-psycopg2-2.9.3-1.el8.x86_64.rpmn~python3.11-psycopg2-2.9.3-1.el8.x86_64.rpmFQ 9wbugfixpython3.11-scipy bug fix and enhancement updateR https://bugzilla.redhat.com/show_bug.cgi?id=21576882157688https://errata.rockylinux.org/RLBA-2023:2939RLBA-2023:2939RLBA-2023:2939 opython3.11-scipy-1.10.0-1.el8.x86_64.rpmopython3.11-scipy-1.10.0-1.el8.x86_64.rpmFV >zBBbugfixrpm-ostree bug fix and enhancement updateQ https://bugzilla.redhat.com/show_bug.cgi?id=21772252177225* Intermittent core dump in hex2bin (librpm.so.8)https://errata.rockylinux.org/RLBA-2023:3086RLBA-2023:3086RLBA-2023:3086 Rrpm-ostree-2022.10.115.g15eba7b1-2.el8_8.x86_64.rpmSrpm-ostree-libs-2022.10.115.g15eba7b1-2.el8_8.x86_64.rpmRrpm-ostree-2022.10.115.g15eba7b1-2.el8_8.x86_64.rpmSrpm-ostree-libs-2022.10.115.g15eba7b1-2.el8_8.x86_64.rpmFW BBBBBBbugfixgnome-session bug fix and enhancement updateb  https://bugzilla.redhat.com/show_bug.cgi?id=21751242175124* gnome-session kiosk-session subpackage makes noise on rpm upgradhttps://errata.rockylinux.org/RLBA-2023:3088RLBA-2023:3088RLBA-2023:3088  xgnome-session-3.28.1-20.el8_8.x86_64.rpm xgnome-session-kiosk-session-3.28.1-20.el8_8.x86_64.rpm xgnome-session-wayland-session-3.28.1-20.el8_8.x86_64.rpm xgnome-session-xsession-3.28.1-20.el8_8.x86_64.rpm xgnome-session-3.28.1-20.el8_8.x86_64.rpm xgnome-session-kiosk-session-3.28.1-20.el8_8.x86_64.rpm xgnome-session-wayland-session-3.28.1-20.el8_8.x86_64.rpm xgnome-session-xsession-3.28.1-20.el8_8.x86_64.rpmFX Hbugfixlinuxptp bug fix and enhancement updatem, https://errata.rockylinux.org/RLBA-2023:3090RLBA-2023:3090RLBA-2023:3090 Olinuxptp-3.1.1-3.el8_8.1.x86_64.rpmOlinuxptp-3.1.1-3.el8_8.1.x86_64.rpmGY KBBBBbugfixnmstate bug fix and enhancement updateO https://bugzilla.redhat.com/show_bug.cgi?id=21811662181166* Rebase nmstate to latest 1.x branch.https://bugzilla.redhat.com/show_bug.cgi?id=21861782186178* Failures when DNS is set to auto with DHCP and there is a static DNS search string defined.https://errata.rockylinux.org/RLBA-2023:3092RLBA-2023:3092RLBA-2023:3092 WLnmstate-1.4.4-1.el8_8.x86_64.rpmXLnmstate-libs-1.4.4-1.el8_8.x86_64.rpmuLnmstate-plugin-ovsdb-1.4.4-1.el8_8.noarch.rpmLpython3-libnmstate-1.4.4-1.el8_8.noarch.rpmWLnmstate-1.4.4-1.el8_8.x86_64.rpmXLnmstate-libs-1.4.4-1.el8_8.x86_64.rpmuLnmstate-plugin-ovsdb-1.4.4-1.el8_8.noarch.rpmLpython3-libnmstate-1.4.4-1.el8_8.noarch.rpmGZ "RBBBBBBBBBBBBBBbugfix.NET 6.0 bugfix updateh https://errata.rockylinux.org/RLBA-2023:3093RLBA-2023:3093RLBA-2023:3093 Z$aspnetcore-runtime-6.0-6.0.16-2.el8_8.x86_64.rpm[$aspnetcore-targeting-pack-6.0-6.0.16-2.el8_8.x86_64.rpm\$dotnet-apphost-pack-6.0-6.0.16-2.el8_8.x86_64.rpm]$dotnet-hostfxr-6.0-6.0.16-2.el8_8.x86_64.rpm^$dotnet-runtime-6.0-6.0.16-2.el8_8.x86_64.rpm_Mdotnet-sdk-6.0-6.0.116-2.el8_8.x86_64.rpm`$dotnet-targeting-pack-6.0-6.0.16-2.el8_8.x86_64.rpmaMdotnet-templates-6.0-6.0.116-2.el8_8.x86_64.rpmZ$aspnetcore-runtime-6.0-6.0.16-2.el8_8.x86_64.rpm[$aspnetcore-targeting-pack-6.0-6.0.16-2.el8_8.x86_64.rpm\$dotnet-apphost-pack-6.0-6.0.16-2.el8_8.x86_64.rpm]$dotnet-hostfxr-6.0-6.0.16-2.el8_8.x86_64.rpm^$dotnet-runtime-6.0-6.0.16-2.el8_8.x86_64.rpm_Mdotnet-sdk-6.0-6.0.116-2.el8_8.x86_64.rpm`$dotnet-targeting-pack-6.0-6.0.16-2.el8_8.x86_64.rpmaMdotnet-templates-6.0-6.0.116-2.el8_8.x86_64.rpmG[ 9cBBBBBBBBBBBBBBBBBBBBbugfix.NET 7.0 bugfix update|  https://errata.rockylinux.org/RLBA-2023:3094RLBA-2023:3094RLBA-2023:3094 SHaspnetcore-runtime-7.0-7.0.5-2.el8_8.x86_64.rpmTHaspnetcore-targeting-pack-7.0-7.0.5-2.el8_8.x86_64.rpmdotnet-7.0.105-2.el8_8.x86_64.rpmUHdotnet-apphost-pack-7.0-7.0.5-2.el8_8.x86_64.rpmHdotnet-host-7.0.5-2.el8_8.x86_64.rpmVHdotnet-hostfxr-7.0-7.0.5-2.el8_8.x86_64.rpmWHdotnet-runtime-7.0-7.0.5-2.el8_8.x86_64.rpmXdotnet-sdk-7.0-7.0.105-2.el8_8.x86_64.rpmYHdotnet-targeting-pack-7.0-7.0.5-2.el8_8.x86_64.rpmZdotnet-templates-7.0-7.0.105-2.el8_8.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.105-2.el8_8.x86_64.rpm SHaspnetcore-runtime-7.0-7.0.5-2.el8_8.x86_64.rpmTHaspnetcore-targeting-pack-7.0-7.0.5-2.el8_8.x86_64.rpmdotnet-7.0.105-2.el8_8.x86_64.rpmUHdotnet-apphost-pack-7.0-7.0.5-2.el8_8.x86_64.rpmHdotnet-host-7.0.5-2.el8_8.x86_64.rpmVHdotnet-hostfxr-7.0-7.0.5-2.el8_8.x86_64.rpmWHdotnet-runtime-7.0-7.0.5-2.el8_8.x86_64.rpmXdotnet-sdk-7.0-7.0.105-2.el8_8.x86_64.rpmYHdotnet-targeting-pack-7.0-7.0.5-2.el8_8.x86_64.rpmZdotnet-templates-7.0-7.0.105-2.el8_8.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.105-2.el8_8.x86_64.rpmG\ U texlive-20180414-29.el8_8.x86_64.rpmV texlive-adjustbox-20180414-29.el8_8.noarch.rpmW texlive-ae-20180414-29.el8_8.noarch.rpmX texlive-algorithms-20180414-29.el8_8.noarch.rpmY texlive-amscls-20180414-29.el8_8.noarch.rpmZ texlive-amsfonts-20180414-29.el8_8.noarch.rpm[ texlive-amsmath-20180414-29.el8_8.noarch.rpm\ texlive-anyfontsize-20180414-29.el8_8.noarch.rpm] texlive-anysize-20180414-29.el8_8.noarch.rpm^ texlive-appendix-20180414-29.el8_8.noarch.rpm_ texlive-arabxetex-20180414-29.el8_8.noarch.rpm` texlive-arphic-20180414-29.el8_8.noarch.rpma texlive-attachfile-20180414-29.el8_8.noarch.rpmb texlive-avantgar-20180414-29.el8_8.noarch.rpmc texlive-awesomebox-20180414-29.el8_8.noarch.rpmd texlive-babel-20180414-29.el8_8.noarch.rpmf texlive-babelbib-20180414-29.el8_8.noarch.rpme texlive-babel-english-20180414-29.el8_8.noarch.rpmg texlive-base-20180414-29.el8_8.noarch.rpmh texlive-beamer-20180414-29.el8_8.noarch.rpmi texlive-bera-20180414-29.el8_8.noarch.rpmj texlive-beton-20180414-29.el8_8.noarch.rpmk texlive-bibtex-20180414-29.el8_8.x86_64.rpml texlive-bibtopic-20180414-29.el8_8.noarch.rpmm texlive-bidi-20180414-29.el8_8.noarch.rpmn texlive-bigfoot-20180414-29.el8_8.noarch.rpmo texlive-bookman-20180414-29.el8_8.noarch.rpmp texlive-booktabs-20180414-29.el8_8.noarch.rpmq texlive-breakurl-20180414-29.el8_8.noarch.rpmr texlive-breqn-20180414-29.el8_8.noarch.rpmt texlive-caption-20180414-29.el8_8.noarch.rpms texlive-capt-of-20180414-29.el8_8.noarch.rpmu texlive-carlisle-20180414-29.el8_8.noarch.rpmv texlive-changebar-20180414-29.el8_8.noarch.rpmw texlive-changepage-20180414-29.el8_8.noarch.rpmx texlive-charter-20180414-29.el8_8.noarch.rpmy texlive-chngcntr-20180414-29.el8_8.noarch.rpmz texlive-cite-20180414-29.el8_8.noarch.rpm{ texlive-cjk-20180414-29.el8_8.noarch.rpm| texlive-classpack-20180414-29.el8_8.noarch.rpm} texlive-cm-20180414-29.el8_8.noarch.rpm texlive-cmap-20180414-29.el8_8.noarch.rpm texlive-cmextra-20180414-29.el8_8.noarch.rpm~ texlive-cm-lgc-20180414-29.el8_8.noarch.rpm texlive-cm-super-20180414-29.el8_8.noarch.rpm texlive-cns-20180414-29.el8_8.noarch.rpm texlive-collectbox-20180414-29.el8_8.noarch.rpm texlive-collection-basic-20180414-29.el8_8.noarch.rpm texlive-collection-fontsrecommended-20180414-29.el8_8.noarch.rpm texlive-collection-htmlxml-20180414-29.el8_8.noarch.rpm texlive-collection-latex-20180414-29.el8_8.noarch.rpm texlive-collection-latexrecommended-20180414-29.el8_8.noarch.rpm texlive-collection-xetex-20180414-29.el8_8.noarch.rpm texlive-colortbl-20180414-29.el8_8.noarch.rpm texlive-context-20180414-29.el8_8.noarch.rpm texlive-courier-20180414-29.el8_8.noarch.rpm texlive-crop-20180414-29.el8_8.noarch.rpm texlive-csquotes-20180414-29.el8_8.noarch.rpm texlive-ctable-20180414-29.el8_8.noarch.rpm texlive-ctablestack-20180414-29.el8_8.noarch.rpm texlive-currfile-20180414-29.el8_8.noarch.rpm texlive-datetime-20180414-29.el8_8.noarch.rpm texlive-dvipdfmx-20180414-29.el8_8.x86_64.rpm texlive-dvipng-20180414-29.el8_8.x86_64.rpm texlive-dvips-20180414-29.el8_8.x86_64.rpm texlive-dvisvgm-20180414-29.el8_8.x86_64.rpm texlive-ec-20180414-29.el8_8.noarch.rpm texlive-eepic-20180414-29.el8_8.noarch.rpm texlive-enctex-20180414-29.el8_8.noarch.rpm texlive-enumitem-20180414-29.el8_8.noarch.rpm texlive-environ-20180414-29.el8_8.noarch.rpm texlive-epsf-20180414-29.el8_8.noarch.rpm texlive-epstopdf-20180414-29.el8_8.noarch.rpm texlive-eqparbox-20180414-29.el8_8.noarch.rpm texlive-eso-pic-20180414-29.el8_8.noarch.rpm texlive-etex-20180414-29.el8_8.noarch.rpm! texlive-etex-pkg-20180414-29.el8_8.noarch.rpm" texlive-etoolbox-20180414-29.el8_8.noarch.rpm# texlive-euenc-20180414-29.el8_8.noarch.rpm$ texlive-euler-20180414-29.el8_8.noarch.rpm% texlive-euro-20180414-29.el8_8.noarch.rpm& texlive-eurosym-20180414-29.el8_8.noarch.rpm' texlive-extsizes-20180414-29.el8_8.noarch.rpm( texlive-fancybox-20180414-29.el8_8.noarch.rpm) texlive-fancyhdr-20180414-29.el8_8.noarch.rpm* texlive-fancyref-20180414-29.el8_8.noarch.rpm+ texlive-fancyvrb-20180414-29.el8_8.noarch.rpm, texlive-filecontents-20180414-29.el8_8.noarch.rpm- texlive-filehook-20180414-29.el8_8.noarch.rpm. texlive-finstrut-20180414-29.el8_8.noarch.rpm/ texlive-fix2col-20180414-29.el8_8.noarch.rpm0 texlive-fixlatvian-20180414-29.el8_8.noarch.rpm1 texlive-float-20180414-29.el8_8.noarch.rpm2 texlive-fmtcount-20180414-29.el8_8.noarch.rpm3 texlive-fncychap-20180414-29.el8_8.noarch.rpm4 texlive-fontawesome-20180414-29.el8_8.noarch.rpm5 texlive-fontbook-20180414-29.el8_8.noarch.rpm7 texlive-fontspec-20180414-29.el8_8.noarch.rpm6 texlive-fonts-tlwg-20180414-29.el8_8.noarch.rpm8 texlive-fontware-20180414-29.el8_8.x86_64.rpm9 texlive-fontwrap-20180414-29.el8_8.noarch.rpm: texlive-footmisc-20180414-29.el8_8.noarch.rpm; texlive-fp-20180414-29.el8_8.noarch.rpm< texlive-fpl-20180414-29.el8_8.noarch.rpm= texlive-framed-20180414-29.el8_8.noarch.rpm> texlive-garuda-c90-20180414-29.el8_8.noarch.rpm? texlive-geometry-20180414-29.el8_8.noarch.rpm@ texlive-glyphlist-20180414-29.el8_8.noarch.rpmA texlive-graphics-20180414-29.el8_8.noarch.rpmB texlive-graphics-cfg-20180414-29.el8_8.noarch.rpmC texlive-graphics-def-20180414-29.el8_8.noarch.rpmD texlive-gsftopk-20180414-29.el8_8.x86_64.rpmE texlive-helvetic-20180414-29.el8_8.noarch.rpmF texlive-hyperref-20180414-29.el8_8.noarch.rpmI texlive-hyphenat-20180414-29.el8_8.noarch.rpmH texlive-hyphen-base-20180414-29.el8_8.noarch.rpmG texlive-hyph-utf8-20180414-29.el8_8.noarch.rpmJ texlive-ifetex-20180414-29.el8_8.noarch.rpmK texlive-ifluatex-20180414-29.el8_8.noarch.rpmL texlive-ifmtarg-20180414-29.el8_8.noarch.rpmM texlive-ifoddpage-20180414-29.el8_8.noarch.rpmN texlive-iftex-20180414-29.el8_8.noarch.rpmO texlive-ifxetex-20180414-29.el8_8.noarch.rpmP texlive-import-20180414-29.el8_8.noarch.rpmQ texlive-index-20180414-29.el8_8.noarch.rpmR texlive-jadetex-20180414-29.el8_8.noarch.rpmS texlive-jknapltx-20180414-29.el8_8.noarch.rpmT texlive-kastrup-20180414-29.el8_8.noarch.rpmU texlive-kerkis-20180414-29.el8_8.noarch.rpmV texlive-knuth-lib-20180414-29.el8_8.noarch.rpmW texlive-knuth-local-20180414-29.el8_8.noarch.rpmX texlive-koma-script-20180414-29.el8_8.noarch.rpmY texlive-kpathsea-20180414-29.el8_8.x86_64.rpmZ texlive-l3experimental-20180414-29.el8_8.noarch.rpm[ texlive-l3kernel-20180414-29.el8_8.noarch.rpm\ texlive-l3packages-20180414-29.el8_8.noarch.rpm] texlive-lastpage-20180414-29.el8_8.noarch.rpm^ texlive-latex-20180414-29.el8_8.noarch.rpm` texlive-latex2man-20180414-29.el8_8.noarch.rpma texlive-latexconfig-20180414-29.el8_8.noarch.rpm_ texlive-latex-fonts-20180414-29.el8_8.noarch.rpmb texlive-lettrine-20180414-29.el8_8.noarch.rpmc texlive-lib-20180414-29.el8_8.x86_64.rpmd texlive-linegoal-20180414-29.el8_8.noarch.rpme texlive-lineno-20180414-29.el8_8.noarch.rpmf texlive-listings-20180414-29.el8_8.noarch.rpmg texlive-lm-20180414-29.el8_8.noarch.rpmh texlive-lm-math-20180414-29.el8_8.noarch.rpmi texlive-ltabptch-20180414-29.el8_8.noarch.rpmj texlive-ltxmisc-20180414-29.el8_8.noarch.rpmk texlive-lua-alt-getopt-20180414-29.el8_8.noarch.rpml texlive-lualatex-math-20180414-29.el8_8.noarch.rpmm texlive-lualibs-20180414-29.el8_8.noarch.rpmn texlive-luaotfload-20180414-29.el8_8.noarch.rpmo texlive-luatex-20180414-29.el8_8.x86_64.rpmp texlive-luatex85-20180414-29.el8_8.noarch.rpmq texlive-luatexbase-20180414-29.el8_8.noarch.rpmr texlive-makecmds-20180414-29.el8_8.noarch.rpms texlive-makeindex-20180414-29.el8_8.x86_64.rpmt texlive-manfnt-font-20180414-29.el8_8.noarch.rpmu texlive-marginnote-20180414-29.el8_8.noarch.rpmv texlive-marvosym-20180414-29.el8_8.noarch.rpmw texlive-mathpazo-20180414-29.el8_8.noarch.rpmx texlive-mathspec-20180414-29.el8_8.noarch.rpmy texlive-mathtools-20180414-29.el8_8.noarch.rpmz texlive-mdwtools-20180414-29.el8_8.noarch.rpm{ texlive-memoir-20180414-29.el8_8.noarch.rpm| texlive-metafont-20180414-29.el8_8.x86_64.rpm} texlive-metalogo-20180414-29.el8_8.noarch.rpm~ texlive-metapost-20180414-29.el8_8.x86_64.rpm texlive-mflogo-20180414-29.el8_8.noarch.rpm texlive-mflogo-font-20180414-29.el8_8.noarch.rpm texlive-mfnfss-20180414-29.el8_8.noarch.rpm texlive-mfware-20180414-29.el8_8.x86_64.rpm texlive-microtype-20180414-29.el8_8.noarch.rpm texlive-mnsymbol-20180414-29.el8_8.noarch.rpm texlive-mparhack-20180414-29.el8_8.noarch.rpm texlive-mptopdf-20180414-29.el8_8.noarch.rpm texlive-ms-20180414-29.el8_8.noarch.rpm texlive-multido-20180414-29.el8_8.noarch.rpm texlive-multirow-20180414-29.el8_8.noarch.rpm texlive-natbib-20180414-29.el8_8.noarch.rpm texlive-ncctools-20180414-29.el8_8.noarch.rpm texlive-ncntrsbk-20180414-29.el8_8.noarch.rpm texlive-needspace-20180414-29.el8_8.noarch.rpm texlive-norasi-c90-20180414-29.el8_8.noarch.rpm texlive-ntgclass-20180414-29.el8_8.noarch.rpm texlive-oberdiek-20180414-29.el8_8.noarch.rpm texlive-overpic-20180414-29.el8_8.noarch.rpm texlive-palatino-20180414-29.el8_8.noarch.rpm texlive-paralist-20180414-29.el8_8.noarch.rpm texlive-parallel-20180414-29.el8_8.noarch.rpm texlive-parskip-20180414-29.el8_8.noarch.rpm texlive-passivetex-20180414-29.el8_8.noarch.rpm texlive-pdfpages-20180414-29.el8_8.noarch.rpm texlive-pdftex-20180414-29.el8_8.x86_64.rpm texlive-pgf-20180414-29.el8_8.noarch.rpm texlive-philokalia-20180414-29.el8_8.noarch.rpm texlive-placeins-20180414-29.el8_8.noarch.rpm texlive-plain-20180414-29.el8_8.noarch.rpm texlive-polyglossia-20180414-29.el8_8.noarch.rpm texlive-powerdot-20180414-29.el8_8.noarch.rpm texlive-preprint-20180414-29.el8_8.noarch.rpm texlive-psfrag-20180414-29.el8_8.noarch.rpm! texlive-pslatex-20180414-29.el8_8.noarch.rpm" texlive-psnfss-20180414-29.el8_8.noarch.rpm# texlive-pspicture-20180414-29.el8_8.noarch.rpm$ texlive-pst-3d-20180414-29.el8_8.noarch.rpm% texlive-pst-arrow-20180414-29.el8_8.noarch.rpm& texlive-pst-blur-20180414-29.el8_8.noarch.rpm' texlive-pst-coil-20180414-29.el8_8.noarch.rpm( texlive-pst-eps-20180414-29.el8_8.noarch.rpm) texlive-pst-fill-20180414-29.el8_8.noarch.rpm* texlive-pst-grad-20180414-29.el8_8.noarch.rpm+ texlive-pst-math-20180414-29.el8_8.noarch.rpm, texlive-pst-node-20180414-29.el8_8.noarch.rpm- texlive-pst-plot-20180414-29.el8_8.noarch.rpm2 texlive-pstricks-20180414-29.el8_8.noarch.rpm3 texlive-pstricks-add-20180414-29.el8_8.noarch.rpm. texlive-pst-slpe-20180414-29.el8_8.noarch.rpm/ texlive-pst-text-20180414-29.el8_8.noarch.rpm0 texlive-pst-tools-20180414-29.el8_8.noarch.rpm1 texlive-pst-tree-20180414-29.el8_8.noarch.rpm4 texlive-ptext-20180414-29.el8_8.noarch.rpm5 texlive-pxfonts-20180414-29.el8_8.noarch.rpm6 texlive-qstest-20180414-29.el8_8.noarch.rpm7 texlive-rcs-20180414-29.el8_8.noarch.rpm8 texlive-realscripts-20180414-29.el8_8.noarch.rpm9 texlive-rsfs-20180414-29.el8_8.noarch.rpm: texlive-sansmath-20180414-29.el8_8.noarch.rpm; texlive-sauerj-20180414-29.el8_8.noarch.rpm< texlive-scheme-basic-20180414-29.el8_8.noarch.rpm= texlive-section-20180414-29.el8_8.noarch.rpm> texlive-sectsty-20180414-29.el8_8.noarch.rpm? texlive-seminar-20180414-29.el8_8.noarch.rpm@ texlive-sepnum-20180414-29.el8_8.noarch.rpmA texlive-setspace-20180414-29.el8_8.noarch.rpmB texlive-showexpl-20180414-29.el8_8.noarch.rpmC texlive-soul-20180414-29.el8_8.noarch.rpmD texlive-stmaryrd-20180414-29.el8_8.noarch.rpmE texlive-subfig-20180414-29.el8_8.noarch.rpmF texlive-subfigure-20180414-29.el8_8.noarch.rpmG texlive-svn-prov-20180414-29.el8_8.noarch.rpmH texlive-symbol-20180414-29.el8_8.noarch.rpmI texlive-t2-20180414-29.el8_8.noarch.rpmJ texlive-tabu-20180414-29.el8_8.noarch.rpmK texlive-tabulary-20180414-29.el8_8.noarch.rpmL texlive-tetex-20180414-29.el8_8.noarch.rpmM texlive-tex-20180414-29.el8_8.x86_64.rpmQ texlive-tex4ht-20180414-29.el8_8.x86_64.rpmR texlive-texconfig-20180414-29.el8_8.noarch.rpmN texlive-tex-gyre-20180414-29.el8_8.noarch.rpmO texlive-tex-gyre-math-20180414-29.el8_8.noarch.rpmP texlive-tex-ini-files-20180414-29.el8_8.noarch.rpmS texlive-texlive-common-doc-20180414-29.el8_8.noarch.rpmT texlive-texlive-docindex-20180414-29.el8_8.noarch.rpmU texlive-texlive-en-20180414-29.el8_8.noarch.rpmX texlive-texlive.infra-20180414-29.el8_8.noarch.rpmV texlive-texlive-msg-translations-20180414-29.el8_8.noarch.rpmW texlive-texlive-scripts-20180414-29.el8_8.noarch.rpmY texlive-textcase-20180414-29.el8_8.noarch.rpmZ texlive-textpos-20180414-29.el8_8.noarch.rpm[ texlive-threeparttable-20180414-29.el8_8.noarch.rpm\ texlive-thumbpdf-20180414-29.el8_8.noarch.rpm] texlive-times-20180414-29.el8_8.noarch.rpm^ texlive-tipa-20180414-29.el8_8.noarch.rpm_ texlive-titlesec-20180414-29.el8_8.noarch.rpm` texlive-titling-20180414-29.el8_8.noarch.rpma texlive-tocloft-20180414-29.el8_8.noarch.rpmb texlive-tools-20180414-29.el8_8.noarch.rpm0 texlive-translator-20180414-29.el8_8.noarch.rpmc texlive-trimspaces-20180414-29.el8_8.noarch.rpmd texlive-txfonts-20180414-29.el8_8.noarch.rpme texlive-type1cm-20180414-29.el8_8.noarch.rpmf texlive-typehtml-20180414-29.el8_8.noarch.rpmg texlive-ucharclasses-20180414-29.el8_8.noarch.rpmh texlive-ucs-20180414-29.el8_8.noarch.rpmi texlive-uhc-20180414-29.el8_8.noarch.rpmj texlive-ulem-20180414-29.el8_8.noarch.rpmk texlive-underscore-20180414-29.el8_8.noarch.rpml texlive-unicode-data-20180414-29.el8_8.noarch.rpmm texlive-unicode-math-20180414-29.el8_8.noarch.rpmn texlive-unisugar-20180414-29.el8_8.noarch.rpmo texlive-updmap-map-20180414-29.el8_8.noarch.rpmp texlive-upquote-20180414-29.el8_8.noarch.rpmq texlive-url-20180414-29.el8_8.noarch.rpmr texlive-utopia-20180414-29.el8_8.noarch.rpms texlive-varwidth-20180414-29.el8_8.noarch.rpmt texlive-wadalab-20180414-29.el8_8.noarch.rpmu texlive-was-20180414-29.el8_8.noarch.rpmv texlive-wasy-20180414-29.el8_8.noarch.rpmw texlive-wasy2-ps-20180414-29.el8_8.noarch.rpmx texlive-wasysym-20180414-29.el8_8.noarch.rpmy texlive-wrapfig-20180414-29.el8_8.noarch.rpmz texlive-xcolor-20180414-29.el8_8.noarch.rpm{ texlive-xdvi-20180414-29.el8_8.x86_64.rpm| texlive-xecjk-20180414-29.el8_8.noarch.rpm} texlive-xecolor-20180414-29.el8_8.noarch.rpm~ texlive-xecyr-20180414-29.el8_8.noarch.rpm texlive-xeindex-20180414-29.el8_8.noarch.rpm texlive-xepersian-20180414-29.el8_8.noarch.rpm texlive-xesearch-20180414-29.el8_8.noarch.rpm texlive-xetex-20180414-29.el8_8.x86_64.rpm texlive-xetexconfig-20180414-29.el8_8.noarch.rpm texlive-xetexfontinfo-20180414-29.el8_8.noarch.rpm texlive-xetex-itrans-20180414-29.el8_8.noarch.rpm texlive-xetex-pstricks-20180414-29.el8_8.noarch.rpm texlive-xetex-tibetan-20180414-29.el8_8.noarch.rpm texlive-xifthen-20180414-29.el8_8.noarch.rpm texlive-xkeyval-20180414-29.el8_8.noarch.rpm texlive-xltxtra-20180414-29.el8_8.noarch.rpm texlive-xmltex-20180414-29.el8_8.noarch.rpm texlive-xmltexconfig-20180414-29.el8_8.noarch.rpm texlive-xstring-20180414-29.el8_8.noarch.rpm texlive-xtab-20180414-29.el8_8.noarch.rpm texlive-xunicode-20180414-29.el8_8.noarch.rpm texlive-zapfchan-20180414-29.el8_8.noarch.rpm texlive-zapfding-20180414-29.el8_8.noarch.rpm>U texlive-20180414-29.el8_8.x86_64.rpmV texlive-adjustbox-20180414-29.el8_8.noarch.rpmW texlive-ae-20180414-29.el8_8.noarch.rpmX texlive-algorithms-20180414-29.el8_8.noarch.rpmY texlive-amscls-20180414-29.el8_8.noarch.rpmZ texlive-amsfonts-20180414-29.el8_8.noarch.rpm[ texlive-amsmath-20180414-29.el8_8.noarch.rpm\ texlive-anyfontsize-20180414-29.el8_8.noarch.rpm] texlive-anysize-20180414-29.el8_8.noarch.rpm^ texlive-appendix-20180414-29.el8_8.noarch.rpm_ texlive-arabxetex-20180414-29.el8_8.noarch.rpm` texlive-arphic-20180414-29.el8_8.noarch.rpma texlive-attachfile-20180414-29.el8_8.noarch.rpmb texlive-avantgar-20180414-29.el8_8.noarch.rpmc texlive-awesomebox-20180414-29.el8_8.noarch.rpmd texlive-babel-20180414-29.el8_8.noarch.rpmf texlive-babelbib-20180414-29.el8_8.noarch.rpme texlive-babel-english-20180414-29.el8_8.noarch.rpmg texlive-base-20180414-29.el8_8.noarch.rpmh texlive-beamer-20180414-29.el8_8.noarch.rpmi texlive-bera-20180414-29.el8_8.noarch.rpmj texlive-beton-20180414-29.el8_8.noarch.rpmk texlive-bibtex-20180414-29.el8_8.x86_64.rpml texlive-bibtopic-20180414-29.el8_8.noarch.rpmm texlive-bidi-20180414-29.el8_8.noarch.rpmn texlive-bigfoot-20180414-29.el8_8.noarch.rpmo texlive-bookman-20180414-29.el8_8.noarch.rpmp texlive-booktabs-20180414-29.el8_8.noarch.rpmq texlive-breakurl-20180414-29.el8_8.noarch.rpmr texlive-breqn-20180414-29.el8_8.noarch.rpmt texlive-caption-20180414-29.el8_8.noarch.rpms texlive-capt-of-20180414-29.el8_8.noarch.rpmu texlive-carlisle-20180414-29.el8_8.noarch.rpmv texlive-changebar-20180414-29.el8_8.noarch.rpmw texlive-changepage-20180414-29.el8_8.noarch.rpmx texlive-charter-20180414-29.el8_8.noarch.rpmy texlive-chngcntr-20180414-29.el8_8.noarch.rpmz texlive-cite-20180414-29.el8_8.noarch.rpm{ texlive-cjk-20180414-29.el8_8.noarch.rpm| texlive-classpack-20180414-29.el8_8.noarch.rpm} texlive-cm-20180414-29.el8_8.noarch.rpm texlive-cmap-20180414-29.el8_8.noarch.rpm texlive-cmextra-20180414-29.el8_8.noarch.rpm~ texlive-cm-lgc-20180414-29.el8_8.noarch.rpm texlive-cm-super-20180414-29.el8_8.noarch.rpm texlive-cns-20180414-29.el8_8.noarch.rpm texlive-collectbox-20180414-29.el8_8.noarch.rpm texlive-collection-basic-20180414-29.el8_8.noarch.rpm texlive-collection-fontsrecommended-20180414-29.el8_8.noarch.rpm texlive-collection-htmlxml-20180414-29.el8_8.noarch.rpm texlive-collection-latex-20180414-29.el8_8.noarch.rpm texlive-collection-latexrecommended-20180414-29.el8_8.noarch.rpm texlive-collection-xetex-20180414-29.el8_8.noarch.rpm texlive-colortbl-20180414-29.el8_8.noarch.rpm texlive-context-20180414-29.el8_8.noarch.rpm texlive-courier-20180414-29.el8_8.noarch.rpm texlive-crop-20180414-29.el8_8.noarch.rpm texlive-csquotes-20180414-29.el8_8.noarch.rpm texlive-ctable-20180414-29.el8_8.noarch.rpm texlive-ctablestack-20180414-29.el8_8.noarch.rpm texlive-currfile-20180414-29.el8_8.noarch.rpm texlive-datetime-20180414-29.el8_8.noarch.rpm texlive-dvipdfmx-20180414-29.el8_8.x86_64.rpm texlive-dvipng-20180414-29.el8_8.x86_64.rpm texlive-dvips-20180414-29.el8_8.x86_64.rpm texlive-dvisvgm-20180414-29.el8_8.x86_64.rpm texlive-ec-20180414-29.el8_8.noarch.rpm texlive-eepic-20180414-29.el8_8.noarch.rpm texlive-enctex-20180414-29.el8_8.noarch.rpm texlive-enumitem-20180414-29.el8_8.noarch.rpm texlive-environ-20180414-29.el8_8.noarch.rpm texlive-epsf-20180414-29.el8_8.noarch.rpm texlive-epstopdf-20180414-29.el8_8.noarch.rpm texlive-eqparbox-20180414-29.el8_8.noarch.rpm texlive-eso-pic-20180414-29.el8_8.noarch.rpm texlive-etex-20180414-29.el8_8.noarch.rpm! texlive-etex-pkg-20180414-29.el8_8.noarch.rpm" texlive-etoolbox-20180414-29.el8_8.noarch.rpm# texlive-euenc-20180414-29.el8_8.noarch.rpm$ texlive-euler-20180414-29.el8_8.noarch.rpm% texlive-euro-20180414-29.el8_8.noarch.rpm& texlive-eurosym-20180414-29.el8_8.noarch.rpm' texlive-extsizes-20180414-29.el8_8.noarch.rpm( texlive-fancybox-20180414-29.el8_8.noarch.rpm) texlive-fancyhdr-20180414-29.el8_8.noarch.rpm* texlive-fancyref-20180414-29.el8_8.noarch.rpm+ texlive-fancyvrb-20180414-29.el8_8.noarch.rpm, texlive-filecontents-20180414-29.el8_8.noarch.rpm- texlive-filehook-20180414-29.el8_8.noarch.rpm. texlive-finstrut-20180414-29.el8_8.noarch.rpm/ texlive-fix2col-20180414-29.el8_8.noarch.rpm0 texlive-fixlatvian-20180414-29.el8_8.noarch.rpm1 texlive-float-20180414-29.el8_8.noarch.rpm2 texlive-fmtcount-20180414-29.el8_8.noarch.rpm3 texlive-fncychap-20180414-29.el8_8.noarch.rpm4 texlive-fontawesome-20180414-29.el8_8.noarch.rpm5 texlive-fontbook-20180414-29.el8_8.noarch.rpm7 texlive-fontspec-20180414-29.el8_8.noarch.rpm6 texlive-fonts-tlwg-20180414-29.el8_8.noarch.rpm8 texlive-fontware-20180414-29.el8_8.x86_64.rpm9 texlive-fontwrap-20180414-29.el8_8.noarch.rpm: texlive-footmisc-20180414-29.el8_8.noarch.rpm; texlive-fp-20180414-29.el8_8.noarch.rpm< texlive-fpl-20180414-29.el8_8.noarch.rpm= texlive-framed-20180414-29.el8_8.noarch.rpm> texlive-garuda-c90-20180414-29.el8_8.noarch.rpm? texlive-geometry-20180414-29.el8_8.noarch.rpm@ texlive-glyphlist-20180414-29.el8_8.noarch.rpmA texlive-graphics-20180414-29.el8_8.noarch.rpmB texlive-graphics-cfg-20180414-29.el8_8.noarch.rpmC texlive-graphics-def-20180414-29.el8_8.noarch.rpmD texlive-gsftopk-20180414-29.el8_8.x86_64.rpmE texlive-helvetic-20180414-29.el8_8.noarch.rpmF texlive-hyperref-20180414-29.el8_8.noarch.rpmI texlive-hyphenat-20180414-29.el8_8.noarch.rpmH texlive-hyphen-base-20180414-29.el8_8.noarch.rpmG texlive-hyph-utf8-20180414-29.el8_8.noarch.rpmJ texlive-ifetex-20180414-29.el8_8.noarch.rpmK texlive-ifluatex-20180414-29.el8_8.noarch.rpmL texlive-ifmtarg-20180414-29.el8_8.noarch.rpmM texlive-ifoddpage-20180414-29.el8_8.noarch.rpmN texlive-iftex-20180414-29.el8_8.noarch.rpmO texlive-ifxetex-20180414-29.el8_8.noarch.rpmP texlive-import-20180414-29.el8_8.noarch.rpmQ texlive-index-20180414-29.el8_8.noarch.rpmR texlive-jadetex-20180414-29.el8_8.noarch.rpmS texlive-jknapltx-20180414-29.el8_8.noarch.rpmT texlive-kastrup-20180414-29.el8_8.noarch.rpmU texlive-kerkis-20180414-29.el8_8.noarch.rpmV texlive-knuth-lib-20180414-29.el8_8.noarch.rpmW texlive-knuth-local-20180414-29.el8_8.noarch.rpmX texlive-koma-script-20180414-29.el8_8.noarch.rpmY texlive-kpathsea-20180414-29.el8_8.x86_64.rpmZ texlive-l3experimental-20180414-29.el8_8.noarch.rpm[ texlive-l3kernel-20180414-29.el8_8.noarch.rpm\ texlive-l3packages-20180414-29.el8_8.noarch.rpm] texlive-lastpage-20180414-29.el8_8.noarch.rpm^ texlive-latex-20180414-29.el8_8.noarch.rpm` texlive-latex2man-20180414-29.el8_8.noarch.rpma texlive-latexconfig-20180414-29.el8_8.noarch.rpm_ texlive-latex-fonts-20180414-29.el8_8.noarch.rpmb texlive-lettrine-20180414-29.el8_8.noarch.rpmc texlive-lib-20180414-29.el8_8.x86_64.rpmd texlive-linegoal-20180414-29.el8_8.noarch.rpme texlive-lineno-20180414-29.el8_8.noarch.rpmf texlive-listings-20180414-29.el8_8.noarch.rpmg texlive-lm-20180414-29.el8_8.noarch.rpmh texlive-lm-math-20180414-29.el8_8.noarch.rpmi texlive-ltabptch-20180414-29.el8_8.noarch.rpmj texlive-ltxmisc-20180414-29.el8_8.noarch.rpmk texlive-lua-alt-getopt-20180414-29.el8_8.noarch.rpml texlive-lualatex-math-20180414-29.el8_8.noarch.rpmm texlive-lualibs-20180414-29.el8_8.noarch.rpmn texlive-luaotfload-20180414-29.el8_8.noarch.rpmo texlive-luatex-20180414-29.el8_8.x86_64.rpmp texlive-luatex85-20180414-29.el8_8.noarch.rpmq texlive-luatexbase-20180414-29.el8_8.noarch.rpmr texlive-makecmds-20180414-29.el8_8.noarch.rpms texlive-makeindex-20180414-29.el8_8.x86_64.rpmt texlive-manfnt-font-20180414-29.el8_8.noarch.rpmu texlive-marginnote-20180414-29.el8_8.noarch.rpmv texlive-marvosym-20180414-29.el8_8.noarch.rpmw texlive-mathpazo-20180414-29.el8_8.noarch.rpmx texlive-mathspec-20180414-29.el8_8.noarch.rpmy texlive-mathtools-20180414-29.el8_8.noarch.rpmz texlive-mdwtools-20180414-29.el8_8.noarch.rpm{ texlive-memoir-20180414-29.el8_8.noarch.rpm| texlive-metafont-20180414-29.el8_8.x86_64.rpm} texlive-metalogo-20180414-29.el8_8.noarch.rpm~ texlive-metapost-20180414-29.el8_8.x86_64.rpm texlive-mflogo-20180414-29.el8_8.noarch.rpm texlive-mflogo-font-20180414-29.el8_8.noarch.rpm texlive-mfnfss-20180414-29.el8_8.noarch.rpm texlive-mfware-20180414-29.el8_8.x86_64.rpm texlive-microtype-20180414-29.el8_8.noarch.rpm texlive-mnsymbol-20180414-29.el8_8.noarch.rpm texlive-mparhack-20180414-29.el8_8.noarch.rpm texlive-mptopdf-20180414-29.el8_8.noarch.rpm texlive-ms-20180414-29.el8_8.noarch.rpm texlive-multido-20180414-29.el8_8.noarch.rpm texlive-multirow-20180414-29.el8_8.noarch.rpm texlive-natbib-20180414-29.el8_8.noarch.rpm texlive-ncctools-20180414-29.el8_8.noarch.rpm texlive-ncntrsbk-20180414-29.el8_8.noarch.rpm texlive-needspace-20180414-29.el8_8.noarch.rpm texlive-norasi-c90-20180414-29.el8_8.noarch.rpm texlive-ntgclass-20180414-29.el8_8.noarch.rpm texlive-oberdiek-20180414-29.el8_8.noarch.rpm texlive-overpic-20180414-29.el8_8.noarch.rpm texlive-palatino-20180414-29.el8_8.noarch.rpm texlive-paralist-20180414-29.el8_8.noarch.rpm texlive-parallel-20180414-29.el8_8.noarch.rpm texlive-parskip-20180414-29.el8_8.noarch.rpm texlive-passivetex-20180414-29.el8_8.noarch.rpm texlive-pdfpages-20180414-29.el8_8.noarch.rpm texlive-pdftex-20180414-29.el8_8.x86_64.rpm texlive-pgf-20180414-29.el8_8.noarch.rpm texlive-philokalia-20180414-29.el8_8.noarch.rpm texlive-placeins-20180414-29.el8_8.noarch.rpm texlive-plain-20180414-29.el8_8.noarch.rpm texlive-polyglossia-20180414-29.el8_8.noarch.rpm texlive-powerdot-20180414-29.el8_8.noarch.rpm texlive-preprint-20180414-29.el8_8.noarch.rpm texlive-psfrag-20180414-29.el8_8.noarch.rpm! texlive-pslatex-20180414-29.el8_8.noarch.rpm" texlive-psnfss-20180414-29.el8_8.noarch.rpm# texlive-pspicture-20180414-29.el8_8.noarch.rpm$ texlive-pst-3d-20180414-29.el8_8.noarch.rpm% texlive-pst-arrow-20180414-29.el8_8.noarch.rpm& texlive-pst-blur-20180414-29.el8_8.noarch.rpm' texlive-pst-coil-20180414-29.el8_8.noarch.rpm( texlive-pst-eps-20180414-29.el8_8.noarch.rpm) texlive-pst-fill-20180414-29.el8_8.noarch.rpm* texlive-pst-grad-20180414-29.el8_8.noarch.rpm+ texlive-pst-math-20180414-29.el8_8.noarch.rpm, texlive-pst-node-20180414-29.el8_8.noarch.rpm- texlive-pst-plot-20180414-29.el8_8.noarch.rpm2 texlive-pstricks-20180414-29.el8_8.noarch.rpm3 texlive-pstricks-add-20180414-29.el8_8.noarch.rpm. texlive-pst-slpe-20180414-29.el8_8.noarch.rpm/ texlive-pst-text-20180414-29.el8_8.noarch.rpm0 texlive-pst-tools-20180414-29.el8_8.noarch.rpm1 texlive-pst-tree-20180414-29.el8_8.noarch.rpm4 texlive-ptext-20180414-29.el8_8.noarch.rpm5 texlive-pxfonts-20180414-29.el8_8.noarch.rpm6 texlive-qstest-20180414-29.el8_8.noarch.rpm7 texlive-rcs-20180414-29.el8_8.noarch.rpm8 texlive-realscripts-20180414-29.el8_8.noarch.rpm9 texlive-rsfs-20180414-29.el8_8.noarch.rpm: texlive-sansmath-20180414-29.el8_8.noarch.rpm; texlive-sauerj-20180414-29.el8_8.noarch.rpm< texlive-scheme-basic-20180414-29.el8_8.noarch.rpm= texlive-section-20180414-29.el8_8.noarch.rpm> texlive-sectsty-20180414-29.el8_8.noarch.rpm? texlive-seminar-20180414-29.el8_8.noarch.rpm@ texlive-sepnum-20180414-29.el8_8.noarch.rpmA texlive-setspace-20180414-29.el8_8.noarch.rpmB texlive-showexpl-20180414-29.el8_8.noarch.rpmC texlive-soul-20180414-29.el8_8.noarch.rpmD texlive-stmaryrd-20180414-29.el8_8.noarch.rpmE texlive-subfig-20180414-29.el8_8.noarch.rpmF texlive-subfigure-20180414-29.el8_8.noarch.rpmG texlive-svn-prov-20180414-29.el8_8.noarch.rpmH texlive-symbol-20180414-29.el8_8.noarch.rpmI texlive-t2-20180414-29.el8_8.noarch.rpmJ texlive-tabu-20180414-29.el8_8.noarch.rpmK texlive-tabulary-20180414-29.el8_8.noarch.rpmL texlive-tetex-20180414-29.el8_8.noarch.rpmM texlive-tex-20180414-29.el8_8.x86_64.rpmQ texlive-tex4ht-20180414-29.el8_8.x86_64.rpmR texlive-texconfig-20180414-29.el8_8.noarch.rpmN texlive-tex-gyre-20180414-29.el8_8.noarch.rpmO texlive-tex-gyre-math-20180414-29.el8_8.noarch.rpmP texlive-tex-ini-files-20180414-29.el8_8.noarch.rpmS texlive-texlive-common-doc-20180414-29.el8_8.noarch.rpmT texlive-texlive-docindex-20180414-29.el8_8.noarch.rpmU texlive-texlive-en-20180414-29.el8_8.noarch.rpmX texlive-texlive.infra-20180414-29.el8_8.noarch.rpmV texlive-texlive-msg-translations-20180414-29.el8_8.noarch.rpmW texlive-texlive-scripts-20180414-29.el8_8.noarch.rpmY texlive-textcase-20180414-29.el8_8.noarch.rpmZ texlive-textpos-20180414-29.el8_8.noarch.rpm[ texlive-threeparttable-20180414-29.el8_8.noarch.rpm\ texlive-thumbpdf-20180414-29.el8_8.noarch.rpm] texlive-times-20180414-29.el8_8.noarch.rpm^ texlive-tipa-20180414-29.el8_8.noarch.rpm_ texlive-titlesec-20180414-29.el8_8.noarch.rpm` texlive-titling-20180414-29.el8_8.noarch.rpma texlive-tocloft-20180414-29.el8_8.noarch.rpmb texlive-tools-20180414-29.el8_8.noarch.rpm0 texlive-translator-20180414-29.el8_8.noarch.rpmc texlive-trimspaces-20180414-29.el8_8.noarch.rpmd texlive-txfonts-20180414-29.el8_8.noarch.rpme texlive-type1cm-20180414-29.el8_8.noarch.rpmf texlive-typehtml-20180414-29.el8_8.noarch.rpmg texlive-ucharclasses-20180414-29.el8_8.noarch.rpmh texlive-ucs-20180414-29.el8_8.noarch.rpmi texlive-uhc-20180414-29.el8_8.noarch.rpmj texlive-ulem-20180414-29.el8_8.noarch.rpmk texlive-underscore-20180414-29.el8_8.noarch.rpml texlive-unicode-data-20180414-29.el8_8.noarch.rpmm texlive-unicode-math-20180414-29.el8_8.noarch.rpmn texlive-unisugar-20180414-29.el8_8.noarch.rpmo texlive-updmap-map-20180414-29.el8_8.noarch.rpmp texlive-upquote-20180414-29.el8_8.noarch.rpmq texlive-url-20180414-29.el8_8.noarch.rpmr texlive-utopia-20180414-29.el8_8.noarch.rpms texlive-varwidth-20180414-29.el8_8.noarch.rpmt texlive-wadalab-20180414-29.el8_8.noarch.rpmu texlive-was-20180414-29.el8_8.noarch.rpmv texlive-wasy-20180414-29.el8_8.noarch.rpmw texlive-wasy2-ps-20180414-29.el8_8.noarch.rpmx texlive-wasysym-20180414-29.el8_8.noarch.rpmy texlive-wrapfig-20180414-29.el8_8.noarch.rpmz texlive-xcolor-20180414-29.el8_8.noarch.rpm{ texlive-xdvi-20180414-29.el8_8.x86_64.rpm| texlive-xecjk-20180414-29.el8_8.noarch.rpm} texlive-xecolor-20180414-29.el8_8.noarch.rpm~ texlive-xecyr-20180414-29.el8_8.noarch.rpm texlive-xeindex-20180414-29.el8_8.noarch.rpm texlive-xepersian-20180414-29.el8_8.noarch.rpm texlive-xesearch-20180414-29.el8_8.noarch.rpm texlive-xetex-20180414-29.el8_8.x86_64.rpm texlive-xetexconfig-20180414-29.el8_8.noarch.rpm texlive-xetexfontinfo-20180414-29.el8_8.noarch.rpm texlive-xetex-itrans-20180414-29.el8_8.noarch.rpm texlive-xetex-pstricks-20180414-29.el8_8.noarch.rpm texlive-xetex-tibetan-20180414-29.el8_8.noarch.rpm texlive-xifthen-20180414-29.el8_8.noarch.rpm texlive-xkeyval-20180414-29.el8_8.noarch.rpm texlive-xltxtra-20180414-29.el8_8.noarch.rpm texlive-xmltex-20180414-29.el8_8.noarch.rpm texlive-xmltexconfig-20180414-29.el8_8.noarch.rpm texlive-xstring-20180414-29.el8_8.noarch.rpm texlive-xtab-20180414-29.el8_8.noarch.rpm texlive-xunicode-20180414-29.el8_8.noarch.rpm texlive-zapfchan-20180414-29.el8_8.noarch.rpm texlive-zapfding-20180414-29.el8_8.noarch.rpmsl zBBsecurityModerate: libtiff security update|$https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48281CVE-2022-48281CVE-2022-48281https://bugzilla.redhat.com/show_bug.cgi?id=21636062163606https://errata.rockylinux.org/RLSA-2023:3827RLSA-2023:3827RLSA-2023:3827 @6libtiff-4.0.9-28.el8_8.x86_64.rpmA6libtiff-devel-4.0.9-28.el8_8.x86_64.rpm@6libtiff-4.0.9-28.el8_8.x86_64.rpmA6libtiff-devel-4.0.9-28.el8_8.x86_64.rpmÌUf BBbugfixansible-core bug fix and enhancement update F https://bugzilla.redhat.com/show_bug.cgi?id=22124452212445https://errata.rockylinux.org/RLBA-2023:3828RLBA-2023:3828RLBA-2023:3828 mtansible-core-2.14.2-4.el8_8.x86_64.rpmntansible-test-2.14.2-4.el8_8.x86_64.rpmmtansible-core-2.14.2-4.el8_8.x86_64.rpmntansible-test-2.14.2-4.el8_8.x86_64.rpmÌUh DBBBBbugfixnmstate enhancement updatef1 https://bugzilla.redhat.com/show_bug.cgi?id=22135542213554bonding and allowing custom/specifying routes with nmstate.https://errata.rockylinux.org/RLBA-2023:3832RLBA-2023:3832RLBA-2023:3832 WMnmstate-1.4.4-2.el8_8.x86_64.rpmXMnmstate-libs-1.4.4-2.el8_8.x86_64.rpmuMnmstate-plugin-ovsdb-1.4.4-2.el8_8.noarch.rpmMpython3-libnmstate-1.4.4-2.el8_8.noarch.rpmWMnmstate-1.4.4-2.el8_8.x86_64.rpmXMnmstate-libs-1.4.4-2.el8_8.x86_64.rpmuMnmstate-plugin-ovsdb-1.4.4-2.el8_8.noarch.rpmMpython3-libnmstate-1.4.4-2.el8_8.noarch.rpmÌVi bugfixrhel-system-roles bug fix updatek https://bugzilla.redhat.com/show_bug.cgi?id=22142832214283registeredhttps://bugzilla.redhat.com/show_bug.cgi?id=22142872214287* rhc system role does not apply Insights tagshttps://errata.rockylinux.org/RLBA-2023:3833RLBA-2023:3833RLBA-2023:3833 8Zrhel-system-roles-1.21.2-1.el8_8.noarch.rpm8Zrhel-system-roles-1.21.2-1.el8_8.noarch.rpmÌVj MBBBBBBBBBBBBBBbugfix.NET 6.0 bugfix update  https://errata.rockylinux.org/RLBA-2023:3834RLBA-2023:3834RLBA-2023:3834 Z&aspnetcore-runtime-6.0-6.0.19-1.el8_8.x86_64.rpm[&aspnetcore-targeting-pack-6.0-6.0.19-1.el8_8.x86_64.rpm\&dotnet-apphost-pack-6.0-6.0.19-1.el8_8.x86_64.rpm]&dotnet-hostfxr-6.0-6.0.19-1.el8_8.x86_64.rpm^&dotnet-runtime-6.0-6.0.19-1.el8_8.x86_64.rpm_Odotnet-sdk-6.0-6.0.119-1.el8_8.x86_64.rpm`&dotnet-targeting-pack-6.0-6.0.19-1.el8_8.x86_64.rpmaOdotnet-templates-6.0-6.0.119-1.el8_8.x86_64.rpmZ&aspnetcore-runtime-6.0-6.0.19-1.el8_8.x86_64.rpm[&aspnetcore-targeting-pack-6.0-6.0.19-1.el8_8.x86_64.rpm\&dotnet-apphost-pack-6.0-6.0.19-1.el8_8.x86_64.rpm]&dotnet-hostfxr-6.0-6.0.19-1.el8_8.x86_64.rpm^&dotnet-runtime-6.0-6.0.19-1.el8_8.x86_64.rpm_Odotnet-sdk-6.0-6.0.119-1.el8_8.x86_64.rpm`&dotnet-targeting-pack-6.0-6.0.19-1.el8_8.x86_64.rpmaOdotnet-templates-6.0-6.0.119-1.el8_8.x86_64.rpmÌVk 4^BBBBBBBBBBBBBBBBBBBBbugfix.NET 7.0 bugfix update  https://errata.rockylinux.org/RLBA-2023:3835RLBA-2023:3835RLBA-2023:3835 SJaspnetcore-runtime-7.0-7.0.8-1.el8_8.x86_64.rpmTJaspnetcore-targeting-pack-7.0-7.0.8-1.el8_8.x86_64.rpmdotnet-7.0.108-1.el8_8.x86_64.rpmUJdotnet-apphost-pack-7.0-7.0.8-1.el8_8.x86_64.rpmJdotnet-host-7.0.8-1.el8_8.x86_64.rpmVJdotnet-hostfxr-7.0-7.0.8-1.el8_8.x86_64.rpmWJdotnet-runtime-7.0-7.0.8-1.el8_8.x86_64.rpmXdotnet-sdk-7.0-7.0.108-1.el8_8.x86_64.rpmYJdotnet-targeting-pack-7.0-7.0.8-1.el8_8.x86_64.rpmZdotnet-templates-7.0-7.0.108-1.el8_8.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.108-1.el8_8.x86_64.rpm SJaspnetcore-runtime-7.0-7.0.8-1.el8_8.x86_64.rpmTJaspnetcore-targeting-pack-7.0-7.0.8-1.el8_8.x86_64.rpmdotnet-7.0.108-1.el8_8.x86_64.rpmUJdotnet-apphost-pack-7.0-7.0.8-1.el8_8.x86_64.rpmJdotnet-host-7.0.8-1.el8_8.x86_64.rpmVJdotnet-hostfxr-7.0-7.0.8-1.el8_8.x86_64.rpmWJdotnet-runtime-7.0-7.0.8-1.el8_8.x86_64.rpmXdotnet-sdk-7.0-7.0.108-1.el8_8.x86_64.rpmYJdotnet-targeting-pack-7.0-7.0.8-1.el8_8.x86_64.rpmZdotnet-templates-7.0-7.0.108-1.el8_8.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.108-1.el8_8.x86_64.rpmÌVh uBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 7.0 security, bug fix, and enhancement updateEhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33170CVE-2023-33170CVE-2023-33170https://bugzilla.redhat.com/show_bug.cgi?id=22218542221854https://errata.rockylinux.org/RLSA-2023:4058RLSA-2023:4058RLSA-2023:4058 SKaspnetcore-runtime-7.0-7.0.9-1.el8_8.x86_64.rpmTKaspnetcore-targeting-pack-7.0-7.0.9-1.el8_8.x86_64.rpmdotnet-7.0.109-1.el8_8.x86_64.rpmUKdotnet-apphost-pack-7.0-7.0.9-1.el8_8.x86_64.rpmKdotnet-host-7.0.9-1.el8_8.x86_64.rpmVKdotnet-hostfxr-7.0-7.0.9-1.el8_8.x86_64.rpmWKdotnet-runtime-7.0-7.0.9-1.el8_8.x86_64.rpmXdotnet-sdk-7.0-7.0.109-1.el8_8.x86_64.rpmYKdotnet-targeting-pack-7.0-7.0.9-1.el8_8.x86_64.rpmZdotnet-templates-7.0-7.0.109-1.el8_8.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.109-1.el8_8.x86_64.rpm SKaspnetcore-runtime-7.0-7.0.9-1.el8_8.x86_64.rpmTKaspnetcore-targeting-pack-7.0-7.0.9-1.el8_8.x86_64.rpmdotnet-7.0.109-1.el8_8.x86_64.rpmUKdotnet-apphost-pack-7.0-7.0.9-1.el8_8.x86_64.rpmKdotnet-host-7.0.9-1.el8_8.x86_64.rpmVKdotnet-hostfxr-7.0-7.0.9-1.el8_8.x86_64.rpmWKdotnet-runtime-7.0-7.0.9-1.el8_8.x86_64.rpmXdotnet-sdk-7.0-7.0.109-1.el8_8.x86_64.rpmYKdotnet-targeting-pack-7.0-7.0.9-1.el8_8.x86_64.rpmZdotnet-templates-7.0-7.0.109-1.el8_8.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.109-1.el8_8.x86_64.rpmÌVi LBBBBBBBBBBBBBBsecurityImportant: .NET 6.0 security, bug fix, and enhancement update\Fhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33170CVE-2023-33170CVE-2023-33170https://bugzilla.redhat.com/show_bug.cgi?id=22218542221854https://errata.rockylinux.org/RLSA-2023:4059RLSA-2023:4059RLSA-2023:4059 Z'aspnetcore-runtime-6.0-6.0.20-1.el8_8.x86_64.rpm['aspnetcore-targeting-pack-6.0-6.0.20-1.el8_8.x86_64.rpm\'dotnet-apphost-pack-6.0-6.0.20-1.el8_8.x86_64.rpm]'dotnet-hostfxr-6.0-6.0.20-1.el8_8.x86_64.rpm^'dotnet-runtime-6.0-6.0.20-1.el8_8.x86_64.rpm_Pdotnet-sdk-6.0-6.0.120-1.el8_8.x86_64.rpm`'dotnet-targeting-pack-6.0-6.0.20-1.el8_8.x86_64.rpmaPdotnet-templates-6.0-6.0.120-1.el8_8.x86_64.rpmZ'aspnetcore-runtime-6.0-6.0.20-1.el8_8.x86_64.rpm['aspnetcore-targeting-pack-6.0-6.0.20-1.el8_8.x86_64.rpm\'dotnet-apphost-pack-6.0-6.0.20-1.el8_8.x86_64.rpm]'dotnet-hostfxr-6.0-6.0.20-1.el8_8.x86_64.rpm^'dotnet-runtime-6.0-6.0.20-1.el8_8.x86_64.rpm_Pdotnet-sdk-6.0-6.0.120-1.el8_8.x86_64.rpm`'dotnet-targeting-pack-6.0-6.0.20-1.el8_8.x86_64.rpmaPdotnet-templates-6.0-6.0.120-1.el8_8.x86_64.rpmÌVj ]securityImportant: thunderbird security update"k https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201CVE-2023-37201CVE-2023-37201https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202CVE-2023-37202CVE-2023-37202https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207CVE-2023-37207CVE-2023-37207https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208CVE-2023-37208CVE-2023-37208https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211CVE-2023-37211CVE-2023-37211https://bugzilla.redhat.com/show_bug.cgi?id=22197472219747https://bugzilla.redhat.com/show_bug.cgi?id=22197482219748https://bugzilla.redhat.com/show_bug.cgi?id=22197492219749https://bugzilla.redhat.com/show_bug.cgi?id=22197502219750https://bugzilla.redhat.com/show_bug.cgi?id=22197512219751https://errata.rockylinux.org/RLSA-2023:4063RLSA-2023:4063RLSA-2023:4063 hDthunderbird-102.13.0-2.el8_8.x86_64.rpmhDthunderbird-102.13.0-2.el8_8.x86_64.rpmÌVk "`securityImportant: firefox security update  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201CVE-2023-37201CVE-2023-37201https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202CVE-2023-37202CVE-2023-37202https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207CVE-2023-37207CVE-2023-37207https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208CVE-2023-37208CVE-2023-37208https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211CVE-2023-37211CVE-2023-37211https://bugzilla.redhat.com/show_bug.cgi?id=22197472219747https://bugzilla.redhat.com/show_bug.cgi?id=22197482219748https://bugzilla.redhat.com/show_bug.cgi?id=22197492219749https://bugzilla.redhat.com/show_bug.cgi?id=22197502219750https://bugzilla.redhat.com/show_bug.cgi?id=22197512219751https://errata.rockylinux.org/RLSA-2023:4076RLSA-2023:4076RLSA-2023:4076 rDfirefox-102.13.0-2.el8_8.x86_64.rpmrDfirefox-102.13.0-2.el8_8.x86_64.rpmÌVy .cBBBBBBBBBsecurityImportant: cups security update)https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32360CVE-2023-32360CVE-2023-32360https://bugzilla.redhat.com/show_bug.cgi?id=22304952230495https://errata.rockylinux.org/RLSA-2023:4864RLSA-2023:4864RLSA-2023:4864  >cups-2.2.6-51.el8_8.1.x86_64.rpm >cups-client-2.2.6-51.el8_8.1.x86_64.rpm >cups-devel-2.2.6-51.el8_8.1.x86_64.rpm>cups-filesystem-2.2.6-51.el8_8.1.noarch.rpm >cups-ipptool-2.2.6-51.el8_8.1.x86_64.rpm>cups-lpd-2.2.6-51.el8_8.1.x86_64.rpm >cups-2.2.6-51.el8_8.1.x86_64.rpm >cups-client-2.2.6-51.el8_8.1.x86_64.rpm >cups-devel-2.2.6-51.el8_8.1.x86_64.rpm>cups-filesystem-2.2.6-51.el8_8.1.noarch.rpm >cups-ipptool-2.2.6-51.el8_8.1.x86_64.rpm>cups-lpd-2.2.6-51.el8_8.1.x86_64.rpmÌV| ?oBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security updateCRhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/show_bug.cgi?id=22373172237317https://errata.rockylinux.org/RLSA-2023:5144RLSA-2023:5144RLSA-2023:5144 Z)aspnetcore-runtime-6.0-6.0.22-1.el8_8.x86_64.rpm[)aspnetcore-targeting-pack-6.0-6.0.22-1.el8_8.x86_64.rpm\)dotnet-apphost-pack-6.0-6.0.22-1.el8_8.x86_64.rpm])dotnet-hostfxr-6.0-6.0.22-1.el8_8.x86_64.rpm^)dotnet-runtime-6.0-6.0.22-1.el8_8.x86_64.rpm_Rdotnet-sdk-6.0-6.0.122-1.el8_8.x86_64.rpm`)dotnet-targeting-pack-6.0-6.0.22-1.el8_8.x86_64.rpmaRdotnet-templates-6.0-6.0.122-1.el8_8.x86_64.rpmZ)aspnetcore-runtime-6.0-6.0.22-1.el8_8.x86_64.rpm[)aspnetcore-targeting-pack-6.0-6.0.22-1.el8_8.x86_64.rpm\)dotnet-apphost-pack-6.0-6.0.22-1.el8_8.x86_64.rpm])dotnet-hostfxr-6.0-6.0.22-1.el8_8.x86_64.rpm^)dotnet-runtime-6.0-6.0.22-1.el8_8.x86_64.rpm_Rdotnet-sdk-6.0-6.0.122-1.el8_8.x86_64.rpm`)dotnet-targeting-pack-6.0-6.0.22-1.el8_8.x86_64.rpmaRdotnet-templates-6.0-6.0.122-1.el8_8.x86_64.rpm_} @securityImportant: firefox security update7https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4863CVE-2023-4863CVE-2023-4863https://bugzilla.redhat.com/show_bug.cgi?id=22384312238431https://errata.rockylinux.org/RLSA-2023:5184RLSA-2023:5184RLSA-2023:5184 rGfirefox-102.15.1-1.el8_8.x86_64.rpmrGfirefox-102.15.1-1.el8_8.x86_64.rpm_ CBBBBBBsecurityImportant: open-vm-tools security updateLlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20900CVE-2023-20900CVE-2023-20900https://bugzilla.redhat.com/show_bug.cgi?id=22365422236542https://errata.rockylinux.org/RLSA-2023:5312RLSA-2023:5312RLSA-2023:5312 1Zopen-vm-tools-12.1.5-2.el8_8.3.x86_64.rpm2Zopen-vm-tools-desktop-12.1.5-2.el8_8.3.x86_64.rpm3Zopen-vm-tools-salt-minion-12.1.5-2.el8_8.3.x86_64.rpm4Zopen-vm-tools-sdmp-12.1.5-2.el8_8.3.x86_64.rpm1Zopen-vm-tools-12.1.5-2.el8_8.3.x86_64.rpm2Zopen-vm-tools-desktop-12.1.5-2.el8_8.3.x86_64.rpm3Zopen-vm-tools-salt-minion-12.1.5-2.el8_8.3.x86_64.rpm4Zopen-vm-tools-sdmp-12.1.5-2.el8_8.3.x86_64.rpm˸W LBBsecurityModerate: libtiff security update8m https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0800CVE-2023-0800CVE-2023-0800https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0801CVE-2023-0801CVE-2023-0801https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0802CVE-2023-0802CVE-2023-0802https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0803CVE-2023-0803CVE-2023-0803https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0804CVE-2023-0804CVE-2023-0804https://bugzilla.redhat.com/show_bug.cgi?id=21701672170167https://bugzilla.redhat.com/show_bug.cgi?id=21701722170172https://bugzilla.redhat.com/show_bug.cgi?id=21701782170178https://bugzilla.redhat.com/show_bug.cgi?id=21701872170187https://bugzilla.redhat.com/show_bug.cgi?id=21701922170192https://errata.rockylinux.org/RLSA-2023:5353RLSA-2023:5353RLSA-2023:5353 @7libtiff-4.0.9-29.el8_8.x86_64.rpmA7libtiff-devel-4.0.9-29.el8_8.x86_64.rpm@7libtiff-4.0.9-29.el8_8.x86_64.rpmA7libtiff-devel-4.0.9-29.el8_8.x86_64.rpmu QBBsecurityImportant: glibc security update% https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4527CVE-2023-4527CVE-2023-4527https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4806CVE-2023-4806CVE-2023-4806https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4813CVE-2023-4813CVE-2023-4813https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911CVE-2023-4911CVE-2023-4911https://bugzilla.redhat.com/show_bug.cgi?id=22347122234712https://bugzilla.redhat.com/show_bug.cgi?id=22377822237782https://bugzilla.redhat.com/show_bug.cgi?id=22377982237798https://bugzilla.redhat.com/show_bug.cgi?id=22383522238352https://errata.rockylinux.org/RLSA-2023:5455RLSA-2023:5455RLSA-2023:5455 |compat-libpthread-nonshared-2.28-225.el8_8.6.x86_64.rpm|glibc-utils-2.28-225.el8_8.6.x86_64.rpm|compat-libpthread-nonshared-2.28-225.el8_8.6.x86_64.rpm|glibc-utils-2.28-225.el8_8.6.x86_64.rpmDz VsecurityImportant: firefox security update4;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4051CVE-2023-4051CVE-2023-4051https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4053CVE-2023-4053CVE-2023-4053https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573CVE-2023-4573CVE-2023-4573https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574CVE-2023-4574CVE-2023-4574https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575CVE-2023-4575CVE-2023-4575https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4577CVE-2023-4577CVE-2023-4577https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4578CVE-2023-4578CVE-2023-4578https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4580CVE-2023-4580CVE-2023-4580https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581CVE-2023-4581CVE-2023-4581https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4583CVE-2023-4583CVE-2023-4583https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584CVE-2023-4584CVE-2023-4584https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4585CVE-2023-4585CVE-2023-4585https://bugzilla.redhat.com/show_bug.cgi?id=22360712236071https://bugzilla.redhat.com/show_bug.cgi?id=22360722236072https://bugzilla.redhat.com/show_bug.cgi?id=22360732236073https://bugzilla.redhat.com/show_bug.cgi?id=22360752236075https://bugzilla.redhat.com/show_bug.cgi?id=22360762236076https://bugzilla.redhat.com/show_bug.cgi?id=22360772236077https://bugzilla.redhat.com/show_bug.cgi?id=22360782236078https://bugzilla.redhat.com/show_bug.cgi?id=22360792236079https://bugzilla.redhat.com/show_bug.cgi?id=22360802236080https://bugzilla.redhat.com/show_bug.cgi?id=22360822236082https://bugzilla.redhat.com/show_bug.cgi?id=22360842236084https://bugzilla.redhat.com/show_bug.cgi?id=22360862236086https://errata.rockylinux.org/RLSA-2023:4952RLSA-2023:4952RLSA-2023:4952 rFfirefox-102.15.0-1.el8_8.x86_64.rpmrFfirefox-102.15.0-1.el8_8.x86_64.rpmD{ YsecurityImportant: thunderbird security updateo https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4051CVE-2023-4051CVE-2023-4051https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4053CVE-2023-4053CVE-2023-4053https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573CVE-2023-4573CVE-2023-4573https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574CVE-2023-4574CVE-2023-4574https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575CVE-2023-4575CVE-2023-4575https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4577CVE-2023-4577CVE-2023-4577https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4578CVE-2023-4578CVE-2023-4578https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4580CVE-2023-4580CVE-2023-4580https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581CVE-2023-4581CVE-2023-4581https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4583CVE-2023-4583CVE-2023-4583https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584CVE-2023-4584CVE-2023-4584https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4585CVE-2023-4585CVE-2023-4585https://bugzilla.redhat.com/show_bug.cgi?id=22360712236071https://bugzilla.redhat.com/show_bug.cgi?id=22360722236072https://bugzilla.redhat.com/show_bug.cgi?id=22360732236073https://bugzilla.redhat.com/show_bug.cgi?id=22360752236075https://bugzilla.redhat.com/show_bug.cgi?id=22360762236076https://bugzilla.redhat.com/show_bug.cgi?id=22360772236077https://bugzilla.redhat.com/show_bug.cgi?id=22360782236078https://bugzilla.redhat.com/show_bug.cgi?id=22360792236079https://bugzilla.redhat.com/show_bug.cgi?id=22360802236080https://bugzilla.redhat.com/show_bug.cgi?id=22360822236082https://bugzilla.redhat.com/show_bug.cgi?id=22360842236084https://bugzilla.redhat.com/show_bug.cgi?id=22360862236086https://errata.rockylinux.org/RLSA-2023:4954RLSA-2023:4954RLSA-2023:4954 hFthunderbird-102.15.0-1.el8_8.x86_64.rpmhFthunderbird-102.15.0-1.el8_8.x86_64.rpmD~ \securityImportant: thunderbird security updateyhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4863CVE-2023-4863CVE-2023-4863https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5129CVE-2023-5129CVE-2023-5129https://bugzilla.redhat.com/show_bug.cgi?id=22384312238431https://errata.rockylinux.org/RLSA-2023:5201RLSA-2023:5201RLSA-2023:5201 hGthunderbird-102.15.1-1.el8_8.x86_64.rpmhGthunderbird-102.15.1-1.el8_8.x86_64.rpmDm !_bugfixNetworkManager bug fix update* https://bugzilla.redhat.com/show_bug.cgi?id=22178992217899* VLAN of bond will not get autoconnect when bond port link revived.https://errata.rockylinux.org/RLBA-2023:4521RLBA-2023:4521RLBA-2023:4521 dNetworkManager-cloud-setup-1.40.16-4.el8_8.x86_64.rpmdNetworkManager-cloud-setup-1.40.16-4.el8_8.x86_64.rpm*n $bbugfixsssd bug fix update) https://bugzilla.redhat.com/show_bug.cgi?id=21968382196838* [sssd] User lookup on IPA client fails with 's2n get_fqlist request failed'.https://bugzilla.redhat.com/show_bug.cgi?id=22193512219351* SSSD enters failed state after heavy load in the system.https://errata.rockylinux.org/RLBA-2023:4525RLBA-2023:4525RLBA-2023:4525 rzsssd-idp-2.8.2-3.el8_8.x86_64.rpmrzsssd-idp-2.8.2-3.el8_8.x86_64.rpm+t 'esecurityModerate: libxml2 security update>Ohttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28484CVE-2023-28484CVE-2023-28484https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29469CVE-2023-29469CVE-2023-29469https://bugzilla.redhat.com/show_bug.cgi?id=21859842185984https://bugzilla.redhat.com/show_bug.cgi?id=21859942185994https://errata.rockylinux.org/RLSA-2023:4529RLSA-2023:4529RLSA-2023:4529 .libxml2-devel-2.9.7-16.el8_8.1.x86_64.rpm.libxml2-devel-2.9.7-16.el8_8.1.x86_64.rpm+o *hbugfixcrash bug fix update a https://errata.rockylinux.org/RLBA-2023:4528RLBA-2023:4528RLBA-2023:4528 Ncrash-7.3.2-4.el8_8.1.x86_64.rpmNcrash-7.3.2-4.el8_8.1.x86_64.rpm+p ,+bugfixcloud-init bug fix updaten https://errata.rockylinux.org/RLBA-2023:4530RLBA-2023:4530RLBA-2023:4530 cloud-init-22.1-8.el8_8.1.0.1.noarch.rpmcloud-init-22.1-8.el8_8.1.0.1.noarch.rpm+q /mbugfixansible-freeipa bug fix updatet9 https://bugzilla.redhat.com/show_bug.cgi?id=22181872218187* maxsequence is not working in ipapwpolicy modulehttps://errata.rockylinux.org/RLBA-2023:4532RLBA-2023:4532RLBA-2023:4532 z`ansible-freeipa-1.9.2-3.el8_8.noarch.rpm{`ansible-freeipa-tests-1.9.2-3.el8_8.noarch.rpmz`ansible-freeipa-1.9.2-3.el8_8.noarch.rpm{`ansible-freeipa-tests-1.9.2-3.el8_8.noarch.rpm+r 2pbugfixmutter bug fix update-@ https://bugzilla.redhat.com/show_bug.cgi?id=22185212218521* Barcode scanner result is not shown correctly on gnome-terminal.https://errata.rockylinux.org/RLBA-2023:4533RLBA-2023:4533RLBA-2023:4533 <mutter-3.32.2-70.el8_8.x86_64.rpm<mutter-3.32.2-70.el8_8.x86_64.rpm+s sBBBBBBBBBBBBBBBBbugfixjava-11-openjdk bug fix and enhancement updatem https://bugzilla.redhat.com/show_bug.cgi?id=22244272224427https://errata.rockylinux.org/RLBA-2023:4538RLBA-2023:4538RLBA-2023:4538 3Fjava-11-openjdk-11.0.20.0.8-3.el8_8.x86_64.rpm4Fjava-11-openjdk-demo-11.0.20.0.8-3.el8_8.x86_64.rpm5Fjava-11-openjdk-devel-11.0.20.0.8-3.el8_8.x86_64.rpm6Fjava-11-openjdk-headless-11.0.20.0.8-3.el8_8.x86_64.rpm7Fjava-11-openjdk-javadoc-11.0.20.0.8-3.el8_8.x86_64.rpm8Fjava-11-openjdk-javadoc-zip-11.0.20.0.8-3.el8_8.x86_64.rpm9Fjava-11-openjdk-jmods-11.0.20.0.8-3.el8_8.x86_64.rpm:Fjava-11-openjdk-src-11.0.20.0.8-3.el8_8.x86_64.rpm;Fjava-11-openjdk-static-libs-11.0.20.0.8-3.el8_8.x86_64.rpm 3Fjava-11-openjdk-11.0.20.0.8-3.el8_8.x86_64.rpm4Fjava-11-openjdk-demo-11.0.20.0.8-3.el8_8.x86_64.rpm5Fjava-11-openjdk-devel-11.0.20.0.8-3.el8_8.x86_64.rpm6Fjava-11-openjdk-headless-11.0.20.0.8-3.el8_8.x86_64.rpm7Fjava-11-openjdk-javadoc-11.0.20.0.8-3.el8_8.x86_64.rpm8Fjava-11-openjdk-javadoc-zip-11.0.20.0.8-3.el8_8.x86_64.rpm9Fjava-11-openjdk-jmods-11.0.20.0.8-3.el8_8.x86_64.rpm:Fjava-11-openjdk-src-11.0.20.0.8-3.el8_8.x86_64.rpm;Fjava-11-openjdk-static-libs-11.0.20.0.8-3.el8_8.x86_64.rpm+v FBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 7.0 security, bug fix, and enhancement updatelhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35390CVE-2023-35390CVE-2023-35390https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38180CVE-2023-38180CVE-2023-38180https://bugzilla.redhat.com/show_bug.cgi?id=22286212228621https://bugzilla.redhat.com/show_bug.cgi?id=22286222228622https://errata.rockylinux.org/RLSA-2023:4643RLSA-2023:4643RLSA-2023:4643 SDaspnetcore-runtime-7.0-7.0.10-1.el8_8.x86_64.rpmTDaspnetcore-targeting-pack-7.0-7.0.10-1.el8_8.x86_64.rpmdotnet-7.0.110-1.el8_8.x86_64.rpmUDdotnet-apphost-pack-7.0-7.0.10-1.el8_8.x86_64.rpmDdotnet-host-7.0.10-1.el8_8.x86_64.rpmVDdotnet-hostfxr-7.0-7.0.10-1.el8_8.x86_64.rpmWDdotnet-runtime-7.0-7.0.10-1.el8_8.x86_64.rpmXdotnet-sdk-7.0-7.0.110-1.el8_8.x86_64.rpmYDdotnet-targeting-pack-7.0-7.0.10-1.el8_8.x86_64.rpmZdotnet-templates-7.0-7.0.110-1.el8_8.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.110-1.el8_8.x86_64.rpm SDaspnetcore-runtime-7.0-7.0.10-1.el8_8.x86_64.rpmTDaspnetcore-targeting-pack-7.0-7.0.10-1.el8_8.x86_64.rpmdotnet-7.0.110-1.el8_8.x86_64.rpmUDdotnet-apphost-pack-7.0-7.0.10-1.el8_8.x86_64.rpmDdotnet-host-7.0.10-1.el8_8.x86_64.rpmVDdotnet-hostfxr-7.0-7.0.10-1.el8_8.x86_64.rpmWDdotnet-runtime-7.0-7.0.10-1.el8_8.x86_64.rpmXdotnet-sdk-7.0-7.0.110-1.el8_8.x86_64.rpmYDdotnet-targeting-pack-7.0-7.0.10-1.el8_8.x86_64.rpmZdotnet-templates-7.0-7.0.110-1.el8_8.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.110-1.el8_8.x86_64.rpm+w -]BBBBBBBBBBBBBBsecurityImportant: .NET 6.0 security, bug fix, and enhancement updatehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35390CVE-2023-35390CVE-2023-35390https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38180CVE-2023-38180CVE-2023-38180https://bugzilla.redhat.com/show_bug.cgi?id=22286212228621https://bugzilla.redhat.com/show_bug.cgi?id=22286222228622https://errata.rockylinux.org/RLSA-2023:4645RLSA-2023:4645RLSA-2023:4645 Z(aspnetcore-runtime-6.0-6.0.21-1.el8_8.x86_64.rpm[(aspnetcore-targeting-pack-6.0-6.0.21-1.el8_8.x86_64.rpm\(dotnet-apphost-pack-6.0-6.0.21-1.el8_8.x86_64.rpm](dotnet-hostfxr-6.0-6.0.21-1.el8_8.x86_64.rpm^(dotnet-runtime-6.0-6.0.21-1.el8_8.x86_64.rpm_Qdotnet-sdk-6.0-6.0.121-1.el8_8.x86_64.rpm`(dotnet-targeting-pack-6.0-6.0.21-1.el8_8.x86_64.rpmaQdotnet-templates-6.0-6.0.121-1.el8_8.x86_64.rpmZ(aspnetcore-runtime-6.0-6.0.21-1.el8_8.x86_64.rpm[(aspnetcore-targeting-pack-6.0-6.0.21-1.el8_8.x86_64.rpm\(dotnet-apphost-pack-6.0-6.0.21-1.el8_8.x86_64.rpm](dotnet-hostfxr-6.0-6.0.21-1.el8_8.x86_64.rpm^(dotnet-runtime-6.0-6.0.21-1.el8_8.x86_64.rpm_Qdotnet-sdk-6.0-6.0.121-1.el8_8.x86_64.rpm`(dotnet-targeting-pack-6.0-6.0.21-1.el8_8.x86_64.rpmaQdotnet-templates-6.0-6.0.121-1.el8_8.x86_64.rpm+ 0nsecurityModerate: grafana security update/https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39325CVE-2023-39325CVE-2023-39325https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/show_bug.cgi?id=22428032242803https://bugzilla.redhat.com/show_bug.cgi?id=22432962243296https://errata.rockylinux.org/RLSA-2023:5863RLSA-2023:5863RLSA-2023:5863 *grafana-7.5.15-5.el8_8.x86_64.rpm*grafana-7.5.15-5.el8_8.x86_64.rpm 9qBBBBBBsecurityImportant: tomcat security updateK)https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/show_bug.cgi?id=22428032242803https://errata.rockylinux.org/RLSA-2023:5928RLSA-2023:5928RLSA-2023:5928 [tomcat-9.0.62-5.el8_8.2.noarch.rpm\tomcat-admin-webapps-9.0.62-5.el8_8.2.noarch.rpm]tomcat-docs-webapp-9.0.62-5.el8_8.2.noarch.rpm^tomcat-el-3.0-api-9.0.62-5.el8_8.2.noarch.rpm_tomcat-jsp-2.3-api-9.0.62-5.el8_8.2.noarch.rpm`tomcat-lib-9.0.62-5.el8_8.2.noarch.rpmatomcat-servlet-4.0-api-9.0.62-5.el8_8.2.noarch.rpmbtomcat-webapps-9.0.62-5.el8_8.2.noarch.rpm[tomcat-9.0.62-5.el8_8.2.noarch.rpm\tomcat-admin-webapps-9.0.62-5.el8_8.2.noarch.rpm]tomcat-docs-webapp-9.0.62-5.el8_8.2.noarch.rpm^tomcat-el-3.0-api-9.0.62-5.el8_8.2.noarch.rpm_tomcat-jsp-2.3-api-9.0.62-5.el8_8.2.noarch.rpm`tomcat-lib-9.0.62-5.el8_8.2.noarch.rpmatomcat-servlet-4.0-api-9.0.62-5.el8_8.2.noarch.rpmbtomcat-webapps-9.0.62-5.el8_8.2.noarch.rpm zBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security updatetQhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/show_bug.cgi?id=22373172237317https://errata.rockylinux.org/RLSA-2023:6245RLSA-2023:6245RLSA-2023:6245 Z*aspnetcore-runtime-6.0-6.0.24-1.el8_8.x86_64.rpm[*aspnetcore-targeting-pack-6.0-6.0.24-1.el8_8.x86_64.rpm\*dotnet-apphost-pack-6.0-6.0.24-1.el8_8.x86_64.rpm]*dotnet-hostfxr-6.0-6.0.24-1.el8_8.x86_64.rpm^*dotnet-runtime-6.0-6.0.24-1.el8_8.x86_64.rpm_Sdotnet-sdk-6.0-6.0.124-1.el8_8.x86_64.rpm`*dotnet-targeting-pack-6.0-6.0.24-1.el8_8.x86_64.rpmaSdotnet-templates-6.0-6.0.124-1.el8_8.x86_64.rpmZ*aspnetcore-runtime-6.0-6.0.24-1.el8_8.x86_64.rpm[*aspnetcore-targeting-pack-6.0-6.0.24-1.el8_8.x86_64.rpm\*dotnet-apphost-pack-6.0-6.0.24-1.el8_8.x86_64.rpm]*dotnet-hostfxr-6.0-6.0.24-1.el8_8.x86_64.rpm^*dotnet-runtime-6.0-6.0.24-1.el8_8.x86_64.rpm_Sdotnet-sdk-6.0-6.0.124-1.el8_8.x86_64.rpm`*dotnet-targeting-pack-6.0-6.0.24-1.el8_8.x86_64.rpmaSdotnet-templates-6.0-6.0.124-1.el8_8.x86_64.rpm4v KBBbugfixtuned bug fix and enhancement updateE https://bugzilla.redhat.com/show_bug.cgi?id=21737402173740https://bugzilla.redhat.com/show_bug.cgi?id=21821192182119https://bugzilla.redhat.com/show_bug.cgi?id=22152982215298https://bugzilla.redhat.com/show_bug.cgi?id=22356382235638https://errata.rockylinux.org/RLBA-2023:7182RLBA-2023:7182RLBA-2023:7182 cPtuned-gtk-2.21.0-1.el8_9.noarch.rpmdPtuned-profiles-postgresql-2.21.0-1.el8_9.noarch.rpmePtuned-utils-2.21.0-1.el8_9.noarch.rpmfPtuned-utils-systemtap-2.21.0-1.el8_9.noarch.rpmcPtuned-gtk-2.21.0-1.el8_9.noarch.rpmdPtuned-profiles-postgresql-2.21.0-1.el8_9.noarch.rpmePtuned-utils-2.21.0-1.el8_9.noarch.rpmfPtuned-utils-systemtap-2.21.0-1.el8_9.noarch.rpmsw Pbugfixutil-linux bug fix and enhancement updateD https://bugzilla.redhat.com/show_bug.cgi?id=21173552117355https://bugzilla.redhat.com/show_bug.cgi?id=21804132180413https://bugzilla.redhat.com/show_bug.cgi?id=21847282184728https://bugzilla.redhat.com/show_bug.cgi?id=21888942188894https://bugzilla.redhat.com/show_bug.cgi?id=22270972227097https://errata.rockylinux.org/RLBA-2023:7186RLBA-2023:7186RLBA-2023:7186 H_python3-libmount-2.32.1-43.el8.x86_64.rpmH_python3-libmount-2.32.1-43.el8.x86_64.rpms SBBsecurityModerate: avahi security updateC+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1981CVE-2023-1981CVE-2023-1981https://bugzilla.redhat.com/show_bug.cgi?id=21859112185911https://errata.rockylinux.org/RLSA-2023:7190RLSA-2023:7190RLSA-2023:7190 >avahi-tools-0.7-21.el8.x86_64.rpmoavahi-ui-gtk3-0.7-21.el8.x86_64.rpm>avahi-tools-0.7-21.el8.x86_64.rpmoavahi-ui-gtk3-0.7-21.el8.x86_64.rpmsy Xbugfixsssd bug fix updaten7 https://bugzilla.redhat.com/show_bug.cgi?id=22373022237302* SSSD runs multiples lookup search for each NFS request (SBUS req chaining stopped working in sssd-2.7)https://errata.rockylinux.org/RLBA-2023:7210RLBA-2023:7210RLBA-2023:7210 r}sssd-idp-2.9.1-4.el8_9.x86_64.rpmr}sssd-idp-2.9.1-4.el8_9.x86_64.rpmtu [BBBbugfixgcc-toolset-13-annobin bug fix and enhancement update% https://bugzilla.redhat.com/show_bug.cgi?id=21757732175773https://bugzilla.redhat.com/show_bug.cgi?id=21886382188638https://errata.rockylinux.org/RLBA-2023:7011RLBA-2023:7011RLBA-2023:7011 gcc-toolset-13-annobin-annocheck-12.20-1.el8.x86_64.rpm(gcc-toolset-13-annobin-docs-12.20-1.el8.noarch.rpmgcc-toolset-13-annobin-plugin-gcc-12.20-1.el8.x86_64.rpmgcc-toolset-13-annobin-annocheck-12.20-1.el8.x86_64.rpm(gcc-toolset-13-annobin-docs-12.20-1.el8.noarch.rpmgcc-toolset-13-annobin-plugin-gcc-12.20-1.el8.x86_64.rpmt #asecurityModerate: yajl security update$2https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33460CVE-2023-33460CVE-2023-33460https://bugzilla.redhat.com/show_bug.cgi?id=22212492221249https://errata.rockylinux.org/RLSA-2023:7057RLSA-2023:7057RLSA-2023:7057 )9yajl-2.1.0-12.el8.x86_64.rpm)9yajl-2.1.0-12.el8.x86_64.rpmtr &denhancementgnome-shell bug fix updateVJ https://errata.rockylinux.org/RLEA-2023:7203RLEA-2023:7203RLEA-2023:7203 8gnome-shell-3.32.2-51.el8.x86_64.rpm8gnome-shell-3.32.2-51.el8.x86_64.rpmtx )gbugfixmutter bug fix update Y https://errata.rockylinux.org/RLBA-2023:7204RLBA-2023:7204RLBA-2023:7204 =mutter-3.32.2-71.el8_9.1.x86_64.rpm=mutter-3.32.2-71.el8_9.1.x86_64.rpmt 2jBBBBBBsecurityImportant: open-vm-tools security updateyThttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34058CVE-2023-34058CVE-2023-34058https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34059CVE-2023-34059CVE-2023-34059https://bugzilla.redhat.com/show_bug.cgi?id=22460802246080https://bugzilla.redhat.com/show_bug.cgi?id=22460962246096https://errata.rockylinux.org/RLSA-2023:7265RLSA-2023:7265RLSA-2023:7265 1[open-vm-tools-12.2.5-3.el8_9.1.x86_64.rpm2[open-vm-tools-desktop-12.2.5-3.el8_9.1.x86_64.rpm3[open-vm-tools-salt-minion-12.2.5-3.el8_9.1.x86_64.rpm4[open-vm-tools-sdmp-12.2.5-3.el8_9.1.x86_64.rpm1[open-vm-tools-12.2.5-3.el8_9.1.x86_64.rpm2[open-vm-tools-desktop-12.2.5-3.el8_9.1.x86_64.rpm3[open-vm-tools-salt-minion-12.2.5-3.el8_9.1.x86_64.rpm4[open-vm-tools-sdmp-12.2.5-3.el8_9.1.x86_64.rpmu ;sBBBBBBsecurityImportant: webkit2gtk3 security updateMghttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917CVE-2023-42917CVE-2023-42917https://bugzilla.redhat.com/show_bug.cgi?id=22530582253058https://errata.rockylinux.org/RLSA-2023:7716RLSA-2023:7716RLSA-2023:7716 yewebkit2gtk3-2.40.5-1.el8_9.1.x86_64.rpmzewebkit2gtk3-devel-2.40.5-1.el8_9.1.x86_64.rpm{ewebkit2gtk3-jsc-2.40.5-1.el8_9.1.x86_64.rpm|ewebkit2gtk3-jsc-devel-2.40.5-1.el8_9.1.x86_64.rpmyewebkit2gtk3-2.40.5-1.el8_9.1.x86_64.rpmzewebkit2gtk3-devel-2.40.5-1.el8_9.1.x86_64.rpm{ewebkit2gtk3-jsc-2.40.5-1.el8_9.1.x86_64.rpm|ewebkit2gtk3-jsc-devel-2.40.5-1.el8_9.1.x86_64.rpmd  >|securityImportant: gstreamer1-plugins-bad-free security update4Shttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44446CVE-2023-44446CVE-2023-44446https://bugzilla.redhat.com/show_bug.cgi?id=22502492250249https://errata.rockylinux.org/RLSA-2023:7841RLSA-2023:7841RLSA-2023:7841 gstreamer1-plugins-bad-free-1.16.1-2.el8_9.x86_64.rpmgstreamer1-plugins-bad-free-1.16.1-2.el8_9.x86_64.rpmd  BBBBBBsecurityModerate: gnutls security updateAhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5981CVE-2023-5981CVE-2023-5981https://bugzilla.redhat.com/show_bug.cgi?id=22484452248445https://errata.rockylinux.org/RLSA-2024:0155RLSA-2024:0155RLSA-2024:0155 &|gnutls-c++-3.6.16-8.el8_9.x86_64.rpm'|gnutls-dane-3.6.16-8.el8_9.x86_64.rpm(|gnutls-devel-3.6.16-8.el8_9.x86_64.rpm)|gnutls-utils-3.6.16-8.el8_9.x86_64.rpm&|gnutls-c++-3.6.16-8.el8_9.x86_64.rpm'|gnutls-dane-3.6.16-8.el8_9.x86_64.rpm(|gnutls-devel-3.6.16-8.el8_9.x86_64.rpm)|gnutls-utils-3.6.16-8.el8_9.x86_64.rpm  HBBBBBBBBBBBBBBBBBBsecurityModerate: nss security updateH+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388CVE-2023-5388CVE-2023-5388https://bugzilla.redhat.com/show_bug.cgi?id=22436442243644https://errata.rockylinux.org/RLSA-2024:0105RLSA-2024:0105RLSA-2024:0105 Y%nss-3.90.0-4.el8_9.x86_64.rpmZ%nss-devel-3.90.0-4.el8_9.x86_64.rpm[%nss-softokn-3.90.0-4.el8_9.x86_64.rpm\%nss-softokn-devel-3.90.0-4.el8_9.x86_64.rpm]%nss-softokn-freebl-3.90.0-4.el8_9.x86_64.rpm^%nss-softokn-freebl-devel-3.90.0-4.el8_9.x86_64.rpm_%nss-sysinit-3.90.0-4.el8_9.x86_64.rpm`%nss-tools-3.90.0-4.el8_9.x86_64.rpma%nss-util-3.90.0-4.el8_9.x86_64.rpmb%nss-util-devel-3.90.0-4.el8_9.x86_64.rpm Y%nss-3.90.0-4.el8_9.x86_64.rpmZ%nss-devel-3.90.0-4.el8_9.x86_64.rpm[%nss-softokn-3.90.0-4.el8_9.x86_64.rpm\%nss-softokn-devel-3.90.0-4.el8_9.x86_64.rpm]%nss-softokn-freebl-3.90.0-4.el8_9.x86_64.rpm^%nss-softokn-freebl-devel-3.90.0-4.el8_9.x86_64.rpm_%nss-sysinit-3.90.0-4.el8_9.x86_64.rpm`%nss-tools-3.90.0-4.el8_9.x86_64.rpma%nss-util-3.90.0-4.el8_9.x86_64.rpmb%nss-util-devel-3.90.0-4.el8_9.x86_64.rpmz bugfixedk2 bug fix updates https://errata.rockylinux.org/RLBA-2024:0123RLBA-2024:0123RLBA-2024:0123 edk2-ovmf-20220126gitbb1bba3d77-6.el8_9.1.noarch.rpmedk2-ovmf-20220126gitbb1bba3d77-6.el8_9.1.noarch.rpm  "_BsecurityModerate: frr security update# https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38406CVE-2023-38406CVE-2023-38406https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38407CVE-2023-38407CVE-2023-38407https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47234CVE-2023-47234CVE-2023-47234https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47235CVE-2023-47235CVE-2023-47235https://bugzilla.redhat.com/show_bug.cgi?id=22482072248207https://bugzilla.redhat.com/show_bug.cgi?id=22482082248208https://bugzilla.redhat.com/show_bug.cgi?id=22485262248526https://bugzilla.redhat.com/show_bug.cgi?id=22485282248528https://errata.rockylinux.org/RLSA-2024:0130RLSA-2024:0130RLSA-2024:0130 jpfrr-7.5.1-13.el8_9.3.x86_64.rpmkpfrr-selinux-7.5.1-13.el8_9.3.noarch.rpmjpfrr-7.5.1-13.el8_9.3.x86_64.rpmkpfrr-selinux-7.5.1-13.el8_9.3.noarch.rpm  %csecurityModerate: sqlite security update&https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7104CVE-2023-7104CVE-2023-7104https://bugzilla.redhat.com/show_bug.cgi?id=22561942256194https://errata.rockylinux.org/RLSA-2024:0253RLSA-2024:0253RLSA-2024:0253 6,lemon-3.26.0-19.el8_9.x86_64.rpm6,lemon-3.26.0-19.el8_9.x86_64.rpm$ .fBBBBBBsecurityModerate: python3 security update.chttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27043CVE-2023-27043CVE-2023-27043https://bugzilla.redhat.com/show_bug.cgi?id=21961832196183https://errata.rockylinux.org/RLSA-2024:0256RLSA-2024:0256RLSA-2024:0256 platform-python-debug-3.6.8-56.el8_9.3.rocky.0.x86_64.rpmplatform-python-devel-3.6.8-56.el8_9.3.rocky.0.x86_64.rpm python3-idle-3.6.8-56.el8_9.3.rocky.0.x86_64.rpm python3-tkinter-3.6.8-56.el8_9.3.rocky.0.x86_64.rpmplatform-python-debug-3.6.8-56.el8_9.3.rocky.0.x86_64.rpmplatform-python-devel-3.6.8-56.el8_9.3.rocky.0.x86_64.rpm python3-idle-3.6.8-56.el8_9.3.rocky.0.x86_64.rpm python3-tkinter-3.6.8-56.el8_9.3.rocky.0.x86_64.rpm$ 0/bugfixudica bug fix and enhancement update https://bugzilla.redhat.com/show_bug.cgi?id=17291151729115https://errata.rockylinux.org/RLBA-2019:3377RLBA-2019:3377RLBA-2019:3377 2oudica-0.1.8-1.el8.noarch.rpm2oudica-0.1.8-1.el8.noarch.rpm6 9qBBBBBBsecurityImportant: tomcat security updatehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46589CVE-2023-46589CVE-2023-46589https://bugzilla.redhat.com/show_bug.cgi?id=22520502252050https://errata.rockylinux.org/RLSA-2024:0539RLSA-2024:0539RLSA-2024:0539 [tomcat-9.0.62-27.el8_9.3.noarch.rpm\tomcat-admin-webapps-9.0.62-27.el8_9.3.noarch.rpm]tomcat-docs-webapp-9.0.62-27.el8_9.3.noarch.rpm^tomcat-el-3.0-api-9.0.62-27.el8_9.3.noarch.rpm_tomcat-jsp-2.3-api-9.0.62-27.el8_9.3.noarch.rpm`tomcat-lib-9.0.62-27.el8_9.3.noarch.rpmatomcat-servlet-4.0-api-9.0.62-27.el8_9.3.noarch.rpmbtomcat-webapps-9.0.62-27.el8_9.3.noarch.rpm[tomcat-9.0.62-27.el8_9.3.noarch.rpm\tomcat-admin-webapps-9.0.62-27.el8_9.3.noarch.rpm]tomcat-docs-webapp-9.0.62-27.el8_9.3.noarch.rpm^tomcat-el-3.0-api-9.0.62-27.el8_9.3.noarch.rpm_tomcat-jsp-2.3-api-9.0.62-27.el8_9.3.noarch.rpm`tomcat-lib-9.0.62-27.el8_9.3.noarch.rpmatomcat-servlet-4.0-api-9.0.62-27.el8_9.3.noarch.rpmbtomcat-webapps-9.0.62-27.el8_9.3.noarch.rpm6 >zBBsecurityModerate: libmaxminddb security updatenhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28241CVE-2020-28241CVE-2020-28241https://bugzilla.redhat.com/show_bug.cgi?id=18953791895379https://errata.rockylinux.org/RLSA-2024:0768RLSA-2024:0768RLSA-2024:0768 8$libmaxminddb-1.2.0-10.el8_9.1.x86_64.rpm9$libmaxminddb-devel-1.2.0-10.el8_9.1.x86_64.rpm8$libmaxminddb-1.2.0-10.el8_9.1.x86_64.rpm9$libmaxminddb-devel-1.2.0-10.el8_9.1.x86_64.rpmD securityModerate: tcpdump security updateYhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41043CVE-2021-41043CVE-2021-41043https://bugzilla.redhat.com/show_bug.cgi?id=20403922040392https://errata.rockylinux.org/RLSA-2024:0769RLSA-2024:0769RLSA-2024:0769 {tcpdump-4.9.3-3.el8_9.1.x86_64.rpm{tcpdump-4.9.3-3.el8_9.1.x86_64.rpmD BBBBBBBBBBBBBBBBBBBsecurityModerate: nss security update\:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6135CVE-2023-6135CVE-2023-6135https://bugzilla.redhat.com/show_bug.cgi?id=22499062249906https://errata.rockylinux.org/RLSA-2024:0786RLSA-2024:0786RLSA-2024:0786 Y&nss-3.90.0-6.el8_9.x86_64.rpmZ&nss-devel-3.90.0-6.el8_9.x86_64.rpm[&nss-softokn-3.90.0-6.el8_9.x86_64.rpm\&nss-softokn-devel-3.90.0-6.el8_9.x86_64.rpm]&nss-softokn-freebl-3.90.0-6.el8_9.x86_64.rpm^&nss-softokn-freebl-devel-3.90.0-6.el8_9.x86_64.rpm_&nss-sysinit-3.90.0-6.el8_9.x86_64.rpm`&nss-tools-3.90.0-6.el8_9.x86_64.rpma&nss-util-3.90.0-6.el8_9.x86_64.rpmb&nss-util-devel-3.90.0-6.el8_9.x86_64.rpm Y&nss-3.90.0-6.el8_9.x86_64.rpmZ&nss-devel-3.90.0-6.el8_9.x86_64.rpm[&nss-softokn-3.90.0-6.el8_9.x86_64.rpm\&nss-softokn-devel-3.90.0-6.el8_9.x86_64.rpm]&nss-softokn-freebl-3.90.0-6.el8_9.x86_64.rpm^&nss-softokn-freebl-devel-3.90.0-6.el8_9.x86_64.rpm_&nss-sysinit-3.90.0-6.el8_9.x86_64.rpm`&nss-tools-3.90.0-6.el8_9.x86_64.rpma&nss-util-3.90.0-6.el8_9.x86_64.rpmb&nss-util-devel-3.90.0-6.el8_9.x86_64.rpmD{ WBBBBbugfixosbuild bug fix updatez https://errata.rockylinux.org/RLBA-2024:0788RLBA-2024:0788RLBA-2024:0788 1{osbuild-93-1.el8_9.1.rocky.0.2.noarch.rpm2{osbuild-luks2-93-1.el8_9.1.rocky.0.2.noarch.rpm3{osbuild-lvm2-93-1.el8_9.1.rocky.0.2.noarch.rpm4{osbuild-ostree-93-1.el8_9.1.rocky.0.2.noarch.rpm5{osbuild-selinux-93-1.el8_9.1.rocky.0.2.noarch.rpm\{python3-osbuild-93-1.el8_9.1.rocky.0.2.noarch.rpm1{osbuild-93-1.el8_9.1.rocky.0.2.noarch.rpm2{osbuild-luks2-93-1.el8_9.1.rocky.0.2.noarch.rpm3{osbuild-lvm2-93-1.el8_9.1.rocky.0.2.noarch.rpm4{osbuild-ostree-93-1.el8_9.1.rocky.0.2.noarch.rpm5{osbuild-selinux-93-1.el8_9.1.rocky.0.2.noarch.rpm\{python3-osbuild-93-1.el8_9.1.rocky.0.2.noarch.rpmD 4^BBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security updatexhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21386CVE-2024-21386CVE-2024-21386https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21404CVE-2024-21404CVE-2024-21404https://bugzilla.redhat.com/show_bug.cgi?id=22630852263085https://bugzilla.redhat.com/show_bug.cgi?id=22630862263086https://errata.rockylinux.org/RLSA-2024:0827RLSA-2024:0827RLSA-2024:0827 /Laspnetcore-runtime-8.0-8.0.2-2.el8_9.x86_64.rpm0Laspnetcore-targeting-pack-8.0-8.0.2-2.el8_9.x86_64.rpmdotnet-8.0.102-2.el8_9.x86_64.rpm1Ldotnet-apphost-pack-8.0-8.0.2-2.el8_9.x86_64.rpmLdotnet-host-8.0.2-2.el8_9.x86_64.rpm2Ldotnet-hostfxr-8.0-8.0.2-2.el8_9.x86_64.rpm3Ldotnet-runtime-8.0-8.0.2-2.el8_9.x86_64.rpm4dotnet-sdk-8.0-8.0.102-2.el8_9.x86_64.rpm5Ldotnet-targeting-pack-8.0-8.0.2-2.el8_9.x86_64.rpm6dotnet-templates-8.0-8.0.102-2.el8_9.x86_64.rpmnetstandard-targeting-pack-2.1-8.0.102-2.el8_9.x86_64.rpm /Laspnetcore-runtime-8.0-8.0.2-2.el8_9.x86_64.rpm0Laspnetcore-targeting-pack-8.0-8.0.2-2.el8_9.x86_64.rpmdotnet-8.0.102-2.el8_9.x86_64.rpm1Ldotnet-apphost-pack-8.0-8.0.2-2.el8_9.x86_64.rpmLdotnet-host-8.0.2-2.el8_9.x86_64.rpm2Ldotnet-hostfxr-8.0-8.0.2-2.el8_9.x86_64.rpm3Ldotnet-runtime-8.0-8.0.2-2.el8_9.x86_64.rpm4dotnet-sdk-8.0-8.0.102-2.el8_9.x86_64.rpm5Ldotnet-targeting-pack-8.0-8.0.2-2.el8_9.x86_64.rpm6dotnet-templates-8.0-8.0.102-2.el8_9.x86_64.rpmnetstandard-targeting-pack-2.1-8.0.102-2.el8_9.x86_64.rpmD 7usecurityImportant: firefox security updateWhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1546CVE-2024-1546CVE-2024-1546https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1547CVE-2024-1547CVE-2024-1547https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1548CVE-2024-1548CVE-2024-1548https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1549CVE-2024-1549CVE-2024-1549https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1550CVE-2024-1550CVE-2024-1550https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1551CVE-2024-1551CVE-2024-1551https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1552CVE-2024-1552CVE-2024-1552https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1553CVE-2024-1553CVE-2024-1553https://bugzilla.redhat.com/show_bug.cgi?id=22653492265349https://bugzilla.redhat.com/show_bug.cgi?id=22653502265350https://bugzilla.redhat.com/show_bug.cgi?id=22653512265351https://bugzilla.redhat.com/show_bug.cgi?id=22653522265352https://bugzilla.redhat.com/show_bug.cgi?id=22653532265353https://bugzilla.redhat.com/show_bug.cgi?id=22653542265354https://bugzilla.redhat.com/show_bug.cgi?id=22653552265355https://bugzilla.redhat.com/show_bug.cgi?id=22653562265356https://errata.rockylinux.org/RLSA-2024:0955RLSA-2024:0955RLSA-2024:0955 rfirefox-115.8.0-1.el8_9.x86_64.rpmrfirefox-115.8.0-1.el8_9.x86_64.rpmD 98securityImportant: edk2 security update_7https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45230CVE-2023-45230CVE-2023-45230https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45234CVE-2023-45234CVE-2023-45234https://bugzilla.redhat.com/show_bug.cgi?id=22586852258685https://bugzilla.redhat.com/show_bug.cgi?id=22586972258697https://errata.rockylinux.org/RLSA-2024:1063RLSA-2024:1063RLSA-2024:1063 edk2-ovmf-20220126gitbb1bba3d77-6.el8_9.6.noarch.rpmedk2-ovmf-20220126gitbb1bba3d77-6.el8_9.6.noarch.rpmD zBBBBBBBBBBBBBBbugfix.NET 6.0 bugfix update https://errata.rockylinux.org/RLBA-2024:1298RLBA-2024:1298RLBA-2024:1298 Z+aspnetcore-runtime-6.0-6.0.28-1.el8_9.x86_64.rpm[+aspnetcore-targeting-pack-6.0-6.0.28-1.el8_9.x86_64.rpm\+dotnet-apphost-pack-6.0-6.0.28-1.el8_9.x86_64.rpm]+dotnet-hostfxr-6.0-6.0.28-1.el8_9.x86_64.rpm^+dotnet-runtime-6.0-6.0.28-1.el8_9.x86_64.rpm_Tdotnet-sdk-6.0-6.0.128-1.el8_9.x86_64.rpm`+dotnet-targeting-pack-6.0-6.0.28-1.el8_9.x86_64.rpmaTdotnet-templates-6.0-6.0.128-1.el8_9.x86_64.rpmZ+aspnetcore-runtime-6.0-6.0.28-1.el8_9.x86_64.rpm[+aspnetcore-targeting-pack-6.0-6.0.28-1.el8_9.x86_64.rpm\+dotnet-apphost-pack-6.0-6.0.28-1.el8_9.x86_64.rpm]+dotnet-hostfxr-6.0-6.0.28-1.el8_9.x86_64.rpm^+dotnet-runtime-6.0-6.0.28-1.el8_9.x86_64.rpm_Tdotnet-sdk-6.0-6.0.128-1.el8_9.x86_64.rpm`+dotnet-targeting-pack-6.0-6.0.28-1.el8_9.x86_64.rpmaTdotnet-templates-6.0-6.0.128-1.el8_9.x86_64.rpm` KBBBBBBBBBBBBBBsecurityModerate: .NET 7.0 security update/Fhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21392CVE-2024-21392CVE-2024-21392https://bugzilla.redhat.com/show_bug.cgi?id=22682662268266https://errata.rockylinux.org/RLSA-2024:1308RLSA-2024:1308RLSA-2024:1308 S0aspnetcore-runtime-7.0-7.0.17-1.el8_9.x86_64.rpmT0aspnetcore-targeting-pack-7.0-7.0.17-1.el8_9.x86_64.rpmU0dotnet-apphost-pack-7.0-7.0.17-1.el8_9.x86_64.rpmV0dotnet-hostfxr-7.0-7.0.17-1.el8_9.x86_64.rpmW0dotnet-runtime-7.0-7.0.17-1.el8_9.x86_64.rpmXYdotnet-sdk-7.0-7.0.117-1.el8_9.x86_64.rpmY0dotnet-targeting-pack-7.0-7.0.17-1.el8_9.x86_64.rpmZYdotnet-templates-7.0-7.0.117-1.el8_9.x86_64.rpmS0aspnetcore-runtime-7.0-7.0.17-1.el8_9.x86_64.rpmT0aspnetcore-targeting-pack-7.0-7.0.17-1.el8_9.x86_64.rpmU0dotnet-apphost-pack-7.0-7.0.17-1.el8_9.x86_64.rpmV0dotnet-hostfxr-7.0-7.0.17-1.el8_9.x86_64.rpmW0dotnet-runtime-7.0-7.0.17-1.el8_9.x86_64.rpmXYdotnet-sdk-7.0-7.0.117-1.el8_9.x86_64.rpmY0dotnet-targeting-pack-7.0-7.0.17-1.el8_9.x86_64.rpmZYdotnet-templates-7.0-7.0.117-1.el8_9.x86_64.rpm` 2\BBBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 8.0 security updateuEhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21392CVE-2024-21392CVE-2024-21392https://bugzilla.redhat.com/show_bug.cgi?id=22682662268266https://errata.rockylinux.org/RLSA-2024:1311RLSA-2024:1311RLSA-2024:1311 /Maspnetcore-runtime-8.0-8.0.3-1.el8_9.x86_64.rpm0Maspnetcore-targeting-pack-8.0-8.0.3-1.el8_9.x86_64.rpmdotnet-8.0.103-1.el8_9.x86_64.rpm1Mdotnet-apphost-pack-8.0-8.0.3-1.el8_9.x86_64.rpmMdotnet-host-8.0.3-1.el8_9.x86_64.rpm2Mdotnet-hostfxr-8.0-8.0.3-1.el8_9.x86_64.rpm3Mdotnet-runtime-8.0-8.0.3-1.el8_9.x86_64.rpm4dotnet-sdk-8.0-8.0.103-1.el8_9.x86_64.rpm5Mdotnet-targeting-pack-8.0-8.0.3-1.el8_9.x86_64.rpm6dotnet-templates-8.0-8.0.103-1.el8_9.x86_64.rpmnetstandard-targeting-pack-2.1-8.0.103-1.el8_9.x86_64.rpm /Maspnetcore-runtime-8.0-8.0.3-1.el8_9.x86_64.rpm0Maspnetcore-targeting-pack-8.0-8.0.3-1.el8_9.x86_64.rpmdotnet-8.0.103-1.el8_9.x86_64.rpm1Mdotnet-apphost-pack-8.0-8.0.3-1.el8_9.x86_64.rpmMdotnet-host-8.0.3-1.el8_9.x86_64.rpm2Mdotnet-hostfxr-8.0-8.0.3-1.el8_9.x86_64.rpm3Mdotnet-runtime-8.0-8.0.3-1.el8_9.x86_64.rpm4dotnet-sdk-8.0-8.0.103-1.el8_9.x86_64.rpm5Mdotnet-targeting-pack-8.0-8.0.3-1.el8_9.x86_64.rpm6dotnet-templates-8.0-8.0.103-1.el8_9.x86_64.rpmnetstandard-targeting-pack-2.1-8.0.103-1.el8_9.x86_64.rpm`  7sBBsecurityImportant: dnsmasq security update:!https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387CVE-2023-50387CVE-2023-50387https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868CVE-2023-50868CVE-2023-50868https://bugzilla.redhat.com/show_bug.cgi?id=22639142263914https://bugzilla.redhat.com/show_bug.cgi?id=22639172263917https://errata.rockylinux.org/RLSA-2024:1335RLSA-2024:1335RLSA-2024:1335 vdnsmasq-2.79-31.el8_9.2.x86_64.rpmwdnsmasq-utils-2.79-31.el8_9.2.x86_64.rpmvdnsmasq-2.79-31.el8_9.2.x86_64.rpmwdnsmasq-utils-2.79-31.el8_9.2.x86_64.rpm`! :xsecurityImportant: postgresql-jdbc security update[ohttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1597CVE-2024-1597CVE-2024-1597https://bugzilla.redhat.com/show_bug.cgi?id=22665232266523https://errata.rockylinux.org/RLSA-2024:1435RLSA-2024:1435RLSA-2024:1435 postgresql-jdbc-42.2.14-3.el8_9.noarch.rpmpostgresql-jdbc-javadoc-42.2.14-3.el8_9.noarch.rpmpostgresql-jdbc-42.2.14-3.el8_9.noarch.rpmpostgresql-jdbc-javadoc-42.2.14-3.el8_9.noarch.rpm`" ={securityCritical: firefox security updateJLehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388CVE-2023-5388CVE-2023-5388https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743CVE-2024-0743CVE-2024-0743https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607CVE-2024-2607CVE-2024-2607https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608CVE-2024-2608CVE-2024-2608https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610CVE-2024-2610CVE-2024-2610https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611CVE-2024-2611CVE-2024-2611https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612CVE-2024-2612CVE-2024-2612https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614CVE-2024-2614CVE-2024-2614https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616CVE-2024-2616CVE-2024-2616https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29944CVE-2024-29944CVE-2024-29944https://bugzilla.redhat.com/show_bug.cgi?id=22436442243644https://bugzilla.redhat.com/show_bug.cgi?id=22600122260012https://bugzilla.redhat.com/show_bug.cgi?id=22706602270660https://bugzilla.redhat.com/show_bug.cgi?id=22706612270661https://bugzilla.redhat.com/show_bug.cgi?id=22706622270662https://bugzilla.redhat.com/show_bug.cgi?id=22706632270663https://bugzilla.redhat.com/show_bug.cgi?id=22706642270664https://bugzilla.redhat.com/show_bug.cgi?id=22706652270665https://bugzilla.redhat.com/show_bug.cgi?id=22706662270666https://bugzilla.redhat.com/show_bug.cgi?id=22710642271064https://errata.rockylinux.org/RLSA-2024:1484RLSA-2024:1484RLSA-2024:1484 rfirefox-115.9.1-1.el8_9.x86_64.rpmrfirefox-115.9.1-1.el8_9.x86_64.rpm`# ~securityModerate: thunderbird security updateShttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388CVE-2023-5388CVE-2023-5388https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743CVE-2024-0743CVE-2024-0743https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936CVE-2024-1936CVE-2024-1936https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607CVE-2024-2607CVE-2024-2607https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608CVE-2024-2608CVE-2024-2608https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610CVE-2024-2610CVE-2024-2610https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611CVE-2024-2611CVE-2024-2611https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612CVE-2024-2612CVE-2024-2612https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614CVE-2024-2614CVE-2024-2614https://bugzilla.redhat.com/show_bug.cgi?id=22436442243644https://bugzilla.redhat.com/show_bug.cgi?id=22600122260012https://bugzilla.redhat.com/show_bug.cgi?id=22681712268171https://bugzilla.redhat.com/show_bug.cgi?id=22706602270660https://bugzilla.redhat.com/show_bug.cgi?id=22706612270661https://bugzilla.redhat.com/show_bug.cgi?id=22706632270663https://bugzilla.redhat.com/show_bug.cgi?id=22706642270664https://bugzilla.redhat.com/show_bug.cgi?id=22706652270665https://bugzilla.redhat.com/show_bug.cgi?id=22706662270666https://errata.rockylinux.org/RLSA-2024:1494RLSA-2024:1494RLSA-2024:1494 hthunderbird-115.9.0-1.el8_9.x86_64.rpmhthunderbird-115.9.0-1.el8_9.x86_64.rpm`$ 1ABBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: libreoffice security fix updateihttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6185CVE-2023-6185CVE-2023-6185https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6186CVE-2023-6186CVE-2023-6186https://bugzilla.redhat.com/show_bug.cgi?id=22540032254003https://bugzilla.redhat.com/show_bug.cgi?id=22540052254005https://errata.rockylinux.org/RLSA-2024:1514RLSA-2024:1514RLSA-2024:1514 *dautocorr-cs-6.4.7.2-16.el8_9.noarch.rpmaautocorr-af-6.4.7.2-16.el8_9.noarch.rpmbautocorr-bg-6.4.7.2-16.el8_9.noarch.rpmcautocorr-ca-6.4.7.2-16.el8_9.noarch.rpmeautocorr-da-6.4.7.2-16.el8_9.noarch.rpmfautocorr-de-6.4.7.2-16.el8_9.noarch.rpmgautocorr-en-6.4.7.2-16.el8_9.noarch.rpmhautocorr-es-6.4.7.2-16.el8_9.noarch.rpmiautocorr-fa-6.4.7.2-16.el8_9.noarch.rpmjautocorr-fi-6.4.7.2-16.el8_9.noarch.rpmkautocorr-fr-6.4.7.2-16.el8_9.noarch.rpmlautocorr-ga-6.4.7.2-16.el8_9.noarch.rpmmautocorr-hr-6.4.7.2-16.el8_9.noarch.rpmnautocorr-hu-6.4.7.2-16.el8_9.noarch.rpmoautocorr-is-6.4.7.2-16.el8_9.noarch.rpmpautocorr-it-6.4.7.2-16.el8_9.noarch.rpmqautocorr-ja-6.4.7.2-16.el8_9.noarch.rpmrautocorr-ko-6.4.7.2-16.el8_9.noarch.rpmsautocorr-lb-6.4.7.2-16.el8_9.noarch.rpmtautocorr-lt-6.4.7.2-16.el8_9.noarch.rpmuautocorr-mn-6.4.7.2-16.el8_9.noarch.rpmvautocorr-nl-6.4.7.2-16.el8_9.noarch.rpmwautocorr-pl-6.4.7.2-16.el8_9.noarch.rpmxautocorr-pt-6.4.7.2-16.el8_9.noarch.rpmyautocorr-ro-6.4.7.2-16.el8_9.noarch.rpmzautocorr-ru-6.4.7.2-16.el8_9.noarch.rpm{autocorr-sk-6.4.7.2-16.el8_9.noarch.rpm|autocorr-sl-6.4.7.2-16.el8_9.noarch.rpm}autocorr-sr-6.4.7.2-16.el8_9.noarch.rpm~autocorr-sv-6.4.7.2-16.el8_9.noarch.rpmautocorr-tr-6.4.7.2-16.el8_9.noarch.rpmautocorr-vi-6.4.7.2-16.el8_9.noarch.rpmautocorr-zh-6.4.7.2-16.el8_9.noarch.rpm@libreoffice-6.4.7.2-16.el8_9.x86_64.rpmDlibreoffice-base-6.4.7.2-16.el8_9.x86_64.rpmElibreoffice-calc-6.4.7.2-16.el8_9.x86_64.rpmFlibreoffice-core-6.4.7.2-16.el8_9.x86_64.rpm-libreoffice-data-6.4.7.2-16.el8_9.noarch.rpmGlibreoffice-draw-6.4.7.2-16.el8_9.x86_64.rpmHlibreoffice-emailmerge-6.4.7.2-16.el8_9.x86_64.rpmIlibreoffice-filters-6.4.7.2-16.el8_9.x86_64.rpmJlibreoffice-gdb-debug-support-6.4.7.2-16.el8_9.x86_64.rpmKlibreoffice-graphicfilter-6.4.7.2-16.el8_9.x86_64.rpmLlibreoffice-gtk3-6.4.7.2-16.el8_9.x86_64.rpmMlibreoffice-help-ar-6.4.7.2-16.el8_9.x86_64.rpmNlibreoffice-help-bg-6.4.7.2-16.el8_9.x86_64.rpmOlibreoffice-help-bn-6.4.7.2-16.el8_9.x86_64.rpmPlibreoffice-help-ca-6.4.7.2-16.el8_9.x86_64.rpmQlibreoffice-help-cs-6.4.7.2-16.el8_9.x86_64.rpmRlibreoffice-help-da-6.4.7.2-16.el8_9.x86_64.rpmSlibreoffice-help-de-6.4.7.2-16.el8_9.x86_64.rpmTlibreoffice-help-dz-6.4.7.2-16.el8_9.x86_64.rpmUlibreoffice-help-el-6.4.7.2-16.el8_9.x86_64.rpmVlibreoffice-help-en-6.4.7.2-16.el8_9.x86_64.rpmWlibreoffice-help-es-6.4.7.2-16.el8_9.x86_64.rpmXlibreoffice-help-et-6.4.7.2-16.el8_9.x86_64.rpmYlibreoffice-help-eu-6.4.7.2-16.el8_9.x86_64.rpmZlibreoffice-help-fi-6.4.7.2-16.el8_9.x86_64.rpm[libreoffice-help-fr-6.4.7.2-16.el8_9.x86_64.rpm\libreoffice-help-gl-6.4.7.2-16.el8_9.x86_64.rpm]libreoffice-help-gu-6.4.7.2-16.el8_9.x86_64.rpm^libreoffice-help-he-6.4.7.2-16.el8_9.x86_64.rpm_libreoffice-help-hi-6.4.7.2-16.el8_9.x86_64.rpm`libreoffice-help-hr-6.4.7.2-16.el8_9.x86_64.rpmalibreoffice-help-hu-6.4.7.2-16.el8_9.x86_64.rpmblibreoffice-help-id-6.4.7.2-16.el8_9.x86_64.rpmclibreoffice-help-it-6.4.7.2-16.el8_9.x86_64.rpmdlibreoffice-help-ja-6.4.7.2-16.el8_9.x86_64.rpmelibreoffice-help-ko-6.4.7.2-16.el8_9.x86_64.rpmflibreoffice-help-lt-6.4.7.2-16.el8_9.x86_64.rpmglibreoffice-help-lv-6.4.7.2-16.el8_9.x86_64.rpmhlibreoffice-help-nb-6.4.7.2-16.el8_9.x86_64.rpmilibreoffice-help-nl-6.4.7.2-16.el8_9.x86_64.rpmjlibreoffice-help-nn-6.4.7.2-16.el8_9.x86_64.rpmklibreoffice-help-pl-6.4.7.2-16.el8_9.x86_64.rpmllibreoffice-help-pt-BR-6.4.7.2-16.el8_9.x86_64.rpmmlibreoffice-help-pt-PT-6.4.7.2-16.el8_9.x86_64.rpmnlibreoffice-help-ro-6.4.7.2-16.el8_9.x86_64.rpmolibreoffice-help-ru-6.4.7.2-16.el8_9.x86_64.rpmplibreoffice-help-si-6.4.7.2-16.el8_9.x86_64.rpmqlibreoffice-help-sk-6.4.7.2-16.el8_9.x86_64.rpmrlibreoffice-help-sl-6.4.7.2-16.el8_9.x86_64.rpmslibreoffice-help-sv-6.4.7.2-16.el8_9.x86_64.rpmtlibreoffice-help-ta-6.4.7.2-16.el8_9.x86_64.rpmulibreoffice-help-tr-6.4.7.2-16.el8_9.x86_64.rpmvlibreoffice-help-uk-6.4.7.2-16.el8_9.x86_64.rpmwlibreoffice-help-zh-Hans-6.4.7.2-16.el8_9.x86_64.rpmxlibreoffice-help-zh-Hant-6.4.7.2-16.el8_9.x86_64.rpmylibreoffice-impress-6.4.7.2-16.el8_9.x86_64.rpmHlibreofficekit-6.4.7.2-16.el8_9.x86_64.rpmzlibreoffice-langpack-af-6.4.7.2-16.el8_9.x86_64.rpm{libreoffice-langpack-ar-6.4.7.2-16.el8_9.x86_64.rpm|libreoffice-langpack-as-6.4.7.2-16.el8_9.x86_64.rpm}libreoffice-langpack-bg-6.4.7.2-16.el8_9.x86_64.rpm~libreoffice-langpack-bn-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-br-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-ca-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-cs-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-cy-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-da-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-de-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-dz-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-el-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-en-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-es-6.4.7.2-16.el8_9.x86_64.rpm libreoffice-langpack-et-6.4.7.2-16.el8_9.x86_64.rpm libreoffice-langpack-eu-6.4.7.2-16.el8_9.x86_64.rpm libreoffice-langpack-fa-6.4.7.2-16.el8_9.x86_64.rpm libreoffice-langpack-fi-6.4.7.2-16.el8_9.x86_64.rpm libreoffice-langpack-fr-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-ga-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-gl-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-gu-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-he-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-hi-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-hr-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-hu-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-id-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-it-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-ja-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-kk-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-kn-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-ko-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-lt-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-lv-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-mai-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-ml-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-mr-6.4.7.2-16.el8_9.x86_64.rpm libreoffice-langpack-nb-6.4.7.2-16.el8_9.x86_64.rpm!libreoffice-langpack-nl-6.4.7.2-16.el8_9.x86_64.rpm"libreoffice-langpack-nn-6.4.7.2-16.el8_9.x86_64.rpm#libreoffice-langpack-nr-6.4.7.2-16.el8_9.x86_64.rpm$libreoffice-langpack-nso-6.4.7.2-16.el8_9.x86_64.rpm%libreoffice-langpack-or-6.4.7.2-16.el8_9.x86_64.rpm&libreoffice-langpack-pa-6.4.7.2-16.el8_9.x86_64.rpm'libreoffice-langpack-pl-6.4.7.2-16.el8_9.x86_64.rpm(libreoffice-langpack-pt-BR-6.4.7.2-16.el8_9.x86_64.rpm)libreoffice-langpack-pt-PT-6.4.7.2-16.el8_9.x86_64.rpm*libreoffice-langpack-ro-6.4.7.2-16.el8_9.x86_64.rpm+libreoffice-langpack-ru-6.4.7.2-16.el8_9.x86_64.rpm,libreoffice-langpack-si-6.4.7.2-16.el8_9.x86_64.rpm-libreoffice-langpack-sk-6.4.7.2-16.el8_9.x86_64.rpm.libreoffice-langpack-sl-6.4.7.2-16.el8_9.x86_64.rpm/libreoffice-langpack-sr-6.4.7.2-16.el8_9.x86_64.rpm0libreoffice-langpack-ss-6.4.7.2-16.el8_9.x86_64.rpm1libreoffice-langpack-st-6.4.7.2-16.el8_9.x86_64.rpm2libreoffice-langpack-sv-6.4.7.2-16.el8_9.x86_64.rpm3libreoffice-langpack-ta-6.4.7.2-16.el8_9.x86_64.rpm4libreoffice-langpack-te-6.4.7.2-16.el8_9.x86_64.rpm5libreoffice-langpack-th-6.4.7.2-16.el8_9.x86_64.rpm6libreoffice-langpack-tn-6.4.7.2-16.el8_9.x86_64.rpm7libreoffice-langpack-tr-6.4.7.2-16.el8_9.x86_64.rpm8libreoffice-langpack-ts-6.4.7.2-16.el8_9.x86_64.rpm9libreoffice-langpack-uk-6.4.7.2-16.el8_9.x86_64.rpm:libreoffice-langpack-ve-6.4.7.2-16.el8_9.x86_64.rpm;libreoffice-langpack-xh-6.4.7.2-16.el8_9.x86_64.rpm<libreoffice-langpack-zh-Hans-6.4.7.2-16.el8_9.x86_64.rpm=libreoffice-langpack-zh-Hant-6.4.7.2-16.el8_9.x86_64.rpm>libreoffice-langpack-zu-6.4.7.2-16.el8_9.x86_64.rpm?libreoffice-math-6.4.7.2-16.el8_9.x86_64.rpm@libreoffice-ogltrans-6.4.7.2-16.el8_9.x86_64.rpm.libreoffice-opensymbol-fonts-6.4.7.2-16.el8_9.noarch.rpmAlibreoffice-pdfimport-6.4.7.2-16.el8_9.x86_64.rpmBlibreoffice-pyuno-6.4.7.2-16.el8_9.x86_64.rpmClibreoffice-ure-6.4.7.2-16.el8_9.x86_64.rpm/libreoffice-ure-common-6.4.7.2-16.el8_9.noarch.rpmDlibreoffice-wiki-publisher-6.4.7.2-16.el8_9.x86_64.rpmElibreoffice-writer-6.4.7.2-16.el8_9.x86_64.rpmFlibreoffice-x11-6.4.7.2-16.el8_9.x86_64.rpmGlibreoffice-xsltfilter-6.4.7.2-16.el8_9.x86_64.rpm*dautocorr-cs-6.4.7.2-16.el8_9.noarch.rpmaautocorr-af-6.4.7.2-16.el8_9.noarch.rpmbautocorr-bg-6.4.7.2-16.el8_9.noarch.rpmcautocorr-ca-6.4.7.2-16.el8_9.noarch.rpmeautocorr-da-6.4.7.2-16.el8_9.noarch.rpmfautocorr-de-6.4.7.2-16.el8_9.noarch.rpmgautocorr-en-6.4.7.2-16.el8_9.noarch.rpmhautocorr-es-6.4.7.2-16.el8_9.noarch.rpmiautocorr-fa-6.4.7.2-16.el8_9.noarch.rpmjautocorr-fi-6.4.7.2-16.el8_9.noarch.rpmkautocorr-fr-6.4.7.2-16.el8_9.noarch.rpmlautocorr-ga-6.4.7.2-16.el8_9.noarch.rpmmautocorr-hr-6.4.7.2-16.el8_9.noarch.rpmnautocorr-hu-6.4.7.2-16.el8_9.noarch.rpmoautocorr-is-6.4.7.2-16.el8_9.noarch.rpmpautocorr-it-6.4.7.2-16.el8_9.noarch.rpmqautocorr-ja-6.4.7.2-16.el8_9.noarch.rpmrautocorr-ko-6.4.7.2-16.el8_9.noarch.rpmsautocorr-lb-6.4.7.2-16.el8_9.noarch.rpmtautocorr-lt-6.4.7.2-16.el8_9.noarch.rpmuautocorr-mn-6.4.7.2-16.el8_9.noarch.rpmvautocorr-nl-6.4.7.2-16.el8_9.noarch.rpmwautocorr-pl-6.4.7.2-16.el8_9.noarch.rpmxautocorr-pt-6.4.7.2-16.el8_9.noarch.rpmyautocorr-ro-6.4.7.2-16.el8_9.noarch.rpmzautocorr-ru-6.4.7.2-16.el8_9.noarch.rpm{autocorr-sk-6.4.7.2-16.el8_9.noarch.rpm|autocorr-sl-6.4.7.2-16.el8_9.noarch.rpm}autocorr-sr-6.4.7.2-16.el8_9.noarch.rpm~autocorr-sv-6.4.7.2-16.el8_9.noarch.rpmautocorr-tr-6.4.7.2-16.el8_9.noarch.rpmautocorr-vi-6.4.7.2-16.el8_9.noarch.rpmautocorr-zh-6.4.7.2-16.el8_9.noarch.rpm@libreoffice-6.4.7.2-16.el8_9.x86_64.rpmDlibreoffice-base-6.4.7.2-16.el8_9.x86_64.rpmElibreoffice-calc-6.4.7.2-16.el8_9.x86_64.rpmFlibreoffice-core-6.4.7.2-16.el8_9.x86_64.rpm-libreoffice-data-6.4.7.2-16.el8_9.noarch.rpmGlibreoffice-draw-6.4.7.2-16.el8_9.x86_64.rpmHlibreoffice-emailmerge-6.4.7.2-16.el8_9.x86_64.rpmIlibreoffice-filters-6.4.7.2-16.el8_9.x86_64.rpmJlibreoffice-gdb-debug-support-6.4.7.2-16.el8_9.x86_64.rpmKlibreoffice-graphicfilter-6.4.7.2-16.el8_9.x86_64.rpmLlibreoffice-gtk3-6.4.7.2-16.el8_9.x86_64.rpmMlibreoffice-help-ar-6.4.7.2-16.el8_9.x86_64.rpmNlibreoffice-help-bg-6.4.7.2-16.el8_9.x86_64.rpmOlibreoffice-help-bn-6.4.7.2-16.el8_9.x86_64.rpmPlibreoffice-help-ca-6.4.7.2-16.el8_9.x86_64.rpmQlibreoffice-help-cs-6.4.7.2-16.el8_9.x86_64.rpmRlibreoffice-help-da-6.4.7.2-16.el8_9.x86_64.rpmSlibreoffice-help-de-6.4.7.2-16.el8_9.x86_64.rpmTlibreoffice-help-dz-6.4.7.2-16.el8_9.x86_64.rpmUlibreoffice-help-el-6.4.7.2-16.el8_9.x86_64.rpmVlibreoffice-help-en-6.4.7.2-16.el8_9.x86_64.rpmWlibreoffice-help-es-6.4.7.2-16.el8_9.x86_64.rpmXlibreoffice-help-et-6.4.7.2-16.el8_9.x86_64.rpmYlibreoffice-help-eu-6.4.7.2-16.el8_9.x86_64.rpmZlibreoffice-help-fi-6.4.7.2-16.el8_9.x86_64.rpm[libreoffice-help-fr-6.4.7.2-16.el8_9.x86_64.rpm\libreoffice-help-gl-6.4.7.2-16.el8_9.x86_64.rpm]libreoffice-help-gu-6.4.7.2-16.el8_9.x86_64.rpm^libreoffice-help-he-6.4.7.2-16.el8_9.x86_64.rpm_libreoffice-help-hi-6.4.7.2-16.el8_9.x86_64.rpm`libreoffice-help-hr-6.4.7.2-16.el8_9.x86_64.rpmalibreoffice-help-hu-6.4.7.2-16.el8_9.x86_64.rpmblibreoffice-help-id-6.4.7.2-16.el8_9.x86_64.rpmclibreoffice-help-it-6.4.7.2-16.el8_9.x86_64.rpmdlibreoffice-help-ja-6.4.7.2-16.el8_9.x86_64.rpmelibreoffice-help-ko-6.4.7.2-16.el8_9.x86_64.rpmflibreoffice-help-lt-6.4.7.2-16.el8_9.x86_64.rpmglibreoffice-help-lv-6.4.7.2-16.el8_9.x86_64.rpmhlibreoffice-help-nb-6.4.7.2-16.el8_9.x86_64.rpmilibreoffice-help-nl-6.4.7.2-16.el8_9.x86_64.rpmjlibreoffice-help-nn-6.4.7.2-16.el8_9.x86_64.rpmklibreoffice-help-pl-6.4.7.2-16.el8_9.x86_64.rpmllibreoffice-help-pt-BR-6.4.7.2-16.el8_9.x86_64.rpmmlibreoffice-help-pt-PT-6.4.7.2-16.el8_9.x86_64.rpmnlibreoffice-help-ro-6.4.7.2-16.el8_9.x86_64.rpmolibreoffice-help-ru-6.4.7.2-16.el8_9.x86_64.rpmplibreoffice-help-si-6.4.7.2-16.el8_9.x86_64.rpmqlibreoffice-help-sk-6.4.7.2-16.el8_9.x86_64.rpmrlibreoffice-help-sl-6.4.7.2-16.el8_9.x86_64.rpmslibreoffice-help-sv-6.4.7.2-16.el8_9.x86_64.rpmtlibreoffice-help-ta-6.4.7.2-16.el8_9.x86_64.rpmulibreoffice-help-tr-6.4.7.2-16.el8_9.x86_64.rpmvlibreoffice-help-uk-6.4.7.2-16.el8_9.x86_64.rpmwlibreoffice-help-zh-Hans-6.4.7.2-16.el8_9.x86_64.rpmxlibreoffice-help-zh-Hant-6.4.7.2-16.el8_9.x86_64.rpmylibreoffice-impress-6.4.7.2-16.el8_9.x86_64.rpmHlibreofficekit-6.4.7.2-16.el8_9.x86_64.rpmzlibreoffice-langpack-af-6.4.7.2-16.el8_9.x86_64.rpm{libreoffice-langpack-ar-6.4.7.2-16.el8_9.x86_64.rpm|libreoffice-langpack-as-6.4.7.2-16.el8_9.x86_64.rpm}libreoffice-langpack-bg-6.4.7.2-16.el8_9.x86_64.rpm~libreoffice-langpack-bn-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-br-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-ca-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-cs-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-cy-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-da-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-de-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-dz-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-el-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-en-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-es-6.4.7.2-16.el8_9.x86_64.rpm libreoffice-langpack-et-6.4.7.2-16.el8_9.x86_64.rpm libreoffice-langpack-eu-6.4.7.2-16.el8_9.x86_64.rpm libreoffice-langpack-fa-6.4.7.2-16.el8_9.x86_64.rpm libreoffice-langpack-fi-6.4.7.2-16.el8_9.x86_64.rpm libreoffice-langpack-fr-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-ga-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-gl-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-gu-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-he-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-hi-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-hr-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-hu-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-id-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-it-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-ja-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-kk-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-kn-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-ko-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-lt-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-lv-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-mai-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-ml-6.4.7.2-16.el8_9.x86_64.rpmlibreoffice-langpack-mr-6.4.7.2-16.el8_9.x86_64.rpm libreoffice-langpack-nb-6.4.7.2-16.el8_9.x86_64.rpm!libreoffice-langpack-nl-6.4.7.2-16.el8_9.x86_64.rpm"libreoffice-langpack-nn-6.4.7.2-16.el8_9.x86_64.rpm#libreoffice-langpack-nr-6.4.7.2-16.el8_9.x86_64.rpm$libreoffice-langpack-nso-6.4.7.2-16.el8_9.x86_64.rpm%libreoffice-langpack-or-6.4.7.2-16.el8_9.x86_64.rpm&libreoffice-langpack-pa-6.4.7.2-16.el8_9.x86_64.rpm'libreoffice-langpack-pl-6.4.7.2-16.el8_9.x86_64.rpm(libreoffice-langpack-pt-BR-6.4.7.2-16.el8_9.x86_64.rpm)libreoffice-langpack-pt-PT-6.4.7.2-16.el8_9.x86_64.rpm*libreoffice-langpack-ro-6.4.7.2-16.el8_9.x86_64.rpm+libreoffice-langpack-ru-6.4.7.2-16.el8_9.x86_64.rpm,libreoffice-langpack-si-6.4.7.2-16.el8_9.x86_64.rpm-libreoffice-langpack-sk-6.4.7.2-16.el8_9.x86_64.rpm.libreoffice-langpack-sl-6.4.7.2-16.el8_9.x86_64.rpm/libreoffice-langpack-sr-6.4.7.2-16.el8_9.x86_64.rpm0libreoffice-langpack-ss-6.4.7.2-16.el8_9.x86_64.rpm1libreoffice-langpack-st-6.4.7.2-16.el8_9.x86_64.rpm2libreoffice-langpack-sv-6.4.7.2-16.el8_9.x86_64.rpm3libreoffice-langpack-ta-6.4.7.2-16.el8_9.x86_64.rpm4libreoffice-langpack-te-6.4.7.2-16.el8_9.x86_64.rpm5libreoffice-langpack-th-6.4.7.2-16.el8_9.x86_64.rpm6libreoffice-langpack-tn-6.4.7.2-16.el8_9.x86_64.rpm7libreoffice-langpack-tr-6.4.7.2-16.el8_9.x86_64.rpm8libreoffice-langpack-ts-6.4.7.2-16.el8_9.x86_64.rpm9libreoffice-langpack-uk-6.4.7.2-16.el8_9.x86_64.rpm:libreoffice-langpack-ve-6.4.7.2-16.el8_9.x86_64.rpm;libreoffice-langpack-xh-6.4.7.2-16.el8_9.x86_64.rpm<libreoffice-langpack-zh-Hans-6.4.7.2-16.el8_9.x86_64.rpm=libreoffice-langpack-zh-Hant-6.4.7.2-16.el8_9.x86_64.rpm>libreoffice-langpack-zu-6.4.7.2-16.el8_9.x86_64.rpm?libreoffice-math-6.4.7.2-16.el8_9.x86_64.rpm@libreoffice-ogltrans-6.4.7.2-16.el8_9.x86_64.rpm.libreoffice-opensymbol-fonts-6.4.7.2-16.el8_9.noarch.rpmAlibreoffice-pdfimport-6.4.7.2-16.el8_9.x86_64.rpmBlibreoffice-pyuno-6.4.7.2-16.el8_9.x86_64.rpmClibreoffice-ure-6.4.7.2-16.el8_9.x86_64.rpm/libreoffice-ure-common-6.4.7.2-16.el8_9.noarch.rpmDlibreoffice-wiki-publisher-6.4.7.2-16.el8_9.x86_64.rpmElibreoffice-writer-6.4.7.2-16.el8_9.x86_64.rpmFlibreoffice-x11-6.4.7.2-16.el8_9.x86_64.rpmGlibreoffice-xsltfilter-6.4.7.2-16.el8_9.x86_64.rpma 4rbugfixNetworkManager bug fix updateD https://errata.rockylinux.org/RLBA-2024:1604RLBA-2024:1604RLBA-2024:1604 dNetworkManager-cloud-setup-1.40.16-15.el8_9.x86_64.rpmdNetworkManager-cloud-setup-1.40.16-15.el8_9.x86_64.rpm 7ubugfixutil-linux bug fix updateK https://errata.rockylinux.org/RLBA-2024:1606RLBA-2024:1606RLBA-2024:1606 H`python3-libmount-2.32.1-44.el8_9.1.x86_64.rpmH`python3-libmount-2.32.1-44.el8_9.1.x86_64.rpm 98bugfixpython-pip bug fix updatea https://errata.rockylinux.org/RLBA-2024:1609RLBA-2024:1609RLBA-2024:1609 ]bpython3-pip-9.0.3-23.el8_9.1.rocky.0.noarch.rpm]bpython3-pip-9.0.3-23.el8_9.1.rocky.0.noarch.rpm avahi-tools-0.7-27.el8.x86_64.rpmoavahi-ui-gtk3-0.7-27.el8.x86_64.rpm>avahi-tools-0.7-27.el8.x86_64.rpmoavahi-ui-gtk3-0.7-27.el8.x86_64.rpmft <;enhancementtzdata bug fix and enhancement updateV https://errata.rockylinux.org/RLEA-2024:3209RLEA-2024:3209RLEA-2024:3209 > tzdata-java-2024a-1.el8.noarch.rpm> tzdata-java-2024a-1.el8.noarch.rpmgI }BBBBBBBBbugfixnet-snmp bug fix and enhancement updateV https://errata.rockylinux.org/RLBA-2024:3216RLBA-2024:3216RLBA-2024:3216 onet-snmp-5.8-30.el8.x86_64.rpmpnet-snmp-agent-libs-5.8-30.el8.x86_64.rpmqnet-snmp-devel-5.8-30.el8.x86_64.rpmrnet-snmp-perl-5.8-30.el8.x86_64.rpmsnet-snmp-utils-5.8-30.el8.x86_64.rpmonet-snmp-5.8-30.el8.x86_64.rpmpnet-snmp-agent-libs-5.8-30.el8.x86_64.rpmqnet-snmp-devel-5.8-30.el8.x86_64.rpmrnet-snmp-perl-5.8-30.el8.x86_64.rpmsnet-snmp-utils-5.8-30.el8.x86_64.rpmhJ bugfixpython-pip bug fix and enhancement updateV https://errata.rockylinux.org/RLBA-2024:3220RLBA-2024:3220RLBA-2024:3220 ]cpython3-pip-9.0.3-24.el8.rocky.0.noarch.rpm]cpython3-pip-9.0.3-24.el8.rocky.0.noarch.rpmhK JBBbugfixtuned bug fix and enhancement updateV https://errata.rockylinux.org/RLBA-2024:3221RLBA-2024:3221RLBA-2024:3221 cQtuned-gtk-2.22.1-4.el8_10.noarch.rpmdQtuned-profiles-postgresql-2.22.1-4.el8_10.noarch.rpmeQtuned-utils-2.22.1-4.el8_10.noarch.rpmfQtuned-utils-systemtap-2.22.1-4.el8_10.noarch.rpmcQtuned-gtk-2.22.1-4.el8_10.noarch.rpmdQtuned-profiles-postgresql-2.22.1-4.el8_10.noarch.rpmeQtuned-utils-2.22.1-4.el8_10.noarch.rpmfQtuned-utils-systemtap-2.22.1-4.el8_10.noarch.rpmhE OsecurityLow: libssh security updateVlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6004CVE-2023-6004CVE-2023-6004https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6918CVE-2023-6918CVE-2023-6918https://bugzilla.redhat.com/show_bug.cgi?id=22511102251110https://bugzilla.redhat.com/show_bug.cgi?id=22549972254997https://errata.rockylinux.org/RLSA-2024:3233RLSA-2024:3233RLSA-2024:3233 Ijlibssh-devel-0.9.6-14.el8.x86_64.rpmIjlibssh-devel-0.9.6-14.el8.x86_64.rpmhK RsecurityModerate: sssd security updatef https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3758CVE-2023-3758CVE-2023-3758https://bugzilla.redhat.com/show_bug.cgi?id=22237622223762https://errata.rockylinux.org/RLSA-2024:3270RLSA-2024:3270RLSA-2024:3270 rsssd-idp-2.9.4-3.el8_10.x86_64.rpmrsssd-idp-2.9.4-3.el8_10.x86_64.rpmiL 1UBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: bind and dhcp security update https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408CVE-2023-4408CVE-2023-4408https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387CVE-2023-50387CVE-2023-50387https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868CVE-2023-50868CVE-2023-50868https://bugzilla.redhat.com/show_bug.cgi?id=22638962263896https://bugzilla.redhat.com/show_bug.cgi?id=22639142263914https://bugzilla.redhat.com/show_bug.cgi?id=22639172263917https://errata.rockylinux.org/RLSA-2024:3271RLSA-2024:3271RLSA-2024:3271 e[bind-9.11.36-14.el8_10.x86_64.rpmf[bind-chroot-9.11.36-14.el8_10.x86_64.rpmg[bind-devel-9.11.36-14.el8_10.x86_64.rpmh[bind-libs-9.11.36-14.el8_10.x86_64.rpmi[bind-libs-lite-9.11.36-14.el8_10.x86_64.rpm&[bind-license-9.11.36-14.el8_10.noarch.rpmj[bind-lite-devel-9.11.36-14.el8_10.x86_64.rpmk[bind-pkcs11-9.11.36-14.el8_10.x86_64.rpml[bind-pkcs11-devel-9.11.36-14.el8_10.x86_64.rpmm[bind-pkcs11-libs-9.11.36-14.el8_10.x86_64.rpmn[bind-pkcs11-utils-9.11.36-14.el8_10.x86_64.rpmo[bind-sdb-9.11.36-14.el8_10.x86_64.rpmp[bind-sdb-chroot-9.11.36-14.el8_10.x86_64.rpmq[bind-utils-9.11.36-14.el8_10.x86_64.rpm4[python3-bind-9.11.36-14.el8_10.noarch.rpme[bind-9.11.36-14.el8_10.x86_64.rpmf[bind-chroot-9.11.36-14.el8_10.x86_64.rpmg[bind-devel-9.11.36-14.el8_10.x86_64.rpmh[bind-libs-9.11.36-14.el8_10.x86_64.rpmi[bind-libs-lite-9.11.36-14.el8_10.x86_64.rpm&[bind-license-9.11.36-14.el8_10.noarch.rpmj[bind-lite-devel-9.11.36-14.el8_10.x86_64.rpmk[bind-pkcs11-9.11.36-14.el8_10.x86_64.rpml[bind-pkcs11-devel-9.11.36-14.el8_10.x86_64.rpmm[bind-pkcs11-libs-9.11.36-14.el8_10.x86_64.rpmn[bind-pkcs11-utils-9.11.36-14.el8_10.x86_64.rpmo[bind-sdb-9.11.36-14.el8_10.x86_64.rpmp[bind-sdb-chroot-9.11.36-14.el8_10.x86_64.rpmq[bind-utils-9.11.36-14.el8_10.x86_64.rpm4[python3-bind-9.11.36-14.el8_10.noarch.rpmiQ rBBBBBBBBBBBBBBBBBBBBbugfixgcc bug fix update{ https://errata.rockylinux.org/RLBA-2024:3272RLBA-2024:3272RLBA-2024:3272  cpp-8.5.0-22.el8_10.x86_64.rpmgcc-8.5.0-22.el8_10.x86_64.rpmgcc-c++-8.5.0-22.el8_10.x86_64.rpmgcc-gdb-plugin-8.5.0-22.el8_10.x86_64.rpmgcc-gfortran-8.5.0-22.el8_10.x86_64.rpmgcc-offload-nvptx-8.5.0-22.el8_10.x86_64.rpm gcc-plugin-annobin-8.5.0-22.el8_10.x86_64.rpm8libitm-devel-8.5.0-22.el8_10.x86_64.rpm9libquadmath-devel-8.5.0-22.el8_10.x86_64.rpm<libstdc++-devel-8.5.0-22.el8_10.x86_64.rpm=libstdc++-docs-8.5.0-22.el8_10.x86_64.rpm  cpp-8.5.0-22.el8_10.x86_64.rpmgcc-8.5.0-22.el8_10.x86_64.rpmgcc-c++-8.5.0-22.el8_10.x86_64.rpmgcc-gdb-plugin-8.5.0-22.el8_10.x86_64.rpmgcc-gfortran-8.5.0-22.el8_10.x86_64.rpmgcc-offload-nvptx-8.5.0-22.el8_10.x86_64.rpm gcc-plugin-annobin-8.5.0-22.el8_10.x86_64.rpm8libitm-devel-8.5.0-22.el8_10.x86_64.rpm9libquadmath-devel-8.5.0-22.el8_10.x86_64.rpm<libstdc++-devel-8.5.0-22.el8_10.x86_64.rpm=libstdc++-docs-8.5.0-22.el8_10.x86_64.rpmiN IBBsecurityModerate: gdk-pixbuf2 security update Ahttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48622CVE-2022-48622CVE-2022-48622https://bugzilla.redhat.com/show_bug.cgi?id=22605452260545https://errata.rockylinux.org/RLSA-2024:3341RLSA-2024:3341RLSA-2024:3341 gdk-pixbuf2-devel-2.36.12-6.el8_10.x86_64.rpmgdk-pixbuf2-modules-2.36.12-6.el8_10.x86_64.rpmgdk-pixbuf2-devel-2.36.12-6.el8_10.x86_64.rpmgdk-pixbuf2-modules-2.36.12-6.el8_10.x86_64.rpmiP kBBsecurityImportant: glibc security updateK? https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599CVE-2024-33599CVE-2024-33599https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600CVE-2024-33600CVE-2024-33600https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601CVE-2024-33601CVE-2024-33601https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602CVE-2024-33602CVE-2024-33602https://bugzilla.redhat.com/show_bug.cgi?id=22772022277202https://bugzilla.redhat.com/show_bug.cgi?id=22772042277204https://bugzilla.redhat.com/show_bug.cgi?id=22772052277205https://bugzilla.redhat.com/show_bug.cgi?id=22772062277206https://errata.rockylinux.org/RLSA-2024:3344RLSA-2024:3344RLSA-2024:3344 Scompat-libpthread-nonshared-2.28-251.el8_10.2.x86_64.rpmSglibc-utils-2.28-251.el8_10.2.x86_64.rpmScompat-libpthread-nonshared-2.28-251.el8_10.2.x86_64.rpmSglibc-utils-2.28-251.el8_10.2.x86_64.rpmiS OBBBBBBsecurityImportant: python3 security update https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6597CVE-2023-6597CVE-2023-6597https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0450CVE-2024-0450CVE-2024-0450https://bugzilla.redhat.com/show_bug.cgi?id=22765182276518https://bugzilla.redhat.com/show_bug.cgi?id=22765252276525https://errata.rockylinux.org/RLSA-2024:3347RLSA-2024:3347RLSA-2024:3347 platform-python-debug-3.6.8-62.el8_10.rocky.0.x86_64.rpmplatform-python-devel-3.6.8-62.el8_10.rocky.0.x86_64.rpm python3-idle-3.6.8-62.el8_10.rocky.0.x86_64.rpm python3-tkinter-3.6.8-62.el8_10.rocky.0.x86_64.rpmplatform-python-debug-3.6.8-62.el8_10.rocky.0.x86_64.rpmplatform-python-devel-3.6.8-62.el8_10.rocky.0.x86_64.rpm python3-idle-3.6.8-62.el8_10.rocky.0.x86_64.rpm python3-tkinter-3.6.8-62.el8_10.rocky.0.x86_64.rpmiS XBBbugfixtuned bug fix update#S https://errata.rockylinux.org/RLBA-2024:3381RLBA-2024:3381RLBA-2024:3381 cRtuned-gtk-2.22.1-4.el8_10.1.noarch.rpmdRtuned-profiles-postgresql-2.22.1-4.el8_10.1.noarch.rpmeRtuned-utils-2.22.1-4.el8_10.1.noarch.rpmfRtuned-utils-systemtap-2.22.1-4.el8_10.1.noarch.rpmcRtuned-gtk-2.22.1-4.el8_10.1.noarch.rpmdRtuned-profiles-postgresql-2.22.1-4.el8_10.1.noarch.rpmeRtuned-utils-2.22.1-4.el8_10.1.noarch.rpmfRtuned-utils-systemtap-2.22.1-4.el8_10.1.noarch.rpmjT ]securityModerate: libxml2 security updatevnhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25062CVE-2024-25062CVE-2024-25062https://bugzilla.redhat.com/show_bug.cgi?id=22627262262726https://errata.rockylinux.org/RLSA-2024:3626RLSA-2024:3626RLSA-2024:3626 .libxml2-devel-2.9.7-18.el8_10.1.x86_64.rpm.libxml2-devel-2.9.7-18.el8_10.1.x86_64.rpmj $`BBbugfixrpm-ostree bug fix updated  https://errata.rockylinux.org/RLBA-2024:1595RLBA-2024:1595RLBA-2024:1595 Rrpm-ostree-2022.10.117.g52714b51-3.el8_9.x86_64.rpmSrpm-ostree-libs-2022.10.117.g52714b51-3.el8_9.x86_64.rpmRrpm-ostree-2022.10.117.g52714b51-3.el8_9.x86_64.rpmSrpm-ostree-libs-2022.10.117.g52714b51-3.el8_9.x86_64.rpmj  8eBBBBBBBBBBBBBBBBBbugfixevolution and evolution-data-server bug fix and enhancement updateq https://errata.rockylinux.org/RLBA-2024:2959RLBA-2024:2959RLBA-2024:2959 Pevolution-pst-3.28.5-26.el8_10.x86_64.rpmPevolution-3.28.5-26.el8_10.x86_64.rpmPevolution-bogofilter-3.28.5-26.el8_10.x86_64.rpmcQevolution-data-server-3.28.5-24.el8.x86_64.rpmdQevolution-data-server-devel-3.28.5-24.el8.x86_64.rpmeQevolution-data-server-langpacks-3.28.5-24.el8.noarch.rpmvQevolution-data-server-ui-3.28.5-24.el8.x86_64.rpmwQevolution-data-server-ui-devel-3.28.5-24.el8.x86_64.rpmPevolution-help-3.28.5-26.el8_10.noarch.rpmPevolution-langpacks-3.28.5-26.el8_10.noarch.rpmPevolution-spamassassin-3.28.5-26.el8_10.x86_64.rpm Pevolution-pst-3.28.5-26.el8_10.x86_64.rpmPevolution-3.28.5-26.el8_10.x86_64.rpmPevolution-bogofilter-3.28.5-26.el8_10.x86_64.rpmcQevolution-data-server-3.28.5-24.el8.x86_64.rpmdQevolution-data-server-devel-3.28.5-24.el8.x86_64.rpmeQevolution-data-server-langpacks-3.28.5-24.el8.noarch.rpmvQevolution-data-server-ui-3.28.5-24.el8.x86_64.rpmwQevolution-data-server-ui-devel-3.28.5-24.el8.x86_64.rpmPevolution-help-3.28.5-26.el8_10.noarch.rpmPevolution-langpacks-3.28.5-26.el8_10.noarch.rpmPevolution-spamassassin-3.28.5-26.el8_10.x86_64.rpmm ;ybugfixgnome-shell bug fix and enhancement updateq https://errata.rockylinux.org/RLBA-2024:2963RLBA-2024:2963RLBA-2024:2963 9gnome-shell-3.32.2-55.el8.x86_64.rpm9gnome-shell-3.32.2-55.el8.x86_64.rpmm5 |BBBBBBBBBBBsecurityModerate: Image builder components bug fix, enhancement and security updateqZhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2307CVE-2024-2307CVE-2024-2307https://bugzilla.redhat.com/show_bug.cgi?id=22685132268513https://errata.rockylinux.org/RLSA-2024:2961RLSA-2024:2961RLSA-2024:2961 1hosbuild-110-1.el8.rocky.0.2.noarch.rpmuIosbuild-composer-101-1.el8.rocky.0.4.x86_64.rpmvIosbuild-composer-core-101-1.el8.rocky.0.4.x86_64.rpmwIosbuild-composer-worker-101-1.el8.rocky.0.4.x86_64.rpm{hosbuild-depsolve-dnf-110-1.el8.rocky.0.2.noarch.rpm2hosbuild-luks2-110-1.el8.rocky.0.2.noarch.rpm3hosbuild-lvm2-110-1.el8.rocky.0.2.noarch.rpm4hosbuild-ostree-110-1.el8.rocky.0.2.noarch.rpm5hosbuild-selinux-110-1.el8.rocky.0.2.noarch.rpm\hpython3-osbuild-110-1.el8.rocky.0.2.noarch.rpm 1hosbuild-110-1.el8.rocky.0.2.noarch.rpmuIosbuild-composer-101-1.el8.rocky.0.4.x86_64.rpmvIosbuild-composer-core-101-1.el8.rocky.0.4.x86_64.rpmwIosbuild-composer-worker-101-1.el8.rocky.0.4.x86_64.rpm{hosbuild-depsolve-dnf-110-1.el8.rocky.0.2.noarch.rpm2hosbuild-luks2-110-1.el8.rocky.0.2.noarch.rpm3hosbuild-lvm2-110-1.el8.rocky.0.2.noarch.rpm4hosbuild-ostree-110-1.el8.rocky.0.2.noarch.rpm5hosbuild-selinux-110-1.el8.rocky.0.2.noarch.rpm\hpython3-osbuild-110-1.el8.rocky.0.2.noarch.rpmm JBBbugfixpixman bug fix and enhancement updateK https://errata.rockylinux.org/RLBA-2024:2967RLBA-2024:2967RLBA-2024:2967 {zpixman-0.38.4-4.el8.x86_64.rpm|zpixman-devel-0.38.4-4.el8.x86_64.rpm{zpixman-0.38.4-4.el8.x86_64.rpm|zpixman-devel-0.38.4-4.el8.x86_64.rpmm Obugfixmutter bug fix and enhancement updateK https://errata.rockylinux.org/RLBA-2024:2969RLBA-2024:2969RLBA-2024:2969 >mutter-3.32.2-72.el8.x86_64.rpm>mutter-3.32.2-72.el8.x86_64.rpmm7 ?RBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: fence-agents security and bug fix updateJhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45803CVE-2023-45803CVE-2023-45803https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52323CVE-2023-52323CVE-2023-52323https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22195CVE-2024-22195CVE-2024-22195https://bugzilla.redhat.com/show_bug.cgi?id=22468402246840https://bugzilla.redhat.com/show_bug.cgi?id=22570282257028https://bugzilla.redhat.com/show_bug.cgi?id=22578542257854https://errata.rockylinux.org/RLSA-2024:2968RLSA-2024:2968RLSA-2024:2968 )|#fence-agents-all-4.2.1-129.el8.x86_64.rpm#fence-agents-amt-ws-4.2.1-129.el8.noarch.rpm#fence-agents-apc-4.2.1-129.el8.noarch.rpm#fence-agents-apc-snmp-4.2.1-129.el8.noarch.rpm#fence-agents-bladecenter-4.2.1-129.el8.noarch.rpm#fence-agents-brocade-4.2.1-129.el8.noarch.rpm#fence-agents-cisco-mds-4.2.1-129.el8.noarch.rpm#fence-agents-cisco-ucs-4.2.1-129.el8.noarch.rpm #fence-agents-common-4.2.1-129.el8.noarch.rpm #fence-agents-compute-4.2.1-129.el8.noarch.rpm #fence-agents-drac5-4.2.1-129.el8.noarch.rpm #fence-agents-eaton-snmp-4.2.1-129.el8.noarch.rpm #fence-agents-emerson-4.2.1-129.el8.noarch.rpm#fence-agents-eps-4.2.1-129.el8.noarch.rpm#fence-agents-heuristics-ping-4.2.1-129.el8.noarch.rpm#fence-agents-hpblade-4.2.1-129.el8.noarch.rpm#fence-agents-ibmblade-4.2.1-129.el8.noarch.rpm#fence-agents-ibm-powervs-4.2.1-129.el8.noarch.rpm#fence-agents-ibm-vpc-4.2.1-129.el8.noarch.rpm#fence-agents-ifmib-4.2.1-129.el8.noarch.rpm#fence-agents-ilo2-4.2.1-129.el8.noarch.rpm#fence-agents-ilo-moonshot-4.2.1-129.el8.noarch.rpm#fence-agents-ilo-mp-4.2.1-129.el8.noarch.rpm#fence-agents-ilo-ssh-4.2.1-129.el8.noarch.rpm#fence-agents-intelmodular-4.2.1-129.el8.noarch.rpm#fence-agents-ipdu-4.2.1-129.el8.noarch.rpm#fence-agents-ipmilan-4.2.1-129.el8.noarch.rpm}#fence-agents-kdump-4.2.1-129.el8.x86_64.rpm~#fence-agents-kubevirt-4.2.1-129.el8.x86_64.rpm#fence-agents-lpar-4.2.1-129.el8.noarch.rpm#fence-agents-mpath-4.2.1-129.el8.noarch.rpm#fence-agents-redfish-4.2.1-129.el8.x86_64.rpm#fence-agents-rhevm-4.2.1-129.el8.noarch.rpm#fence-agents-rsa-4.2.1-129.el8.noarch.rpm #fence-agents-rsb-4.2.1-129.el8.noarch.rpm!#fence-agents-sbd-4.2.1-129.el8.noarch.rpm"#fence-agents-scsi-4.2.1-129.el8.noarch.rpm##fence-agents-virsh-4.2.1-129.el8.noarch.rpm$#fence-agents-vmware-rest-4.2.1-129.el8.noarch.rpm%#fence-agents-vmware-soap-4.2.1-129.el8.noarch.rpm&#fence-agents-wti-4.2.1-129.el8.noarch.rpm)|#fence-agents-all-4.2.1-129.el8.x86_64.rpm#fence-agents-amt-ws-4.2.1-129.el8.noarch.rpm#fence-agents-apc-4.2.1-129.el8.noarch.rpm#fence-agents-apc-snmp-4.2.1-129.el8.noarch.rpm#fence-agents-bladecenter-4.2.1-129.el8.noarch.rpm#fence-agents-brocade-4.2.1-129.el8.noarch.rpm#fence-agents-cisco-mds-4.2.1-129.el8.noarch.rpm#fence-agents-cisco-ucs-4.2.1-129.el8.noarch.rpm #fence-agents-common-4.2.1-129.el8.noarch.rpm #fence-agents-compute-4.2.1-129.el8.noarch.rpm #fence-agents-drac5-4.2.1-129.el8.noarch.rpm #fence-agents-eaton-snmp-4.2.1-129.el8.noarch.rpm #fence-agents-emerson-4.2.1-129.el8.noarch.rpm#fence-agents-eps-4.2.1-129.el8.noarch.rpm#fence-agents-heuristics-ping-4.2.1-129.el8.noarch.rpm#fence-agents-hpblade-4.2.1-129.el8.noarch.rpm#fence-agents-ibmblade-4.2.1-129.el8.noarch.rpm#fence-agents-ibm-powervs-4.2.1-129.el8.noarch.rpm#fence-agents-ibm-vpc-4.2.1-129.el8.noarch.rpm#fence-agents-ifmib-4.2.1-129.el8.noarch.rpm#fence-agents-ilo2-4.2.1-129.el8.noarch.rpm#fence-agents-ilo-moonshot-4.2.1-129.el8.noarch.rpm#fence-agents-ilo-mp-4.2.1-129.el8.noarch.rpm#fence-agents-ilo-ssh-4.2.1-129.el8.noarch.rpm#fence-agents-intelmodular-4.2.1-129.el8.noarch.rpm#fence-agents-ipdu-4.2.1-129.el8.noarch.rpm#fence-agents-ipmilan-4.2.1-129.el8.noarch.rpm}#fence-agents-kdump-4.2.1-129.el8.x86_64.rpm~#fence-agents-kubevirt-4.2.1-129.el8.x86_64.rpm#fence-agents-lpar-4.2.1-129.el8.noarch.rpm#fence-agents-mpath-4.2.1-129.el8.noarch.rpm#fence-agents-redfish-4.2.1-129.el8.x86_64.rpm#fence-agents-rhevm-4.2.1-129.el8.noarch.rpm#fence-agents-rsa-4.2.1-129.el8.noarch.rpm #fence-agents-rsb-4.2.1-129.el8.noarch.rpm!#fence-agents-sbd-4.2.1-129.el8.noarch.rpm"#fence-agents-scsi-4.2.1-129.el8.noarch.rpm##fence-agents-virsh-4.2.1-129.el8.noarch.rpm$#fence-agents-vmware-rest-4.2.1-129.el8.noarch.rpm%#fence-agents-vmware-soap-4.2.1-129.el8.noarch.rpm&#fence-agents-wti-4.2.1-129.el8.noarch.rpmn @BBBBBBbugfixopen-vm-tools bug fix and enhancement updateL https://errata.rockylinux.org/RLBA-2024:2965RLBA-2024:2965RLBA-2024:2965 1\open-vm-tools-12.3.5-2.el8.x86_64.rpm2\open-vm-tools-desktop-12.3.5-2.el8.x86_64.rpm3\open-vm-tools-salt-minion-12.3.5-2.el8.x86_64.rpm4\open-vm-tools-sdmp-12.3.5-2.el8.x86_64.rpm1\open-vm-tools-12.3.5-2.el8.x86_64.rpm2\open-vm-tools-desktop-12.3.5-2.el8.x86_64.rpm3\open-vm-tools-salt-minion-12.3.5-2.el8.x86_64.rpm4\open-vm-tools-sdmp-12.3.5-2.el8.x86_64.rpmn6 IBBBBsecurityLow: ghostscript security updateLzlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21710CVE-2020-21710CVE-2020-21710https://bugzilla.redhat.com/show_bug.cgi?id=22350012235001https://errata.rockylinux.org/RLSA-2024:2966RLSA-2024:2966RLSA-2024:2966 ughostscript-9.27-12.el8.x86_64.rpmughostscript-x11-9.27-12.el8.x86_64.rpm-ulibgs-9.27-12.el8.x86_64.rpmughostscript-9.27-12.el8.x86_64.rpmughostscript-x11-9.27-12.el8.x86_64.rpm-ulibgs-9.27-12.el8.x86_64.rpmn Pbugfixibus-typing-booster bug fix and enhancement updateF https://errata.rockylinux.org/RLBA-2024:2972RLBA-2024:2972RLBA-2024:2972 bsemoji-picker-2.1.0-7.el8.noarch.rpm(sibus-typing-booster-2.1.0-7.el8.noarch.rpmbsemoji-picker-2.1.0-7.el8.noarch.rpm(sibus-typing-booster-2.1.0-7.el8.noarch.rpmn SBBbugfixhexchat bug fix and enhancement updateE https://errata.rockylinux.org/RLBA-2024:2970RLBA-2024:2970RLBA-2024:2970 *uhexchat-2.14.3-1.el8.x86_64.rpm+uhexchat-devel-2.14.3-1.el8.x86_64.rpm*uhexchat-2.14.3-1.el8.x86_64.rpm+uhexchat-devel-2.14.3-1.el8.x86_64.rpmn8 XBBsecurityModerate: libXpm security updateD'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43788CVE-2023-43788CVE-2023-43788https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43789CVE-2023-43789CVE-2023-43789https://bugzilla.redhat.com/show_bug.cgi?id=22422482242248https://bugzilla.redhat.com/show_bug.cgi?id=22422492242249https://errata.rockylinux.org/RLSA-2024:2974RLSA-2024:2974RLSA-2024:2974 &,libXpm-3.5.12-11.el8.x86_64.rpm',libXpm-devel-3.5.12-11.el8.x86_64.rpm&,libXpm-3.5.12-11.el8.x86_64.rpm',libXpm-devel-3.5.12-11.el8.x86_64.rpmn #]BBBBbugfixnmstate bug fix and enhancement updatek https://errata.rockylinux.org/RLBA-2024:2971RLBA-2024:2971RLBA-2024:2971 WNnmstate-1.4.5-2.el8_9.x86_64.rpmXNnmstate-libs-1.4.5-2.el8_9.x86_64.rpmuNnmstate-plugin-ovsdb-1.4.5-2.el8_9.noarch.rpmNpython3-libnmstate-1.4.5-2.el8_9.noarch.rpmWNnmstate-1.4.5-2.el8_9.x86_64.rpmXNnmstate-libs-1.4.5-2.el8_9.x86_64.rpmuNnmstate-plugin-ovsdb-1.4.5-2.el8_9.noarch.rpmNpython3-libnmstate-1.4.5-2.el8_9.noarch.rpmn %$bugfixibus-table bug fix and enhancement updatek https://errata.rockylinux.org/RLBA-2024:2976RLBA-2024:2976RLBA-2024:2976 'ibus-table-1.9.18-8.el8.noarch.rpm'ibus-table-1.9.18-8.el8.noarch.rpmn '&bugfixpoppler-data bug fix and enhancement updatej https://errata.rockylinux.org/RLBA-2024:2978RLBA-2024:2978RLBA-2024:2978 Gpoppler-data-0.4.9-2.el8.noarch.rpmGpoppler-data-0.4.9-2.el8.noarch.rpmn .hBBBBbugfixgcc-toolset-13-binutils bug fix and enhancement updatei https://bugzilla.redhat.com/show_bug.cgi?id=22324102232410https://errata.rockylinux.org/RLBA-2024:2977RLBA-2024:2977RLBA-2024:2977 Wgcc-toolset-13-binutils-2.40-21.el8.x86_64.rpmWgcc-toolset-13-binutils-devel-2.40-21.el8.x86_64.rpmWgcc-toolset-13-binutils-gold-2.40-21.el8.x86_64.rpmWgcc-toolset-13-binutils-2.40-21.el8.x86_64.rpmWgcc-toolset-13-binutils-devel-2.40-21.el8.x86_64.rpmWgcc-toolset-13-binutils-gold-2.40-21.el8.x86_64.rpmn9 7oBBBBBBsecurityImportant: webkit2gtk3 security updateihttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745CVE-2014-1745CVE-2014-1745https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359CVE-2023-32359CVE-2023-32359https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928CVE-2023-39928CVE-2023-39928https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414CVE-2023-40414CVE-2023-40414https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983CVE-2023-41983CVE-2023-41983https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852CVE-2023-42852CVE-2023-42852https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42883CVE-2023-42883CVE-2023-42883https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890CVE-2023-42890CVE-2023-42890https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206CVE-2024-23206CVE-2024-23206https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213CVE-2024-23213CVE-2024-23213https://bugzilla.redhat.com/show_bug.cgi?id=22414002241400https://bugzilla.redhat.com/show_bug.cgi?id=22543262254326https://bugzilla.redhat.com/show_bug.cgi?id=22543272254327https://bugzilla.redhat.com/show_bug.cgi?id=22697432269743https://bugzilla.redhat.com/show_bug.cgi?id=22701412270141https://bugzilla.redhat.com/show_bug.cgi?id=22701432270143https://bugzilla.redhat.com/show_bug.cgi?id=22701512270151https://bugzilla.redhat.com/show_bug.cgi?id=22714492271449https://bugzilla.redhat.com/show_bug.cgi?id=22714532271453https://bugzilla.redhat.com/show_bug.cgi?id=22714562271456https://errata.rockylinux.org/RLSA-2024:2982RLSA-2024:2982RLSA-2024:2982 ygwebkit2gtk3-2.42.5-1.el8.x86_64.rpmzgwebkit2gtk3-devel-2.42.5-1.el8.x86_64.rpm{gwebkit2gtk3-jsc-2.42.5-1.el8.x86_64.rpm|gwebkit2gtk3-jsc-devel-2.42.5-1.el8.x86_64.rpmygwebkit2gtk3-2.42.5-1.el8.x86_64.rpmzgwebkit2gtk3-devel-2.42.5-1.el8.x86_64.rpm{gwebkit2gtk3-jsc-2.42.5-1.el8.x86_64.rpm|gwebkit2gtk3-jsc-devel-2.42.5-1.el8.x86_64.rpmn: 98securityModerate: python3.11-urllib3 security update|:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43804CVE-2023-43804CVE-2023-43804https://bugzilla.redhat.com/show_bug.cgi?id=22424932242493https://errata.rockylinux.org/RLSA-2024:2986RLSA-2024:2986RLSA-2024:2986 ipython3.11-urllib3-1.26.12-2.el8.noarch.rpmipython3.11-urllib3-1.26.12-2.el8.noarch.rpmn >zBBbugfixgtk-vnc bug fix and enhancement update6 https://errata.rockylinux.org/RLBA-2024:2983RLBA-2024:2983RLBA-2024:2983 gtk-vnc2-0.9.0-3.el8.x86_64.rpmgvnc-0.9.0-3.el8.x86_64.rpmgtk-vnc2-0.9.0-3.el8.x86_64.rpmgvnc-0.9.0-3.el8.x86_64.rpmp bugfixgcc-toolset-13-gdb bug fix and enhancement update6 https://errata.rockylinux.org/RLBA-2024:2990RLBA-2024:2990RLBA-2024:2990 gcc-toolset-13-gdb-12.1-4.el8.x86_64.rpmgcc-toolset-13-gdb-12.1-4.el8.x86_64.rpmp Bbugfixjq bug fix and enhancement update6 https://errata.rockylinux.org/RLBA-2024:2993RLBA-2024:2993RLBA-2024:2993 %Ljq-1.6-8.el8.x86_64.rpm%Ljq-1.6-8.el8.x86_64.rpmp; EsecurityModerate: LibRaw security update6Nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32142CVE-2021-32142CVE-2021-32142https://bugzilla.redhat.com/show_bug.cgi?id=21720042172004https://errata.rockylinux.org/RLSA-2024:2994RLSA-2024:2994RLSA-2024:2994 %8LibRaw-0.19.5-4.el8.x86_64.rpm%8LibRaw-0.19.5-4.el8.x86_64.rpmp *HBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbugfixlibblockdev bug fix and enhancement update https://errata.rockylinux.org/RLBA-2024:2998RLBA-2024:2998RLBA-2024:2998 (Olibblockdev-2.28-6.el8.x86_64.rpm)Olibblockdev-crypto-2.28-6.el8.x86_64.rpm*Olibblockdev-dm-2.28-6.el8.x86_64.rpm+Olibblockdev-fs-2.28-6.el8.x86_64.rpm,Olibblockdev-kbd-2.28-6.el8.x86_64.rpm-Olibblockdev-loop-2.28-6.el8.x86_64.rpm.Olibblockdev-lvm-2.28-6.el8.x86_64.rpm/Olibblockdev-lvm-dbus-2.28-6.el8.x86_64.rpm0Olibblockdev-mdraid-2.28-6.el8.x86_64.rpm1Olibblockdev-mpath-2.28-6.el8.x86_64.rpm2Olibblockdev-nvdimm-2.28-6.el8.x86_64.rpm3Olibblockdev-part-2.28-6.el8.x86_64.rpm4Olibblockdev-plugins-all-2.28-6.el8.x86_64.rpm5Olibblockdev-swap-2.28-6.el8.x86_64.rpm6Olibblockdev-utils-2.28-6.el8.x86_64.rpm7Olibblockdev-vdo-2.28-6.el8.x86_64.rpmjOpython3-blockdev-2.28-6.el8.x86_64.rpm(Olibblockdev-2.28-6.el8.x86_64.rpm)Olibblockdev-crypto-2.28-6.el8.x86_64.rpm*Olibblockdev-dm-2.28-6.el8.x86_64.rpm+Olibblockdev-fs-2.28-6.el8.x86_64.rpm,Olibblockdev-kbd-2.28-6.el8.x86_64.rpm-Olibblockdev-loop-2.28-6.el8.x86_64.rpm.Olibblockdev-lvm-2.28-6.el8.x86_64.rpm/Olibblockdev-lvm-dbus-2.28-6.el8.x86_64.rpm0Olibblockdev-mdraid-2.28-6.el8.x86_64.rpm1Olibblockdev-mpath-2.28-6.el8.x86_64.rpm2Olibblockdev-nvdimm-2.28-6.el8.x86_64.rpm3Olibblockdev-part-2.28-6.el8.x86_64.rpm4Olibblockdev-plugins-all-2.28-6.el8.x86_64.rpm5Olibblockdev-swap-2.28-6.el8.x86_64.rpm6Olibblockdev-utils-2.28-6.el8.x86_64.rpm7Olibblockdev-vdo-2.28-6.el8.x86_64.rpmjOpython3-blockdev-2.28-6.el8.x86_64.rpmp -kbugfixrt-tests bug fix and enhancement update https://errata.rockylinux.org/RLBA-2024:2997RLBA-2024:2997RLBA-2024:2997 Inrt-tests-2.6-3.el8.x86_64.rpmInrt-tests-2.6-3.el8.x86_64.rpmp< 0nsecurityModerate: python-pillow security update:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44271CVE-2023-44271CVE-2023-44271https://bugzilla.redhat.com/show_bug.cgi?id=22478202247820https://errata.rockylinux.org/RLSA-2024:3005RLSA-2024:3005RLSA-2024:3005  python3-pillow-5.1.1-20.el8.x86_64.rpm python3-pillow-5.1.1-20.el8.x86_64.rpmq 6qBBBbugfixcockpit-appstream bug fix and enhancement update= https://errata.rockylinux.org/RLBA-2024:3000RLBA-2024:3000RLBA-2024:3000 ~cockpit-machines-310.3-2.el8.noarch.rpmcockpit-packagekit-310.3-2.el8.noarch.rpmcockpit-pcp-310.3-2.el8.x86_64.rpmcockpit-storaged-310.3-2.el8.noarch.rpm~cockpit-machines-310.3-2.el8.noarch.rpmcockpit-packagekit-310.3-2.el8.noarch.rpmcockpit-pcp-310.3-2.el8.x86_64.rpmcockpit-storaged-310.3-2.el8.noarch.rpmq= 9wsecurityImportant: pmix security update=Ahttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41915CVE-2023-41915CVE-2023-41915https://bugzilla.redhat.com/show_bug.cgi?id=22388982238898https://errata.rockylinux.org/RLSA-2024:3008RLSA-2024:3008RLSA-2024:3008 ~Opmix-2.2.5-3.el8.x86_64.rpm~Opmix-2.2.5-3.el8.x86_64.rpmq Flibtsan2-13.2.1-6.2.el8.x86_64.rpmmFgcc-toolset-13-gcc-13.2.1-6.2.el8.x86_64.rpmnFgcc-toolset-13-gcc-c++-13.2.1-6.2.el8.x86_64.rpmoFgcc-toolset-13-gcc-gfortran-13.2.1-6.2.el8.x86_64.rpmpFgcc-toolset-13-gcc-plugin-annobin-13.2.1-6.2.el8.x86_64.rpmqFgcc-toolset-13-gcc-plugin-devel-13.2.1-6.2.el8.x86_64.rpmrFgcc-toolset-13-libasan-devel-13.2.1-6.2.el8.x86_64.rpmsFgcc-toolset-13-libatomic-devel-13.2.1-6.2.el8.x86_64.rpmtFgcc-toolset-13-libgccjit-13.2.1-6.2.el8.x86_64.rpmuFgcc-toolset-13-libgccjit-devel-13.2.1-6.2.el8.x86_64.rpmvFgcc-toolset-13-libitm-devel-13.2.1-6.2.el8.x86_64.rpmwFgcc-toolset-13-liblsan-devel-13.2.1-6.2.el8.x86_64.rpmxFgcc-toolset-13-libquadmath-devel-13.2.1-6.2.el8.x86_64.rpmyFgcc-toolset-13-libstdc++-devel-13.2.1-6.2.el8.x86_64.rpmzFgcc-toolset-13-libstdc++-docs-13.2.1-6.2.el8.x86_64.rpm{Fgcc-toolset-13-libtsan-devel-13.2.1-6.2.el8.x86_64.rpm|Fgcc-toolset-13-libubsan-devel-13.2.1-6.2.el8.x86_64.rpm}Fgcc-toolset-13-offload-nvptx-13.2.1-6.2.el8.x86_64.rpm7Flibasan8-13.2.1-6.2.el8.x86_64.rpm>Flibtsan2-13.2.1-6.2.el8.x86_64.rpmq# 1obugfixxdg-desktop-portal bug fix and enhancement update| https://errata.rockylinux.org/RLBA-2024:3020RLBA-2024:3020RLBA-2024:3020 ' xdg-desktop-portal-1.12.6-1.el8.x86_64.rpm' xdg-desktop-portal-1.12.6-1.el8.x86_64.rpmq" 4rbugfixcrash-trace-command bug fix and enhancement update{ https://errata.rockylinux.org/RLBA-2024:3019RLBA-2024:3019RLBA-2024:3019 Ocrash-trace-command-3.0-2.el8.x86_64.rpmOcrash-trace-command-3.0-2.el8.x86_64.rpmq! 7ubugfixtcpdump bug fix and enhancement updatez https://errata.rockylinux.org/RLBA-2024:3016RLBA-2024:3016RLBA-2024:3016 |tcpdump-4.9.3-5.el8.x86_64.rpm|tcpdump-4.9.3-5.el8.x86_64.rpmqs =xBBBenhancementgcc-toolset-13-annobin bug fix and enhancement updatez https://errata.rockylinux.org/RLEA-2024:3024RLEA-2024:3024RLEA-2024:3024 gcc-toolset-13-annobin-annocheck-12.32-2.el8.x86_64.rpm(gcc-toolset-13-annobin-docs-12.32-2.el8.noarch.rpmgcc-toolset-13-annobin-plugin-gcc-12.32-2.el8.x86_64.rpmgcc-toolset-13-annobin-annocheck-12.32-2.el8.x86_64.rpm(gcc-toolset-13-annobin-docs-12.32-2.el8.noarch.rpmgcc-toolset-13-annobin-plugin-gcc-12.32-2.el8.x86_64.rpmq% ?>bugfixrhel-system-roles bug fix and enhancement updatez https://errata.rockylinux.org/RLBA-2024:3026RLBA-2024:3026RLBA-2024:3026 8`rhel-system-roles-1.23.0-2.21.el8.noarch.rpm8`rhel-system-roles-1.23.0-2.21.el8.noarch.rpmr$ @bugfixxdg-desktop-portal-gtk bug fix and enhancement updatez https://errata.rockylinux.org/RLBA-2024:3021RLBA-2024:3021RLBA-2024:3021 ( xdg-desktop-portal-gtk-1.12.0-1.el8.x86_64.rpm( xdg-desktop-portal-gtk-1.12.0-1.el8.x86_64.rpmr& Cbugfixtracer bug fix and enhancement updatey https://errata.rockylinux.org/RLBA-2024:3029RLBA-2024:3029RLBA-2024:3029 Npython3-tracer-1.1-1.el8.noarch.rpmNtracer-common-1.1-1.el8.noarch.rpmNpython3-tracer-1.1-1.el8.noarch.rpmNtracer-common-1.1-1.el8.noarch.rpmr' FBBbugfixsetroubleshoot bug fix and enhancement updatey https://errata.rockylinux.org/RLBA-2024:3031RLBA-2024:3031RLBA-2024:3031 M'setroubleshoot-3.3.26-6.el8.x86_64.rpmN'setroubleshoot-server-3.3.26-6.el8.x86_64.rpmM'setroubleshoot-3.3.26-6.el8.x86_64.rpmN'setroubleshoot-server-3.3.26-6.el8.x86_64.rpmr( KBBBBbugfixpapi bug fix and enhancement updatey https://errata.rockylinux.org/RLBA-2024:3034RLBA-2024:3034RLBA-2024:3034 ujpapi-libs-5.6.0-20.el8.x86_64.rpmsjpapi-5.6.0-20.el8.x86_64.rpmtjpapi-devel-5.6.0-20.el8.x86_64.rpmujpapi-libs-5.6.0-20.el8.x86_64.rpmsjpapi-5.6.0-20.el8.x86_64.rpmtjpapi-devel-5.6.0-20.el8.x86_64.rpmr) Rbugfixansible-freeipa bug fix and enhancement updatey https://errata.rockylinux.org/RLBA-2024:3035RLBA-2024:3035RLBA-2024:3035 zRansible-freeipa-1.12.1-1.el8.noarch.rpm{Ransible-freeipa-tests-1.12.1-1.el8.noarch.rpmzRansible-freeipa-1.12.1-1.el8.noarch.rpm{Ransible-freeipa-tests-1.12.1-1.el8.noarch.rpmr* UBBbugfixqatzip bug fix and enhancement updatey https://errata.rockylinux.org/RLBA-2024:3038RLBA-2024:3038RLBA-2024:3038 'qatzip-1.1.2-2.el8.x86_64.rpm(qatzip-libs-1.1.2-2.el8.x86_64.rpm'qatzip-1.1.2-2.el8.x86_64.rpm(qatzip-libs-1.1.2-2.el8.x86_64.rpmr, Zbugfixpython-blivet bug fix and enhancement updatey https://errata.rockylinux.org/RLBA-2024:3045RLBA-2024:3045RLBA-2024:3045 Clblivet-data-3.6.0-8.el8.noarch.rpm lpython3-blivet-3.6.0-8.el8.noarch.rpmClblivet-data-3.6.0-8.el8.noarch.rpm lpython3-blivet-3.6.0-8.el8.noarch.rpmr+ !]BBbugfixqatlib bug fix and enhancement updatey https://errata.rockylinux.org/RLBA-2024:3039RLBA-2024:3039RLBA-2024:3039 &qatlib-23.11.0-1.el8.x86_64.rpm}qatlib-service-23.11.0-1.el8.x86_64.rpm&qatlib-23.11.0-1.el8.x86_64.rpm}qatlib-service-23.11.0-1.el8.x86_64.rpms. 0bBBBBBBBBBBBBbugfixanaconda bug fix and enhancement updatey https://errata.rockylinux.org/RLBA-2024:3048RLBA-2024:3048RLBA-2024:3048 *=anaconda-33.16.10.5-1.el8.rocky.0.1.x86_64.rpm+=anaconda-core-33.16.10.5-1.el8.rocky.0.1.x86_64.rpm,=anaconda-dracut-33.16.10.5-1.el8.rocky.0.1.x86_64.rpm-=anaconda-gui-33.16.10.5-1.el8.rocky.0.1.x86_64.rpm.=anaconda-install-env-deps-33.16.10.5-1.el8.rocky.0.1.x86_64.rpm/=anaconda-tui-33.16.10.5-1.el8.rocky.0.1.x86_64.rpm0=anaconda-widgets-33.16.10.5-1.el8.rocky.0.1.x86_64.rpm*=anaconda-33.16.10.5-1.el8.rocky.0.1.x86_64.rpm+=anaconda-core-33.16.10.5-1.el8.rocky.0.1.x86_64.rpm,=anaconda-dracut-33.16.10.5-1.el8.rocky.0.1.x86_64.rpm-=anaconda-gui-33.16.10.5-1.el8.rocky.0.1.x86_64.rpm.=anaconda-install-env-deps-33.16.10.5-1.el8.rocky.0.1.x86_64.rpm/=anaconda-tui-33.16.10.5-1.el8.rocky.0.1.x86_64.rpm0=anaconda-widgets-33.16.10.5-1.el8.rocky.0.1.x86_64.rpms> 21securityModerate: perl-Convert-ASN1 security updatey!https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7488CVE-2013-7488CVE-2013-7488https://bugzilla.redhat.com/show_bug.cgi?id=18218791821879https://errata.rockylinux.org/RLSA-2024:3049RLSA-2024:3049RLSA-2024:3049 vperl-Convert-ASN1-0.27-18.el8.noarch.rpmvperl-Convert-ASN1-0.27-18.el8.noarch.rpmt- 43bugfixdriverctl bug fix and enhancement update https://errata.rockylinux.org/RLBA-2024:3046RLBA-2024:3046RLBA-2024:3046 [rdriverctl-0.115-1.el8.noarch.rpm[rdriverctl-0.115-1.el8.noarch.rpmt0 :uBBBbugfixpacemaker bug fix and enhancement update https://errata.rockylinux.org/RLBA-2024:3055RLBA-2024:3055RLBA-2024:3055 pacemaker-cluster-libs-2.1.7-5.el8_10.x86_64.rpmpacemaker-libs-2.1.7-5.el8_10.x86_64.rpm0pacemaker-schemas-2.1.7-5.el8_10.noarch.rpmpacemaker-cluster-libs-2.1.7-5.el8_10.x86_64.rpmpacemaker-libs-2.1.7-5.el8_10.x86_64.rpm0pacemaker-schemas-2.1.7-5.el8_10.noarch.rpmt/ ={bugfixoniguruma bug fix and enhancement update https://errata.rockylinux.org/RLBA-2024:3052RLBA-2024:3052RLBA-2024:3052 loniguruma-6.8.2-3.el8.x86_64.rpmloniguruma-6.8.2-3.el8.x86_64.rpmt? ~securityModerate: mutt security updatehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4874CVE-2023-4874CVE-2023-4874https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4875CVE-2023-4875CVE-2023-4875https://bugzilla.redhat.com/show_bug.cgi?id=22382402238240https://bugzilla.redhat.com/show_bug.cgi?id=22382412238241https://errata.rockylinux.org/RLSA-2024:3058RLSA-2024:3058RLSA-2024:3058 jmutt-2.0.7-3.el8.x86_64.rpmjmutt-2.0.7-3.el8.x86_64.rpmuA AsecurityModerate: gstreamer1-plugins-bad-free security update* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40474CVE-2023-40474CVE-2023-40474https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40475CVE-2023-40475CVE-2023-40475https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40476CVE-2023-40476CVE-2023-40476https://bugzilla.redhat.com/show_bug.cgi?id=22545872254587https://bugzilla.redhat.com/show_bug.cgi?id=22545882254588https://bugzilla.redhat.com/show_bug.cgi?id=22545892254589https://errata.rockylinux.org/RLSA-2024:3060RLSA-2024:3060RLSA-2024:3060 @gstreamer1-plugins-bad-free-1.16.1-4.el8.x86_64.rpm@gstreamer1-plugins-bad-free-1.16.1-4.el8.x86_64.rpmu@ DBBsecurityModerate: libtiff security update6https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4645CVE-2022-4645CVE-2022-4645https://bugzilla.redhat.com/show_bug.cgi?id=21762202176220https://errata.rockylinux.org/RLSA-2024:3059RLSA-2024:3059RLSA-2024:3059 @8libtiff-4.0.9-31.el8.x86_64.rpmA8libtiff-devel-4.0.9-31.el8.x86_64.rpm@8libtiff-4.0.9-31.el8.x86_64.rpmA8libtiff-devel-4.0.9-31.el8.x86_64.rpmuB IsecurityModerate: exempi security updateTShttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18651CVE-2020-18651CVE-2020-18651https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18652CVE-2020-18652CVE-2020-18652https://bugzilla.redhat.com/show_bug.cgi?id=22356692235669https://bugzilla.redhat.com/show_bug.cgi?id=22356732235673https://errata.rockylinux.org/RLSA-2024:3066RLSA-2024:3066RLSA-2024:3066 zcexempi-2.4.5-4.el8.x86_64.rpmzcexempi-2.4.5-4.el8.x86_64.rpmu2 Lbugfixlibtimezonemap bug fix and enhancement update' https://errata.rockylinux.org/RLBA-2024:3064RLBA-2024:3064RLBA-2024:3064 KRlibtimezonemap-0.4.5.1-5.el8.x86_64.rpmKRlibtimezonemap-0.4.5.1-5.el8.x86_64.rpmu3 bugfixansible-collection-microsoft-sql bug fix and enhancement update' https://errata.rockylinux.org/RLBA-2024:3065RLBA-2024:3065RLBA-2024:3065 1_ansible-collection-microsoft-sql-2.2.3-2.el8.noarch.rpm1_ansible-collection-microsoft-sql-2.2.3-2.el8.noarch.rpmu1 Qbugfixpython-reportlab bug fix and enhancement update' https://errata.rockylinux.org/RLBA-2024:3063RLBA-2024:3063RLBA-2024:3063 Fpython3-reportlab-3.4.0-9.el8.x86_64.rpmFpython3-reportlab-3.4.0-9.el8.x86_64.rpmu4 TBBbugfixleapp bug fix and enhancement update' https://errata.rockylinux.org/RLBA-2024:3068RLBA-2024:3068RLBA-2024:3068 2,leapp-0.17.0-1.el8.noarch.rpm3,leapp-deps-0.17.0-1.el8.noarch.rpm,python3-leapp-0.17.0-1.el8.noarch.rpmO,snactor-0.17.0-1.el8.noarch.rpm2,leapp-0.17.0-1.el8.noarch.rpm3,leapp-deps-0.17.0-1.el8.noarch.rpm,python3-leapp-0.17.0-1.el8.noarch.rpmO,snactor-0.17.0-1.el8.noarch.rpmu5 Ybugfixpython3.12-cffi bug fix and enhancement update' https://errata.rockylinux.org/RLBA-2024:3069RLBA-2024:3069RLBA-2024:3069 ppython3.12-cffi-1.16.0-2.el8.x86_64.rpmppython3.12-cffi-1.16.0-2.el8.x86_64.rpmv7 \bugfixpython3.12-lxml bug fix and enhancement update' https://errata.rockylinux.org/RLBA-2024:3075RLBA-2024:3075RLBA-2024:3075 qrpython3.12-lxml-4.9.3-2.el8.x86_64.rpmqrpython3.12-lxml-4.9.3-2.el8.x86_64.rpmv8 bugfixpython3.12-wheel bug fix and enhancement update' https://errata.rockylinux.org/RLBA-2024:3078RLBA-2024:3078RLBA-2024:3078 q python3.12-wheel-0.41.2-3.el8.noarch.rpmq python3.12-wheel-0.41.2-3.el8.noarch.rpmv6 #abugfixpython3.12-pyyaml bug fix and enhancement update' https://errata.rockylinux.org/RLBA-2024:3074RLBA-2024:3074RLBA-2024:3074 rpython3.12-pyyaml-6.0.1-2.el8.x86_64.rpmrpython3.12-pyyaml-6.0.1-2.el8.x86_64.rpmv9 &dbugfixpython3.12-pip bug fix and enhancement update' https://errata.rockylinux.org/RLBA-2024:3080RLBA-2024:3080RLBA-2024:3080 l~python3.12-pip-23.2.1-4.el8.noarch.rpmm~python3.12-pip-wheel-23.2.1-4.el8.noarch.rpml~python3.12-pip-23.2.1-4.el8.noarch.rpmm~python3.12-pip-wheel-23.2.1-4.el8.noarch.rpmwC +gBBsecurityModerate: gstreamer1-plugins-good security update';https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37327CVE-2023-37327CVE-2023-37327https://bugzilla.redhat.com/show_bug.cgi?id=22545392254539https://errata.rockylinux.org/RLSA-2024:3089RLSA-2024:3089RLSA-2024:3089 @gstreamer1-plugins-good-1.16.1-4.el8.x86_64.rpm@gstreamer1-plugins-good-gtk-1.16.1-4.el8.x86_64.rpm@gstreamer1-plugins-good-1.16.1-4.el8.x86_64.rpm@gstreamer1-plugins-good-gtk-1.16.1-4.el8.x86_64.rpmw: -,bugfixpython3.12-requests bug fix and enhancement updateb https://errata.rockylinux.org/RLBA-2024:3087RLBA-2024:3087RLBA-2024:3087 nepython3.12-requests-2.28.2-2.el8.noarch.rpmnepython3.12-requests-2.28.2-2.el8.noarch.rpmw; 2nBBbugfixalsa-utils bug fix and enhancement updateb https://errata.rockylinux.org/RLBA-2024:3092RLBA-2024:3092RLBA-2024:3092 k&alsa-utils-1.2.10-1.el8.x86_64.rpml&alsa-utils-alsabat-1.2.10-1.el8.x86_64.rpmk&alsa-utils-1.2.10-1.el8.x86_64.rpml&alsa-utils-alsabat-1.2.10-1.el8.x86_64.rpmwD 43securityModerate: python-jinja2 security updatebhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22195CVE-2024-22195CVE-2024-22195https://bugzilla.redhat.com/show_bug.cgi?id=22578542257854https://errata.rockylinux.org/RLSA-2024:3102RLSA-2024:3102RLSA-2024:3102 GVpython3-jinja2-2.10.1-4.el8.noarch.rpmGVpython3-jinja2-2.10.1-4.el8.noarch.rpmw= 65bugfixcockpit-session-recording bug fix and enhancement update~ https://errata.rockylinux.org/RLBA-2024:3111RLBA-2024:3111RLBA-2024:3111 Lcockpit-session-recording-16-1.el8.noarch.rpmLcockpit-session-recording-16-1.el8.noarch.rpmw< wBBBBBBBBBBbugfixlorax bug fix and enhancement update~ https://errata.rockylinux.org/RLBA-2024:3108RLBA-2024:3108RLBA-2024:3108 Qlorax-28.14.71-1.el8.x86_64.rpmMcomposer-cli-28.14.71-1.el8.x86_64.rpmRlorax-composer-28.14.71-1.el8.x86_64.rpmSlorax-lmc-novirt-28.14.71-1.el8.x86_64.rpmTlorax-lmc-virt-28.14.71-1.el8.x86_64.rpmUlorax-templates-generic-28.14.71-1.el8.x86_64.rpmQlorax-28.14.71-1.el8.x86_64.rpmMcomposer-cli-28.14.71-1.el8.x86_64.rpmRlorax-composer-28.14.71-1.el8.x86_64.rpmSlorax-lmc-novirt-28.14.71-1.el8.x86_64.rpmTlorax-lmc-virt-28.14.71-1.el8.x86_64.rpmUlorax-templates-generic-28.14.71-1.el8.x86_64.rpmx> Dbugfixtlog bug fix and enhancement update~ https://errata.rockylinux.org/RLBA-2024:3112RLBA-2024:3112RLBA-2024:3112  tlog-14-1.el8.x86_64.rpm tlog-14-1.el8.x86_64.rpmx? Gbugfixpython3.11-pip bug fix and enhancement update~ https://errata.rockylinux.org/RLBA-2024:3115RLBA-2024:3115RLBA-2024:3115 }python3.11-pip-22.3.1-5.el8.noarch.rpm}python3.11-pip-wheel-22.3.1-5.el8.noarch.rpm}python3.11-pip-22.3.1-5.el8.noarch.rpm}python3.11-pip-wheel-22.3.1-5.el8.noarch.rpmx@ JBBBBBBbugfixdovecot bug fix and enhancement update~ https://errata.rockylinux.org/RLBA-2024:3123RLBA-2024:3123RLBA-2024:3123 x^dovecot-2.3.16-5.el8.x86_64.rpmy^dovecot-mysql-2.3.16-5.el8.x86_64.rpmz^dovecot-pgsql-2.3.16-5.el8.x86_64.rpm{^dovecot-pigeonhole-2.3.16-5.el8.x86_64.rpmx^dovecot-2.3.16-5.el8.x86_64.rpmy^dovecot-mysql-2.3.16-5.el8.x86_64.rpmz^dovecot-pgsql-2.3.16-5.el8.x86_64.rpm{^dovecot-pigeonhole-2.3.16-5.el8.x86_64.rpmxA bugfixvirtio-win bug fix and enhancement update~ https://errata.rockylinux.org/RLBA-2024:3130RLBA-2024:3130RLBA-2024:3130  virtio-win-1.9.39-0.el8_10.noarch.rpm virtio-win-1.9.39-0.el8_10.noarch.rpmyB Ubugfixweldr-client bug fix and enhancement update~ https://errata.rockylinux.org/RLBA-2024:3132RLBA-2024:3132RLBA-2024:3132 &Uweldr-client-35.12-2.el8.x86_64.rpm&Uweldr-client-35.12-2.el8.x86_64.rpmyC XBBBbugfixdpdk bug fix and enhancement update~ https://errata.rockylinux.org/RLBA-2024:3134RLBA-2024:3134RLBA-2024:3134 dpdk-23.11-1.el8.x86_64.rpmdpdk-doc-23.11-1.el8.noarch.rpmdpdk-tools-23.11-1.el8.x86_64.rpmdpdk-23.11-1.el8.x86_64.rpmdpdk-doc-23.11-1.el8.noarch.rpmdpdk-tools-23.11-1.el8.x86_64.rpmyF *^BBBBBBBBBBsecurityModerate: xorg-x11-server security update~ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080CVE-2024-31080CVE-2024-31080https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081CVE-2024-31081CVE-2024-31081https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083CVE-2024-31083CVE-2024-31083https://bugzilla.redhat.com/show_bug.cgi?id=22719972271997https://bugzilla.redhat.com/show_bug.cgi?id=22719982271998https://bugzilla.redhat.com/show_bug.cgi?id=22720002272000https://errata.rockylinux.org/RLSA-2024:3258RLSA-2024:3258RLSA-2024:3258 5xorg-x11-server-common-1.20.11-23.el8_10.x86_64.rpm0xorg-x11-server-Xdmx-1.20.11-23.el8_10.x86_64.rpm1xorg-x11-server-Xephyr-1.20.11-23.el8_10.x86_64.rpm2xorg-x11-server-Xnest-1.20.11-23.el8_10.x86_64.rpm3xorg-x11-server-Xorg-1.20.11-23.el8_10.x86_64.rpm4xorg-x11-server-Xvfb-1.20.11-23.el8_10.x86_64.rpm5xorg-x11-server-common-1.20.11-23.el8_10.x86_64.rpm0xorg-x11-server-Xdmx-1.20.11-23.el8_10.x86_64.rpm1xorg-x11-server-Xephyr-1.20.11-23.el8_10.x86_64.rpm2xorg-x11-server-Xnest-1.20.11-23.el8_10.x86_64.rpm3xorg-x11-server-Xorg-1.20.11-23.el8_10.x86_64.rpm4xorg-x11-server-Xvfb-1.20.11-23.el8_10.x86_64.rpm|L kBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBbugfixgcc-toolset-12-gcc bug fix update 6 https://errata.rockylinux.org/RLBA-2024:3257RLBA-2024:3257RLBA-2024:3257 Jgcc-toolset-12-gcc-12.2.1-7.6.el8_10.x86_64.rpmJgcc-toolset-12-gcc-c++-12.2.1-7.6.el8_10.x86_64.rpmJgcc-toolset-12-gcc-gfortran-12.2.1-7.6.el8_10.x86_64.rpm Jgcc-toolset-12-gcc-plugin-annobin-12.2.1-7.6.el8_10.x86_64.rpmJgcc-toolset-12-gcc-plugin-devel-12.2.1-7.6.el8_10.x86_64.rpm Jgcc-toolset-12-libasan-devel-12.2.1-7.6.el8_10.x86_64.rpm Jgcc-toolset-12-libatomic-devel-12.2.1-7.6.el8_10.x86_64.rpm Jgcc-toolset-12-libgccjit-12.2.1-7.6.el8_10.x86_64.rpm Jgcc-toolset-12-libgccjit-devel-12.2.1-7.6.el8_10.x86_64.rpm Jgcc-toolset-12-libgccjit-docs-12.2.1-7.6.el8_10.x86_64.rpmJgcc-toolset-12-libitm-devel-12.2.1-7.6.el8_10.x86_64.rpmJgcc-toolset-12-liblsan-devel-12.2.1-7.6.el8_10.x86_64.rpmJgcc-toolset-12-libquadmath-devel-12.2.1-7.6.el8_10.x86_64.rpmJgcc-toolset-12-libstdc++-devel-12.2.1-7.6.el8_10.x86_64.rpmJgcc-toolset-12-libstdc++-docs-12.2.1-7.6.el8_10.x86_64.rpmJgcc-toolset-12-libtsan-devel-12.2.1-7.6.el8_10.x86_64.rpmJgcc-toolset-12-libubsan-devel-12.2.1-7.6.el8_10.x86_64.rpmJgcc-toolset-12-offload-nvptx-12.2.1-7.6.el8_10.x86_64.rpmJgcc-toolset-12-gcc-12.2.1-7.6.el8_10.x86_64.rpmJgcc-toolset-12-gcc-c++-12.2.1-7.6.el8_10.x86_64.rpmJgcc-toolset-12-gcc-gfortran-12.2.1-7.6.el8_10.x86_64.rpm Jgcc-toolset-12-gcc-plugin-annobin-12.2.1-7.6.el8_10.x86_64.rpmJgcc-toolset-12-gcc-plugin-devel-12.2.1-7.6.el8_10.x86_64.rpm Jgcc-toolset-12-libasan-devel-12.2.1-7.6.el8_10.x86_64.rpm Jgcc-toolset-12-libatomic-devel-12.2.1-7.6.el8_10.x86_64.rpm Jgcc-toolset-12-libgccjit-12.2.1-7.6.el8_10.x86_64.rpm Jgcc-toolset-12-libgccjit-devel-12.2.1-7.6.el8_10.x86_64.rpm Jgcc-toolset-12-libgccjit-docs-12.2.1-7.6.el8_10.x86_64.rpmJgcc-toolset-12-libitm-devel-12.2.1-7.6.el8_10.x86_64.rpmJgcc-toolset-12-liblsan-devel-12.2.1-7.6.el8_10.x86_64.rpmJgcc-toolset-12-libquadmath-devel-12.2.1-7.6.el8_10.x86_64.rpmJgcc-toolset-12-libstdc++-devel-12.2.1-7.6.el8_10.x86_64.rpmJgcc-toolset-12-libstdc++-docs-12.2.1-7.6.el8_10.x86_64.rpmJgcc-toolset-12-libtsan-devel-12.2.1-7.6.el8_10.x86_64.rpmJgcc-toolset-12-libubsan-devel-12.2.1-7.6.el8_10.x86_64.rpmJgcc-toolset-12-offload-nvptx-12.2.1-7.6.el8_10.x86_64.rpm}M Pbugfixsushi bug fix update@ https://errata.rockylinux.org/RLBA-2024:3260RLBA-2024:3260RLBA-2024:3260 2sushi-3.28.3-3.el8_10.x86_64.rpm2sushi-3.28.3-3.el8_10.x86_64.rpm}N 'SBBBBBBBBBBBBBBBBBBbugfixnss bug fix updateT https://errata.rockylinux.org/RLBA-2024:3262RLBA-2024:3262RLBA-2024:3262 Y'nss-3.90.0-7.el8_10.x86_64.rpmZ'nss-devel-3.90.0-7.el8_10.x86_64.rpm['nss-softokn-3.90.0-7.el8_10.x86_64.rpm\'nss-softokn-devel-3.90.0-7.el8_10.x86_64.rpm]'nss-softokn-freebl-3.90.0-7.el8_10.x86_64.rpm^'nss-softokn-freebl-devel-3.90.0-7.el8_10.x86_64.rpm_'nss-sysinit-3.90.0-7.el8_10.x86_64.rpm`'nss-tools-3.90.0-7.el8_10.x86_64.rpma'nss-util-3.90.0-7.el8_10.x86_64.rpmb'nss-util-devel-3.90.0-7.el8_10.x86_64.rpm Y'nss-3.90.0-7.el8_10.x86_64.rpmZ'nss-devel-3.90.0-7.el8_10.x86_64.rpm['nss-softokn-3.90.0-7.el8_10.x86_64.rpm\'nss-softokn-devel-3.90.0-7.el8_10.x86_64.rpm]'nss-softokn-freebl-3.90.0-7.el8_10.x86_64.rpm^'nss-softokn-freebl-devel-3.90.0-7.el8_10.x86_64.rpm_'nss-sysinit-3.90.0-7.el8_10.x86_64.rpm`'nss-tools-3.90.0-7.el8_10.x86_64.rpma'nss-util-3.90.0-7.el8_10.x86_64.rpmb'nss-util-devel-3.90.0-7.el8_10.x86_64.rpm}G 3hBBBBBBBBBsecurityImportant: tigervnc security updatechttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080CVE-2024-31080CVE-2024-31080https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081CVE-2024-31081CVE-2024-31081https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083CVE-2024-31083CVE-2024-31083https://bugzilla.redhat.com/show_bug.cgi?id=22719972271997https://bugzilla.redhat.com/show_bug.cgi?id=22719982271998https://bugzilla.redhat.com/show_bug.cgi?id=22720002272000https://errata.rockylinux.org/RLSA-2024:3261RLSA-2024:3261RLSA-2024:3261 stigervnc-1.13.1-10.el8_10.x86_64.rpmtigervnc-icons-1.13.1-10.el8_10.noarch.rpmtigervnc-license-1.13.1-10.el8_10.noarch.rpm tigervnc-selinux-1.13.1-10.el8_10.noarch.rpmttigervnc-server-1.13.1-10.el8_10.x86_64.rpmutigervnc-server-minimal-1.13.1-10.el8_10.x86_64.rpmvtigervnc-server-module-1.13.1-10.el8_10.x86_64.rpmstigervnc-1.13.1-10.el8_10.x86_64.rpmtigervnc-icons-1.13.1-10.el8_10.noarch.rpmtigervnc-license-1.13.1-10.el8_10.noarch.rpm tigervnc-selinux-1.13.1-10.el8_10.noarch.rpmttigervnc-server-1.13.1-10.el8_10.x86_64.rpmutigervnc-server-minimal-1.13.1-10.el8_10.x86_64.rpmvtigervnc-server-module-1.13.1-10.el8_10.x86_64.rpm}O 6tbugfixlibreswan bug fix and enhancement updatej5 https://errata.rockylinux.org/RLBA-2024:3263RLBA-2024:3263RLBA-2024:3263 :alibreswan-4.12-2.el8_10.3.x86_64.rpm:alibreswan-4.12-2.el8_10.3.x86_64.rpm}H >wBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: pcp security updateMhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3019CVE-2024-3019CVE-2024-3019https://bugzilla.redhat.com/show_bug.cgi?id=22718982271898https://errata.rockylinux.org/RLSA-2024:3264RLSA-2024:3264RLSA-2024:3264 dxpcp-5.3.7-20.el8_10.x86_64.rpmypcp-conf-5.3.7-20.el8_10.x86_64.rpmzpcp-devel-5.3.7-20.el8_10.x86_64.rpm6pcp-doc-5.3.7-20.el8_10.noarch.rpm{pcp-export-pcp2elasticsearch-5.3.7-20.el8_10.x86_64.rpm|pcp-export-pcp2graphite-5.3.7-20.el8_10.x86_64.rpm}pcp-export-pcp2influxdb-5.3.7-20.el8_10.x86_64.rpm~pcp-export-pcp2json-5.3.7-20.el8_10.x86_64.rpmpcp-export-pcp2spark-5.3.7-20.el8_10.x86_64.rpmpcp-export-pcp2xml-5.3.7-20.el8_10.x86_64.rpmpcp-export-pcp2zabbix-5.3.7-20.el8_10.x86_64.rpmpcp-export-zabbix-agent-5.3.7-20.el8_10.x86_64.rpmpcp-gui-5.3.7-20.el8_10.x86_64.rpmpcp-import-collectl2pcp-5.3.7-20.el8_10.x86_64.rpmpcp-import-ganglia2pcp-5.3.7-20.el8_10.x86_64.rpmpcp-import-iostat2pcp-5.3.7-20.el8_10.x86_64.rpmpcp-import-mrtg2pcp-5.3.7-20.el8_10.x86_64.rpmpcp-import-sar2pcp-5.3.7-20.el8_10.x86_64.rpm pcp-libs-5.3.7-20.el8_10.x86_64.rpm pcp-libs-devel-5.3.7-20.el8_10.x86_64.rpm pcp-pmda-activemq-5.3.7-20.el8_10.x86_64.rpm pcp-pmda-apache-5.3.7-20.el8_10.x86_64.rpm pcp-pmda-bash-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-bcc-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-bind2-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-bonding-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-bpftrace-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-cifs-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-cisco-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-dbping-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-denki-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-dm-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-docker-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-ds389-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-ds389log-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-elasticsearch-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-gfs2-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-gluster-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-gpfs-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-gpsd-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-hacluster-5.3.7-20.el8_10.x86_64.rpm pcp-pmda-haproxy-5.3.7-20.el8_10.x86_64.rpm!pcp-pmda-infiniband-5.3.7-20.el8_10.x86_64.rpm"pcp-pmda-json-5.3.7-20.el8_10.x86_64.rpm#pcp-pmda-libvirt-5.3.7-20.el8_10.x86_64.rpm$pcp-pmda-lio-5.3.7-20.el8_10.x86_64.rpm%pcp-pmda-lmsensors-5.3.7-20.el8_10.x86_64.rpm&pcp-pmda-logger-5.3.7-20.el8_10.x86_64.rpm'pcp-pmda-lustre-5.3.7-20.el8_10.x86_64.rpm(pcp-pmda-lustrecomm-5.3.7-20.el8_10.x86_64.rpm)pcp-pmda-mailq-5.3.7-20.el8_10.x86_64.rpm*pcp-pmda-memcache-5.3.7-20.el8_10.x86_64.rpm+pcp-pmda-mic-5.3.7-20.el8_10.x86_64.rpm,pcp-pmda-mongodb-5.3.7-20.el8_10.x86_64.rpm-pcp-pmda-mounts-5.3.7-20.el8_10.x86_64.rpm.pcp-pmda-mssql-5.3.7-20.el8_10.x86_64.rpm/pcp-pmda-mysql-5.3.7-20.el8_10.x86_64.rpm0pcp-pmda-named-5.3.7-20.el8_10.x86_64.rpm1pcp-pmda-netcheck-5.3.7-20.el8_10.x86_64.rpm2pcp-pmda-netfilter-5.3.7-20.el8_10.x86_64.rpm3pcp-pmda-news-5.3.7-20.el8_10.x86_64.rpm4pcp-pmda-nfsclient-5.3.7-20.el8_10.x86_64.rpm5pcp-pmda-nginx-5.3.7-20.el8_10.x86_64.rpm6pcp-pmda-nvidia-gpu-5.3.7-20.el8_10.x86_64.rpm7pcp-pmda-openmetrics-5.3.7-20.el8_10.x86_64.rpm8pcp-pmda-openvswitch-5.3.7-20.el8_10.x86_64.rpm9pcp-pmda-oracle-5.3.7-20.el8_10.x86_64.rpm:pcp-pmda-pdns-5.3.7-20.el8_10.x86_64.rpm;pcp-pmda-perfevent-5.3.7-20.el8_10.x86_64.rpm<pcp-pmda-podman-5.3.7-20.el8_10.x86_64.rpm=pcp-pmda-postfix-5.3.7-20.el8_10.x86_64.rpm>pcp-pmda-postgresql-5.3.7-20.el8_10.x86_64.rpm?pcp-pmda-rabbitmq-5.3.7-20.el8_10.x86_64.rpm@pcp-pmda-redis-5.3.7-20.el8_10.x86_64.rpmApcp-pmda-roomtemp-5.3.7-20.el8_10.x86_64.rpmBpcp-pmda-rsyslog-5.3.7-20.el8_10.x86_64.rpmCpcp-pmda-samba-5.3.7-20.el8_10.x86_64.rpmDpcp-pmda-sendmail-5.3.7-20.el8_10.x86_64.rpmEpcp-pmda-shping-5.3.7-20.el8_10.x86_64.rpmFpcp-pmda-slurm-5.3.7-20.el8_10.x86_64.rpmGpcp-pmda-smart-5.3.7-20.el8_10.x86_64.rpmHpcp-pmda-snmp-5.3.7-20.el8_10.x86_64.rpmIpcp-pmda-sockets-5.3.7-20.el8_10.x86_64.rpmJpcp-pmda-statsd-5.3.7-20.el8_10.x86_64.rpmKpcp-pmda-summary-5.3.7-20.el8_10.x86_64.rpmLpcp-pmda-systemd-5.3.7-20.el8_10.x86_64.rpmMpcp-pmda-trace-5.3.7-20.el8_10.x86_64.rpmNpcp-pmda-unbound-5.3.7-20.el8_10.x86_64.rpmOpcp-pmda-weblog-5.3.7-20.el8_10.x86_64.rpmPpcp-pmda-zimbra-5.3.7-20.el8_10.x86_64.rpmQpcp-pmda-zswap-5.3.7-20.el8_10.x86_64.rpmRpcp-selinux-5.3.7-20.el8_10.x86_64.rpmSpcp-system-tools-5.3.7-20.el8_10.x86_64.rpmTpcp-testsuite-5.3.7-20.el8_10.x86_64.rpmUpcp-zeroconf-5.3.7-20.el8_10.x86_64.rpm[perl-PCP-LogImport-5.3.7-20.el8_10.x86_64.rpm\perl-PCP-LogSummary-5.3.7-20.el8_10.x86_64.rpm]perl-PCP-MMV-5.3.7-20.el8_10.x86_64.rpm^perl-PCP-PMDA-5.3.7-20.el8_10.x86_64.rpmmpython3-pcp-5.3.7-20.el8_10.x86_64.rpmdxpcp-5.3.7-20.el8_10.x86_64.rpmypcp-conf-5.3.7-20.el8_10.x86_64.rpmzpcp-devel-5.3.7-20.el8_10.x86_64.rpm6pcp-doc-5.3.7-20.el8_10.noarch.rpm{pcp-export-pcp2elasticsearch-5.3.7-20.el8_10.x86_64.rpm|pcp-export-pcp2graphite-5.3.7-20.el8_10.x86_64.rpm}pcp-export-pcp2influxdb-5.3.7-20.el8_10.x86_64.rpm~pcp-export-pcp2json-5.3.7-20.el8_10.x86_64.rpmpcp-export-pcp2spark-5.3.7-20.el8_10.x86_64.rpmpcp-export-pcp2xml-5.3.7-20.el8_10.x86_64.rpmpcp-export-pcp2zabbix-5.3.7-20.el8_10.x86_64.rpmpcp-export-zabbix-agent-5.3.7-20.el8_10.x86_64.rpmpcp-gui-5.3.7-20.el8_10.x86_64.rpmpcp-import-collectl2pcp-5.3.7-20.el8_10.x86_64.rpmpcp-import-ganglia2pcp-5.3.7-20.el8_10.x86_64.rpmpcp-import-iostat2pcp-5.3.7-20.el8_10.x86_64.rpmpcp-import-mrtg2pcp-5.3.7-20.el8_10.x86_64.rpmpcp-import-sar2pcp-5.3.7-20.el8_10.x86_64.rpm pcp-libs-5.3.7-20.el8_10.x86_64.rpm pcp-libs-devel-5.3.7-20.el8_10.x86_64.rpm pcp-pmda-activemq-5.3.7-20.el8_10.x86_64.rpm pcp-pmda-apache-5.3.7-20.el8_10.x86_64.rpm pcp-pmda-bash-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-bcc-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-bind2-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-bonding-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-bpftrace-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-cifs-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-cisco-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-dbping-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-denki-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-dm-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-docker-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-ds389-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-ds389log-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-elasticsearch-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-gfs2-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-gluster-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-gpfs-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-gpsd-5.3.7-20.el8_10.x86_64.rpmpcp-pmda-hacluster-5.3.7-20.el8_10.x86_64.rpm pcp-pmda-haproxy-5.3.7-20.el8_10.x86_64.rpm!pcp-pmda-infiniband-5.3.7-20.el8_10.x86_64.rpm"pcp-pmda-json-5.3.7-20.el8_10.x86_64.rpm#pcp-pmda-libvirt-5.3.7-20.el8_10.x86_64.rpm$pcp-pmda-lio-5.3.7-20.el8_10.x86_64.rpm%pcp-pmda-lmsensors-5.3.7-20.el8_10.x86_64.rpm&pcp-pmda-logger-5.3.7-20.el8_10.x86_64.rpm'pcp-pmda-lustre-5.3.7-20.el8_10.x86_64.rpm(pcp-pmda-lustrecomm-5.3.7-20.el8_10.x86_64.rpm)pcp-pmda-mailq-5.3.7-20.el8_10.x86_64.rpm*pcp-pmda-memcache-5.3.7-20.el8_10.x86_64.rpm+pcp-pmda-mic-5.3.7-20.el8_10.x86_64.rpm,pcp-pmda-mongodb-5.3.7-20.el8_10.x86_64.rpm-pcp-pmda-mounts-5.3.7-20.el8_10.x86_64.rpm.pcp-pmda-mssql-5.3.7-20.el8_10.x86_64.rpm/pcp-pmda-mysql-5.3.7-20.el8_10.x86_64.rpm0pcp-pmda-named-5.3.7-20.el8_10.x86_64.rpm1pcp-pmda-netcheck-5.3.7-20.el8_10.x86_64.rpm2pcp-pmda-netfilter-5.3.7-20.el8_10.x86_64.rpm3pcp-pmda-news-5.3.7-20.el8_10.x86_64.rpm4pcp-pmda-nfsclient-5.3.7-20.el8_10.x86_64.rpm5pcp-pmda-nginx-5.3.7-20.el8_10.x86_64.rpm6pcp-pmda-nvidia-gpu-5.3.7-20.el8_10.x86_64.rpm7pcp-pmda-openmetrics-5.3.7-20.el8_10.x86_64.rpm8pcp-pmda-openvswitch-5.3.7-20.el8_10.x86_64.rpm9pcp-pmda-oracle-5.3.7-20.el8_10.x86_64.rpm:pcp-pmda-pdns-5.3.7-20.el8_10.x86_64.rpm;pcp-pmda-perfevent-5.3.7-20.el8_10.x86_64.rpm<pcp-pmda-podman-5.3.7-20.el8_10.x86_64.rpm=pcp-pmda-postfix-5.3.7-20.el8_10.x86_64.rpm>pcp-pmda-postgresql-5.3.7-20.el8_10.x86_64.rpm?pcp-pmda-rabbitmq-5.3.7-20.el8_10.x86_64.rpm@pcp-pmda-redis-5.3.7-20.el8_10.x86_64.rpmApcp-pmda-roomtemp-5.3.7-20.el8_10.x86_64.rpmBpcp-pmda-rsyslog-5.3.7-20.el8_10.x86_64.rpmCpcp-pmda-samba-5.3.7-20.el8_10.x86_64.rpmDpcp-pmda-sendmail-5.3.7-20.el8_10.x86_64.rpmEpcp-pmda-shping-5.3.7-20.el8_10.x86_64.rpmFpcp-pmda-slurm-5.3.7-20.el8_10.x86_64.rpmGpcp-pmda-smart-5.3.7-20.el8_10.x86_64.rpmHpcp-pmda-snmp-5.3.7-20.el8_10.x86_64.rpmIpcp-pmda-sockets-5.3.7-20.el8_10.x86_64.rpmJpcp-pmda-statsd-5.3.7-20.el8_10.x86_64.rpmKpcp-pmda-summary-5.3.7-20.el8_10.x86_64.rpmLpcp-pmda-systemd-5.3.7-20.el8_10.x86_64.rpmMpcp-pmda-trace-5.3.7-20.el8_10.x86_64.rpmNpcp-pmda-unbound-5.3.7-20.el8_10.x86_64.rpmOpcp-pmda-weblog-5.3.7-20.el8_10.x86_64.rpmPpcp-pmda-zimbra-5.3.7-20.el8_10.x86_64.rpmQpcp-pmda-zswap-5.3.7-20.el8_10.x86_64.rpmRpcp-selinux-5.3.7-20.el8_10.x86_64.rpmSpcp-system-tools-5.3.7-20.el8_10.x86_64.rpmTpcp-testsuite-5.3.7-20.el8_10.x86_64.rpmUpcp-zeroconf-5.3.7-20.el8_10.x86_64.rpm[perl-PCP-LogImport-5.3.7-20.el8_10.x86_64.rpm\perl-PCP-LogSummary-5.3.7-20.el8_10.x86_64.rpm]perl-PCP-MMV-5.3.7-20.el8_10.x86_64.rpm^perl-PCP-PMDA-5.3.7-20.el8_10.x86_64.rpmmpython3-pcp-5.3.7-20.el8_10.x86_64.rpm}P bugfixgrafana-pcp bug fix and enhancement updatel_ https://errata.rockylinux.org/RLBA-2024:3266RLBA-2024:3266RLBA-2024:3266 +grafana-pcp-5.1.1-2.el8_10.x86_64.rpm+grafana-pcp-5.1.1-2.el8_10.x86_64.rpm}I BBBsecurityImportant: grafana security updateKbhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1313CVE-2024-1313CVE-2024-1313https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/show_bug.cgi?id=22629212262921https://bugzilla.redhat.com/show_bug.cgi?id=22719032271903https://errata.rockylinux.org/RLSA-2024:3265RLSA-2024:3265RLSA-2024:3265 *ggrafana-9.2.10-16.el8_10.x86_64.rpm,ggrafana-selinux-9.2.10-16.el8_10.x86_64.rpm*ggrafana-9.2.10-16.el8_10.x86_64.rpm,ggrafana-selinux-9.2.10-16.el8_10.x86_64.rpm~R GBBBBBBBBBBBBBBbugfix.NET 6.0 bugfix update- https://errata.rockylinux.org/RLBA-2024:3273RLBA-2024:3273RLBA-2024:3273 [-aspnetcore-targeting-pack-6.0-6.0.30-1.el8_10.x86_64.rpmZ-aspnetcore-runtime-6.0-6.0.30-1.el8_10.x86_64.rpm\-dotnet-apphost-pack-6.0-6.0.30-1.el8_10.x86_64.rpm]-dotnet-hostfxr-6.0-6.0.30-1.el8_10.x86_64.rpm^-dotnet-runtime-6.0-6.0.30-1.el8_10.x86_64.rpm_Vdotnet-sdk-6.0-6.0.130-1.el8_10.x86_64.rpm`-dotnet-targeting-pack-6.0-6.0.30-1.el8_10.x86_64.rpmaVdotnet-templates-6.0-6.0.130-1.el8_10.x86_64.rpm[-aspnetcore-targeting-pack-6.0-6.0.30-1.el8_10.x86_64.rpmZ-aspnetcore-runtime-6.0-6.0.30-1.el8_10.x86_64.rpm\-dotnet-apphost-pack-6.0-6.0.30-1.el8_10.x86_64.rpm]-dotnet-hostfxr-6.0-6.0.30-1.el8_10.x86_64.rpm^-dotnet-runtime-6.0-6.0.30-1.el8_10.x86_64.rpm_Vdotnet-sdk-6.0-6.0.130-1.el8_10.x86_64.rpm`-dotnet-targeting-pack-6.0-6.0.30-1.el8_10.x86_64.rpmaVdotnet-templates-6.0-6.0.130-1.el8_10.x86_64.rpm~M (XBBBBBBBBBBBBBBsecurityImportant: .NET 7.0 security update0$https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30045CVE-2024-30045CVE-2024-30045https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30046CVE-2024-30046CVE-2024-30046https://bugzilla.redhat.com/show_bug.cgi?id=22796952279695https://bugzilla.redhat.com/show_bug.cgi?id=22796972279697https://errata.rockylinux.org/RLSA-2024:3340RLSA-2024:3340RLSA-2024:3340 S2aspnetcore-runtime-7.0-7.0.19-1.el8_10.x86_64.rpmT2aspnetcore-targeting-pack-7.0-7.0.19-1.el8_10.x86_64.rpmU2dotnet-apphost-pack-7.0-7.0.19-1.el8_10.x86_64.rpmV2dotnet-hostfxr-7.0-7.0.19-1.el8_10.x86_64.rpmW2dotnet-runtime-7.0-7.0.19-1.el8_10.x86_64.rpmX[dotnet-sdk-7.0-7.0.119-1.el8_10.x86_64.rpmY2dotnet-targeting-pack-7.0-7.0.19-1.el8_10.x86_64.rpmZ[dotnet-templates-7.0-7.0.119-1.el8_10.x86_64.rpmS2aspnetcore-runtime-7.0-7.0.19-1.el8_10.x86_64.rpmT2aspnetcore-targeting-pack-7.0-7.0.19-1.el8_10.x86_64.rpmU2dotnet-apphost-pack-7.0-7.0.19-1.el8_10.x86_64.rpmV2dotnet-hostfxr-7.0-7.0.19-1.el8_10.x86_64.rpmW2dotnet-runtime-7.0-7.0.19-1.el8_10.x86_64.rpmX[dotnet-sdk-7.0-7.0.119-1.el8_10.x86_64.rpmY2dotnet-targeting-pack-7.0-7.0.19-1.el8_10.x86_64.rpmZ[dotnet-templates-7.0-7.0.119-1.el8_10.x86_64.rpm~O +isecurityImportant: xorg-x11-server-Xwayland security updateThttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080CVE-2024-31080CVE-2024-31080https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081CVE-2024-31081CVE-2024-31081https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083CVE-2024-31083CVE-2024-31083https://bugzilla.redhat.com/show_bug.cgi?id=22719972271997https://bugzilla.redhat.com/show_bug.cgi?id=22719982271998https://bugzilla.redhat.com/show_bug.cgi?id=22720002272000https://errata.rockylinux.org/RLSA-2024:3343RLSA-2024:3343RLSA-2024:3343 xorg-x11-server-Xwayland-21.1.3-16.el8_10.x86_64.rpmxorg-x11-server-Xwayland-21.1.3-16.el8_10.x86_64.rpm~Q lBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security updateq#https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30045CVE-2024-30045CVE-2024-30045https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30046CVE-2024-30046CVE-2024-30046https://bugzilla.redhat.com/show_bug.cgi?id=22796952279695https://bugzilla.redhat.com/show_bug.cgi?id=22796972279697https://errata.rockylinux.org/RLSA-2024:3345RLSA-2024:3345RLSA-2024:3345 /Waspnetcore-runtime-8.0-8.0.5-1.el8_10.x86_64.rpm&Waspnetcore-runtime-dbg-8.0-8.0.5-1.el8_10.x86_64.rpm0Waspnetcore-targeting-pack-8.0-8.0.5-1.el8_10.x86_64.rpm'dotnet-8.0.105-1.el8_10.x86_64.rpm1Wdotnet-apphost-pack-8.0-8.0.5-1.el8_10.x86_64.rpmWdotnet-host-8.0.5-1.el8_10.x86_64.rpm2Wdotnet-hostfxr-8.0-8.0.5-1.el8_10.x86_64.rpm3Wdotnet-runtime-8.0-8.0.5-1.el8_10.x86_64.rpm'Wdotnet-runtime-dbg-8.0-8.0.5-1.el8_10.x86_64.rpm4'dotnet-sdk-8.0-8.0.105-1.el8_10.x86_64.rpm('dotnet-sdk-dbg-8.0-8.0.105-1.el8_10.x86_64.rpm5Wdotnet-targeting-pack-8.0-8.0.5-1.el8_10.x86_64.rpm6'dotnet-templates-8.0-8.0.105-1.el8_10.x86_64.rpm'netstandard-targeting-pack-2.1-8.0.105-1.el8_10.x86_64.rpm/Waspnetcore-runtime-8.0-8.0.5-1.el8_10.x86_64.rpm&Waspnetcore-runtime-dbg-8.0-8.0.5-1.el8_10.x86_64.rpm0Waspnetcore-targeting-pack-8.0-8.0.5-1.el8_10.x86_64.rpm'dotnet-8.0.105-1.el8_10.x86_64.rpm1Wdotnet-apphost-pack-8.0-8.0.5-1.el8_10.x86_64.rpmWdotnet-host-8.0.5-1.el8_10.x86_64.rpm2Wdotnet-hostfxr-8.0-8.0.5-1.el8_10.x86_64.rpm3Wdotnet-runtime-8.0-8.0.5-1.el8_10.x86_64.rpm'Wdotnet-runtime-dbg-8.0-8.0.5-1.el8_10.x86_64.rpm4'dotnet-sdk-8.0-8.0.105-1.el8_10.x86_64.rpm('dotnet-sdk-dbg-8.0-8.0.105-1.el8_10.x86_64.rpm5Wdotnet-targeting-pack-8.0-8.0.5-1.el8_10.x86_64.rpm6'dotnet-templates-8.0-8.0.105-1.el8_10.x86_64.rpm'netstandard-targeting-pack-2.1-8.0.105-1.el8_10.x86_64.rpm~R IsecurityImportant: git-lfs security update+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45288CVE-2023-45288CVE-2023-45288https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45289CVE-2023-45289CVE-2023-45289https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45290CVE-2023-45290CVE-2023-45290https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24783CVE-2024-24783CVE-2024-24783https://bugzilla.redhat.com/show_bug.cgi?id=22680172268017https://bugzilla.redhat.com/show_bug.cgi?id=22680182268018https://bugzilla.redhat.com/show_bug.cgi?id=22680192268019https://bugzilla.redhat.com/show_bug.cgi?id=22682732268273https://errata.rockylinux.org/RLSA-2024:3346RLSA-2024:3346RLSA-2024:3346  Ggit-lfs-3.4.1-2.el8_10.x86_64.rpm Ggit-lfs-3.4.1-2.el8_10.x86_64.rpmT Lbugfixscap-security-guide bug fix and enhancement update? https://errata.rockylinux.org/RLBA-2024:3624RLBA-2024:3624RLBA-2024:3624 A>scap-security-guide-0.1.73-1.el8_10.rocky.1.1.noarch.rpmB>scap-security-guide-doc-0.1.73-1.el8_10.rocky.1.1.noarch.rpmA>scap-security-guide-0.1.73-1.el8_10.rocky.1.1.noarch.rpmB>scap-security-guide-doc-0.1.73-1.el8_10.rocky.1.1.noarch.rpmU OBBBBBBsecurityImportant: tomcat security and bug fix updateBxhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23672CVE-2024-23672CVE-2024-23672https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24549CVE-2024-24549CVE-2024-24549https://bugzilla.redhat.com/show_bug.cgi?id=22696072269607https://bugzilla.redhat.com/show_bug.cgi?id=22696082269608https://errata.rockylinux.org/RLSA-2024:3666RLSA-2024:3666RLSA-2024:3666 [tomcat-9.0.87-1.el8_10.1.noarch.rpm\tomcat-admin-webapps-9.0.87-1.el8_10.1.noarch.rpm]tomcat-docs-webapp-9.0.87-1.el8_10.1.noarch.rpm^tomcat-el-3.0-api-9.0.87-1.el8_10.1.noarch.rpm_tomcat-jsp-2.3-api-9.0.87-1.el8_10.1.noarch.rpm`tomcat-lib-9.0.87-1.el8_10.1.noarch.rpmatomcat-servlet-4.0-api-9.0.87-1.el8_10.1.noarch.rpmbtomcat-webapps-9.0.87-1.el8_10.1.noarch.rpm[tomcat-9.0.87-1.el8_10.1.noarch.rpm\tomcat-admin-webapps-9.0.87-1.el8_10.1.noarch.rpm]tomcat-docs-webapp-9.0.87-1.el8_10.1.noarch.rpm^tomcat-el-3.0-api-9.0.87-1.el8_10.1.noarch.rpm_tomcat-jsp-2.3-api-9.0.87-1.el8_10.1.noarch.rpm`tomcat-lib-9.0.87-1.el8_10.1.noarch.rpmatomcat-servlet-4.0-api-9.0.87-1.el8_10.1.noarch.rpmbtomcat-webapps-9.0.87-1.el8_10.1.noarch.rpmV XsecurityModerate: firefox security update: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367CVE-2024-4367CVE-2024-4367https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767CVE-2024-4767CVE-2024-4767https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768CVE-2024-4768CVE-2024-4768https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769CVE-2024-4769CVE-2024-4769https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770CVE-2024-4770CVE-2024-4770https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777CVE-2024-4777CVE-2024-4777https://bugzilla.redhat.com/show_bug.cgi?id=22803822280382https://bugzilla.redhat.com/show_bug.cgi?id=22803832280383https://bugzilla.redhat.com/show_bug.cgi?id=22803842280384https://bugzilla.redhat.com/show_bug.cgi?id=22803852280385https://bugzilla.redhat.com/show_bug.cgi?id=22803862280386https://bugzilla.redhat.com/show_bug.cgi?id=22803872280387https://errata.rockylinux.org/RLSA-2024:3783RLSA-2024:3783RLSA-2024:3783 rJfirefox-115.11.0-1.el8_10.x86_64.rpmrJfirefox-115.11.0-1.el8_10.x86_64.rpmW [securityModerate: thunderbird security updateI^ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367CVE-2024-4367CVE-2024-4367https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767CVE-2024-4767CVE-2024-4767https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768CVE-2024-4768CVE-2024-4768https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769CVE-2024-4769CVE-2024-4769https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770CVE-2024-4770CVE-2024-4770https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777CVE-2024-4777CVE-2024-4777https://bugzilla.redhat.com/show_bug.cgi?id=22803822280382https://bugzilla.redhat.com/show_bug.cgi?id=22803832280383https://bugzilla.redhat.com/show_bug.cgi?id=22803842280384https://bugzilla.redhat.com/show_bug.cgi?id=22803852280385https://bugzilla.redhat.com/show_bug.cgi?id=22803862280386https://bugzilla.redhat.com/show_bug.cgi?id=22803872280387https://errata.rockylinux.org/RLSA-2024:3784RLSA-2024:3784RLSA-2024:3784 hJthunderbird-115.11.0-1.el8_10.x86_64.rpmhJthunderbird-115.11.0-1.el8_10.x86_64.rpmX ^securityImportant: firefox security update'4https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688CVE-2024-5688CVE-2024-5688https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690CVE-2024-5690CVE-2024-5690https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691CVE-2024-5691CVE-2024-5691https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693CVE-2024-5693CVE-2024-5693https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696CVE-2024-5696CVE-2024-5696https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700CVE-2024-5700CVE-2024-5700https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702CVE-2024-5702CVE-2024-5702https://bugzilla.redhat.com/show_bug.cgi?id=22913942291394https://bugzilla.redhat.com/show_bug.cgi?id=22913952291395https://bugzilla.redhat.com/show_bug.cgi?id=22913962291396https://bugzilla.redhat.com/show_bug.cgi?id=22913972291397https://bugzilla.redhat.com/show_bug.cgi?id=22913992291399https://bugzilla.redhat.com/show_bug.cgi?id=22914002291400https://bugzilla.redhat.com/show_bug.cgi?id=22914012291401https://errata.rockylinux.org/RLSA-2024:3954RLSA-2024:3954RLSA-2024:3954 r}firefox-115.12.0-1.el8_10.x86_64.rpmr}firefox-115.12.0-1.el8_10.x86_64.rpmuY (aBBBBBsecurityImportant: flatpak security update[|https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32462CVE-2024-32462CVE-2024-32462https://bugzilla.redhat.com/show_bug.cgi?id=22759812275981https://errata.rockylinux.org/RLSA-2024:3961RLSA-2024:3961RLSA-2024:3961 yflatpak-1.12.9-1.el8_10.x86_64.rpmyflatpak-libs-1.12.9-1.el8_10.x86_64.rpm'yflatpak-selinux-1.12.9-1.el8_10.noarch.rpmyflatpak-session-helper-1.12.9-1.el8_10.x86_64.rpmyflatpak-1.12.9-1.el8_10.x86_64.rpmyflatpak-libs-1.12.9-1.el8_10.x86_64.rpm'yflatpak-selinux-1.12.9-1.el8_10.noarch.rpmyflatpak-session-helper-1.12.9-1.el8_10.x86_64.rpmuZ /iBBBBsecurityImportant: ghostscript security updateWqhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871CVE-2024-33871CVE-2024-33871https://bugzilla.redhat.com/show_bug.cgi?id=22835082283508https://errata.rockylinux.org/RLSA-2024:4000RLSA-2024:4000RLSA-2024:4000 vghostscript-9.27-13.el8_10.x86_64.rpmvghostscript-x11-9.27-13.el8_10.x86_64.rpm-vlibgs-9.27-13.el8_10.x86_64.rpmvghostscript-9.27-13.el8_10.x86_64.rpmvghostscript-x11-9.27-13.el8_10.x86_64.rpm-vlibgs-9.27-13.el8_10.x86_64.rpmu[ 2psecurityImportant: thunderbird security updateHhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688CVE-2024-5688CVE-2024-5688https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690CVE-2024-5690CVE-2024-5690https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691CVE-2024-5691CVE-2024-5691https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693CVE-2024-5693CVE-2024-5693https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696CVE-2024-5696CVE-2024-5696https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700CVE-2024-5700CVE-2024-5700https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702CVE-2024-5702CVE-2024-5702https://bugzilla.redhat.com/show_bug.cgi?id=22913942291394https://bugzilla.redhat.com/show_bug.cgi?id=22913952291395https://bugzilla.redhat.com/show_bug.cgi?id=22913962291396https://bugzilla.redhat.com/show_bug.cgi?id=22913972291397https://bugzilla.redhat.com/show_bug.cgi?id=22913992291399https://bugzilla.redhat.com/show_bug.cgi?id=22914002291400https://bugzilla.redhat.com/show_bug.cgi?id=22914012291401https://errata.rockylinux.org/RLSA-2024:4036RLSA-2024:4036RLSA-2024:4036 h~thunderbird-115.12.1-1.el8_10.x86_64.rpmh~thunderbird-115.12.1-1.el8_10.x86_64.rpmu\ sBBBBBBBBBBBBBBBBBBsecurityImportant: git security updated# https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32002CVE-2024-32002CVE-2024-32002https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32004CVE-2024-32004CVE-2024-32004https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32020CVE-2024-32020CVE-2024-32020https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32021CVE-2024-32021CVE-2024-32021https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32465CVE-2024-32465CVE-2024-32465https://bugzilla.redhat.com/show_bug.cgi?id=22804212280421https://bugzilla.redhat.com/show_bug.cgi?id=22804282280428https://bugzilla.redhat.com/show_bug.cgi?id=22804462280446https://bugzilla.redhat.com/show_bug.cgi?id=22804662280466https://bugzilla.redhat.com/show_bug.cgi?id=22804842280484https://errata.rockylinux.org/RLSA-2024:4084RLSA-2024:4084RLSA-2024:4084 !|git-2.43.5-1.el8_10.x86_64.rpm|git-all-2.43.5-1.el8_10.noarch.rpm"|git-core-2.43.5-1.el8_10.x86_64.rpm |git-core-doc-2.43.5-1.el8_10.noarch.rpm#|git-credential-libsecret-2.43.5-1.el8_10.x86_64.rpm$|git-daemon-2.43.5-1.el8_10.x86_64.rpm |git-email-2.43.5-1.el8_10.noarch.rpm |git-gui-2.43.5-1.el8_10.noarch.rpm |git-instaweb-2.43.5-1.el8_10.noarch.rpm|gitk-2.43.5-1.el8_10.noarch.rpm%|git-subtree-2.43.5-1.el8_10.x86_64.rpm|git-svn-2.43.5-1.el8_10.noarch.rpm|gitweb-2.43.5-1.el8_10.noarch.rpm6|perl-Git-2.43.5-1.el8_10.noarch.rpm7|perl-Git-SVN-2.43.5-1.el8_10.noarch.rpm!|git-2.43.5-1.el8_10.x86_64.rpm|git-all-2.43.5-1.el8_10.noarch.rpm"|git-core-2.43.5-1.el8_10.x86_64.rpm |git-core-doc-2.43.5-1.el8_10.noarch.rpm#|git-credential-libsecret-2.43.5-1.el8_10.x86_64.rpm$|git-daemon-2.43.5-1.el8_10.x86_64.rpm |git-email-2.43.5-1.el8_10.noarch.rpm |git-gui-2.43.5-1.el8_10.noarch.rpm |git-instaweb-2.43.5-1.el8_10.noarch.rpm|gitk-2.43.5-1.el8_10.noarch.rpm%|git-subtree-2.43.5-1.el8_10.x86_64.rpm|git-svn-2.43.5-1.el8_10.noarch.rpm|gitweb-2.43.5-1.el8_10.noarch.rpm6|perl-Git-2.43.5-1.el8_10.noarch.rpm7|perl-Git-SVN-2.43.5-1.el8_10.noarch.rpmuU HBBBBBBBBBBbugfixxorg-x11-server bug fix update  https://errata.rockylinux.org/RLBA-2024:4213RLBA-2024:4213RLBA-2024:4213 5xorg-x11-server-common-1.20.11-24.el8_10.x86_64.rpm0xorg-x11-server-Xdmx-1.20.11-24.el8_10.x86_64.rpm1xorg-x11-server-Xephyr-1.20.11-24.el8_10.x86_64.rpm2xorg-x11-server-Xnest-1.20.11-24.el8_10.x86_64.rpm3xorg-x11-server-Xorg-1.20.11-24.el8_10.x86_64.rpm4xorg-x11-server-Xvfb-1.20.11-24.el8_10.x86_64.rpm5xorg-x11-server-common-1.20.11-24.el8_10.x86_64.rpm0xorg-x11-server-Xdmx-1.20.11-24.el8_10.x86_64.rpm1xorg-x11-server-Xephyr-1.20.11-24.el8_10.x86_64.rpm2xorg-x11-server-Xnest-1.20.11-24.el8_10.x86_64.rpm3xorg-x11-server-Xorg-1.20.11-24.el8_10.x86_64.rpm4xorg-x11-server-Xvfb-1.20.11-24.el8_10.x86_64.rpmԧm] UsecurityModerate: python-pillow security updateYhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28219CVE-2024-28219CVE-2024-28219https://bugzilla.redhat.com/show_bug.cgi?id=22725632272563https://errata.rockylinux.org/RLSA-2024:4227RLSA-2024:4227RLSA-2024:4227  python3-pillow-5.1.1-21.el8_10.x86_64.rpm python3-pillow-5.1.1-21.el8_10.x86_64.rpmԧmV 4XBBBBBBBBBBBBBBBBBBBBBBBBBBbugfixgnome-shell-extensions bug fix updatem6 https://errata.rockylinux.org/RLBA-2024:4228RLBA-2024:4228RLBA-2024:4228 6gnome-classic-session-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-apps-menu-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-auto-move-windows-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-classification-banner-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-common-3.32.1-39.el8_10.noarch.rpm 6gnome-shell-extension-custom-menu-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-dash-to-dock-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-dash-to-panel-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-desktop-icons-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-disable-screenshield-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-drive-menu-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-gesture-inhibitor-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-heads-up-display-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-horizontal-workspaces-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-launch-new-instance-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-native-window-placement-3.32.1-39.el8_10.noarch.rpm 6gnome-shell-extension-no-hot-corner-3.32.1-39.el8_10.noarch.rpm!6gnome-shell-extension-panel-favorites-3.32.1-39.el8_10.noarch.rpm"6gnome-shell-extension-places-menu-3.32.1-39.el8_10.noarch.rpm#6gnome-shell-extension-screenshot-window-sizer-3.32.1-39.el8_10.noarch.rpm$6gnome-shell-extension-systemMonitor-3.32.1-39.el8_10.noarch.rpm%6gnome-shell-extension-top-icons-3.32.1-39.el8_10.noarch.rpm&6gnome-shell-extension-updates-dialog-3.32.1-39.el8_10.noarch.rpm'6gnome-shell-extension-user-theme-3.32.1-39.el8_10.noarch.rpm(6gnome-shell-extension-window-grouper-3.32.1-39.el8_10.noarch.rpm)6gnome-shell-extension-window-list-3.32.1-39.el8_10.noarch.rpm*6gnome-shell-extension-windowsNavigator-3.32.1-39.el8_10.noarch.rpm+6gnome-shell-extension-workspace-indicator-3.32.1-39.el8_10.noarch.rpm6gnome-classic-session-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-apps-menu-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-auto-move-windows-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-classification-banner-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-common-3.32.1-39.el8_10.noarch.rpm 6gnome-shell-extension-custom-menu-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-dash-to-dock-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-dash-to-panel-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-desktop-icons-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-disable-screenshield-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-drive-menu-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-gesture-inhibitor-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-heads-up-display-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-horizontal-workspaces-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-launch-new-instance-3.32.1-39.el8_10.noarch.rpm6gnome-shell-extension-native-window-placement-3.32.1-39.el8_10.noarch.rpm 6gnome-shell-extension-no-hot-corner-3.32.1-39.el8_10.noarch.rpm!6gnome-shell-extension-panel-favorites-3.32.1-39.el8_10.noarch.rpm"6gnome-shell-extension-places-menu-3.32.1-39.el8_10.noarch.rpm#6gnome-shell-extension-screenshot-window-sizer-3.32.1-39.el8_10.noarch.rpm$6gnome-shell-extension-systemMonitor-3.32.1-39.el8_10.noarch.rpm%6gnome-shell-extension-top-icons-3.32.1-39.el8_10.noarch.rpm&6gnome-shell-extension-updates-dialog-3.32.1-39.el8_10.noarch.rpm'6gnome-shell-extension-user-theme-3.32.1-39.el8_10.noarch.rpm(6gnome-shell-extension-window-grouper-3.32.1-39.el8_10.noarch.rpm)6gnome-shell-extension-window-list-3.32.1-39.el8_10.noarch.rpm*6gnome-shell-extension-windowsNavigator-3.32.1-39.el8_10.noarch.rpm+6gnome-shell-extension-workspace-indicator-3.32.1-39.el8_10.noarch.rpmԧmW 65bugfixcloud-init bug fix update#: https://errata.rockylinux.org/RLBA-2024:4229RLBA-2024:4229RLBA-2024:4229 cloud-init-23.4-7.el8_10.3.0.1.noarch.rpmcloud-init-23.4-7.el8_10.3.0.1.noarch.rpmԧmX =securityModerate: python-jinja2 security updatelhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34064CVE-2024-34064CVE-2024-34064https://bugzilla.redhat.com/show_bug.cgi?id=22794762279476https://errata.rockylinux.org/RLSA-2024:4231RLSA-2024:4231RLSA-2024:4231 GWpython3-jinja2-2.10.1-5.el8_10.noarch.rpmGWpython3-jinja2-2.10.1-5.el8_10.noarch.rpmԧmY BBBBbugfixBug fix of nmstate  https://errata.rockylinux.org/RLBA-2024:4232RLBA-2024:4232RLBA-2024:4232 WOnmstate-1.4.6-2.el8_10.x86_64.rpmXOnmstate-libs-1.4.6-2.el8_10.x86_64.rpmuOnmstate-plugin-ovsdb-1.4.6-2.el8_10.noarch.rpmOpython3-libnmstate-1.4.6-2.el8_10.noarch.rpmWOnmstate-1.4.6-2.el8_10.x86_64.rpmXOnmstate-libs-1.4.6-2.el8_10.x86_64.rpmuOnmstate-plugin-ovsdb-1.4.6-2.el8_10.noarch.rpmOpython3-libnmstate-1.4.6-2.el8_10.noarch.rpmԧmZ Fbugfixjq updateY https://errata.rockylinux.org/RLBA-2024:4234RLBA-2024:4234RLBA-2024:4234 %Mjq-1.6-9.el8_10.x86_64.rpm%Mjq-1.6-9.el8_10.x86_64.rpmԧm[ Ibugfixsysstat bug fix updateq} https://errata.rockylinux.org/RLBA-2024:4236RLBA-2024:4236RLBA-2024:4236 xsysstat-11.7.3-13.el8_10.x86_64.rpmxsysstat-11.7.3-13.el8_10.x86_64.rpmԧn_ (LBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: dotnet8.0 security updaten)https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30105CVE-2024-30105CVE-2024-30105https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35264CVE-2024-35264CVE-2024-35264https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38095CVE-2024-38095CVE-2024-38095https://bugzilla.redhat.com/show_bug.cgi?id=22953202295320https://bugzilla.redhat.com/show_bug.cgi?id=22953212295321https://bugzilla.redhat.com/show_bug.cgi?id=22953232295323https://errata.rockylinux.org/RLSA-2024:4451RLSA-2024:4451RLSA-2024:4451 Xdotnet-host-8.0.7-1.el8_10.x86_64.rpm2Xdotnet-hostfxr-8.0-8.0.7-1.el8_10.x86_64.rpm/Xaspnetcore-runtime-8.0-8.0.7-1.el8_10.x86_64.rpm&Xaspnetcore-runtime-dbg-8.0-8.0.7-1.el8_10.x86_64.rpm0Xaspnetcore-targeting-pack-8.0-8.0.7-1.el8_10.x86_64.rpm(dotnet-8.0.107-1.el8_10.x86_64.rpm1Xdotnet-apphost-pack-8.0-8.0.7-1.el8_10.x86_64.rpm3Xdotnet-runtime-8.0-8.0.7-1.el8_10.x86_64.rpm'Xdotnet-runtime-dbg-8.0-8.0.7-1.el8_10.x86_64.rpm4(dotnet-sdk-8.0-8.0.107-1.el8_10.x86_64.rpm((dotnet-sdk-dbg-8.0-8.0.107-1.el8_10.x86_64.rpm5Xdotnet-targeting-pack-8.0-8.0.7-1.el8_10.x86_64.rpm6(dotnet-templates-8.0-8.0.107-1.el8_10.x86_64.rpm(netstandard-targeting-pack-2.1-8.0.107-1.el8_10.x86_64.rpmXdotnet-host-8.0.7-1.el8_10.x86_64.rpm2Xdotnet-hostfxr-8.0-8.0.7-1.el8_10.x86_64.rpm/Xaspnetcore-runtime-8.0-8.0.7-1.el8_10.x86_64.rpm&Xaspnetcore-runtime-dbg-8.0-8.0.7-1.el8_10.x86_64.rpm0Xaspnetcore-targeting-pack-8.0-8.0.7-1.el8_10.x86_64.rpm(dotnet-8.0.107-1.el8_10.x86_64.rpm1Xdotnet-apphost-pack-8.0-8.0.7-1.el8_10.x86_64.rpm3Xdotnet-runtime-8.0-8.0.7-1.el8_10.x86_64.rpm'Xdotnet-runtime-dbg-8.0-8.0.7-1.el8_10.x86_64.rpm4(dotnet-sdk-8.0-8.0.107-1.el8_10.x86_64.rpm((dotnet-sdk-dbg-8.0-8.0.107-1.el8_10.x86_64.rpm5Xdotnet-targeting-pack-8.0-8.0.7-1.el8_10.x86_64.rpm6(dotnet-templates-8.0-8.0.107-1.el8_10.x86_64.rpm(netstandard-targeting-pack-2.1-8.0.107-1.el8_10.x86_64.rpmԧo` ;iBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security updatem https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131CVE-2024-21131CVE-2024-21131https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138CVE-2024-21138CVE-2024-21138https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140CVE-2024-21140CVE-2024-21140https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145CVE-2024-21145CVE-2024-21145https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/show_bug.cgi?id=22979612297961https://bugzilla.redhat.com/show_bug.cgi?id=22979622297962https://bugzilla.redhat.com/show_bug.cgi?id=22979632297963https://bugzilla.redhat.com/show_bug.cgi?id=22979762297976https://bugzilla.redhat.com/show_bug.cgi?id=22979772297977https://errata.rockylinux.org/RLSA-2024:4573RLSA-2024:4573RLSA-2024:4573 -Pjava-21-openjdk-21.0.4.0.7-1.el8.x86_64.rpm.Pjava-21-openjdk-demo-21.0.4.0.7-1.el8.x86_64.rpm/Pjava-21-openjdk-devel-21.0.4.0.7-1.el8.x86_64.rpm0Pjava-21-openjdk-headless-21.0.4.0.7-1.el8.x86_64.rpm1Pjava-21-openjdk-javadoc-21.0.4.0.7-1.el8.x86_64.rpm2Pjava-21-openjdk-javadoc-zip-21.0.4.0.7-1.el8.x86_64.rpm3Pjava-21-openjdk-jmods-21.0.4.0.7-1.el8.x86_64.rpm4Pjava-21-openjdk-src-21.0.4.0.7-1.el8.x86_64.rpm5Pjava-21-openjdk-static-libs-21.0.4.0.7-1.el8.x86_64.rpm -Pjava-21-openjdk-21.0.4.0.7-1.el8.x86_64.rpm.Pjava-21-openjdk-demo-21.0.4.0.7-1.el8.x86_64.rpm/Pjava-21-openjdk-devel-21.0.4.0.7-1.el8.x86_64.rpm0Pjava-21-openjdk-headless-21.0.4.0.7-1.el8.x86_64.rpm1Pjava-21-openjdk-javadoc-21.0.4.0.7-1.el8.x86_64.rpm2Pjava-21-openjdk-javadoc-zip-21.0.4.0.7-1.el8.x86_64.rpm3Pjava-21-openjdk-jmods-21.0.4.0.7-1.el8.x86_64.rpm4Pjava-21-openjdk-src-21.0.4.0.7-1.el8.x86_64.rpm5Pjava-21-openjdk-static-libs-21.0.4.0.7-1.el8.x86_64.rpma |BBBBBBBBBBBBBBBsecurityImportant: qt5-qtbase security update@https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39936CVE-2024-39936CVE-2024-39936https://bugzilla.redhat.com/show_bug.cgi?id=22958672295867https://errata.rockylinux.org/RLSA-2024:4617RLSA-2024:4617RLSA-2024:4617 .kqt5-qtbase-5.15.3-8.el8_10.x86_64.rpm/kqt5-qtbase-common-5.15.3-8.el8_10.noarch.rpm0kqt5-qtbase-devel-5.15.3-8.el8_10.x86_64.rpm1kqt5-qtbase-examples-5.15.3-8.el8_10.x86_64.rpm2kqt5-qtbase-gui-5.15.3-8.el8_10.x86_64.rpm3kqt5-qtbase-mysql-5.15.3-8.el8_10.x86_64.rpm4kqt5-qtbase-odbc-5.15.3-8.el8_10.x86_64.rpm5kqt5-qtbase-postgresql-5.15.3-8.el8_10.x86_64.rpm6kqt5-qtbase-private-devel-5.15.3-8.el8_10.x86_64.rpm .kqt5-qtbase-5.15.3-8.el8_10.x86_64.rpm/kqt5-qtbase-common-5.15.3-8.el8_10.noarch.rpm0kqt5-qtbase-devel-5.15.3-8.el8_10.x86_64.rpm1kqt5-qtbase-examples-5.15.3-8.el8_10.x86_64.rpm2kqt5-qtbase-gui-5.15.3-8.el8_10.x86_64.rpm3kqt5-qtbase-mysql-5.15.3-8.el8_10.x86_64.rpm4kqt5-qtbase-odbc-5.15.3-8.el8_10.x86_64.rpm5kqt5-qtbase-postgresql-5.15.3-8.el8_10.x86_64.rpm6kqt5-qtbase-private-devel-5.15.3-8.el8_10.x86_64.rpmb NsecurityImportant: thunderbird security updateDhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601CVE-2024-6601CVE-2024-6601https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603CVE-2024-6603CVE-2024-6603https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604CVE-2024-6604CVE-2024-6604https://bugzilla.redhat.com/show_bug.cgi?id=22966362296636https://bugzilla.redhat.com/show_bug.cgi?id=22966382296638https://bugzilla.redhat.com/show_bug.cgi?id=22966392296639https://errata.rockylinux.org/RLSA-2024:4635RLSA-2024:4635RLSA-2024:4635 hthunderbird-115.13.0-3.el8_10.x86_64.rpmhthunderbird-115.13.0-3.el8_10.x86_64.rpmc QBBsecurityModerate: libtiff security updateI; https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15209CVE-2018-15209CVE-2018-15209https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25433CVE-2023-25433CVE-2023-25433https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52356CVE-2023-52356CVE-2023-52356https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6228CVE-2023-6228CVE-2023-6228https://bugzilla.redhat.com/show_bug.cgi?id=16140511614051https://bugzilla.redhat.com/show_bug.cgi?id=22187442218744https://bugzilla.redhat.com/show_bug.cgi?id=22409952240995https://bugzilla.redhat.com/show_bug.cgi?id=22513442251344https://errata.rockylinux.org/RLSA-2024:5079RLSA-2024:5079RLSA-2024:5079 @9libtiff-4.0.9-32.el8_10.x86_64.rpmA9libtiff-devel-4.0.9-32.el8_10.x86_64.rpm@9libtiff-4.0.9-32.el8_10.x86_64.rpmA9libtiff-devel-4.0.9-32.el8_10.x86_64.rpm4\ VBBBbugfixpacemaker bug fix update https://errata.rockylinux.org/RLBA-2024:5260RLBA-2024:5260RLBA-2024:5260 pacemaker-cluster-libs-2.1.7-5.1.el8_10.x86_64.rpmpacemaker-libs-2.1.7-5.1.el8_10.x86_64.rpm0pacemaker-schemas-2.1.7-5.1.el8_10.noarch.rpmpacemaker-cluster-libs-2.1.7-5.1.el8_10.x86_64.rpmpacemaker-libs-2.1.7-5.1.el8_10.x86_64.rpm0pacemaker-schemas-2.1.7-5.1.el8_10.noarch.rpm5d securityImportant: python3.12-setuptools security updatehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6345CVE-2024-6345CVE-2024-6345https://bugzilla.redhat.com/show_bug.cgi?id=22977712297771https://errata.rockylinux.org/RLSA-2024:5531RLSA-2024:5531RLSA-2024:5531 oYpython3.12-setuptools-68.2.2-4.el8_10.noarch.rpmoYpython3.12-setuptools-68.2.2-4.el8_10.noarch.rpm5e ^securityImportant: python3.11-setuptools security updatehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6345CVE-2024-6345CVE-2024-6345https://bugzilla.redhat.com/show_bug.cgi?id=22977712297771https://errata.rockylinux.org/RLSA-2024:5532RLSA-2024:5532RLSA-2024:5532 jpython3.11-setuptools-65.5.1-3.el8_10.noarch.rpmkpython3.11-setuptools-wheel-65.5.1-3.el8_10.noarch.rpmjpython3.11-setuptools-65.5.1-3.el8_10.noarch.rpmkpython3.11-setuptools-wheel-65.5.1-3.el8_10.noarch.rpm5h (aBBBBBsecurityImportant: bubblewrap and flatpak security update4Jhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42472CVE-2024-42472CVE-2024-42472https://errata.rockylinux.org/RLSA-2024:6422RLSA-2024:6422RLSA-2024:6422 zflatpak-1.12.9-3.el8_10.x86_64.rpmzflatpak-libs-1.12.9-3.el8_10.x86_64.rpm'zflatpak-selinux-1.12.9-3.el8_10.noarch.rpmzflatpak-session-helper-1.12.9-3.el8_10.x86_64.rpmzflatpak-1.12.9-3.el8_10.x86_64.rpmzflatpak-libs-1.12.9-3.el8_10.x86_64.rpm'zflatpak-selinux-1.12.9-3.el8_10.noarch.rpmzflatpak-session-helper-1.12.9-3.el8_10.x86_64.rpmof 1iBBBBBBsecurityImportant: tomcat security update~|https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34750CVE-2024-34750CVE-2024-34750https://bugzilla.redhat.com/show_bug.cgi?id=22956512295651https://errata.rockylinux.org/RLSA-2024:5694RLSA-2024:5694RLSA-2024:5694 [tomcat-9.0.87-1.el8_10.2.noarch.rpm\tomcat-admin-webapps-9.0.87-1.el8_10.2.noarch.rpm]tomcat-docs-webapp-9.0.87-1.el8_10.2.noarch.rpm^tomcat-el-3.0-api-9.0.87-1.el8_10.2.noarch.rpm_tomcat-jsp-2.3-api-9.0.87-1.el8_10.2.noarch.rpm`tomcat-lib-9.0.87-1.el8_10.2.noarch.rpmatomcat-servlet-4.0-api-9.0.87-1.el8_10.2.noarch.rpmbtomcat-webapps-9.0.87-1.el8_10.2.noarch.rpm[tomcat-9.0.87-1.el8_10.2.noarch.rpm\tomcat-admin-webapps-9.0.87-1.el8_10.2.noarch.rpm]tomcat-docs-webapp-9.0.87-1.el8_10.2.noarch.rpm^tomcat-el-3.0-api-9.0.87-1.el8_10.2.noarch.rpm_tomcat-jsp-2.3-api-9.0.87-1.el8_10.2.noarch.rpm`tomcat-lib-9.0.87-1.el8_10.2.noarch.rpmatomcat-servlet-4.0-api-9.0.87-1.el8_10.2.noarch.rpmbtomcat-webapps-9.0.87-1.el8_10.2.noarch.rpmo] 4rbugfixscap-security-guide bug fix and enhancement updatezk https://errata.rockylinux.org/RLBA-2024:5811RLBA-2024:5811RLBA-2024:5811 A?scap-security-guide-0.1.74-3.el8_10.rocky.1.1.noarch.rpmB?scap-security-guide-doc-0.1.74-3.el8_10.rocky.1.1.noarch.rpmA?scap-security-guide-0.1.74-3.el8_10.rocky.1.1.noarch.rpmB?scap-security-guide-doc-0.1.74-3.el8_10.rocky.1.1.noarch.rpmog 7usecurityModerate: libvpx security updatee~https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6349CVE-2023-6349CVE-2023-6349https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5197CVE-2024-5197CVE-2024-5197https://bugzilla.redhat.com/show_bug.cgi?id=22835532283553https://bugzilla.redhat.com/show_bug.cgi?id=22911982291198https://errata.rockylinux.org/RLSA-2024:5941RLSA-2024:5941RLSA-2024:5941 LXlibvpx-1.7.0-11.el8_10.x86_64.rpmLXlibvpx-1.7.0-11.el8_10.x86_64.rpmq^ xBBBBBBBBBBBBBBBBBBbugfixnss bug fix and enhancement updatecw https://errata.rockylinux.org/RLBA-2024:6680RLBA-2024:6680RLBA-2024:6680 ]"nss-softokn-freebl-3.101.0-7.el8_10.x86_64.rpmY"nss-3.101.0-7.el8_10.x86_64.rpmZ"nss-devel-3.101.0-7.el8_10.x86_64.rpm["nss-softokn-3.101.0-7.el8_10.x86_64.rpm\"nss-softokn-devel-3.101.0-7.el8_10.x86_64.rpm^"nss-softokn-freebl-devel-3.101.0-7.el8_10.x86_64.rpm_"nss-sysinit-3.101.0-7.el8_10.x86_64.rpm`"nss-tools-3.101.0-7.el8_10.x86_64.rpma"nss-util-3.101.0-7.el8_10.x86_64.rpmb"nss-util-devel-3.101.0-7.el8_10.x86_64.rpm ]"nss-softokn-freebl-3.101.0-7.el8_10.x86_64.rpmY"nss-3.101.0-7.el8_10.x86_64.rpmZ"nss-devel-3.101.0-7.el8_10.x86_64.rpm["nss-softokn-3.101.0-7.el8_10.x86_64.rpm\"nss-softokn-devel-3.101.0-7.el8_10.x86_64.rpm^"nss-softokn-freebl-devel-3.101.0-7.el8_10.x86_64.rpm_"nss-sysinit-3.101.0-7.el8_10.x86_64.rpm`"nss-tools-3.101.0-7.el8_10.x86_64.rpma"nss-util-3.101.0-7.el8_10.x86_64.rpmb"nss-util-devel-3.101.0-7.el8_10.x86_64.rpmri MsecurityImportant: firefox security updateZhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652CVE-2024-7652CVE-2024-7652https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8381CVE-2024-8381CVE-2024-8381https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8382CVE-2024-8382CVE-2024-8382https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8383CVE-2024-8383CVE-2024-8383https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8384CVE-2024-8384CVE-2024-8384https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8385CVE-2024-8385CVE-2024-8385https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8386CVE-2024-8386CVE-2024-8386https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8387CVE-2024-8387CVE-2024-8387https://bugzilla.redhat.com/show_bug.cgi?id=23073282307328https://bugzilla.redhat.com/show_bug.cgi?id=23094272309427https://bugzilla.redhat.com/show_bug.cgi?id=23094282309428https://bugzilla.redhat.com/show_bug.cgi?id=23094292309429https://bugzilla.redhat.com/show_bug.cgi?id=23094302309430https://bugzilla.redhat.com/show_bug.cgi?id=23094312309431https://bugzilla.redhat.com/show_bug.cgi?id=23094322309432https://bugzilla.redhat.com/show_bug.cgi?id=23094332309433https://bugzilla.redhat.com/show_bug.cgi?id=23104902310490https://errata.rockylinux.org/RLSA-2024:6682RLSA-2024:6682RLSA-2024:6682 rLfirefox-128.2.0-1.el8_10.x86_64.rpmrLfirefox-128.2.0-1.el8_10.x86_64.rpmrj PsecurityImportant: thunderbird security update`;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652CVE-2024-7652CVE-2024-7652https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8381CVE-2024-8381CVE-2024-8381https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8382CVE-2024-8382CVE-2024-8382https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8384CVE-2024-8384CVE-2024-8384https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8385CVE-2024-8385CVE-2024-8385https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8386CVE-2024-8386CVE-2024-8386https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8387CVE-2024-8387CVE-2024-8387https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8394CVE-2024-8394CVE-2024-8394https://bugzilla.redhat.com/show_bug.cgi?id=23073312307331https://bugzilla.redhat.com/show_bug.cgi?id=23094272309427https://bugzilla.redhat.com/show_bug.cgi?id=23094282309428https://bugzilla.redhat.com/show_bug.cgi?id=23094302309430https://bugzilla.redhat.com/show_bug.cgi?id=23094312309431https://bugzilla.redhat.com/show_bug.cgi?id=23094322309432https://bugzilla.redhat.com/show_bug.cgi?id=23094332309433https://bugzilla.redhat.com/show_bug.cgi?id=23104812310481https://bugzilla.redhat.com/show_bug.cgi?id=23104902310490https://errata.rockylinux.org/RLSA-2024:6684RLSA-2024:6684RLSA-2024:6684 hLthunderbird-128.2.0-1.el8_10.x86_64.rpmhLthunderbird-128.2.0-1.el8_10.x86_64.rpmrp SBBBBBBsecurityModerate: python3 security updatehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032CVE-2024-4032CVE-2024-4032https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232CVE-2024-6232CVE-2024-6232https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923CVE-2024-6923CVE-2024-6923https://bugzilla.redhat.com/show_bug.cgi?id=22929212292921https://bugzilla.redhat.com/show_bug.cgi?id=23022552302255https://bugzilla.redhat.com/show_bug.cgi?id=23094262309426https://errata.rockylinux.org/RLSA-2024:6975RLSA-2024:6975RLSA-2024:6975 platform-python-debug-3.6.8-67.el8_10.rocky.0.x86_64.rpmplatform-python-devel-3.6.8-67.el8_10.rocky.0.x86_64.rpm python3-idle-3.6.8-67.el8_10.rocky.0.x86_64.rpm python3-tkinter-3.6.8-67.el8_10.rocky.0.x86_64.rpmplatform-python-debug-3.6.8-67.el8_10.rocky.0.x86_64.rpmplatform-python-devel-3.6.8-67.el8_10.rocky.0.x86_64.rpm python3-idle-3.6.8-67.el8_10.rocky.0.x86_64.rpm python3-tkinter-3.6.8-67.el8_10.rocky.0.x86_64.rpm%f \bugfixblktrace bug fix update/" https://errata.rockylinux.org/RLBA-2024:6982RLBA-2024:6982RLBA-2024:6982 *iowatcher-1.2.0-11.el8_10.x86_64.rpm*iowatcher-1.2.0-11.el8_10.x86_64.rpm%k &_BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: pcp security updateQhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45769CVE-2024-45769CVE-2024-45769https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45770CVE-2024-45770CVE-2024-45770https://bugzilla.redhat.com/show_bug.cgi?id=23104512310451https://bugzilla.redhat.com/show_bug.cgi?id=23104522310452https://errata.rockylinux.org/RLSA-2024:6837RLSA-2024:6837RLSA-2024:6837 dxpcp-5.3.7-22.el8_10.x86_64.rpmypcp-conf-5.3.7-22.el8_10.x86_64.rpmzpcp-devel-5.3.7-22.el8_10.x86_64.rpm6pcp-doc-5.3.7-22.el8_10.noarch.rpm{pcp-export-pcp2elasticsearch-5.3.7-22.el8_10.x86_64.rpm|pcp-export-pcp2graphite-5.3.7-22.el8_10.x86_64.rpm}pcp-export-pcp2influxdb-5.3.7-22.el8_10.x86_64.rpm~pcp-export-pcp2json-5.3.7-22.el8_10.x86_64.rpmpcp-export-pcp2spark-5.3.7-22.el8_10.x86_64.rpmpcp-export-pcp2xml-5.3.7-22.el8_10.x86_64.rpmpcp-export-pcp2zabbix-5.3.7-22.el8_10.x86_64.rpmpcp-export-zabbix-agent-5.3.7-22.el8_10.x86_64.rpmpcp-gui-5.3.7-22.el8_10.x86_64.rpmpcp-import-collectl2pcp-5.3.7-22.el8_10.x86_64.rpmpcp-import-ganglia2pcp-5.3.7-22.el8_10.x86_64.rpmpcp-import-iostat2pcp-5.3.7-22.el8_10.x86_64.rpmpcp-import-mrtg2pcp-5.3.7-22.el8_10.x86_64.rpmpcp-import-sar2pcp-5.3.7-22.el8_10.x86_64.rpm pcp-libs-5.3.7-22.el8_10.x86_64.rpm pcp-libs-devel-5.3.7-22.el8_10.x86_64.rpm pcp-pmda-activemq-5.3.7-22.el8_10.x86_64.rpm pcp-pmda-apache-5.3.7-22.el8_10.x86_64.rpm pcp-pmda-bash-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-bcc-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-bind2-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-bonding-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-bpftrace-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-cifs-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-cisco-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-dbping-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-denki-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-dm-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-docker-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-ds389-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-ds389log-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-elasticsearch-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-gfs2-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-gluster-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-gpfs-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-gpsd-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-hacluster-5.3.7-22.el8_10.x86_64.rpm pcp-pmda-haproxy-5.3.7-22.el8_10.x86_64.rpm!pcp-pmda-infiniband-5.3.7-22.el8_10.x86_64.rpm"pcp-pmda-json-5.3.7-22.el8_10.x86_64.rpm#pcp-pmda-libvirt-5.3.7-22.el8_10.x86_64.rpm$pcp-pmda-lio-5.3.7-22.el8_10.x86_64.rpm%pcp-pmda-lmsensors-5.3.7-22.el8_10.x86_64.rpm&pcp-pmda-logger-5.3.7-22.el8_10.x86_64.rpm'pcp-pmda-lustre-5.3.7-22.el8_10.x86_64.rpm(pcp-pmda-lustrecomm-5.3.7-22.el8_10.x86_64.rpm)pcp-pmda-mailq-5.3.7-22.el8_10.x86_64.rpm*pcp-pmda-memcache-5.3.7-22.el8_10.x86_64.rpm+pcp-pmda-mic-5.3.7-22.el8_10.x86_64.rpm,pcp-pmda-mongodb-5.3.7-22.el8_10.x86_64.rpm-pcp-pmda-mounts-5.3.7-22.el8_10.x86_64.rpm.pcp-pmda-mssql-5.3.7-22.el8_10.x86_64.rpm/pcp-pmda-mysql-5.3.7-22.el8_10.x86_64.rpm0pcp-pmda-named-5.3.7-22.el8_10.x86_64.rpm1pcp-pmda-netcheck-5.3.7-22.el8_10.x86_64.rpm2pcp-pmda-netfilter-5.3.7-22.el8_10.x86_64.rpm3pcp-pmda-news-5.3.7-22.el8_10.x86_64.rpm4pcp-pmda-nfsclient-5.3.7-22.el8_10.x86_64.rpm5pcp-pmda-nginx-5.3.7-22.el8_10.x86_64.rpm6pcp-pmda-nvidia-gpu-5.3.7-22.el8_10.x86_64.rpm7pcp-pmda-openmetrics-5.3.7-22.el8_10.x86_64.rpm8pcp-pmda-openvswitch-5.3.7-22.el8_10.x86_64.rpm9pcp-pmda-oracle-5.3.7-22.el8_10.x86_64.rpm:pcp-pmda-pdns-5.3.7-22.el8_10.x86_64.rpm;pcp-pmda-perfevent-5.3.7-22.el8_10.x86_64.rpm<pcp-pmda-podman-5.3.7-22.el8_10.x86_64.rpm=pcp-pmda-postfix-5.3.7-22.el8_10.x86_64.rpm>pcp-pmda-postgresql-5.3.7-22.el8_10.x86_64.rpm?pcp-pmda-rabbitmq-5.3.7-22.el8_10.x86_64.rpm@pcp-pmda-redis-5.3.7-22.el8_10.x86_64.rpmApcp-pmda-roomtemp-5.3.7-22.el8_10.x86_64.rpmBpcp-pmda-rsyslog-5.3.7-22.el8_10.x86_64.rpmCpcp-pmda-samba-5.3.7-22.el8_10.x86_64.rpmDpcp-pmda-sendmail-5.3.7-22.el8_10.x86_64.rpmEpcp-pmda-shping-5.3.7-22.el8_10.x86_64.rpmFpcp-pmda-slurm-5.3.7-22.el8_10.x86_64.rpmGpcp-pmda-smart-5.3.7-22.el8_10.x86_64.rpmHpcp-pmda-snmp-5.3.7-22.el8_10.x86_64.rpmIpcp-pmda-sockets-5.3.7-22.el8_10.x86_64.rpmJpcp-pmda-statsd-5.3.7-22.el8_10.x86_64.rpmKpcp-pmda-summary-5.3.7-22.el8_10.x86_64.rpmLpcp-pmda-systemd-5.3.7-22.el8_10.x86_64.rpmMpcp-pmda-trace-5.3.7-22.el8_10.x86_64.rpmNpcp-pmda-unbound-5.3.7-22.el8_10.x86_64.rpmOpcp-pmda-weblog-5.3.7-22.el8_10.x86_64.rpmPpcp-pmda-zimbra-5.3.7-22.el8_10.x86_64.rpmQpcp-pmda-zswap-5.3.7-22.el8_10.x86_64.rpmRpcp-selinux-5.3.7-22.el8_10.x86_64.rpmSpcp-system-tools-5.3.7-22.el8_10.x86_64.rpmTpcp-testsuite-5.3.7-22.el8_10.x86_64.rpmUpcp-zeroconf-5.3.7-22.el8_10.x86_64.rpm[perl-PCP-LogImport-5.3.7-22.el8_10.x86_64.rpm\perl-PCP-LogSummary-5.3.7-22.el8_10.x86_64.rpm]perl-PCP-MMV-5.3.7-22.el8_10.x86_64.rpm^perl-PCP-PMDA-5.3.7-22.el8_10.x86_64.rpmmpython3-pcp-5.3.7-22.el8_10.x86_64.rpmdxpcp-5.3.7-22.el8_10.x86_64.rpmypcp-conf-5.3.7-22.el8_10.x86_64.rpmzpcp-devel-5.3.7-22.el8_10.x86_64.rpm6pcp-doc-5.3.7-22.el8_10.noarch.rpm{pcp-export-pcp2elasticsearch-5.3.7-22.el8_10.x86_64.rpm|pcp-export-pcp2graphite-5.3.7-22.el8_10.x86_64.rpm}pcp-export-pcp2influxdb-5.3.7-22.el8_10.x86_64.rpm~pcp-export-pcp2json-5.3.7-22.el8_10.x86_64.rpmpcp-export-pcp2spark-5.3.7-22.el8_10.x86_64.rpmpcp-export-pcp2xml-5.3.7-22.el8_10.x86_64.rpmpcp-export-pcp2zabbix-5.3.7-22.el8_10.x86_64.rpmpcp-export-zabbix-agent-5.3.7-22.el8_10.x86_64.rpmpcp-gui-5.3.7-22.el8_10.x86_64.rpmpcp-import-collectl2pcp-5.3.7-22.el8_10.x86_64.rpmpcp-import-ganglia2pcp-5.3.7-22.el8_10.x86_64.rpmpcp-import-iostat2pcp-5.3.7-22.el8_10.x86_64.rpmpcp-import-mrtg2pcp-5.3.7-22.el8_10.x86_64.rpmpcp-import-sar2pcp-5.3.7-22.el8_10.x86_64.rpm pcp-libs-5.3.7-22.el8_10.x86_64.rpm pcp-libs-devel-5.3.7-22.el8_10.x86_64.rpm pcp-pmda-activemq-5.3.7-22.el8_10.x86_64.rpm pcp-pmda-apache-5.3.7-22.el8_10.x86_64.rpm pcp-pmda-bash-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-bcc-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-bind2-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-bonding-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-bpftrace-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-cifs-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-cisco-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-dbping-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-denki-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-dm-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-docker-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-ds389-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-ds389log-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-elasticsearch-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-gfs2-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-gluster-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-gpfs-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-gpsd-5.3.7-22.el8_10.x86_64.rpmpcp-pmda-hacluster-5.3.7-22.el8_10.x86_64.rpm pcp-pmda-haproxy-5.3.7-22.el8_10.x86_64.rpm!pcp-pmda-infiniband-5.3.7-22.el8_10.x86_64.rpm"pcp-pmda-json-5.3.7-22.el8_10.x86_64.rpm#pcp-pmda-libvirt-5.3.7-22.el8_10.x86_64.rpm$pcp-pmda-lio-5.3.7-22.el8_10.x86_64.rpm%pcp-pmda-lmsensors-5.3.7-22.el8_10.x86_64.rpm&pcp-pmda-logger-5.3.7-22.el8_10.x86_64.rpm'pcp-pmda-lustre-5.3.7-22.el8_10.x86_64.rpm(pcp-pmda-lustrecomm-5.3.7-22.el8_10.x86_64.rpm)pcp-pmda-mailq-5.3.7-22.el8_10.x86_64.rpm*pcp-pmda-memcache-5.3.7-22.el8_10.x86_64.rpm+pcp-pmda-mic-5.3.7-22.el8_10.x86_64.rpm,pcp-pmda-mongodb-5.3.7-22.el8_10.x86_64.rpm-pcp-pmda-mounts-5.3.7-22.el8_10.x86_64.rpm.pcp-pmda-mssql-5.3.7-22.el8_10.x86_64.rpm/pcp-pmda-mysql-5.3.7-22.el8_10.x86_64.rpm0pcp-pmda-named-5.3.7-22.el8_10.x86_64.rpm1pcp-pmda-netcheck-5.3.7-22.el8_10.x86_64.rpm2pcp-pmda-netfilter-5.3.7-22.el8_10.x86_64.rpm3pcp-pmda-news-5.3.7-22.el8_10.x86_64.rpm4pcp-pmda-nfsclient-5.3.7-22.el8_10.x86_64.rpm5pcp-pmda-nginx-5.3.7-22.el8_10.x86_64.rpm6pcp-pmda-nvidia-gpu-5.3.7-22.el8_10.x86_64.rpm7pcp-pmda-openmetrics-5.3.7-22.el8_10.x86_64.rpm8pcp-pmda-openvswitch-5.3.7-22.el8_10.x86_64.rpm9pcp-pmda-oracle-5.3.7-22.el8_10.x86_64.rpm:pcp-pmda-pdns-5.3.7-22.el8_10.x86_64.rpm;pcp-pmda-perfevent-5.3.7-22.el8_10.x86_64.rpm<pcp-pmda-podman-5.3.7-22.el8_10.x86_64.rpm=pcp-pmda-postfix-5.3.7-22.el8_10.x86_64.rpm>pcp-pmda-postgresql-5.3.7-22.el8_10.x86_64.rpm?pcp-pmda-rabbitmq-5.3.7-22.el8_10.x86_64.rpm@pcp-pmda-redis-5.3.7-22.el8_10.x86_64.rpmApcp-pmda-roomtemp-5.3.7-22.el8_10.x86_64.rpmBpcp-pmda-rsyslog-5.3.7-22.el8_10.x86_64.rpmCpcp-pmda-samba-5.3.7-22.el8_10.x86_64.rpmDpcp-pmda-sendmail-5.3.7-22.el8_10.x86_64.rpmEpcp-pmda-shping-5.3.7-22.el8_10.x86_64.rpmFpcp-pmda-slurm-5.3.7-22.el8_10.x86_64.rpmGpcp-pmda-smart-5.3.7-22.el8_10.x86_64.rpmHpcp-pmda-snmp-5.3.7-22.el8_10.x86_64.rpmIpcp-pmda-sockets-5.3.7-22.el8_10.x86_64.rpmJpcp-pmda-statsd-5.3.7-22.el8_10.x86_64.rpmKpcp-pmda-summary-5.3.7-22.el8_10.x86_64.rpmLpcp-pmda-systemd-5.3.7-22.el8_10.x86_64.rpmMpcp-pmda-trace-5.3.7-22.el8_10.x86_64.rpmNpcp-pmda-unbound-5.3.7-22.el8_10.x86_64.rpmOpcp-pmda-weblog-5.3.7-22.el8_10.x86_64.rpmPpcp-pmda-zimbra-5.3.7-22.el8_10.x86_64.rpmQpcp-pmda-zswap-5.3.7-22.el8_10.x86_64.rpmRpcp-selinux-5.3.7-22.el8_10.x86_64.rpmSpcp-system-tools-5.3.7-22.el8_10.x86_64.rpmTpcp-testsuite-5.3.7-22.el8_10.x86_64.rpmUpcp-zeroconf-5.3.7-22.el8_10.x86_64.rpm[perl-PCP-LogImport-5.3.7-22.el8_10.x86_64.rpm\perl-PCP-LogSummary-5.3.7-22.el8_10.x86_64.rpm]perl-PCP-MMV-5.3.7-22.el8_10.x86_64.rpm^perl-PCP-PMDA-5.3.7-22.el8_10.x86_64.rpmmpython3-pcp-5.3.7-22.el8_10.x86_64.rpm)l 0gBBBBBBBsecurityModerate: python3.12 security updateWhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032CVE-2024-4032CVE-2024-4032https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923CVE-2024-6923CVE-2024-6923https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/show_bug.cgi?id=22929212292921https://bugzilla.redhat.com/show_bug.cgi?id=23022552302255https://bugzilla.redhat.com/show_bug.cgi?id=23073702307370https://errata.rockylinux.org/RLSA-2024:6961RLSA-2024:6961RLSA-2024:6961 pNpython3.12-3.12.5-2.el8_10.x86_64.rpmqNpython3.12-devel-3.12.5-2.el8_10.x86_64.rpmrNpython3.12-libs-3.12.5-2.el8_10.x86_64.rpm^Npython3.12-rpm-macros-3.12.5-2.el8_10.noarch.rpmsNpython3.12-tkinter-3.12.5-2.el8_10.x86_64.rpmpNpython3.12-3.12.5-2.el8_10.x86_64.rpmqNpython3.12-devel-3.12.5-2.el8_10.x86_64.rpmrNpython3.12-libs-3.12.5-2.el8_10.x86_64.rpm^Npython3.12-rpm-macros-3.12.5-2.el8_10.noarch.rpmsNpython3.12-tkinter-3.12.5-2.el8_10.x86_64.rpm)m :qBBBBBBBsecurityModerate: python3.11 security updatekahttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032CVE-2024-4032CVE-2024-4032https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923CVE-2024-6923CVE-2024-6923https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/show_bug.cgi?id=22929212292921https://bugzilla.redhat.com/show_bug.cgi?id=23022552302255https://bugzilla.redhat.com/show_bug.cgi?id=23073702307370https://errata.rockylinux.org/RLSA-2024:6962RLSA-2024:6962RLSA-2024:6962 !Mpython3.11-3.11.9-7.el8_10.x86_64.rpm"Mpython3.11-devel-3.11.9-7.el8_10.x86_64.rpm#Mpython3.11-libs-3.11.9-7.el8_10.x86_64.rpmIMpython3.11-rpm-macros-3.11.9-7.el8_10.noarch.rpm$Mpython3.11-tkinter-3.11.9-7.el8_10.x86_64.rpm!Mpython3.11-3.11.9-7.el8_10.x86_64.rpm"Mpython3.11-devel-3.11.9-7.el8_10.x86_64.rpm#Mpython3.11-libs-3.11.9-7.el8_10.x86_64.rpmIMpython3.11-rpm-macros-3.11.9-7.el8_10.noarch.rpm$Mpython3.11-tkinter-3.11.9-7.el8_10.x86_64.rpm)n {BBBBBBsecurityModerate: gtk3 security updateLhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6655CVE-2024-6655CVE-2024-6655https://bugzilla.redhat.com/show_bug.cgi?id=22970982297098https://errata.rockylinux.org/RLSA-2024:6963RLSA-2024:6963RLSA-2024:6963 vgtk3-3.22.30-12.el8_10.x86_64.rpmvgtk3-devel-3.22.30-12.el8_10.x86_64.rpmvgtk3-immodule-xim-3.22.30-12.el8_10.x86_64.rpmvgtk-update-icon-cache-3.22.30-12.el8_10.x86_64.rpmvgtk3-3.22.30-12.el8_10.x86_64.rpmvgtk3-devel-3.22.30-12.el8_10.x86_64.rpmvgtk3-immodule-xim-3.22.30-12.el8_10.x86_64.rpmvgtk-update-icon-cache-3.22.30-12.el8_10.x86_64.rpm)_ DBBBbugfixpacemaker bug fix update\ https://errata.rockylinux.org/RLBA-2024:6965RLBA-2024:6965RLBA-2024:6965 pacemaker-cluster-libs-2.1.7-5.2.el8_10.x86_64.rpmpacemaker-libs-2.1.7-5.2.el8_10.x86_64.rpm0pacemaker-schemas-2.1.7-5.2.el8_10.noarch.rpmpacemaker-cluster-libs-2.1.7-5.2.el8_10.x86_64.rpmpacemaker-libs-2.1.7-5.2.el8_10.x86_64.rpm0pacemaker-schemas-2.1.7-5.2.el8_10.noarch.rpm)` JBBBBbugfixxmlsec1 bug fix update\, https://errata.rockylinux.org/RLBA-2024:6967RLBA-2024:6967RLBA-2024:6967 LBxmlsec1-1.2.25-8.el8_10.x86_64.rpmMBxmlsec1-nss-1.2.25-8.el8_10.x86_64.rpmNBxmlsec1-openssl-1.2.25-8.el8_10.x86_64.rpmLBxmlsec1-1.2.25-8.el8_10.x86_64.rpmMBxmlsec1-nss-1.2.25-8.el8_10.x86_64.rpmNBxmlsec1-openssl-1.2.25-8.el8_10.x86_64.rpm*a QBBBBBBBBBbugfixtigervnc bug fix update+ https://errata.rockylinux.org/RLBA-2024:6968RLBA-2024:6968RLBA-2024:6968 stigervnc-1.13.1-13.el8_10.x86_64.rpmtigervnc-icons-1.13.1-13.el8_10.noarch.rpmtigervnc-license-1.13.1-13.el8_10.noarch.rpm tigervnc-selinux-1.13.1-13.el8_10.noarch.rpmttigervnc-server-1.13.1-13.el8_10.x86_64.rpmutigervnc-server-minimal-1.13.1-13.el8_10.x86_64.rpmvtigervnc-server-module-1.13.1-13.el8_10.x86_64.rpmstigervnc-1.13.1-13.el8_10.x86_64.rpmtigervnc-icons-1.13.1-13.el8_10.noarch.rpmtigervnc-license-1.13.1-13.el8_10.noarch.rpm tigervnc-selinux-1.13.1-13.el8_10.noarch.rpmttigervnc-server-1.13.1-13.el8_10.x86_64.rpmutigervnc-server-minimal-1.13.1-13.el8_10.x86_64.rpmvtigervnc-server-module-1.13.1-13.el8_10.x86_64.rpm*b bugfixcloud-init bug fix and enhancement update3L https://errata.rockylinux.org/RLBA-2024:6970RLBA-2024:6970RLBA-2024:6970 cloud-init-23.4-7.el8_10.8.0.1.noarch.rpmcloud-init-23.4-7.el8_10.8.0.1.noarch.rpm*c bugfixedk2 bug fix and enhancement update  https://errata.rockylinux.org/RLBA-2024:6971RLBA-2024:6971RLBA-2024:6971 edk2-ovmf-20220126gitbb1bba3d77-13.el8_10.3.noarch.rpmedk2-ovmf-20220126gitbb1bba3d77-13.el8_10.3.noarch.rpm*d %aBBbugfixgnome-keyring bug fix update@ https://errata.rockylinux.org/RLBA-2024:6972RLBA-2024:6972RLBA-2024:6972 "gnome-keyring-3.28.2-2.el8_10.x86_64.rpm"gnome-keyring-pam-3.28.2-2.el8_10.x86_64.rpm"gnome-keyring-3.28.2-2.el8_10.x86_64.rpm"gnome-keyring-pam-3.28.2-2.el8_10.x86_64.rpm*o .fBBBBBBsecurityModerate: dovecot security update_-https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23184CVE-2024-23184CVE-2024-23184https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23185CVE-2024-23185CVE-2024-23185https://bugzilla.redhat.com/show_bug.cgi?id=23059092305909https://bugzilla.redhat.com/show_bug.cgi?id=23059102305910https://errata.rockylinux.org/RLSA-2024:6973RLSA-2024:6973RLSA-2024:6973 x_dovecot-2.3.16-6.el8_10.x86_64.rpmy_dovecot-mysql-2.3.16-6.el8_10.x86_64.rpmz_dovecot-pgsql-2.3.16-6.el8_10.x86_64.rpm{_dovecot-pigeonhole-2.3.16-6.el8_10.x86_64.rpmx_dovecot-2.3.16-6.el8_10.x86_64.rpmy_dovecot-mysql-2.3.16-6.el8_10.x86_64.rpmz_dovecot-pgsql-2.3.16-6.el8_10.x86_64.rpm{_dovecot-pigeonhole-2.3.16-6.el8_10.x86_64.rpm*e 6oBBBBBbugfixlibX11 bug fix update K https://errata.rockylinux.org/RLBA-2024:6974RLBA-2024:6974RLBA-2024:6974 4libX11-1.6.8-9.el8_10.x86_64.rpm5libX11-common-1.6.8-9.el8_10.noarch.rpm6libX11-devel-1.6.8-9.el8_10.x86_64.rpm7libX11-xcb-1.6.8-9.el8_10.x86_64.rpm4libX11-1.6.8-9.el8_10.x86_64.rpm5libX11-common-1.6.8-9.el8_10.noarch.rpm6libX11-devel-1.6.8-9.el8_10.x86_64.rpm7libX11-xcb-1.6.8-9.el8_10.x86_64.rpm*q 9wsecurityImportant: git-lfs security updateW,https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/show_bug.cgi?id=23105282310528https://errata.rockylinux.org/RLSA-2024:7135RLSA-2024:7135RLSA-2024:7135  Hgit-lfs-3.4.1-3.el8_10.x86_64.rpm Hgit-lfs-3.4.1-3.el8_10.x86_64.rpm*r zBBBBsecurityImportant: osbuild-composer security updateehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1394CVE-2024-1394CVE-2024-1394https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/show_bug.cgi?id=22629212262921https://bugzilla.redhat.com/show_bug.cgi?id=23105282310528https://errata.rockylinux.org/RLSA-2024:7262RLSA-2024:7262RLSA-2024:7262 uJosbuild-composer-101-2.el8_10.rocky.0.6.x86_64.rpmvJosbuild-composer-core-101-2.el8_10.rocky.0.6.x86_64.rpmwJosbuild-composer-worker-101-2.el8_10.rocky.0.6.x86_64.rpmuJosbuild-composer-101-2.el8_10.rocky.0.6.x86_64.rpmvJosbuild-composer-core-101-2.el8_10.rocky.0.6.x86_64.rpmwJosbuild-composer-worker-101-2.el8_10.rocky.0.6.x86_64.rpm*s ABBsecurityModerate: grafana security updateh"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24791CVE-2024-24791CVE-2024-24791https://bugzilla.redhat.com/show_bug.cgi?id=22953102295310https://errata.rockylinux.org/RLSA-2024:7349RLSA-2024:7349RLSA-2024:7349 *hgrafana-9.2.10-18.el8_10.x86_64.rpm,hgrafana-selinux-9.2.10-18.el8_10.x86_64.rpm*hgrafana-9.2.10-18.el8_10.x86_64.rpm,hgrafana-selinux-9.2.10-18.el8_10.x86_64.rpmtt FBBsecurityImportant: cups-filters security update Nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47076CVE-2024-47076CVE-2024-47076https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47175CVE-2024-47175CVE-2024-47175https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47176CVE-2024-47176CVE-2024-47176https://bugzilla.redhat.com/show_bug.cgi?id=23142522314252https://bugzilla.redhat.com/show_bug.cgi?id=23142532314253https://bugzilla.redhat.com/show_bug.cgi?id=23142562314256https://errata.rockylinux.org/RLSA-2024:7463RLSA-2024:7463RLSA-2024:7463 r-cups-filters-1.20.0-35.el8_10.x86_64.rpms-cups-filters-libs-1.20.0-35.el8_10.x86_64.rpmr-cups-filters-1.20.0-35.el8_10.x86_64.rpms-cups-filters-libs-1.20.0-35.el8_10.x86_64.rpmtu KsecurityImportant: thunderbird security updateXkhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9392CVE-2024-9392CVE-2024-9392https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9393CVE-2024-9393CVE-2024-9393https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9394CVE-2024-9394CVE-2024-9394https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9396CVE-2024-9396CVE-2024-9396https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9397CVE-2024-9397CVE-2024-9397https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9398CVE-2024-9398CVE-2024-9398https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9399CVE-2024-9399CVE-2024-9399https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9400CVE-2024-9400CVE-2024-9400https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9401CVE-2024-9401CVE-2024-9401https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9402CVE-2024-9402CVE-2024-9402https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9403CVE-2024-9403CVE-2024-9403https://bugzilla.redhat.com/show_bug.cgi?id=23144312314431https://bugzilla.redhat.com/show_bug.cgi?id=23159452315945https://bugzilla.redhat.com/show_bug.cgi?id=23159472315947https://bugzilla.redhat.com/show_bug.cgi?id=23159492315949https://bugzilla.redhat.com/show_bug.cgi?id=23159502315950https://bugzilla.redhat.com/show_bug.cgi?id=23159512315951https://bugzilla.redhat.com/show_bug.cgi?id=23159522315952https://bugzilla.redhat.com/show_bug.cgi?id=23159532315953https://bugzilla.redhat.com/show_bug.cgi?id=23159542315954https://bugzilla.redhat.com/show_bug.cgi?id=23159562315956https://bugzilla.redhat.com/show_bug.cgi?id=23159572315957https://bugzilla.redhat.com/show_bug.cgi?id=23159592315959https://errata.rockylinux.org/RLSA-2024:7699RLSA-2024:7699RLSA-2024:7699 hMthunderbird-128.3.0-1.el8_10.x86_64.rpmhMthunderbird-128.3.0-1.el8_10.x86_64.rpmtv NsecurityImportant: firefox security updateChttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8900CVE-2024-8900CVE-2024-8900https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9392CVE-2024-9392CVE-2024-9392https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9393CVE-2024-9393CVE-2024-9393https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9394CVE-2024-9394CVE-2024-9394https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9396CVE-2024-9396CVE-2024-9396https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9397CVE-2024-9397CVE-2024-9397https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9398CVE-2024-9398CVE-2024-9398https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9399CVE-2024-9399CVE-2024-9399https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9400CVE-2024-9400CVE-2024-9400https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9401CVE-2024-9401CVE-2024-9401https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9402CVE-2024-9402CVE-2024-9402https://bugzilla.redhat.com/show_bug.cgi?id=23144302314430https://bugzilla.redhat.com/show_bug.cgi?id=23159452315945https://bugzilla.redhat.com/show_bug.cgi?id=23159472315947https://bugzilla.redhat.com/show_bug.cgi?id=23159492315949https://bugzilla.redhat.com/show_bug.cgi?id=23159502315950https://bugzilla.redhat.com/show_bug.cgi?id=23159512315951https://bugzilla.redhat.com/show_bug.cgi?id=23159522315952https://bugzilla.redhat.com/show_bug.cgi?id=23159532315953https://bugzilla.redhat.com/show_bug.cgi?id=23159542315954https://bugzilla.redhat.com/show_bug.cgi?id=23159562315956https://bugzilla.redhat.com/show_bug.cgi?id=23159572315957https://bugzilla.redhat.com/show_bug.cgi?id=23159592315959https://errata.rockylinux.org/RLSA-2024:7700RLSA-2024:7700RLSA-2024:7700 rMfirefox-128.3.0-1.el8_10.x86_64.rpmrMfirefox-128.3.0-1.el8_10.x86_64.rpmtw !QBBBBBBBBBBBBBBsecurityImportant: .NET 6.0 security update_$https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43483CVE-2024-43483CVE-2024-43483https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43484CVE-2024-43484CVE-2024-43484https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43485CVE-2024-43485CVE-2024-43485https://bugzilla.redhat.com/show_bug.cgi?id=23157292315729https://bugzilla.redhat.com/show_bug.cgi?id=23157302315730https://bugzilla.redhat.com/show_bug.cgi?id=23157312315731https://errata.rockylinux.org/RLSA-2024:7851RLSA-2024:7851RLSA-2024:7851 \.dotnet-apphost-pack-6.0-6.0.35-1.el8_10.x86_64.rpmZ.aspnetcore-runtime-6.0-6.0.35-1.el8_10.x86_64.rpm[.aspnetcore-targeting-pack-6.0-6.0.35-1.el8_10.x86_64.rpm].dotnet-hostfxr-6.0-6.0.35-1.el8_10.x86_64.rpm^.dotnet-runtime-6.0-6.0.35-1.el8_10.x86_64.rpm_Wdotnet-sdk-6.0-6.0.135-1.el8_10.x86_64.rpm`.dotnet-targeting-pack-6.0-6.0.35-1.el8_10.x86_64.rpmaWdotnet-templates-6.0-6.0.135-1.el8_10.x86_64.rpm\.dotnet-apphost-pack-6.0-6.0.35-1.el8_10.x86_64.rpmZ.aspnetcore-runtime-6.0-6.0.35-1.el8_10.x86_64.rpm[.aspnetcore-targeting-pack-6.0-6.0.35-1.el8_10.x86_64.rpm].dotnet-hostfxr-6.0-6.0.35-1.el8_10.x86_64.rpm^.dotnet-runtime-6.0-6.0.35-1.el8_10.x86_64.rpm_Wdotnet-sdk-6.0-6.0.135-1.el8_10.x86_64.rpm`.dotnet-targeting-pack-6.0-6.0.35-1.el8_10.x86_64.rpmaWdotnet-templates-6.0-6.0.135-1.el8_10.x86_64.rpmtx >bBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security update https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38229CVE-2024-38229CVE-2024-38229https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43483CVE-2024-43483CVE-2024-43483https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43484CVE-2024-43484CVE-2024-43484https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43485CVE-2024-43485CVE-2024-43485https://bugzilla.redhat.com/show_bug.cgi?id=23157292315729https://bugzilla.redhat.com/show_bug.cgi?id=23157302315730https://bugzilla.redhat.com/show_bug.cgi?id=23157312315731https://bugzilla.redhat.com/show_bug.cgi?id=23161612316161https://errata.rockylinux.org/RLSA-2024:7868RLSA-2024:7868RLSA-2024:7868 /Uaspnetcore-runtime-8.0-8.0.10-1.el8_10.x86_64.rpm&Uaspnetcore-runtime-dbg-8.0-8.0.10-1.el8_10.x86_64.rpm0Uaspnetcore-targeting-pack-8.0-8.0.10-1.el8_10.x86_64.rpm)dotnet-8.0.110-1.el8_10.x86_64.rpm1Udotnet-apphost-pack-8.0-8.0.10-1.el8_10.x86_64.rpmUdotnet-host-8.0.10-1.el8_10.x86_64.rpm2Udotnet-hostfxr-8.0-8.0.10-1.el8_10.x86_64.rpm3Udotnet-runtime-8.0-8.0.10-1.el8_10.x86_64.rpm'Udotnet-runtime-dbg-8.0-8.0.10-1.el8_10.x86_64.rpm4)dotnet-sdk-8.0-8.0.110-1.el8_10.x86_64.rpm()dotnet-sdk-dbg-8.0-8.0.110-1.el8_10.x86_64.rpm5Udotnet-targeting-pack-8.0-8.0.10-1.el8_10.x86_64.rpm6)dotnet-templates-8.0-8.0.110-1.el8_10.x86_64.rpm)netstandard-targeting-pack-2.1-8.0.110-1.el8_10.x86_64.rpm/Uaspnetcore-runtime-8.0-8.0.10-1.el8_10.x86_64.rpm&Uaspnetcore-runtime-dbg-8.0-8.0.10-1.el8_10.x86_64.rpm0Uaspnetcore-targeting-pack-8.0-8.0.10-1.el8_10.x86_64.rpm)dotnet-8.0.110-1.el8_10.x86_64.rpm1Udotnet-apphost-pack-8.0-8.0.10-1.el8_10.x86_64.rpmUdotnet-host-8.0.10-1.el8_10.x86_64.rpm2Udotnet-hostfxr-8.0-8.0.10-1.el8_10.x86_64.rpm3Udotnet-runtime-8.0-8.0.10-1.el8_10.x86_64.rpm'Udotnet-runtime-dbg-8.0-8.0.10-1.el8_10.x86_64.rpm4)dotnet-sdk-8.0-8.0.110-1.el8_10.x86_64.rpm()dotnet-sdk-dbg-8.0-8.0.110-1.el8_10.x86_64.rpm5Udotnet-targeting-pack-8.0-8.0.10-1.el8_10.x86_64.rpm6)dotnet-templates-8.0-8.0.110-1.el8_10.x86_64.rpm)netstandard-targeting-pack-2.1-8.0.110-1.el8_10.x86_64.rpmty securityImportant: firefox security updatehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9680CVE-2024-9680CVE-2024-9680https://bugzilla.redhat.com/show_bug.cgi?id=23174422317442https://errata.rockylinux.org/RLSA-2024:7977RLSA-2024:7977RLSA-2024:7977 rfirefox-128.3.1-2.el8_10.x86_64.rpmrfirefox-128.3.1-2.el8_10.x86_64.rpmtz BsecurityImportant: thunderbird security update6ihttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9680CVE-2024-9680CVE-2024-9680https://bugzilla.redhat.com/show_bug.cgi?id=23174422317442https://errata.rockylinux.org/RLSA-2024:8024RLSA-2024:8024RLSA-2024:8024 hthunderbird-128.3.1-1.el8_10.x86_64.rpmhthunderbird-128.3.1-1.el8_10.x86_64.rpmt| EBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security updateu https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48161CVE-2023-48161CVE-2023-48161https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208CVE-2024-21208CVE-2024-21208https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210CVE-2024-21210CVE-2024-21210https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217CVE-2024-21217CVE-2024-21217https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/show_bug.cgi?id=22510252251025https://bugzilla.redhat.com/show_bug.cgi?id=23185242318524https://bugzilla.redhat.com/show_bug.cgi?id=23185302318530https://bugzilla.redhat.com/show_bug.cgi?id=23185342318534https://errata.rockylinux.org/RLSA-2024:8121RLSA-2024:8121RLSA-2024:8121 3Hjava-11-openjdk-11.0.25.0.9-2.el8.x86_64.rpm4Hjava-11-openjdk-demo-11.0.25.0.9-2.el8.x86_64.rpm5Hjava-11-openjdk-devel-11.0.25.0.9-2.el8.x86_64.rpm6Hjava-11-openjdk-headless-11.0.25.0.9-2.el8.x86_64.rpm7Hjava-11-openjdk-javadoc-11.0.25.0.9-2.el8.x86_64.rpm8Hjava-11-openjdk-javadoc-zip-11.0.25.0.9-2.el8.x86_64.rpm9Hjava-11-openjdk-jmods-11.0.25.0.9-2.el8.x86_64.rpm:Hjava-11-openjdk-src-11.0.25.0.9-2.el8.x86_64.rpm;Hjava-11-openjdk-static-libs-11.0.25.0.9-2.el8.x86_64.rpm 3Hjava-11-openjdk-11.0.25.0.9-2.el8.x86_64.rpm4Hjava-11-openjdk-demo-11.0.25.0.9-2.el8.x86_64.rpm5Hjava-11-openjdk-devel-11.0.25.0.9-2.el8.x86_64.rpm6Hjava-11-openjdk-headless-11.0.25.0.9-2.el8.x86_64.rpm7Hjava-11-openjdk-javadoc-11.0.25.0.9-2.el8.x86_64.rpm8Hjava-11-openjdk-javadoc-zip-11.0.25.0.9-2.el8.x86_64.rpm9Hjava-11-openjdk-jmods-11.0.25.0.9-2.el8.x86_64.rpm:Hjava-11-openjdk-src-11.0.25.0.9-2.el8.x86_64.rpm;Hjava-11-openjdk-static-libs-11.0.25.0.9-2.el8.x86_64.rpmu~ *XBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48161CVE-2023-48161CVE-2023-48161https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208CVE-2024-21208CVE-2024-21208https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210CVE-2024-21210CVE-2024-21210https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217CVE-2024-21217CVE-2024-21217https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/show_bug.cgi?id=22510252251025https://bugzilla.redhat.com/show_bug.cgi?id=23185242318524https://bugzilla.redhat.com/show_bug.cgi?id=23185262318526https://bugzilla.redhat.com/show_bug.cgi?id=23185302318530https://bugzilla.redhat.com/show_bug.cgi?id=23185342318534https://errata.rockylinux.org/RLSA-2024:8127RLSA-2024:8127RLSA-2024:8127 -Qjava-21-openjdk-21.0.5.0.10-3.el8.x86_64.rpm.Qjava-21-openjdk-demo-21.0.5.0.10-3.el8.x86_64.rpm/Qjava-21-openjdk-devel-21.0.5.0.10-3.el8.x86_64.rpm0Qjava-21-openjdk-headless-21.0.5.0.10-3.el8.x86_64.rpm1Qjava-21-openjdk-javadoc-21.0.5.0.10-3.el8.x86_64.rpm2Qjava-21-openjdk-javadoc-zip-21.0.5.0.10-3.el8.x86_64.rpm3Qjava-21-openjdk-jmods-21.0.5.0.10-3.el8.x86_64.rpm4Qjava-21-openjdk-src-21.0.5.0.10-3.el8.x86_64.rpm5Qjava-21-openjdk-static-libs-21.0.5.0.10-3.el8.x86_64.rpm -Qjava-21-openjdk-21.0.5.0.10-3.el8.x86_64.rpm.Qjava-21-openjdk-demo-21.0.5.0.10-3.el8.x86_64.rpm/Qjava-21-openjdk-devel-21.0.5.0.10-3.el8.x86_64.rpm0Qjava-21-openjdk-headless-21.0.5.0.10-3.el8.x86_64.rpm1Qjava-21-openjdk-javadoc-21.0.5.0.10-3.el8.x86_64.rpm2Qjava-21-openjdk-javadoc-zip-21.0.5.0.10-3.el8.x86_64.rpm3Qjava-21-openjdk-jmods-21.0.5.0.10-3.el8.x86_64.rpm4Qjava-21-openjdk-src-21.0.5.0.10-3.el8.x86_64.rpm5Qjava-21-openjdk-static-libs-21.0.5.0.10-3.el8.x86_64.rpmu} =kBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security update.u https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48161CVE-2023-48161CVE-2023-48161https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208CVE-2024-21208CVE-2024-21208https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210CVE-2024-21210CVE-2024-21210https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217CVE-2024-21217CVE-2024-21217https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/show_bug.cgi?id=22510252251025https://bugzilla.redhat.com/show_bug.cgi?id=23185242318524https://bugzilla.redhat.com/show_bug.cgi?id=23185262318526https://bugzilla.redhat.com/show_bug.cgi?id=23185302318530https://bugzilla.redhat.com/show_bug.cgi?id=23185342318534https://errata.rockylinux.org/RLSA-2024:8124RLSA-2024:8124RLSA-2024:8124 sIjava-17-openjdk-17.0.13.0.11-3.el8.x86_64.rpmtIjava-17-openjdk-demo-17.0.13.0.11-3.el8.x86_64.rpmuIjava-17-openjdk-devel-17.0.13.0.11-3.el8.x86_64.rpmvIjava-17-openjdk-headless-17.0.13.0.11-3.el8.x86_64.rpmwIjava-17-openjdk-javadoc-17.0.13.0.11-3.el8.x86_64.rpmxIjava-17-openjdk-javadoc-zip-17.0.13.0.11-3.el8.x86_64.rpmyIjava-17-openjdk-jmods-17.0.13.0.11-3.el8.x86_64.rpmzIjava-17-openjdk-src-17.0.13.0.11-3.el8.x86_64.rpm{Ijava-17-openjdk-static-libs-17.0.13.0.11-3.el8.x86_64.rpm sIjava-17-openjdk-17.0.13.0.11-3.el8.x86_64.rpmtIjava-17-openjdk-demo-17.0.13.0.11-3.el8.x86_64.rpmuIjava-17-openjdk-devel-17.0.13.0.11-3.el8.x86_64.rpmvIjava-17-openjdk-headless-17.0.13.0.11-3.el8.x86_64.rpmwIjava-17-openjdk-javadoc-17.0.13.0.11-3.el8.x86_64.rpmxIjava-17-openjdk-javadoc-zip-17.0.13.0.11-3.el8.x86_64.rpmyIjava-17-openjdk-jmods-17.0.13.0.11-3.el8.x86_64.rpmzIjava-17-openjdk-src-17.0.13.0.11-3.el8.x86_64.rpm{Ijava-17-openjdk-static-libs-17.0.13.0.11-3.el8.x86_64.rpmu{ ~BBBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update#v https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48161CVE-2023-48161CVE-2023-48161https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208CVE-2024-21208CVE-2024-21208https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210CVE-2024-21210CVE-2024-21210https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217CVE-2024-21217CVE-2024-21217https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/show_bug.cgi?id=22510252251025https://bugzilla.redhat.com/show_bug.cgi?id=23185242318524https://bugzilla.redhat.com/show_bug.cgi?id=23185262318526https://bugzilla.redhat.com/show_bug.cgi?id=23185302318530https://bugzilla.redhat.com/show_bug.cgi?id=23185342318534https://errata.rockylinux.org/RLSA-2024:8117RLSA-2024:8117RLSA-2024:8117 -java-1.8.0-openjdk-1.8.0.432.b06-2.el8.x86_64.rpm.java-1.8.0-openjdk-accessibility-1.8.0.432.b06-2.el8.x86_64.rpm/java-1.8.0-openjdk-demo-1.8.0.432.b06-2.el8.x86_64.rpm0java-1.8.0-openjdk-devel-1.8.0.432.b06-2.el8.x86_64.rpm1java-1.8.0-openjdk-headless-1.8.0.432.b06-2.el8.x86_64.rpm8java-1.8.0-openjdk-javadoc-1.8.0.432.b06-2.el8.noarch.rpm9java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-2.el8.noarch.rpm2java-1.8.0-openjdk-src-1.8.0.432.b06-2.el8.x86_64.rpm-java-1.8.0-openjdk-1.8.0.432.b06-2.el8.x86_64.rpm.java-1.8.0-openjdk-accessibility-1.8.0.432.b06-2.el8.x86_64.rpm/java-1.8.0-openjdk-demo-1.8.0.432.b06-2.el8.x86_64.rpm0java-1.8.0-openjdk-devel-1.8.0.432.b06-2.el8.x86_64.rpm1java-1.8.0-openjdk-headless-1.8.0.432.b06-2.el8.x86_64.rpm8java-1.8.0-openjdk-javadoc-1.8.0.432.b06-2.el8.noarch.rpm9java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-2.el8.noarch.rpm2java-1.8.0-openjdk-src-1.8.0.432.b06-2.el8.x86_64.rpmv MBBsecurityImportant: grafana security updateBhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47875CVE-2024-47875CVE-2024-47875https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9355CVE-2024-9355CVE-2024-9355https://bugzilla.redhat.com/show_bug.cgi?id=23157192315719https://bugzilla.redhat.com/show_bug.cgi?id=23180522318052https://errata.rockylinux.org/RLSA-2024:8327RLSA-2024:8327RLSA-2024:8327 *igrafana-9.2.10-20.el8_10.x86_64.rpm,igrafana-selinux-9.2.10-20.el8_10.x86_64.rpm*igrafana-9.2.10-20.el8_10.x86_64.rpm,igrafana-selinux-9.2.10-20.el8_10.x86_64.rpmvg bugfixtzdata bug fix and enhancement update[ https://errata.rockylinux.org/RLBA-2024:8805RLBA-2024:8805RLBA-2024:8805 > tzdata-java-2024b-4.el8.noarch.rpm> tzdata-java-2024b-4.el8.noarch.rpm[y TBBBBBBenhancementlibproxy bug fix and enhancement updatea  https://errata.rockylinux.org/RLEA-2024:8852RLEA-2024:8852RLEA-2024:8852 9Alibproxy-bin-0.4.15-5.5.el8_10.x86_64.rpm:Alibproxy-gnome-0.4.15-5.5.el8_10.x86_64.rpm;Alibproxy-networkmanager-0.4.15-5.5.el8_10.x86_64.rpmxBBBBbugfixghostscript bug fix updateW* https://errata.rockylinux.org/RLBA-2024:8845RLBA-2024:8845RLBA-2024:8845 wghostscript-9.27-15.el8_10.x86_64.rpmwghostscript-x11-9.27-15.el8_10.x86_64.rpm-wlibgs-9.27-15.el8_10.x86_64.rpmwghostscript-9.27-15.el8_10.x86_64.rpmwghostscript-x11-9.27-15.el8_10.x86_64.rpm-wlibgs-9.27-15.el8_10.x86_64.rpm`  securityModerate: grafana-pcp security updateVhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9355CVE-2024-9355CVE-2024-9355https://bugzilla.redhat.com/show_bug.cgi?id=23157192315719https://errata.rockylinux.org/RLSA-2024:8847RLSA-2024:8847RLSA-2024:8847 +grafana-pcp-5.1.1-9.el8_10.x86_64.rpm+grafana-pcp-5.1.1-9.el8_10.x86_64.rpmb  BsecurityModerate: haproxy security updateW7https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45539CVE-2023-45539CVE-2023-45539https://bugzilla.redhat.com/show_bug.cgi?id=22530372253037https://errata.rockylinux.org/RLSA-2024:8849RLSA-2024:8849RLSA-2024:8849 _haproxy-1.8.27-5.el8_10.1.x86_64.rpm_haproxy-1.8.27-5.el8_10.1.x86_64.rpmbx EBBenhancementgcc-toolset-14 bug fix and enhancement updateP https://errata.rockylinux.org/RLEA-2024:8851RLEA-2024:8851RLEA-2024:8851 Sgcc-toolset-14-14.0-0.el8_10.x86_64.rpm+Sgcc-toolset-14-runtime-14.0-0.el8_10.x86_64.rpmSgcc-toolset-14-14.0-0.el8_10.x86_64.rpm+Sgcc-toolset-14-runtime-14.0-0.el8_10.x86_64.rpmdj Jbugfixgcc-toolset-14-gdb bug fix and enhancement update^D https://errata.rockylinux.org/RLBA-2024:8862RLBA-2024:8862RLBA-2024:8862 gcc-toolset-14-gdb-14.2-3.el8_10.x86_64.rpmgcc-toolset-14-gdb-14.2-3.el8_10.x86_64.rpmdk MBBBbugfixgcc-toolset-14-annobin bug fix and enhancement update" https://errata.rockylinux.org/RLBA-2024:8863RLBA-2024:8863RLBA-2024:8863 ~gcc-toolset-14-annobin-annocheck-12.70-2.el8_10.x86_64.rpmgcc-toolset-14-annobin-docs-12.70-2.el8_10.noarch.rpmgcc-toolset-14-annobin-plugin-gcc-12.70-2.el8_10.x86_64.rpm~gcc-toolset-14-annobin-annocheck-12.70-2.el8_10.x86_64.rpmgcc-toolset-14-annobin-docs-12.70-2.el8_10.noarch.rpmgcc-toolset-14-annobin-plugin-gcc-12.70-2.el8_10.x86_64.rpmdl Sbugfixgcc-toolset-14-dwz bug fix and enhancement update!F https://errata.rockylinux.org/RLBA-2024:8865RLBA-2024:8865RLBA-2024:8865 /gcc-toolset-14-dwz-0.14-0.el8_10.x86_64.rpm/gcc-toolset-14-dwz-0.14-0.el8_10.x86_64.rpmdz VBBBBBBenhancementgcc-toolset-14-binutils bug fix and enhancement updateg/ https://errata.rockylinux.org/RLEA-2024:8869RLEA-2024:8869RLEA-2024:8869 fgcc-toolset-14-binutils-2.41-3.el8_10.x86_64.rpmfgcc-toolset-14-binutils-devel-2.41-3.el8_10.x86_64.rpmfgcc-toolset-14-binutils-gold-2.41-3.el8_10.x86_64.rpmfgcc-toolset-14-binutils-gprofng-2.41-3.el8_10.x86_64.rpmfgcc-toolset-14-binutils-2.41-3.el8_10.x86_64.rpmfgcc-toolset-14-binutils-devel-2.41-3.el8_10.x86_64.rpmfgcc-toolset-14-binutils-gold-2.41-3.el8_10.x86_64.rpmfgcc-toolset-14-binutils-gprofng-2.41-3.el8_10.x86_64.rpmd !_securityImportant: libsoup security updateNhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52530CVE-2024-52530CVE-2024-52530https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52532CVE-2024-52532CVE-2024-52532https://bugzilla.redhat.com/show_bug.cgi?id=23252762325276https://bugzilla.redhat.com/show_bug.cgi?id=23252842325284https://errata.rockylinux.org/RLSA-2024:9573RLSA-2024:9573RLSA-2024:9573 ;tlibsoup-devel-2.62.3-6.el8_10.x86_64.rpm;tlibsoup-devel-2.62.3-6.el8_10.x86_64.rpmw $bsecurityLow: binutils security updated lhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12699CVE-2018-12699CVE-2018-12699https://bugzilla.redhat.com/show_bug.cgi?id=15954271595427https://errata.rockylinux.org/RLSA-2024:9689RLSA-2024:9689RLSA-2024:9689 B[binutils-devel-2.30-125.el8_10.x86_64.rpmB[binutils-devel-2.30-125.el8_10.x86_64.rpmw  )eBBsecurityModerate: gstreamer1-plugins-base security updateShttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4453CVE-2024-4453CVE-2024-4453https://bugzilla.redhat.com/show_bug.cgi?id=22829992282999https://errata.rockylinux.org/RLSA-2024:9056RLSA-2024:9056RLSA-2024:9056  gstreamer1-plugins-base-1.16.1-4.el8_10.x86_64.rpm gstreamer1-plugins-base-devel-1.16.1-4.el8_10.x86_64.rpm gstreamer1-plugins-base-1.16.1-4.el8_10.x86_64.rpm gstreamer1-plugins-base-devel-1.16.1-4.el8_10.x86_64.rpm{m .jBBbugfixleapp bug fix and enhancement updateW% https://errata.rockylinux.org/RLBA-2024:9504RLBA-2024:9504RLBA-2024:9504 2-leapp-0.18.0-1.el8_10.noarch.rpm3-leapp-deps-0.18.0-1.el8_10.noarch.rpm-python3-leapp-0.18.0-1.el8_10.noarch.rpmO-snactor-0.18.0-1.el8_10.noarch.rpm2-leapp-0.18.0-1.el8_10.noarch.rpm3-leapp-deps-0.18.0-1.el8_10.noarch.rpm-python3-leapp-0.18.0-1.el8_10.noarch.rpmO-snactor-0.18.0-1.el8_10.noarch.rpm{{ oBBBBBBBBBBBBBBBBBBBBenhancement.NET 9.0 bug fix and enhancement update|~ https://errata.rockylinux.org/RLEA-2024:9519RLEA-2024:9519RLEA-2024:9519 Oaspnetcore-runtime-9.0-9.0.0-1.el8_10.x86_64.rpmOaspnetcore-targeting-pack-9.0-9.0.0-1.el8_10.x86_64.rpm dotnet-9.0.100-1.el8_10.x86_64.rpmOdotnet-apphost-pack-9.0-9.0.0-1.el8_10.x86_64.rpmOdotnet-host-9.0.0-1.el8_10.x86_64.rpmOdotnet-hostfxr-9.0-9.0.0-1.el8_10.x86_64.rpmOdotnet-runtime-9.0-9.0.0-1.el8_10.x86_64.rpm dotnet-sdk-9.0-9.0.100-1.el8_10.x86_64.rpmOdotnet-targeting-pack-9.0-9.0.0-1.el8_10.x86_64.rpm dotnet-templates-9.0-9.0.100-1.el8_10.x86_64.rpm netstandard-targeting-pack-2.1-9.0.100-1.el8_10.x86_64.rpm Oaspnetcore-runtime-9.0-9.0.0-1.el8_10.x86_64.rpmOaspnetcore-targeting-pack-9.0-9.0.0-1.el8_10.x86_64.rpm dotnet-9.0.100-1.el8_10.x86_64.rpmOdotnet-apphost-pack-9.0-9.0.0-1.el8_10.x86_64.rpmOdotnet-host-9.0.0-1.el8_10.x86_64.rpmOdotnet-hostfxr-9.0-9.0.0-1.el8_10.x86_64.rpmOdotnet-runtime-9.0-9.0.0-1.el8_10.x86_64.rpm dotnet-sdk-9.0-9.0.100-1.el8_10.x86_64.rpmOdotnet-targeting-pack-9.0-9.0.0-1.el8_10.x86_64.rpm dotnet-templates-9.0-9.0.100-1.el8_10.x86_64.rpm netstandard-targeting-pack-2.1-9.0.100-1.el8_10.x86_64.rpm{  FBBBBBBBBBsecurityImportant: tigervnc security updatezdhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9632CVE-2024-9632CVE-2024-9632https://bugzilla.redhat.com/show_bug.cgi?id=23172332317233https://errata.rockylinux.org/RLSA-2024:9540RLSA-2024:9540RLSA-2024:9540 stigervnc-1.13.1-14.el8_10.x86_64.rpmtigervnc-icons-1.13.1-14.el8_10.noarch.rpmtigervnc-license-1.13.1-14.el8_10.noarch.rpm tigervnc-selinux-1.13.1-14.el8_10.noarch.rpmttigervnc-server-1.13.1-14.el8_10.x86_64.rpmutigervnc-server-minimal-1.13.1-14.el8_10.x86_64.rpmvtigervnc-server-module-1.13.1-14.el8_10.x86_64.rpmstigervnc-1.13.1-14.el8_10.x86_64.rpmtigervnc-icons-1.13.1-14.el8_10.noarch.rpmtigervnc-license-1.13.1-14.el8_10.noarch.rpm tigervnc-selinux-1.13.1-14.el8_10.noarch.rpmttigervnc-server-1.13.1-14.el8_10.x86_64.rpmutigervnc-server-minimal-1.13.1-14.el8_10.x86_64.rpmvtigervnc-server-module-1.13.1-14.el8_10.x86_64.rpm{n "RBBBBBBBBBBBBBBbugfix.NET 6.0 bug fix and enhancement update^p https://errata.rockylinux.org/RLBA-2024:9568RLBA-2024:9568RLBA-2024:9568 Z/aspnetcore-runtime-6.0-6.0.36-1.el8_10.x86_64.rpm[/aspnetcore-targeting-pack-6.0-6.0.36-1.el8_10.x86_64.rpm\/dotnet-apphost-pack-6.0-6.0.36-1.el8_10.x86_64.rpm]/dotnet-hostfxr-6.0-6.0.36-1.el8_10.x86_64.rpm^/dotnet-runtime-6.0-6.0.36-1.el8_10.x86_64.rpm_Xdotnet-sdk-6.0-6.0.136-1.el8_10.x86_64.rpm`/dotnet-targeting-pack-6.0-6.0.36-1.el8_10.x86_64.rpmaXdotnet-templates-6.0-6.0.136-1.el8_10.x86_64.rpmZ/aspnetcore-runtime-6.0-6.0.36-1.el8_10.x86_64.rpm[/aspnetcore-targeting-pack-6.0-6.0.36-1.el8_10.x86_64.rpm\/dotnet-apphost-pack-6.0-6.0.36-1.el8_10.x86_64.rpm]/dotnet-hostfxr-6.0-6.0.36-1.el8_10.x86_64.rpm^/dotnet-runtime-6.0-6.0.36-1.el8_10.x86_64.rpm_Xdotnet-sdk-6.0-6.0.136-1.el8_10.x86_64.rpm`/dotnet-targeting-pack-6.0-6.0.36-1.el8_10.x86_64.rpmaXdotnet-templates-6.0-6.0.136-1.el8_10.x86_64.rpm{o 9cBBBBBBBBBBBBBBBBBBBBbugfix.NET 8.0 bug fix and enhancement updateNp https://errata.rockylinux.org/RLBA-2024:9569RLBA-2024:9569RLBA-2024:9569 /aspnetcore-runtime-8.0-8.0.11-1.el8_10.1.x86_64.rpm&aspnetcore-runtime-dbg-8.0-8.0.11-1.el8_10.1.x86_64.rpm0aspnetcore-targeting-pack-8.0-8.0.11-1.el8_10.1.x86_64.rpm1dotnet-apphost-pack-8.0-8.0.11-1.el8_10.1.x86_64.rpm2dotnet-hostfxr-8.0-8.0.11-1.el8_10.1.x86_64.rpm3dotnet-runtime-8.0-8.0.11-1.el8_10.1.x86_64.rpm'dotnet-runtime-dbg-8.0-8.0.11-1.el8_10.1.x86_64.rpm4odotnet-sdk-8.0-8.0.111-1.el8_10.1.x86_64.rpm(odotnet-sdk-dbg-8.0-8.0.111-1.el8_10.1.x86_64.rpm5dotnet-targeting-pack-8.0-8.0.11-1.el8_10.1.x86_64.rpm6odotnet-templates-8.0-8.0.111-1.el8_10.1.x86_64.rpm /aspnetcore-runtime-8.0-8.0.11-1.el8_10.1.x86_64.rpm&aspnetcore-runtime-dbg-8.0-8.0.11-1.el8_10.1.x86_64.rpm0aspnetcore-targeting-pack-8.0-8.0.11-1.el8_10.1.x86_64.rpm1dotnet-apphost-pack-8.0-8.0.11-1.el8_10.1.x86_64.rpm2dotnet-hostfxr-8.0-8.0.11-1.el8_10.1.x86_64.rpm3dotnet-runtime-8.0-8.0.11-1.el8_10.1.x86_64.rpm'dotnet-runtime-dbg-8.0-8.0.11-1.el8_10.1.x86_64.rpm4odotnet-sdk-8.0-8.0.111-1.el8_10.1.x86_64.rpm(odotnet-sdk-dbg-8.0-8.0.111-1.el8_10.1.x86_64.rpm5dotnet-targeting-pack-8.0-8.0.11-1.el8_10.1.x86_64.rpm6odotnet-templates-8.0-8.0.111-1.el8_10.1.x86_64.rpm| zBBBBBBsecurityImportant: webkit2gtk3 security update>chttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271CVE-2024-23271CVE-2024-23271https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820CVE-2024-27820CVE-2024-27820https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27838CVE-2024-27838CVE-2024-27838https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27851CVE-2024-27851CVE-2024-27851https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40779CVE-2024-40779CVE-2024-40779https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40780CVE-2024-40780CVE-2024-40780https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40782CVE-2024-40782CVE-2024-40782https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40789CVE-2024-40789CVE-2024-40789https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40866CVE-2024-40866CVE-2024-40866https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44185CVE-2024-44185CVE-2024-44185https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44187CVE-2024-44187CVE-2024-44187https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44244CVE-2024-44244CVE-2024-44244https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44296CVE-2024-44296CVE-2024-44296https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4558CVE-2024-4558CVE-2024-4558https://bugzilla.redhat.com/show_bug.cgi?id=22796892279689https://bugzilla.redhat.com/show_bug.cgi?id=23020672302067https://bugzilla.redhat.com/show_bug.cgi?id=23020692302069https://bugzilla.redhat.com/show_bug.cgi?id=23020702302070https://bugzilla.redhat.com/show_bug.cgi?id=23020712302071https://bugzilla.redhat.com/show_bug.cgi?id=23127242312724https://bugzilla.redhat.com/show_bug.cgi?id=23146962314696https://bugzilla.redhat.com/show_bug.cgi?id=23146982314698https://bugzilla.redhat.com/show_bug.cgi?id=23147022314702https://bugzilla.redhat.com/show_bug.cgi?id=23147042314704https://bugzilla.redhat.com/show_bug.cgi?id=23147062314706https://bugzilla.redhat.com/show_bug.cgi?id=23232632323263https://bugzilla.redhat.com/show_bug.cgi?id=23232782323278https://bugzilla.redhat.com/show_bug.cgi?id=23232892323289https://errata.rockylinux.org/RLSA-2024:9636RLSA-2024:9636RLSA-2024:9636 yhwebkit2gtk3-2.46.3-1.el8_10.x86_64.rpmzhwebkit2gtk3-devel-2.46.3-1.el8_10.x86_64.rpm{hwebkit2gtk3-jsc-2.46.3-1.el8_10.x86_64.rpm|hwebkit2gtk3-jsc-devel-2.46.3-1.el8_10.x86_64.rpmyhwebkit2gtk3-2.46.3-1.el8_10.x86_64.rpmzhwebkit2gtk3-devel-2.46.3-1.el8_10.x86_64.rpm{hwebkit2gtk3-jsc-2.46.3-1.el8_10.x86_64.rpm|hwebkit2gtk3-jsc-devel-2.46.3-1.el8_10.x86_64.rpm|p CBBBBBBBBbugfixevolution bug fix update! https://errata.rockylinux.org/RLBA-2024:9685RLBA-2024:9685RLBA-2024:9685 Qevolution-3.28.5-27.el8_10.x86_64.rpmQevolution-bogofilter-3.28.5-27.el8_10.x86_64.rpmQevolution-help-3.28.5-27.el8_10.noarch.rpmQevolution-langpacks-3.28.5-27.el8_10.noarch.rpmQevolution-pst-3.28.5-27.el8_10.x86_64.rpmQevolution-spamassassin-3.28.5-27.el8_10.x86_64.rpmQevolution-3.28.5-27.el8_10.x86_64.rpmQevolution-bogofilter-3.28.5-27.el8_10.x86_64.rpmQevolution-help-3.28.5-27.el8_10.noarch.rpmQevolution-langpacks-3.28.5-27.el8_10.noarch.rpmQevolution-pst-3.28.5-27.el8_10.x86_64.rpmQevolution-spamassassin-3.28.5-27.el8_10.x86_64.rpm| NBBBBBBsecurityModerate: python3:3.6.8 security update https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11168CVE-2024-11168CVE-2024-11168https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/show_bug.cgi?id=23214402321440https://bugzilla.redhat.com/show_bug.cgi?id=23257762325776https://errata.rockylinux.org/RLSA-2024:10779RLSA-2024:10779RLSA-2024:10779 platform-python-debug-3.6.8-69.el8_10.rocky.0.x86_64.rpmplatform-python-devel-3.6.8-69.el8_10.rocky.0.x86_64.rpm python3-idle-3.6.8-69.el8_10.rocky.0.x86_64.rpm python3-tkinter-3.6.8-69.el8_10.rocky.0.x86_64.rpmplatform-python-debug-3.6.8-69.el8_10.rocky.0.x86_64.rpmplatform-python-devel-3.6.8-69.el8_10.rocky.0.x86_64.rpm python3-idle-3.6.8-69.el8_10.rocky.0.x86_64.rpm python3-tkinter-3.6.8-69.el8_10.rocky.0.x86_64.rpm&~ Wbugfixsssd bug fix update5J https://errata.rockylinux.org/RLBA-2024:11151RLBA-2024:11151RLBA-2024:11151 rsssd-idp-2.9.4-5.el8_10.1.x86_64.rpmrsssd-idp-2.9.4-5.el8_10.1.x86_64.rpm& Zbugfixsamba bug fix updatex https://errata.rockylinux.org/RLBA-2024:11152RLBA-2024:11152RLBA-2024:11152 (fsamba-vfs-iouring-4.19.4-6.el8_10.x86_64.rpm(fsamba-vfs-iouring-4.19.4-6.el8_10.x86_64.rpm& %]BBBBBBsecurityImportant: webkit2gtk3 security updatewkhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44309CVE-2024-44309CVE-2024-44309https://bugzilla.redhat.com/show_bug.cgi?id=23279272327927https://errata.rockylinux.org/RLSA-2024:10481RLSA-2024:10481RLSA-2024:10481 |iwebkit2gtk3-jsc-devel-2.46.3-2.el8_10.x86_64.rpmyiwebkit2gtk3-2.46.3-2.el8_10.x86_64.rpmziwebkit2gtk3-devel-2.46.3-2.el8_10.x86_64.rpm{iwebkit2gtk3-jsc-2.46.3-2.el8_10.x86_64.rpm|iwebkit2gtk3-jsc-devel-2.46.3-2.el8_10.x86_64.rpmyiwebkit2gtk3-2.46.3-2.el8_10.x86_64.rpmziwebkit2gtk3-devel-2.46.3-2.el8_10.x86_64.rpm{iwebkit2gtk3-jsc-2.46.3-2.el8_10.x86_64.rpm' (fsecurityImportant: thunderbird security updatebxhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11159CVE-2024-11159CVE-2024-11159https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11692CVE-2024-11692CVE-2024-11692https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11694CVE-2024-11694CVE-2024-11694https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11695CVE-2024-11695CVE-2024-11695https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11696CVE-2024-11696CVE-2024-11696https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11697CVE-2024-11697CVE-2024-11697https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11699CVE-2024-11699CVE-2024-11699https://bugzilla.redhat.com/show_bug.cgi?id=23258962325896https://bugzilla.redhat.com/show_bug.cgi?id=23289412328941https://bugzilla.redhat.com/show_bug.cgi?id=23289432328943https://bugzilla.redhat.com/show_bug.cgi?id=23289462328946https://bugzilla.redhat.com/show_bug.cgi?id=23289472328947https://bugzilla.redhat.com/show_bug.cgi?id=23289482328948https://bugzilla.redhat.com/show_bug.cgi?id=23289502328950https://errata.rockylinux.org/RLSA-2024:10591RLSA-2024:10591RLSA-2024:10591 h thunderbird-128.5.0-1.el8_10.x86_64.rpmh thunderbird-128.5.0-1.el8_10.x86_64.rpm' +isecurityImportant: firefox security updateZI https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11692CVE-2024-11692CVE-2024-11692https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11694CVE-2024-11694CVE-2024-11694https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11695CVE-2024-11695CVE-2024-11695https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11696CVE-2024-11696CVE-2024-11696https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11697CVE-2024-11697CVE-2024-11697https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11699CVE-2024-11699CVE-2024-11699https://bugzilla.redhat.com/show_bug.cgi?id=23289412328941https://bugzilla.redhat.com/show_bug.cgi?id=23289432328943https://bugzilla.redhat.com/show_bug.cgi?id=23289462328946https://bugzilla.redhat.com/show_bug.cgi?id=23289472328947https://bugzilla.redhat.com/show_bug.cgi?id=23289482328948https://bugzilla.redhat.com/show_bug.cgi?id=23289502328950https://errata.rockylinux.org/RLSA-2024:10752RLSA-2024:10752RLSA-2024:10752 r firefox-128.5.1-1.el8_10.x86_64.rpmr firefox-128.5.1-1.el8_10.x86_64.rpm'| .lbugfixscap-security-guide bug fix and enhancement update#2 https://errata.rockylinux.org/RLBA-2024:10833RLBA-2024:10833RLBA-2024:10833 A@scap-security-guide-0.1.75-1.el8.rocky.1.3.noarch.rpmB@scap-security-guide-doc-0.1.75-1.el8.rocky.1.3.noarch.rpmA@scap-security-guide-0.1.75-1.el8.rocky.1.3.noarch.rpmB@scap-security-guide-doc-0.1.75-1.el8.rocky.1.3.noarch.rpm)} oBBBBBBBBBBBBBBBBBBBBbugfix.NET 9.0 bugfix updateU https://errata.rockylinux.org/RLBA-2024:10863RLBA-2024:10863RLBA-2024:10863 Pdotnet-apphost-pack-9.0-9.0.0-2.el8_10.x86_64.rpmPaspnetcore-runtime-9.0-9.0.0-2.el8_10.x86_64.rpmPaspnetcore-targeting-pack-9.0-9.0.0-2.el8_10.x86_64.rpm!dotnet-9.0.101-2.el8_10.x86_64.rpmPdotnet-host-9.0.0-2.el8_10.x86_64.rpmPdotnet-hostfxr-9.0-9.0.0-2.el8_10.x86_64.rpmPdotnet-runtime-9.0-9.0.0-2.el8_10.x86_64.rpm!dotnet-sdk-9.0-9.0.101-2.el8_10.x86_64.rpmPdotnet-targeting-pack-9.0-9.0.0-2.el8_10.x86_64.rpm!dotnet-templates-9.0-9.0.101-2.el8_10.x86_64.rpm!netstandard-targeting-pack-2.1-9.0.101-2.el8_10.x86_64.rpm Pdotnet-apphost-pack-9.0-9.0.0-2.el8_10.x86_64.rpmPaspnetcore-runtime-9.0-9.0.0-2.el8_10.x86_64.rpmPaspnetcore-targeting-pack-9.0-9.0.0-2.el8_10.x86_64.rpm!dotnet-9.0.101-2.el8_10.x86_64.rpmPdotnet-host-9.0.0-2.el8_10.x86_64.rpmPdotnet-hostfxr-9.0-9.0.0-2.el8_10.x86_64.rpmPdotnet-runtime-9.0-9.0.0-2.el8_10.x86_64.rpm!dotnet-sdk-9.0-9.0.101-2.el8_10.x86_64.rpmPdotnet-targeting-pack-9.0-9.0.0-2.el8_10.x86_64.rpm!dotnet-templates-9.0-9.0.101-2.el8_10.x86_64.rpm!netstandard-targeting-pack-2.1-9.0.101-2.el8_10.x86_64.rpm* FBBBBBBBsecurityModerate: python3.11 security updateWEhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/show_bug.cgi?id=23214402321440https://errata.rockylinux.org/RLSA-2024:10979RLSA-2024:10979RLSA-2024:10979 !Kpython3.11-3.11.11-1.el8_10.x86_64.rpm"Kpython3.11-devel-3.11.11-1.el8_10.x86_64.rpm#Kpython3.11-libs-3.11.11-1.el8_10.x86_64.rpmIKpython3.11-rpm-macros-3.11.11-1.el8_10.noarch.rpm$Kpython3.11-tkinter-3.11.11-1.el8_10.x86_64.rpm!Kpython3.11-3.11.11-1.el8_10.x86_64.rpm"Kpython3.11-devel-3.11.11-1.el8_10.x86_64.rpm#Kpython3.11-libs-3.11.11-1.el8_10.x86_64.rpmIKpython3.11-rpm-macros-3.11.11-1.el8_10.noarch.rpm$Kpython3.11-tkinter-3.11.11-1.el8_10.x86_64.rpm, PBBBBBBBsecurityImportant: python3.12 security update$https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12254CVE-2024-12254CVE-2024-12254https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/show_bug.cgi?id=23214402321440https://bugzilla.redhat.com/show_bug.cgi?id=23308042330804https://errata.rockylinux.org/RLSA-2024:10980RLSA-2024:10980RLSA-2024:10980 pPpython3.12-3.12.8-1.el8_10.x86_64.rpmqPpython3.12-devel-3.12.8-1.el8_10.x86_64.rpmrPpython3.12-libs-3.12.8-1.el8_10.x86_64.rpm^Ppython3.12-rpm-macros-3.12.8-1.el8_10.noarch.rpmsPpython3.12-tkinter-3.12.8-1.el8_10.x86_64.rpmpPpython3.12-3.12.8-1.el8_10.x86_64.rpmqPpython3.12-devel-3.12.8-1.el8_10.x86_64.rpmrPpython3.12-libs-3.12.8-1.el8_10.x86_64.rpm^Ppython3.12-rpm-macros-3.12.8-1.el8_10.noarch.rpmsPpython3.12-tkinter-3.12.8-1.el8_10.x86_64.rpm, ZBBsecurityImportant: gstreamer1-plugins-good security update@ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47537CVE-2024-47537CVE-2024-47537https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47539CVE-2024-47539CVE-2024-47539https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47540CVE-2024-47540CVE-2024-47540https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47606CVE-2024-47606CVE-2024-47606https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47613CVE-2024-47613CVE-2024-47613https://bugzilla.redhat.com/show_bug.cgi?id=23317192331719https://bugzilla.redhat.com/show_bug.cgi?id=23317222331722https://bugzilla.redhat.com/show_bug.cgi?id=23317262331726https://bugzilla.redhat.com/show_bug.cgi?id=23317532331753https://bugzilla.redhat.com/show_bug.cgi?id=23317602331760https://errata.rockylinux.org/RLSA-2024:11299RLSA-2024:11299RLSA-2024:11299 Kgstreamer1-plugins-good-1.16.1-5.el8_10.x86_64.rpmKgstreamer1-plugins-good-gtk-1.16.1-5.el8_10.x86_64.rpmKgstreamer1-plugins-good-1.16.1-5.el8_10.x86_64.rpmKgstreamer1-plugins-good-gtk-1.16.1-5.el8_10.x86_64.rpm, #_BBsecurityImportant: gstreamer1-plugins-base security update[8https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47538CVE-2024-47538CVE-2024-47538https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47607CVE-2024-47607CVE-2024-47607https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47615CVE-2024-47615CVE-2024-47615https://bugzilla.redhat.com/show_bug.cgi?id=23317272331727https://bugzilla.redhat.com/show_bug.cgi?id=23317402331740https://bugzilla.redhat.com/show_bug.cgi?id=23317542331754https://errata.rockylinux.org/RLSA-2024:11345RLSA-2024:11345RLSA-2024:11345 Kgstreamer1-plugins-base-1.16.1-5.el8_10.x86_64.rpmKgstreamer1-plugins-base-devel-1.16.1-5.el8_10.x86_64.rpmKgstreamer1-plugins-base-1.16.1-5.el8_10.x86_64.rpmKgstreamer1-plugins-base-devel-1.16.1-5.el8_10.x86_64.rpm, 8dBBBBBBBBBBBBBBBBBBbugfixnss bug fix and enhancement update@ https://errata.rockylinux.org/RLBA-2024:11581RLBA-2024:11581RLBA-2024:11581 Y!nss-3.101.0-11.el8_10.x86_64.rpmZ!nss-devel-3.101.0-11.el8_10.x86_64.rpm[!nss-softokn-3.101.0-11.el8_10.x86_64.rpm\!nss-softokn-devel-3.101.0-11.el8_10.x86_64.rpm]!nss-softokn-freebl-3.101.0-11.el8_10.x86_64.rpm^!nss-softokn-freebl-devel-3.101.0-11.el8_10.x86_64.rpm_!nss-sysinit-3.101.0-11.el8_10.x86_64.rpm`!nss-tools-3.101.0-11.el8_10.x86_64.rpma!nss-util-3.101.0-11.el8_10.x86_64.rpmb!nss-util-devel-3.101.0-11.el8_10.x86_64.rpm Y!nss-3.101.0-11.el8_10.x86_64.rpmZ!nss-devel-3.101.0-11.el8_10.x86_64.rpm[!nss-softokn-3.101.0-11.el8_10.x86_64.rpm\!nss-softokn-devel-3.101.0-11.el8_10.x86_64.rpm]!nss-softokn-freebl-3.101.0-11.el8_10.x86_64.rpm^!nss-softokn-freebl-devel-3.101.0-11.el8_10.x86_64.rpm_!nss-sysinit-3.101.0-11.el8_10.x86_64.rpm`!nss-tools-3.101.0-11.el8_10.x86_64.rpma!nss-util-3.101.0-11.el8_10.x86_64.rpmb!nss-util-devel-3.101.0-11.el8_10.x86_64.rpmx yBBBBBBBBBsecurityLow: cups security updateS/lhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47175CVE-2024-47175CVE-2024-47175https://bugzilla.redhat.com/show_bug.cgi?id=23142562314256https://errata.rockylinux.org/RLSA-2025:0083RLSA-2025:0083RLSA-2025:0083  @cups-2.2.6-62.el8_10.x86_64.rpm @cups-client-2.2.6-62.el8_10.x86_64.rpm @cups-devel-2.2.6-62.el8_10.x86_64.rpm@cups-filesystem-2.2.6-62.el8_10.noarch.rpm @cups-ipptool-2.2.6-62.el8_10.x86_64.rpm@cups-lpd-2.2.6-62.el8_10.x86_64.rpm @cups-2.2.6-62.el8_10.x86_64.rpm @cups-client-2.2.6-62.el8_10.x86_64.rpm @cups-devel-2.2.6-62.el8_10.x86_64.rpm@cups-filesystem-2.2.6-62.el8_10.noarch.rpm @cups-ipptool-2.2.6-62.el8_10.x86_64.rpm@cups-lpd-2.2.6-62.el8_10.x86_64.rpm& EsecurityImportant: firefox security updatehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0237CVE-2025-0237CVE-2025-0237https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0238CVE-2025-0238CVE-2025-0238https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0239CVE-2025-0239CVE-2025-0239https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0240CVE-2025-0240CVE-2025-0240https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0241CVE-2025-0241CVE-2025-0241https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0242CVE-2025-0242CVE-2025-0242https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0243CVE-2025-0243CVE-2025-0243https://bugzilla.redhat.com/show_bug.cgi?id=23361652336165https://bugzilla.redhat.com/show_bug.cgi?id=23361682336168https://bugzilla.redhat.com/show_bug.cgi?id=23361702336170https://bugzilla.redhat.com/show_bug.cgi?id=23361752336175https://bugzilla.redhat.com/show_bug.cgi?id=23361812336181https://bugzilla.redhat.com/show_bug.cgi?id=23361822336182https://bugzilla.redhat.com/show_bug.cgi?id=23361882336188https://errata.rockylinux.org/RLSA-2025:0144RLSA-2025:0144RLSA-2025:0144 r firefox-128.6.0-1.el8_10.x86_64.rpmr firefox-128.6.0-1.el8_10.x86_64.rpm& HBBBBBBsecurityImportant: webkit2gtk3 security update] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54479CVE-2024-54479CVE-2024-54479https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54502CVE-2024-54502CVE-2024-54502https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54505CVE-2024-54505CVE-2024-54505https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54508CVE-2024-54508CVE-2024-54508https://bugzilla.redhat.com/show_bug.cgi?id=23338412333841https://bugzilla.redhat.com/show_bug.cgi?id=23338432333843https://bugzilla.redhat.com/show_bug.cgi?id=23338442333844https://bugzilla.redhat.com/show_bug.cgi?id=23338452333845https://errata.rockylinux.org/RLSA-2025:0145RLSA-2025:0145RLSA-2025:0145 yjwebkit2gtk3-2.46.5-1.el8_10.x86_64.rpmzjwebkit2gtk3-devel-2.46.5-1.el8_10.x86_64.rpm{jwebkit2gtk3-jsc-2.46.5-1.el8_10.x86_64.rpm|jwebkit2gtk3-jsc-devel-2.46.5-1.el8_10.x86_64.rpmyjwebkit2gtk3-2.46.5-1.el8_10.x86_64.rpmzjwebkit2gtk3-devel-2.46.5-1.el8_10.x86_64.rpm{jwebkit2gtk3-jsc-2.46.5-1.el8_10.x86_64.rpm|jwebkit2gtk3-jsc-devel-2.46.5-1.el8_10.x86_64.rpm& QsecurityImportant: iperf3 security updatepMhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53580CVE-2024-53580CVE-2024-53580https://bugzilla.redhat.com/show_bug.cgi?id=23331462333146https://errata.rockylinux.org/RLSA-2025:0168RLSA-2025:0168RLSA-2025:0168 #Miperf3-3.5-11.el8_10.x86_64.rpm#Miperf3-3.5-11.el8_10.x86_64.rpm& TBBBsecurityImportant: dpdk security update=Jhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11614CVE-2024-11614CVE-2024-11614https://bugzilla.redhat.com/show_bug.cgi?id=23279552327955https://errata.rockylinux.org/RLSA-2025:0222RLSA-2025:0222RLSA-2025:0222 dpdk-23.11-2.el8_10.x86_64.rpmdpdk-doc-23.11-2.el8_10.noarch.rpmdpdk-tools-23.11-2.el8_10.x86_64.rpmdpdk-23.11-2.el8_10.x86_64.rpmdpdk-doc-23.11-2.el8_10.noarch.rpmdpdk-tools-23.11-2.el8_10.x86_64.rpm& ZsecurityImportant: thunderbird security updatePhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0242CVE-2025-0242CVE-2025-0242https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0243CVE-2025-0243CVE-2025-0243https://bugzilla.redhat.com/show_bug.cgi?id=23361752336175https://bugzilla.redhat.com/show_bug.cgi?id=23361812336181https://errata.rockylinux.org/RLSA-2025:0281RLSA-2025:0281RLSA-2025:0281 h thunderbird-128.6.0-3.el8_10.x86_64.rpmh thunderbird-128.6.0-3.el8_10.x86_64.rpmp ]securityImportant: raptor2 security updateW8https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57823CVE-2024-57823CVE-2024-57823https://bugzilla.redhat.com/show_bug.cgi?id=23369212336921https://errata.rockylinux.org/RLSA-2025:0314RLSA-2025:0314RLSA-2025:0314 >4raptor2-2.0.15-17.el8_10.x86_64.rpm>4raptor2-2.0.15-17.el8_10.x86_64.rpmpJ $`BBsecurityImportant: glibc security updateBhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961CVE-2024-2961CVE-2024-2961https://bugzilla.redhat.com/show_bug.cgi?id=22734042273404https://errata.rockylinux.org/RLSA-2024:3269RLSA-2024:3269RLSA-2024:3269 ~compat-libpthread-nonshared-2.28-251.el8_10.11.x86_64.rpm~glibc-utils-2.28-251.el8_10.11.x86_64.rpm~compat-libpthread-nonshared-2.28-251.el8_10.11.x86_64.rpm~glibc-utils-2.28-251.el8_10.11.x86_64.rpmz 'esecurityImportant: libsoup security updateQhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52531CVE-2024-52531CVE-2024-52531https://bugzilla.redhat.com/show_bug.cgi?id=23252772325277https://errata.rockylinux.org/RLSA-2025:0838RLSA-2025:0838RLSA-2025:0838 ;ulibsoup-devel-2.62.3-7.el8_10.x86_64.rpm;ulibsoup-devel-2.62.3-7.el8_10.x86_64.rpmzu )(bugfixtzdata bug fix and enhancement updateU1 https://errata.rockylinux.org/RLBA-2025:1104RLBA-2025:1104RLBA-2025:1104 > tzdata-java-2025a-1.el8.noarch.rpm> tzdata-java-2025a-1.el8.noarch.rpmz$ jBBBBBBBBBBBBBBBBBBBBsecurityModerate: gcc security updateChttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/show_bug.cgi?id=18500041850004https://errata.rockylinux.org/RLSA-2025:1301RLSA-2025:1301RLSA-2025:1301  cpp-8.5.0-23.el8_10.x86_64.rpmgcc-8.5.0-23.el8_10.x86_64.rpmgcc-c++-8.5.0-23.el8_10.x86_64.rpmgcc-gdb-plugin-8.5.0-23.el8_10.x86_64.rpmgcc-gfortran-8.5.0-23.el8_10.x86_64.rpmgcc-offload-nvptx-8.5.0-23.el8_10.x86_64.rpm gcc-plugin-annobin-8.5.0-23.el8_10.x86_64.rpm8libitm-devel-8.5.0-23.el8_10.x86_64.rpm9libquadmath-devel-8.5.0-23.el8_10.x86_64.rpm<libstdc++-devel-8.5.0-23.el8_10.x86_64.rpm=libstdc++-docs-8.5.0-23.el8_10.x86_64.rpm  cpp-8.5.0-23.el8_10.x86_64.rpmgcc-8.5.0-23.el8_10.x86_64.rpmgcc-c++-8.5.0-23.el8_10.x86_64.rpmgcc-gdb-plugin-8.5.0-23.el8_10.x86_64.rpmgcc-gfortran-8.5.0-23.el8_10.x86_64.rpmgcc-offload-nvptx-8.5.0-23.el8_10.x86_64.rpm gcc-plugin-annobin-8.5.0-23.el8_10.x86_64.rpm8libitm-devel-8.5.0-23.el8_10.x86_64.rpm9libquadmath-devel-8.5.0-23.el8_10.x86_64.rpm<libstdc++-devel-8.5.0-23.el8_10.x86_64.rpm=libstdc++-docs-8.5.0-23.el8_10.x86_64.rpm{ ABBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security updateIPhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21172CVE-2025-21172CVE-2025-21172https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21173CVE-2025-21173CVE-2025-21173https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21176CVE-2025-21176CVE-2025-21176https://bugzilla.redhat.com/show_bug.cgi?id=23378932337893https://bugzilla.redhat.com/show_bug.cgi?id=23379262337926https://bugzilla.redhat.com/show_bug.cgi?id=23379272337927https://errata.rockylinux.org/RLSA-2025:0381RLSA-2025:0381RLSA-2025:0381 /aspnetcore-runtime-8.0-8.0.12-1.el8_10.x86_64.rpm&aspnetcore-runtime-dbg-8.0-8.0.12-1.el8_10.x86_64.rpm0aspnetcore-targeting-pack-8.0-8.0.12-1.el8_10.x86_64.rpm1dotnet-apphost-pack-8.0-8.0.12-1.el8_10.x86_64.rpm2dotnet-hostfxr-8.0-8.0.12-1.el8_10.x86_64.rpm3dotnet-runtime-8.0-8.0.12-1.el8_10.x86_64.rpm'dotnet-runtime-dbg-8.0-8.0.12-1.el8_10.x86_64.rpm4pdotnet-sdk-8.0-8.0.112-1.el8_10.x86_64.rpm(pdotnet-sdk-dbg-8.0-8.0.112-1.el8_10.x86_64.rpm5dotnet-targeting-pack-8.0-8.0.12-1.el8_10.x86_64.rpm6pdotnet-templates-8.0-8.0.112-1.el8_10.x86_64.rpm /aspnetcore-runtime-8.0-8.0.12-1.el8_10.x86_64.rpm&aspnetcore-runtime-dbg-8.0-8.0.12-1.el8_10.x86_64.rpm0aspnetcore-targeting-pack-8.0-8.0.12-1.el8_10.x86_64.rpm1dotnet-apphost-pack-8.0-8.0.12-1.el8_10.x86_64.rpm2dotnet-hostfxr-8.0-8.0.12-1.el8_10.x86_64.rpm3dotnet-runtime-8.0-8.0.12-1.el8_10.x86_64.rpm'dotnet-runtime-dbg-8.0-8.0.12-1.el8_10.x86_64.rpm4pdotnet-sdk-8.0-8.0.112-1.el8_10.x86_64.rpm(pdotnet-sdk-dbg-8.0-8.0.112-1.el8_10.x86_64.rpm5dotnet-targeting-pack-8.0-8.0.12-1.el8_10.x86_64.rpm6pdotnet-templates-8.0-8.0.112-1.el8_10.x86_64.rpm{ .XBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 9.0 security updateV https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21171CVE-2025-21171CVE-2025-21171https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21172CVE-2025-21172CVE-2025-21172https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21173CVE-2025-21173CVE-2025-21173https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21176CVE-2025-21176CVE-2025-21176https://bugzilla.redhat.com/show_bug.cgi?id=23378932337893https://bugzilla.redhat.com/show_bug.cgi?id=23379262337926https://bugzilla.redhat.com/show_bug.cgi?id=23379272337927https://bugzilla.redhat.com/show_bug.cgi?id=23379582337958https://errata.rockylinux.org/RLSA-2025:0382RLSA-2025:0382RLSA-2025:0382 Qaspnetcore-runtime-9.0-9.0.1-1.el8_10.x86_64.rpmQaspnetcore-targeting-pack-9.0-9.0.1-1.el8_10.x86_64.rpm"dotnet-9.0.102-1.el8_10.x86_64.rpmQdotnet-apphost-pack-9.0-9.0.1-1.el8_10.x86_64.rpmQdotnet-host-9.0.1-1.el8_10.x86_64.rpmQdotnet-hostfxr-9.0-9.0.1-1.el8_10.x86_64.rpmQdotnet-runtime-9.0-9.0.1-1.el8_10.x86_64.rpm"dotnet-sdk-9.0-9.0.102-1.el8_10.x86_64.rpmQdotnet-targeting-pack-9.0-9.0.1-1.el8_10.x86_64.rpm"dotnet-templates-9.0-9.0.102-1.el8_10.x86_64.rpm"netstandard-targeting-pack-2.1-9.0.102-1.el8_10.x86_64.rpm Qaspnetcore-runtime-9.0-9.0.1-1.el8_10.x86_64.rpmQaspnetcore-targeting-pack-9.0-9.0.1-1.el8_10.x86_64.rpm"dotnet-9.0.102-1.el8_10.x86_64.rpmQdotnet-apphost-pack-9.0-9.0.1-1.el8_10.x86_64.rpmQdotnet-host-9.0.1-1.el8_10.x86_64.rpmQdotnet-hostfxr-9.0-9.0.1-1.el8_10.x86_64.rpmQdotnet-runtime-9.0-9.0.1-1.el8_10.x86_64.rpm"dotnet-sdk-9.0-9.0.102-1.el8_10.x86_64.rpmQdotnet-targeting-pack-9.0-9.0.1-1.el8_10.x86_64.rpm"dotnet-templates-9.0-9.0.102-1.el8_10.x86_64.rpm"netstandard-targeting-pack-2.1-9.0.102-1.el8_10.x86_64.rpm{ 3oBBsecurityImportant: grafana security updateoihttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21613CVE-2025-21613CVE-2025-21613https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21614CVE-2025-21614CVE-2025-21614https://bugzilla.redhat.com/show_bug.cgi?id=23358882335888https://bugzilla.redhat.com/show_bug.cgi?id=23359012335901https://errata.rockylinux.org/RLSA-2025:0401RLSA-2025:0401RLSA-2025:0401 *jgrafana-9.2.10-21.el8_10.x86_64.rpm,jgrafana-selinux-9.2.10-21.el8_10.x86_64.rpm*jgrafana-9.2.10-21.el8_10.x86_64.rpm,jgrafana-selinux-9.2.10-21.el8_10.x86_64.rpm{ tBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update for Rocky Linux 8.10, 9.4 and 9.5X{https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21502CVE-2025-21502CVE-2025-21502https://errata.rockylinux.org/RLSA-2025:0426RLSA-2025:0426RLSA-2025:0426 -Rjava-21-openjdk-21.0.6.0.7-1.el8.x86_64.rpm.Rjava-21-openjdk-demo-21.0.6.0.7-1.el8.x86_64.rpm/Rjava-21-openjdk-devel-21.0.6.0.7-1.el8.x86_64.rpm0Rjava-21-openjdk-headless-21.0.6.0.7-1.el8.x86_64.rpm1Rjava-21-openjdk-javadoc-21.0.6.0.7-1.el8.x86_64.rpm2Rjava-21-openjdk-javadoc-zip-21.0.6.0.7-1.el8.x86_64.rpm3Rjava-21-openjdk-jmods-21.0.6.0.7-1.el8.x86_64.rpm4Rjava-21-openjdk-src-21.0.6.0.7-1.el8.x86_64.rpm5Rjava-21-openjdk-static-libs-21.0.6.0.7-1.el8.x86_64.rpm -Rjava-21-openjdk-21.0.6.0.7-1.el8.x86_64.rpm.Rjava-21-openjdk-demo-21.0.6.0.7-1.el8.x86_64.rpm/Rjava-21-openjdk-devel-21.0.6.0.7-1.el8.x86_64.rpm0Rjava-21-openjdk-headless-21.0.6.0.7-1.el8.x86_64.rpm1Rjava-21-openjdk-javadoc-21.0.6.0.7-1.el8.x86_64.rpm2Rjava-21-openjdk-javadoc-zip-21.0.6.0.7-1.el8.x86_64.rpm3Rjava-21-openjdk-jmods-21.0.6.0.7-1.el8.x86_64.rpm4Rjava-21-openjdk-src-21.0.6.0.7-1.el8.x86_64.rpm5Rjava-21-openjdk-static-libs-21.0.6.0.7-1.el8.x86_64.rpm{ securityImportant: python-jinja2 security updateSOhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56326CVE-2024-56326CVE-2024-56326https://bugzilla.redhat.com/show_bug.cgi?id=23338562333856https://errata.rockylinux.org/RLSA-2025:0711RLSA-2025:0711RLSA-2025:0711 GXpython3-jinja2-2.10.1-6.el8_10.noarch.rpmGXpython3-jinja2-2.10.1-6.el8_10.noarch.rpm{| enhancementmysql-selinux bug fix and enhancement update" https://errata.rockylinux.org/RLEA-2025:0738RLEA-2025:0738RLEA-2025:0738 k"mysql-selinux-1.0.13-1.el8_10.noarch.rpmk"mysql-selinux-1.0.13-1.el8_10.noarch.rpm|q KBBBBbugfixmotif bug fix update5 https://errata.rockylinux.org/RLBA-2025:0740RLBA-2025:0740RLBA-2025:0740 fUmotif-2.3.4-21.el8_10.x86_64.rpmgUmotif-devel-2.3.4-21.el8_10.x86_64.rpmhUmotif-static-2.3.4-21.el8_10.x86_64.rpmfUmotif-2.3.4-21.el8_10.x86_64.rpmgUmotif-devel-2.3.4-21.el8_10.x86_64.rpmhUmotif-static-2.3.4-21.el8_10.x86_64.rpm|r Rbugfixmutter bug fix updateF  https://errata.rockylinux.org/RLBA-2025:0742RLBA-2025:0742RLBA-2025:0742 ?mutter-3.32.2-73.el8_10.x86_64.rpm?mutter-3.32.2-73.el8_10.x86_64.rpm| UsecurityModerate: keepalived security updatefMhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41184CVE-2024-41184CVE-2024-41184https://bugzilla.redhat.com/show_bug.cgi?id=22985322298532https://errata.rockylinux.org/RLSA-2025:0743RLSA-2025:0743RLSA-2025:0743 1@keepalived-2.1.5-10.el8_10.x86_64.rpm1@keepalived-2.1.5-10.el8_10.x86_64.rpm|s Xbugfixjasper bug fix update3K https://errata.rockylinux.org/RLBA-2025:0744RLBA-2025:0744RLBA-2025:0744 02jasper-libs-2.0.14-6.el8_10.x86_64.rpm02jasper-libs-2.0.14-6.el8_10.x86_64.rpm|t 7[BBBBBBBBBBBBBBBBBBBBBBBBBBbugfixgnome-shell-extensions bug fix update~? https://errata.rockylinux.org/RLBA-2025:0745RLBA-2025:0745RLBA-2025:0745 7gnome-classic-session-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-apps-menu-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-auto-move-windows-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-classification-banner-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-common-3.32.1-40.el8_10.noarch.rpm 7gnome-shell-extension-custom-menu-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-dash-to-dock-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-dash-to-panel-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-desktop-icons-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-disable-screenshield-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-drive-menu-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-gesture-inhibitor-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-heads-up-display-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-horizontal-workspaces-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-launch-new-instance-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-native-window-placement-3.32.1-40.el8_10.noarch.rpm 7gnome-shell-extension-no-hot-corner-3.32.1-40.el8_10.noarch.rpm!7gnome-shell-extension-panel-favorites-3.32.1-40.el8_10.noarch.rpm"7gnome-shell-extension-places-menu-3.32.1-40.el8_10.noarch.rpm#7gnome-shell-extension-screenshot-window-sizer-3.32.1-40.el8_10.noarch.rpm$7gnome-shell-extension-systemMonitor-3.32.1-40.el8_10.noarch.rpm%7gnome-shell-extension-top-icons-3.32.1-40.el8_10.noarch.rpm&7gnome-shell-extension-updates-dialog-3.32.1-40.el8_10.noarch.rpm'7gnome-shell-extension-user-theme-3.32.1-40.el8_10.noarch.rpm(7gnome-shell-extension-window-grouper-3.32.1-40.el8_10.noarch.rpm)7gnome-shell-extension-window-list-3.32.1-40.el8_10.noarch.rpm*7gnome-shell-extension-windowsNavigator-3.32.1-40.el8_10.noarch.rpm+7gnome-shell-extension-workspace-indicator-3.32.1-40.el8_10.noarch.rpm7gnome-classic-session-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-apps-menu-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-auto-move-windows-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-classification-banner-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-common-3.32.1-40.el8_10.noarch.rpm 7gnome-shell-extension-custom-menu-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-dash-to-dock-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-dash-to-panel-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-desktop-icons-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-disable-screenshield-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-drive-menu-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-gesture-inhibitor-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-heads-up-display-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-horizontal-workspaces-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-launch-new-instance-3.32.1-40.el8_10.noarch.rpm7gnome-shell-extension-native-window-placement-3.32.1-40.el8_10.noarch.rpm 7gnome-shell-extension-no-hot-corner-3.32.1-40.el8_10.noarch.rpm!7gnome-shell-extension-panel-favorites-3.32.1-40.el8_10.noarch.rpm"7gnome-shell-extension-places-menu-3.32.1-40.el8_10.noarch.rpm#7gnome-shell-extension-screenshot-window-sizer-3.32.1-40.el8_10.noarch.rpm$7gnome-shell-extension-systemMonitor-3.32.1-40.el8_10.noarch.rpm%7gnome-shell-extension-top-icons-3.32.1-40.el8_10.noarch.rpm&7gnome-shell-extension-updates-dialog-3.32.1-40.el8_10.noarch.rpm'7gnome-shell-extension-user-theme-3.32.1-40.el8_10.noarch.rpm(7gnome-shell-extension-window-grouper-3.32.1-40.el8_10.noarch.rpm)7gnome-shell-extension-window-list-3.32.1-40.el8_10.noarch.rpm*7gnome-shell-extension-windowsNavigator-3.32.1-40.el8_10.noarch.rpm+7gnome-shell-extension-workspace-indicator-3.32.1-40.el8_10.noarch.rpm| xBBBBBBsecurityImportant: unbound security update=zhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1488CVE-2024-1488CVE-2024-1488https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8508CVE-2024-8508CVE-2024-8508https://bugzilla.redhat.com/show_bug.cgi?id=22641832264183https://bugzilla.redhat.com/show_bug.cgi?id=23163212316321https://errata.rockylinux.org/RLSA-2025:0837RLSA-2025:0837RLSA-2025:0837 oMpython3-unbound-1.16.2-5.8.el8_10.x86_64.rpmMunbound-1.16.2-5.8.el8_10.x86_64.rpmMunbound-devel-1.16.2-5.8.el8_10.x86_64.rpmMunbound-libs-1.16.2-5.8.el8_10.x86_64.rpmoMpython3-unbound-1.16.2-5.8.el8_10.x86_64.rpmMunbound-1.16.2-5.8.el8_10.x86_64.rpmMunbound-devel-1.16.2-5.8.el8_10.x86_64.rpmMunbound-libs-1.16.2-5.8.el8_10.x86_64.rpm}  AsecurityImportant: git-lfs security update7khttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53263CVE-2024-53263CVE-2024-53263https://bugzilla.redhat.com/show_bug.cgi?id=23380022338002https://errata.rockylinux.org/RLSA-2025:0845RLSA-2025:0845RLSA-2025:0845  Igit-lfs-3.4.1-4.el8_10.x86_64.rpm Igit-lfs-3.4.1-4.el8_10.x86_64.rpm}! DBBBBBBsecurityModerate: tbb security update"Yhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/show_bug.cgi?id=18500041850004https://errata.rockylinux.org/RLSA-2025:1215RLSA-2025:1215RLSA-2025:1215 lppython3-tbb-2018.2-10.el8_10.1.x86_64.rpmptbb-2018.2-10.el8_10.1.x86_64.rpmptbb-devel-2018.2-10.el8_10.1.x86_64.rpmptbb-doc-2018.2-10.el8_10.1.x86_64.rpmlppython3-tbb-2018.2-10.el8_10.1.x86_64.rpmptbb-2018.2-10.el8_10.1.x86_64.rpmptbb-devel-2018.2-10.el8_10.1.x86_64.rpmptbb-doc-2018.2-10.el8_10.1.x86_64.rpm}" MsecurityImportant: firefox security update{https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1009CVE-2025-1009CVE-2025-1009https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1010CVE-2025-1010CVE-2025-1010https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1011CVE-2025-1011CVE-2025-1011https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1012CVE-2025-1012CVE-2025-1012https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1013CVE-2025-1013CVE-2025-1013https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1014CVE-2025-1014CVE-2025-1014https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1016CVE-2025-1016CVE-2025-1016https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1017CVE-2025-1017CVE-2025-1017https://bugzilla.redhat.com/show_bug.cgi?id=23437482343748https://bugzilla.redhat.com/show_bug.cgi?id=23437502343750https://bugzilla.redhat.com/show_bug.cgi?id=23437522343752https://bugzilla.redhat.com/show_bug.cgi?id=23437542343754https://bugzilla.redhat.com/show_bug.cgi?id=23437562343756https://bugzilla.redhat.com/show_bug.cgi?id=23437602343760https://bugzilla.redhat.com/show_bug.cgi?id=23437642343764https://bugzilla.redhat.com/show_bug.cgi?id=23437652343765https://errata.rockylinux.org/RLSA-2025:1283RLSA-2025:1283RLSA-2025:1283 rOfirefox-128.7.0-1.el8_10.x86_64.rpmrOfirefox-128.7.0-1.el8_10.x86_64.rpm}# PsecurityImportant: thunderbird security update zhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0510CVE-2025-0510CVE-2025-0510https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1009CVE-2025-1009CVE-2025-1009https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1010CVE-2025-1010CVE-2025-1010https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1011CVE-2025-1011CVE-2025-1011https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1012CVE-2025-1012CVE-2025-1012https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1013CVE-2025-1013CVE-2025-1013https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1014CVE-2025-1014CVE-2025-1014https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1015CVE-2025-1015CVE-2025-1015https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1016CVE-2025-1016CVE-2025-1016https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1017CVE-2025-1017CVE-2025-1017https://bugzilla.redhat.com/show_bug.cgi?id=23437482343748https://bugzilla.redhat.com/show_bug.cgi?id=23437502343750https://bugzilla.redhat.com/show_bug.cgi?id=23437522343752https://bugzilla.redhat.com/show_bug.cgi?id=23437542343754https://bugzilla.redhat.com/show_bug.cgi?id=23437562343756https://bugzilla.redhat.com/show_bug.cgi?id=23437592343759https://bugzilla.redhat.com/show_bug.cgi?id=23437602343760https://bugzilla.redhat.com/show_bug.cgi?id=23437622343762https://bugzilla.redhat.com/show_bug.cgi?id=23437642343764https://bugzilla.redhat.com/show_bug.cgi?id=23437652343765https://errata.rockylinux.org/RLSA-2025:1292RLSA-2025:1292RLSA-2025:1292 hOthunderbird-128.7.0-1.el8_10.x86_64.rpmhOthunderbird-128.7.0-1.el8_10.x86_64.rpm}% 5SBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: gcc-toolset-13-gcc security updatehttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/show_bug.cgi?id=18500041850004https://errata.rockylinux.org/RLSA-2025:1306RLSA-2025:1306RLSA-2025:1306 mNgcc-toolset-13-gcc-13.3.1-2.2.el8_10.x86_64.rpmnNgcc-toolset-13-gcc-c++-13.3.1-2.2.el8_10.x86_64.rpmoNgcc-toolset-13-gcc-gfortran-13.3.1-2.2.el8_10.x86_64.rpmpNgcc-toolset-13-gcc-plugin-annobin-13.3.1-2.2.el8_10.x86_64.rpmqNgcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el8_10.x86_64.rpmrNgcc-toolset-13-libasan-devel-13.3.1-2.2.el8_10.x86_64.rpmsNgcc-toolset-13-libatomic-devel-13.3.1-2.2.el8_10.x86_64.rpmtNgcc-toolset-13-libgccjit-13.3.1-2.2.el8_10.x86_64.rpmuNgcc-toolset-13-libgccjit-devel-13.3.1-2.2.el8_10.x86_64.rpmvNgcc-toolset-13-libitm-devel-13.3.1-2.2.el8_10.x86_64.rpmwNgcc-toolset-13-liblsan-devel-13.3.1-2.2.el8_10.x86_64.rpmxNgcc-toolset-13-libquadmath-devel-13.3.1-2.2.el8_10.x86_64.rpmyNgcc-toolset-13-libstdc++-devel-13.3.1-2.2.el8_10.x86_64.rpmzNgcc-toolset-13-libstdc++-docs-13.3.1-2.2.el8_10.x86_64.rpm{Ngcc-toolset-13-libtsan-devel-13.3.1-2.2.el8_10.x86_64.rpm|Ngcc-toolset-13-libubsan-devel-13.3.1-2.2.el8_10.x86_64.rpm}Ngcc-toolset-13-offload-nvptx-13.3.1-2.2.el8_10.x86_64.rpmmNgcc-toolset-13-gcc-13.3.1-2.2.el8_10.x86_64.rpmnNgcc-toolset-13-gcc-c++-13.3.1-2.2.el8_10.x86_64.rpmoNgcc-toolset-13-gcc-gfortran-13.3.1-2.2.el8_10.x86_64.rpmpNgcc-toolset-13-gcc-plugin-annobin-13.3.1-2.2.el8_10.x86_64.rpmqNgcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el8_10.x86_64.rpmrNgcc-toolset-13-libasan-devel-13.3.1-2.2.el8_10.x86_64.rpmsNgcc-toolset-13-libatomic-devel-13.3.1-2.2.el8_10.x86_64.rpmtNgcc-toolset-13-libgccjit-13.3.1-2.2.el8_10.x86_64.rpmuNgcc-toolset-13-libgccjit-devel-13.3.1-2.2.el8_10.x86_64.rpmvNgcc-toolset-13-libitm-devel-13.3.1-2.2.el8_10.x86_64.rpmwNgcc-toolset-13-liblsan-devel-13.3.1-2.2.el8_10.x86_64.rpmxNgcc-toolset-13-libquadmath-devel-13.3.1-2.2.el8_10.x86_64.rpmyNgcc-toolset-13-libstdc++-devel-13.3.1-2.2.el8_10.x86_64.rpmzNgcc-toolset-13-libstdc++-docs-13.3.1-2.2.el8_10.x86_64.rpm{Ngcc-toolset-13-libtsan-devel-13.3.1-2.2.el8_10.x86_64.rpm|Ngcc-toolset-13-libubsan-devel-13.3.1-2.2.el8_10.x86_64.rpm}Ngcc-toolset-13-offload-nvptx-13.3.1-2.2.el8_10.x86_64.rpm}v vBBBBBBBBBBBBBBBBBBBBbugfix.NET 9.0 bug fix and enhancement update https://errata.rockylinux.org/RLBA-2025:1336RLBA-2025:1336RLBA-2025:1336 Raspnetcore-runtime-9.0-9.0.2-1.el8_10.x86_64.rpmRaspnetcore-targeting-pack-9.0-9.0.2-1.el8_10.x86_64.rpm#dotnet-9.0.103-1.el8_10.x86_64.rpmRdotnet-apphost-pack-9.0-9.0.2-1.el8_10.x86_64.rpmRdotnet-host-9.0.2-1.el8_10.x86_64.rpmRdotnet-hostfxr-9.0-9.0.2-1.el8_10.x86_64.rpmRdotnet-runtime-9.0-9.0.2-1.el8_10.x86_64.rpm#dotnet-sdk-9.0-9.0.103-1.el8_10.x86_64.rpmRdotnet-targeting-pack-9.0-9.0.2-1.el8_10.x86_64.rpm#dotnet-templates-9.0-9.0.103-1.el8_10.x86_64.rpm#netstandard-targeting-pack-2.1-9.0.103-1.el8_10.x86_64.rpm Raspnetcore-runtime-9.0-9.0.2-1.el8_10.x86_64.rpmRaspnetcore-targeting-pack-9.0-9.0.2-1.el8_10.x86_64.rpm#dotnet-9.0.103-1.el8_10.x86_64.rpmRdotnet-apphost-pack-9.0-9.0.2-1.el8_10.x86_64.rpmRdotnet-host-9.0.2-1.el8_10.x86_64.rpmRdotnet-hostfxr-9.0-9.0.2-1.el8_10.x86_64.rpmRdotnet-runtime-9.0-9.0.2-1.el8_10.x86_64.rpm#dotnet-sdk-9.0-9.0.103-1.el8_10.x86_64.rpmRdotnet-targeting-pack-9.0-9.0.2-1.el8_10.x86_64.rpm#dotnet-templates-9.0-9.0.103-1.el8_10.x86_64.rpm#netstandard-targeting-pack-2.1-9.0.103-1.el8_10.x86_64.rpm}} MBBBenhancementgcc-toolset-14-annobin bug fix and enhancement update https://errata.rockylinux.org/RLEA-2025:1337RLEA-2025:1337RLEA-2025:1337 ~ gcc-toolset-14-annobin-annocheck-12.88-1.el8_10.x86_64.rpm gcc-toolset-14-annobin-docs-12.88-1.el8_10.noarch.rpm gcc-toolset-14-annobin-plugin-gcc-12.88-1.el8_10.x86_64.rpm~ gcc-toolset-14-annobin-annocheck-12.88-1.el8_10.x86_64.rpm gcc-toolset-14-annobin-docs-12.88-1.el8_10.noarch.rpm gcc-toolset-14-annobin-plugin-gcc-12.88-1.el8_10.x86_64.rpm}& 9SBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: gcc-toolset-14-gcc security update*https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/show_bug.cgi?id=18500041850004https://errata.rockylinux.org/RLSA-2025:1338RLSA-2025:1338RLSA-2025:1338 Ggcc-toolset-14-gcc-14.2.1-7.1.el8_10.x86_64.rpmGgcc-toolset-14-gcc-c++-14.2.1-7.1.el8_10.x86_64.rpmGgcc-toolset-14-gcc-gfortran-14.2.1-7.1.el8_10.x86_64.rpmGgcc-toolset-14-gcc-plugin-annobin-14.2.1-7.1.el8_10.x86_64.rpmGgcc-toolset-14-gcc-plugin-devel-14.2.1-7.1.el8_10.x86_64.rpmGgcc-toolset-14-libasan-devel-14.2.1-7.1.el8_10.x86_64.rpm Ggcc-toolset-14-libatomic-devel-14.2.1-7.1.el8_10.x86_64.rpm!Ggcc-toolset-14-libgccjit-14.2.1-7.1.el8_10.x86_64.rpm"Ggcc-toolset-14-libgccjit-devel-14.2.1-7.1.el8_10.x86_64.rpm#Ggcc-toolset-14-libitm-devel-14.2.1-7.1.el8_10.x86_64.rpm$Ggcc-toolset-14-liblsan-devel-14.2.1-7.1.el8_10.x86_64.rpm%Ggcc-toolset-14-libquadmath-devel-14.2.1-7.1.el8_10.x86_64.rpm&Ggcc-toolset-14-libstdc++-devel-14.2.1-7.1.el8_10.x86_64.rpm'Ggcc-toolset-14-libstdc++-docs-14.2.1-7.1.el8_10.x86_64.rpm(Ggcc-toolset-14-libtsan-devel-14.2.1-7.1.el8_10.x86_64.rpm)Ggcc-toolset-14-libubsan-devel-14.2.1-7.1.el8_10.x86_64.rpm*Ggcc-toolset-14-offload-nvptx-14.2.1-7.1.el8_10.x86_64.rpm7Glibasan8-14.2.1-7.1.el8_10.x86_64.rpm>Glibtsan2-14.2.1-7.1.el8_10.x86_64.rpmGgcc-toolset-14-gcc-14.2.1-7.1.el8_10.x86_64.rpmGgcc-toolset-14-gcc-c++-14.2.1-7.1.el8_10.x86_64.rpmGgcc-toolset-14-gcc-gfortran-14.2.1-7.1.el8_10.x86_64.rpmGgcc-toolset-14-gcc-plugin-annobin-14.2.1-7.1.el8_10.x86_64.rpmGgcc-toolset-14-gcc-plugin-devel-14.2.1-7.1.el8_10.x86_64.rpmGgcc-toolset-14-libasan-devel-14.2.1-7.1.el8_10.x86_64.rpm Ggcc-toolset-14-libatomic-devel-14.2.1-7.1.el8_10.x86_64.rpm!Ggcc-toolset-14-libgccjit-14.2.1-7.1.el8_10.x86_64.rpm"Ggcc-toolset-14-libgccjit-devel-14.2.1-7.1.el8_10.x86_64.rpm#Ggcc-toolset-14-libitm-devel-14.2.1-7.1.el8_10.x86_64.rpm$Ggcc-toolset-14-liblsan-devel-14.2.1-7.1.el8_10.x86_64.rpm%Ggcc-toolset-14-libquadmath-devel-14.2.1-7.1.el8_10.x86_64.rpm&Ggcc-toolset-14-libstdc++-devel-14.2.1-7.1.el8_10.x86_64.rpm'Ggcc-toolset-14-libstdc++-docs-14.2.1-7.1.el8_10.x86_64.rpm(Ggcc-toolset-14-libtsan-devel-14.2.1-7.1.el8_10.x86_64.rpm)Ggcc-toolset-14-libubsan-devel-14.2.1-7.1.el8_10.x86_64.rpm*Ggcc-toolset-14-offload-nvptx-14.2.1-7.1.el8_10.x86_64.rpm7Glibasan8-14.2.1-7.1.el8_10.x86_64.rpm>Glibtsan2-14.2.1-7.1.el8_10.x86_64.rpm}w zBBBBBBBBBBBBBBBBBBBBbugfix.NET 8.0 bug fix and enhancement update< https://errata.rockylinux.org/RLBA-2025:1344RLBA-2025:1344RLBA-2025:1344 /aspnetcore-runtime-8.0-8.0.13-1.el8_10.x86_64.rpm&aspnetcore-runtime-dbg-8.0-8.0.13-1.el8_10.x86_64.rpm0aspnetcore-targeting-pack-8.0-8.0.13-1.el8_10.x86_64.rpm1dotnet-apphost-pack-8.0-8.0.13-1.el8_10.x86_64.rpm2dotnet-hostfxr-8.0-8.0.13-1.el8_10.x86_64.rpm3dotnet-runtime-8.0-8.0.13-1.el8_10.x86_64.rpm'dotnet-runtime-dbg-8.0-8.0.13-1.el8_10.x86_64.rpm4qdotnet-sdk-8.0-8.0.113-1.el8_10.x86_64.rpm(qdotnet-sdk-dbg-8.0-8.0.113-1.el8_10.x86_64.rpm5dotnet-targeting-pack-8.0-8.0.13-1.el8_10.x86_64.rpm6qdotnet-templates-8.0-8.0.113-1.el8_10.x86_64.rpm /aspnetcore-runtime-8.0-8.0.13-1.el8_10.x86_64.rpm&aspnetcore-runtime-dbg-8.0-8.0.13-1.el8_10.x86_64.rpm0aspnetcore-targeting-pack-8.0-8.0.13-1.el8_10.x86_64.rpm1dotnet-apphost-pack-8.0-8.0.13-1.el8_10.x86_64.rpm2dotnet-hostfxr-8.0-8.0.13-1.el8_10.x86_64.rpm3dotnet-runtime-8.0-8.0.13-1.el8_10.x86_64.rpm'dotnet-runtime-dbg-8.0-8.0.13-1.el8_10.x86_64.rpm4qdotnet-sdk-8.0-8.0.113-1.el8_10.x86_64.rpm(qdotnet-sdk-dbg-8.0-8.0.113-1.el8_10.x86_64.rpm5dotnet-targeting-pack-8.0-8.0.13-1.el8_10.x86_64.rpm6qdotnet-templates-8.0-8.0.113-1.el8_10.x86_64.rpm}' QsecurityModerate: libxml2 security updateBvhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49043CVE-2022-49043CVE-2022-49043https://bugzilla.redhat.com/show_bug.cgi?id=23421182342118https://errata.rockylinux.org/RLSA-2025:1517RLSA-2025:1517RLSA-2025:1517 .libxml2-devel-2.9.7-18.el8_10.2.x86_64.rpm.libxml2-devel-2.9.7-18.el8_10.2.x86_64.rpm,x TBBbugfixglibc bug fix update8~ https://errata.rockylinux.org/RLBA-2025:1573RLBA-2025:1573RLBA-2025:1573 compat-libpthread-nonshared-2.28-251.el8_10.13.x86_64.rpmglibc-utils-2.28-251.el8_10.13.x86_64.rpmcompat-libpthread-nonshared-2.28-251.el8_10.13.x86_64.rpmglibc-utils-2.28-251.el8_10.13.x86_64.rpm-( 5YBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: bind security update6Phttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11187CVE-2024-11187CVE-2024-11187https://bugzilla.redhat.com/show_bug.cgi?id=23428792342879https://errata.rockylinux.org/RLSA-2025:1675RLSA-2025:1675RLSA-2025:1675 e\bind-9.11.36-16.el8_10.4.x86_64.rpmf\bind-chroot-9.11.36-16.el8_10.4.x86_64.rpmg\bind-devel-9.11.36-16.el8_10.4.x86_64.rpmh\bind-libs-9.11.36-16.el8_10.4.x86_64.rpmi\bind-libs-lite-9.11.36-16.el8_10.4.x86_64.rpm&\bind-license-9.11.36-16.el8_10.4.noarch.rpmj\bind-lite-devel-9.11.36-16.el8_10.4.x86_64.rpmk\bind-pkcs11-9.11.36-16.el8_10.4.x86_64.rpml\bind-pkcs11-devel-9.11.36-16.el8_10.4.x86_64.rpmm\bind-pkcs11-libs-9.11.36-16.el8_10.4.x86_64.rpmn\bind-pkcs11-utils-9.11.36-16.el8_10.4.x86_64.rpmo\bind-sdb-9.11.36-16.el8_10.4.x86_64.rpmp\bind-sdb-chroot-9.11.36-16.el8_10.4.x86_64.rpmq\bind-utils-9.11.36-16.el8_10.4.x86_64.rpm4\python3-bind-9.11.36-16.el8_10.4.noarch.rpme\bind-9.11.36-16.el8_10.4.x86_64.rpmf\bind-chroot-9.11.36-16.el8_10.4.x86_64.rpmg\bind-devel-9.11.36-16.el8_10.4.x86_64.rpmh\bind-libs-9.11.36-16.el8_10.4.x86_64.rpmi\bind-libs-lite-9.11.36-16.el8_10.4.x86_64.rpm&\bind-license-9.11.36-16.el8_10.4.noarch.rpmj\bind-lite-devel-9.11.36-16.el8_10.4.x86_64.rpmk\bind-pkcs11-9.11.36-16.el8_10.4.x86_64.rpml\bind-pkcs11-devel-9.11.36-16.el8_10.4.x86_64.rpmm\bind-pkcs11-libs-9.11.36-16.el8_10.4.x86_64.rpmn\bind-pkcs11-utils-9.11.36-16.el8_10.4.x86_64.rpmo\bind-sdb-9.11.36-16.el8_10.4.x86_64.rpmp\bind-sdb-chroot-9.11.36-16.el8_10.4.x86_64.rpmq\bind-utils-9.11.36-16.el8_10.4.x86_64.rpm4\python3-bind-9.11.36-16.el8_10.4.noarch.rpm-) vBBBBBBBBBBsecurityImportant: bind9.16 security updatePhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11187CVE-2024-11187CVE-2024-11187https://bugzilla.redhat.com/show_bug.cgi?id=23428792342879https://errata.rockylinux.org/RLSA-2025:1676RLSA-2025:1676RLSA-2025:1676 obind9.16-9.16.23-0.22.el8_10.2.x86_64.rpmobind9.16-chroot-9.16.23-0.22.el8_10.2.x86_64.rpmqobind9.16-dnssec-utils-9.16.23-0.22.el8_10.2.x86_64.rpmobind9.16-libs-9.16.23-0.22.el8_10.2.x86_64.rpm|obind9.16-license-9.16.23-0.22.el8_10.2.noarch.rpmobind9.16-utils-9.16.23-0.22.el8_10.2.x86_64.rpmXopython3-bind9.16-9.16.23-0.22.el8_10.2.noarch.rpmobind9.16-9.16.23-0.22.el8_10.2.x86_64.rpmobind9.16-chroot-9.16.23-0.22.el8_10.2.x86_64.rpmqobind9.16-dnssec-utils-9.16.23-0.22.el8_10.2.x86_64.rpmobind9.16-libs-9.16.23-0.22.el8_10.2.x86_64.rpm|obind9.16-license-9.16.23-0.22.el8_10.2.noarch.rpmobind9.16-utils-9.16.23-0.22.el8_10.2.x86_64.rpmXopython3-bind9.16-9.16.23-0.22.el8_10.2.noarch.rpm0* CBBsecurityImportant: libpq security updateVJhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1094CVE-2025-1094CVE-2025-1094https://bugzilla.redhat.com/show_bug.cgi?id=23455482345548https://errata.rockylinux.org/RLSA-2025:1737RLSA-2025:1737RLSA-2025:1737 FPlibpq-13.20-1.el8_10.x86_64.rpmGPlibpq-devel-13.20-1.el8_10.x86_64.rpmFPlibpq-13.20-1.el8_10.x86_64.rpmGPlibpq-devel-13.20-1.el8_10.x86_64.rpm1y HBBbugfixglibc bug fix update  https://errata.rockylinux.org/RLBA-2025:2871RLBA-2025:2871RLBA-2025:2871 compat-libpthread-nonshared-2.28-251.el8_10.14.x86_64.rpmglibc-utils-2.28-251.el8_10.14.x86_64.rpmcompat-libpthread-nonshared-2.28-251.el8_10.14.x86_64.rpmglibc-utils-2.28-251.el8_10.14.x86_64.rpmy?For detailed information changes this release, seee Rocky Linux 8.1 R Not6linkTfrom-eferencsecd.l~GNOME [ defaultsktop environment ofm. Security Fix(es): * evi_: uninitializmemory ufun| tiff_docu`_der() andget_thumbn&!(CVE-2019-11459)ygvfs: improper authorizKudan/& .cP2795Ps about%sissue(s), luding act, a CVSS scG cknowgs,o/rat,ftoR pagms, Addi al CC:.~EnterpriwSoftwaFoundH 2oLibRaw: st~-bd bufYoverflowHparse_makernidcraw_com7pp08337dm: lreen bypass whemzloginenabx3825mish lSf ownershipbedmi447Trace conEdue|  lequery_P_onad/weń8'srgroupꥤunavabilUrov]Ď1 !Tgnome-spavtn applicthat rt oysdmDupdatV+]stm-2a videVi"ibuspecific AppS9ta=requirorqKDEces. fw{-vicoal|>ssLϤde-firm.]o8ahave brupgradedF trsvj:(3.36.1椹(1.4.2)S$: PobleiignatuRjT|20-1075|3Z7:Ste-x(0.1.8pipewik0.3.6vte29152.4webkit2gtk3 (2.28xdgM-ports6.0-=. (BZ#1775345, 9691 817143 32347 7406)e: Maiplk862y710264697182Y8081123456982Y3J44YG3Y45788,94799001³9835674;506h934w91210 1793 `et$ s- :H Cust=r`\wor< g Xmm#argur R regrY ghrol4391; la 6zeL nXchecl "^ Z550?b!TencC l:5.30!dul 13592)y~nu acctsY N 6.55N 30N ;K37683304typ;fu mayarbitraco exJ99Q-af-frQ51QE-of-bwVL83;4?R84^lib2:.4miFsSsds ct301;4ŨBrotli^a genRc-purpoEl}les prCalgohRaSabinfmod variaLZ77R, H manG2rdO extJl5lrsarab ibesurr3ly LhodtIt"sim4rZu buf nNb: b input4unkl h%2GiB8927BqH dbp2BerkSy D embed\ d supBkbo8t| Qcli^/g ersBug3,E YF[FJߡ)]: [REG]rpm*PU ds m% 2072)c5 odm (405  909300 U dAoSourceP~rGNlea 5, S :iden2"y_c_dng_fields."i j24870 >"1 IFr sboxo?y violaA1-17658P8ǑT rV9VAc}@reccQWsTFsa d b9bK80$M$=rup/"YLc$M*MImJLoapatchPengErrorEvyakэ2؎WebC::GraphicsCQ 39؁fL nw2189 S3066GTogs1 wWX82X"(_cros cripat[9[a&acmU3,C-[ $ ifec#j1714OQ5*Q9InsAic s V7APUd be$,fuld r?"fhistR962 +oar: Dy KdsymbO s5i% sS dXB<36241`1o&ċx)t2# ! ?(utlsGNU T7s Layj(GnuTLSb0,bicho*syptog 5pocoluch SSL, RD 2N leaOw ;isb&eZf(ilyialmostU ]N.olobjenlu,C++, Py o ike,fekSH!GPG+ev ,e p+9%(3.(6%567.%n_: & 8-shRSAQ"ipucip! 58   y_V,rat a31H_s _mS/Q/&_d_jd-\Lwlu-LuapowulXght-we0gm)>%Vulsot90u%,1nd-alonek.v:){ein =61s 1debug3-cyrus-sas(40f Sthe /鷾(SASLZKadHEton4 (:"il?"H69escapVQL 01`e1R2-n3016c1%~*2 ** 4MN sny.509s~ |-* go9. A+ 'XQL92Ned%A!tora le$k2. OAPI(^iƫ}x i1 aga+3tK enjoeJflexiCD!Dist-G ha.'#H+AJ sqlK"t rAF&"q55DDN, ?errrsrc+lEJRPM P Mana%(m-l6 - O N4Y)D-BI.04 mbdz\1J'GI-w,B  $s]-9-b-^4e dW:W 1&ceis>nr neIpa8Ρkly bra{.64!6{/(d A0 rr}Qngste](Rq1q`_4dbal_!swap` doesn'.3fdă"f" ann)vb6[ crhNoccaa4@1U L deploy "s f s! rYk ioy.D O573@Y isK$igu"I!<OpenShift 4.10WofreclONM $$IPdCnd 528[NMCLI OVSg0mit$OgetgucI "p"W]:\"cyc(r ;o3429Y luuxy ab#/,-ltnenli 6.xongnl eui'+NY(PA0-- oced[[4325gccV$rEC,J=J, Fn&, O=CAda 95&]5S q">>"Lorstd::n>l_ufp|5.407`%aBH<3*N%iof 9 Jtr|`Y ڪK2*AAbct9x O3 (ASN.1i dX.680 ITU-TK l:)1 UrucisDi ui EncURDERy=rl90) e"=de 9<)tasn1,4ETYPE_OK1468!]seX(siQty):x s fS>d|B'X  ha512 12 ]A yzer: tXye)n9 T_b$Zis 9Q ssse a^` FsGld m 'Lp' MpdeKRU fb.%d 20ltL3 YUs  = lse'-ar6l89N?ra$IdP, ok('Kve2)g O:7sert 8&*%W@&# e)7;D_PARSE_HUGE+030p Bdicn ,Qca(y y- sN7O w}h7nt dmZ buildahk orN x advi9Vsev"D Cs5eB,mpfs$312 !"cost8M!Kyd}Ӿûhavew r eam':i (8.0.17)%o:pl pi#[+,=m H 8.1 R N' s kedb ~8 ' 2 o ncraf< eds.*.f!()p p M$s&C^6]RLFW2viavAr2E8%t6o g[/hZ947ZU/ c e_7  ~ atta1+byl*meismss8s-s 3711o'\r\n'ܩK~ posf)6;51#6̉E-e4erro]&hould /(#ownW( Add:Cz:h~Kel"Virtu8KV8o7 fuv#=s3oer#d E:½ h( N2'âɤyX(0oWAPIm)0 Eed:tfs-3g  ro5" e `%QEMU: slirp:;l'08cp_emuK 5wo£wlttng2<ub r&>badebann/usr/y/Cgen-tp>p8%Ht isZ5|:onl#vIx86_64 %i 9.ӡZx54z;1?edsj GCCmCe@)H*H( z.664. Un A S"a"CHk` gccet-9-dwzgl #EneJin#Dag}UmmL-+cu7W> n9pD+5elf 0M\US)IODL#NPQVAprV6eS:U"_2öOI8ʩLQZulY[Q!_O QNQI5RX!QX?PHPHTML-ead#dylyd_7Ap1 @env_<_fpm_(QGF4gPVhd R; e P` Acc@gC'(CAC) emu9K[tBi k;N#nv5nbr9` CI]5047`h. heh IhINe+ksrpmUc>;W  tha+U73655JIPAi.p6nad/as_DvWF2YF:Ar)/SE.Ai9t  vqe /pL2faHlv2AM>---opt el=D:s^>_q8_ _6'M PjQGCP>1.4.20?;SelwoLiSCTP =po^mm!> @4382$/  SnapDt3 - ssDuNPyVgoe-{Dtifin#3 (kvm)82 [HPE BUG] IckA`q.pc5;F tbta 69_-md#ols-2 d [Int^H8i)-L lde= - "=Q}0%6lob 9-5-cpu=C ~1''f"79M761C>D5virtualization solufor Linux numerous hardware plat"ms. The E:Rocky4module contains packages which provide user-s*mponentsd to runY machineing KVMyXalsoWAPIsmanag0and interactwith tssyste Security Fix(es): * hw: TSX TransGAsynchronAbort (TAA) (CVE-2019-11135) FoeasbseeY1# Not6linkTfromAl~stoo7work&6anotablyd[, buildahkopeocDQEMU: slirp: OOBAfacemulatcptoccp_(a20-7039` Addi C:nN.js issoftdevelop5 Qfast+scal/e netS applicåe JavaScriptFmmDlu?=}0.19.0)': HTTPVquesmugglmalsfUEncoher560[RemItriggn asa TLS verasc(fItm4mɥvalup 46119)GCC T>et tthac sd ( 4. U S+ [ d wSwC| abt i,b# -e>fip(obj5 c{in riBt"Iwear,, gf, ldYm,;copydumpYanliba lfg,B sp'r2l^C a PUs 0as byJ}En(JCC)g caU f bx|Ur^ly.Ss n , zmight?py7fullex^volvesjmicrovulnU]d,canȲpde kiZeCi aroun mbhelp mAg<$elos|LshdeLo 3pǬ- C("-Wa,-mbraes-in-32B-bHes"Q-J` . AXldY3llb^Jflaw<gt>)ssisrzoyTia!~( _rGP#Nthe",L,thi} ld4thGwAXw83958)Kernel-baXVQM{(K)fO bl:zcsip unexprn;iSCSI S8 711)a2d: err:x86ULive:3110  e4g/-esn't s}iWmfeatureofxsr_oU9510)q92 [exiv2T yvdisp X RF mӱa ch EXIF, LPTCNJPEGaa7o(0.27.2651912:|inPloop~|Jp2I:: Mٱjp2.cppl$DoS2042Ionpo de-E&:DjV>::toLof" {i7-iExciv(l(aChmp8-4868oSurBigTiffbD^bigtY9303Ydi zVgIFDV4V.6 ^ faIptcVS i.cRsHpng:tEXtToWBuw}crashAraf8 d10772e0vk>1037>Lsamp /geg71433^ KXd2typ S7229SulT30TNULLlh]3 w8StCDiJtTw._|denjice|58a,71891-o,Par elB_9Psdiksd˹YPngChunk`RawPcf53 wisoSpe%y X6Hyl/ R*a T20096e #j::WS fPrryGsn en_Hey#I}6mrsZÄЂ9-9+@ jE1310WebPF]ss a1un rdp Conrivd iCRW \x -%httpiW@vO&!y 0~E/áw5FH l~PyniQeo, ve1-o~n cl0 e w h-lQ dyna^z ,fs27&=r2.7#Nbf3GvaG@n MySQL!P-7 (.\59944-url3: Cr-ho`redu erGAu3rt$ edFos76w z:+okieemc(n"TsI852IRLF:oj q &'\r\n' &D po  at ٪U1236̉&hleCn)wnW324+em..W)zs$(esP&èF'&&S&]7+ )Irw!ar IRCNP6)7'iI: rwesenSASL goE 045ިPHP HTML-e d y only Apac[N8 h.9 Y869 hnI)rinxmlrpc_c#h)IFi@ w eFM  y* unwan+r## b6b,ni_ f_=_{_MAKERNOTEK88K9KDESOFn6646Ouf$sA +iX v_mime_ saB _ = =PHAR) #C Ni1McpyUnegaf ngt!DNS "L2ߚmb2reg{ ] ͩi}m64_t/ /D ,wc4 TAG.Pii _N5}Ȓld$lNe6дjs _thnf1G&_ M= G-:j mzaM)4ph8."Mt1Xm.M8#aJ4]rpK24-biutput% i cMiLaye SDL)s -4m>ڡ/eQ4icscŦ\#&:8#u- m_f&< 3~PjKeyras4(PKI) P)fo%l 3?.[^e>.8jcsf:x Igadget$.zaxx hik./.Hfi;45! 0]nSourX63Caorg.aa . s.dbcp.:sas.*d9p6spy.p (. P69E#4j.N4ivdbĿ79u-#.0me 7ru04ssha< s7!7l(/Qd5Q99h /  ra"Uf.hoR]/00x 8!95(f sJ;u5 Bten,aiL72w{2 ;9489Ge8on>-U6ma4'2̫#9T;un9pt s+dA`Oŏ:2.0 "rqs -=M$}9C etAB)@=$Mim /chmd0:0 n` .#38:3.8'473&2XLi^=uis opR" bLMob)-6honod)LPB>bC; FwuteUliteu,R*ezGunZSy: havhyph New.9?ilyT@dPQ`B*ArݪiOaO5ro . a0?(+ab(NeZ:1HMarburgSOlO5T64Din= T:T /1168Xn_Hgu5u3_e@.c:&_ 3L577ۣ*B=C-p2vk &n -ysic+aBg@ 0l" J1All=C?o FadviYkU+ndf?m=#n<6 <DhaJ bJ7941a'//A<u#0Y>0inp ar3lB# 4Dl"@ux0Z#MMc "069"ccq(l nx1=SbT1TR13-g;^U.>@vc 9EY:650vcRe =Oein15}%0499)Sd9Fxyg Teb?s,"FTP, GoppC20GZs: 8Ek"m;rESIE7::E6#USsD*#251H9t2re8 nDig+(De+ no#reW VYD09c5‚D@s DP{-r_>+AuW2aI,P tp[vs34346)697S_:jTv0[l\0;oKh203Vhvn8r]1 mvghR3R:ly ?SETTINGS 9#\0q-mzAmn:toNldN0dif|nNO'.Cior?__"__*ylo$N8.inpi_5>_@_k@'1LyCe following packages have been upgraded to a laterstream version: nodejs (12.18.2). Security Fix(es): * nghttp2: o:lyOrge SETTINGS fram}can leasDoS (CVE-2020-11080)Iq-minimist: prototype put as addor modifyropertinof Object.Cus$a conuct<__"__*ylo7598: TLS sessreusehostnDificabypassU8172Umemoryrrup3in napi_get_value__* func#Q4QFre detail%bout theissue(s),ccluE im)t,CVScG cknowledgmentsnd o/r9dFform,f RSgm lУ,R&encse.T_auth_nidc _O ID Conn- !_4ulr AáFHTTP Ser. It enableJ!7 anRel^Par?/iOA 2.0sourcep':g1dirfiGogurl whURLs wingslashe19-14857)f exss]Ub a20479c BugM;;2.3 doAnot@Ft.md fi@(BZ#1844107)dner-too%s work 6sy podmabuildah, sko'r פ3 1.6.4Donourj---optk--privgBs ed6364=JQEMU:irp: -aftfreeip_ss(),input.c}983A  al Chan:Ҥj c%T졑0e,Sefocky Linux  Not6linkedomEclipseintegrdevelopviron (IDEdTenceupdddsmeY:8?ĺ T1vid 4.15,ichba+FoundU's O03L tr.A786637)miiDwhow8ܬ }USquiHa high-ancsxy9 ch2eb c0suppo nTP, Gop=Hya o s*s:/Request SmugglWcouldgsull ison'581 QplitQ1 PHPHTML-embedY scriplua commonuHU 2 php (7.3.20)856655)-0/ ut-of-bۺauZi fl5Uv_mime_dec _her} 103= bBuffG-`H f_ _=40=D 1 It ?cla accepts \0 Ind )tOm Hv aa|+Ą5Idisclosure7COwraparoemGipy nsK Yguruma: _newluxei_gexN3224NNULLn_derCch_atQecR5RStͩ#haus<<p w (8.0.21%: #: POsYunspecd vulnpbili14- , 7897276174985[58670Encry|91jInnoDBT38T;301I25778*7602Ḥ935V56234PS429 XRe Ra'5Ep67ʀORmizer ~7 829166H5892x9014+2~Y53947965807@C API51[DDL Y0Oz r3062316191aqvytF8 e3DML ZF7A547+62Yt5p92s5573Loggb7Mem$dE80ˉStor6Pc d} L1 Sc"a|89T569ChtsݽUH l9OGpPluginT21TGCSQ6Qg JUDF@7ˌJSONA62n AuL31LRo W4 5wL~DKGVKernelVirtuM/KVM)0fLacll v#iz.so-#T/oumevs edwarW'E:dJ; -sponâlɤyXalsoWJahracFssy_m=usb$/w %!lsb3netg407N.j]softfastl[ ap@syJavaS!mD#4 "'4"'&dot-&:&&rksCR!-HypkPPpmstivexpough$509 iuv:Clpathz5b 5$>12/0q#hF}8398 3 !0~E1$wS ! )LeOfJ)San'p',Runi$ed-ad vYsuiteoYbkey ktopDv ch($\ox sp{'epue;e&Pula e 8a dran. re'6 0la8##d#en6lZ(6M6 ,,cm(0.5orcu1=#r79f ]: 'al@'mota)resV+1 S6,b!bm!QURI!locwrin:&!vpx 3VP8 SDK%. 1!} [6Coc>"WebM! ma er .:.ub, eContE#ry= mkvr.cg21Uvp8_n4 ti?62?, .!.kѐ9371Po!deblۡ/i/p/O.S43CFPython iSel, v)-ore" + s,'ex 'i y*; dy2'icT* dl. *Et 9~ cC,W wea.v d 5)38 (3.)474dPyYAML: ` eA#V//@ 4W5\FLo!'(A:inY lo c$kN vrgd TAR arEv%90Warbitv$(`#i 7(w.g23train3..AbstBasic`forRe78492k  iMymIPv{4,6}I¸442hRD- m\ f; DvPcoa#<),d1-l nse*xardp$8z6S?$sMicroo Wis, xJgBox~vir  Kview) oGNOME7(xh834283D C 0rdr_:_,e 'p1F#)U/0 57nelO.O2 3M)y._P)K(Q6odrct* wid7m_se7entlmlk,geMUag w5r//sspi/NTLM/6m(.c.y3Iy+ps/%n://(6f>cvGsh> /NV5O- }ear0ms_0rl,0QUnyc\arrayc\&snd5w2_pduT1;rfx+_tilefM3MdcQ _map_v3_4ФyW* S5SzkSsypr+zeSJlȕq6b^5S.T8TA:2i,D:r p]mɮ;!8fUy_67to w5!tb_85T v2_M_c&^6^s e3?yP7PNegoc/MR&s@gdi152;S1sedo k | Ev ! fB  Exc/ ]"8vs",pons[j {STFSMlPOP34,B80 .>)*$27sr!2.7a%byfHutvV4orNJ4vEW-pip: " raɡa_n8_FJ_7Csrc/@/>:/1.pyu1CBMGD%" :?ycrefby-. T%PNG, JPEGBIF,)BXPM, BMP@m ,sJgJB 9gdIWC;rM9Vgd_c9Q7~\ KVe.Gg SVG):&[Vuc53hH6Cnepatt % SubNNonr  z2dC':in !E neRiU hierRs$l keep2sU;s: Wly0jivn! '" -d]rUv'E8782EPK?VHras4 (PKI)3K fa*DOicLqھ C j^o#EBaHa$ el t9ipul\s y.un[^\ki g]\5t.ivdcu 57SQN-:,l]"'g('Aint )lCAA?01[`/krahr,,v[elseZa&KRbDRfeis r],=ePocky*~Thttpd packamprovid`AHTTP Server, a powerful, efficientnd extensible webe1. efollowingihave been upgradto_laZstream Cs: mod_2 (1.15.7). (BZ#1814236) Security Fix(es): *ߡ=emory corrupbearly push(CVE-2019-10081)8>n_ftp usfciniGizvalu34B"e's aboutsissue(s),clud imm CVSSG cknowqgmso/rca5, TR+mcs,` Addi +C:hGCC Toolset isthat c'sdevelopm4. Un>plicSd awXC2Tence`updaddsgcc-h-dwzT einususX~UsXnmponihspeci7GX docuVn10ptV F+7p ruby:2.7Iuu 7135)2cB  ~ x Smake0ltrac1?+'* Onumaregular?presolibrasupport+varieDrer ^osoq: NULL atch_at() exec.c322^ ;? symtap0 5IdeMan(IdM)Mraut,:m:(orizasolufb t/cloud-bd eenviron)Bugnsslapd-db-ls1no lo:r works@82472)Ucnznr@Rwi6notydd, buildahk/oruncɹ~0/6:-k io beschij .06443)EclipsegrikDE)eQta)a seM:{8?hdavunuf ce:ytơo ck whet#youQNobYeFal:,yj # yumEާ1D_[i]dni ames"o ur1 [rK],&He!Rjava/Z-y cNll1-y /µ mscr,9 !Node.jsspw Ʋfa+calp^  a e JjSy_mmDluL0rh-njs14(4)0)91809a exifoa| e imag.~ k: # bds Mdueov`B7-iy 0452 KernelVirtuMaKVhoff cuv#= nQrou?rdѶ E whiOusspwcunâlɤyXalsoWAPIP+0r xe| s!l D b ummG͡ .08204)51)ms-y18n:9totypi!l"il:777%!9 -ar/ _`"se_{a,a}!plysu$ddrttlsy!i #\827T"ajv͝7#fJSON,hem, 3.`enc0!536"Q=yar#OJ:12a 64(901)MaDBmulti-{, th]$SQL " bm& ik ink$t&|My45&dbh027gale&(2531z9&, &S: ISST hoda leao cod jmysql-wso )hfnomunlPU O ) 2938I#(: O.mr#TХTC HApr ݧH27" I61DML#N8NStorEProced8 ![815V)I-(or-cWmp;ont OKX@ Yive3249FTSBĺ14765%J76;8L"S2Jp 5{FTBFS: -D_GLIBCXX_ASSERTIONS0Que9-e_id IN ('1', '2… 70') mu( 8+er 1w1`COup |_rsync_sst_t+[ y &ve osbootspb2,The |alf t sf W%Y N@ClF(C driU80 NE C/C++*^s? (3.k.3)<'H92H_{C " lugcan'tly "zJ-" /ir"subCRe W-' d /usrg%{_pix}79#Postgremadvd]d -+ o.-w r-r6N>OB be6t0"-pbug-ngW")2+P} Re's$FL 56 fi/p kvm" 29L ykdc1[dou}p-_m_sE_fJshvZ _as_m056*_isbt ly" -@51z78727*A&*aSUP*4 #uGrbitr{@C]v1G92SBA1N?Easy*ANE]al-f++ ()s|(y"7ny rastfAt(exa, fb&-:#-hr[d s0lmeeZfr -gb,|+.e9)3B M*i_epson_ _|286dMD)4 sLK+s4wr8 *gen1w(SWIGj utnt6C, 6O#3 7Qhigh-lVl cr:18@)RD[,n -g2k7xI Nswig:4B {(J39)n0~P!Pyn n, g v5{1aS RT :ssexceDfdy},ic Uf( 27 , a@ r`!ber9Qvf }or :!6Y:4LF :AwA )/.c:V26I(Y-url-3aJ37Jlxml Xj0J+%iz!'G 3Ge@ U*PyCArg <_c/c H J1-31u ?EJYB #6AgGetI Y_aM8"pTmsix__o_MYhw/pci/!Z79/Z2$Ui_EOB `7B! N2sO9Rتiscsi_aio!_cbbHT/@litPd l,m 194%Czqrj5in tx_pkt__raw_-2 2#'816k8nloop>ek0e_xGo_`(70-usbaunmap^/hcd-ehci[2scenari{Rnl Lo 89Zslirx+-of-bPVARP/NCSIaY129, 37ʮ P\ Key~GfZtPKCYf] @dCf<&reqCL# e(WMoaT HDei.U> ],GUPnP o7r=X# +?te0CO Gv.`p_ I=in.be  uCfl~V GSSDP,[Ay2ajKu 8 @ rWg8gssdpv0Dupn6GL+8 61D$as4SUBSCRIBE>9be8tWPSQ2q*go.y /ssh.0 +Gl{ niew  6;J+IDtef3Ml )+i,enorg<S al(fN+9X.OrgA 1 -qfA 2 NjaL-fle0d graphical user interfaces are designed upon. Mesa provid! 3D@s API that is compatible with Open G)Library (GL). It alsoZhardw-acceleratdrivers for many popularchipsThe%llowing packagUve beup3dStolatupstream dion: egl-wayland (1.1.5), libdrm (2.4.103glv#3.2input56.$wa6mJ(201xorg-x11-v%10(BZ#1878160, 86648 7654 5) Security Fix(es): *a: Out-of-boundcs XkbSetNamejunct (CVE-2020-1434dQI=gIndE}NtX extensOtocolX6XԪMapͨ60O7lectEventJƸpkil esa[vulnbil\i1iRecordRegisdCli5p2pVX11zovOlea*doufree2lo]e ndlT3/tDeviceInfo heap-basAbuffx2571HeͧL?method cE:4̺Leak ofiinitializhememofre|5bdAl3tePixmf dix/p .cŅ7Fo>tailtbsissue(sinclud i8ct,CVSS scG, nowledgmmo/r redFmm,ƢRgmes,R&ense>;Addi C%7:Ҥj c%Tre{ssqfockynux 8.4v Not6kTɔGCC Toolse^a`ily>rec vsevelopm4. UpplicS <d awSoft C]2in=usus5Usmamtspecif̫gocun10p+.hhttpdd=AHTTP S[powul, efѺh6eb.v:hd_s _cooki notͪ5vpitime18-17199)Jxy_uwsgi1984: 2nrfpool:9e?$0~E wFtH ) VNCC enas youle6al)n'owW m 5gvnctvleIUXM212bDConn ToUnixS~()N9839N /rfbrX ScHNULLw der}97YY XMlimit TCs3V405ٰdi,by zero w huldult0DoS3 08BASubvT(SVN)k"rsym T c/cmaain hie chyfiS$diroriqkeep2st0all+ encBupdad *:4uO449 ? RUs,DF ParszkM fRedaa sta.lU @p@ ge t rip% 0$/XML N-T.  r:s du err cul|maximum nspac c'#wer 7-18922:Kli pngfa ,!rray'\_xml__Urt_eW_/mo;k IdIJMan>(IdM: e' ]aui,?,:m: ( zasoluGboLt֢/cloudeenvironejquery:sHT ) ipuncode~0 02dmig cedtea-uset-java XM ir JDK8oY pla"9PostgreSQLd advbj$-i_yab^2(DBMS)ppsql:13 55776~Pybnive, a&vp/ n m*luq Dd! ssexce veuhigh|  dynamic type| l. suppor!U%>ycCiasll.vous $d$;p~: CRLF{viaresM!/.]!2611 Y-lH Xp ropN G7783G:DG"PyCArg_repu _cr/4cc|!1-317C{!$ MaDBmi-, threl* 2+ 9+My4mdb:10.581)~r='039:3.9 F 77430F 1Su. P7fI69d8 u!Eh7+PICErP.te*sbuil!7tueAoa9:iewS x'ktop'@-onlyU>ma:neWerC run,t b 5IInetj!Pde]eti+Y+T!cturs+sp\v/tr"go Z"i.1C~-n@4 _opdc!=ID11C!Ji5U=.4!ny9P+$y/iOAu2.0sp?Q- 2&er- workS6sBd ildahkoc ŏ 0 929575 Squid -p n< g #0@, "FTP, Goph<| {- :K ,vJ)d m+# a h([ tGEsmuggl+096ө*slapi-nis::: :)Q1&lraf8BDN-!480nginxhps,4acu9cy,Kͺt*==FfFy-0ngx_re+v/copysc645BgMsurINSERT ... ON CONFLICDO UPDATEYAGUPnP85 frct=d=LBd?AtFC3GOgib`p. umPi tebI asy 2\HCflexV%gupnp:wDNS/b: Cu8cbr2es=kue(nielum3NqW. D6PyYAML:o "teBx30AS47'VRub%T$1$, #}Of "6CtYMtask8\r(5T bAoR"RQWEB 256EDEEr-EZARE!x289 BugQR(::c:/!Vڹf<4%IPv6sOgivenrV leaRR[-8]2000)5.926rG` 7; FiFfn&?T158*_W^`X\%nW'igu$o6!&oCyDACMEnfigurJiployh9aoD1c<\%gGtX&bh!Rll^f(b6hwr<}mDoEcMFkPASVxScarFNet::(te].rbitRaho%c810cS STLS sO]ǦcIMAPG2K2lV3M2(KV"o&el3w) nrmLtsE:) ipSf 4-cUw?uR43lɤyXonMa `0d+EedCQEMU&Isi/$OB UduS~1i xa137E*Evexj$ˢ'*d"`Ung50OnrtWa e2get_gso_X7617EiQni+loopxbas\g1(mJqemu:Vmk)JNru2fie022:5hX!fO wK,p?*oI-in/t8 et/ b|f 83 X-Ntly[0322] -_A! fWfizolLnu ix (-kvm)f75679)a Tm.N.js s E8X ɢfa9 nd aoEe JRSv 4r]22a78 &4-git-`E `i8h MiUrlPh32qossri|ReS-YarDqSRIg1cti729`uvFauv__idna_toascii[s\-shesr291d& 'v7  - DNy.)nchSI/OL f7n!K pkg in68370M(Q0Q%e M 0ecmyT#d)!p7G!7nw (8.0.F9669F2:?.dC% u4672, )81215793)42FTSܷ}N8980_OmizereU7737Ņŕ934ťŵ3067?456,2= CVE-2020-14861,688913101243016556070J1649;1ࡖ122789Æ342576834,41028256Y3414) * mysql: InnoDB multiple vulnerabilities (9e77g94022,17-8j729Ŵ7j2>Server: PSB827|"ê42mSecuritys80c3L60dLockingc050DML]X*5h08H6*193:544GCharsets unspecifiedy5+D+661s33 599ʊX Plugin7^gg^D3DReplication 071 ,3585‘C API܃0115omponen7ice@O38OOp$C146CGroups17j23Garti2SInformSchema3T21zPackaE7EFed.t9E54IS?41˅Memca>ޅ For more details about the sissue(s), includ. impact, agSS scG cknowledgmnd o/r rel%i,ftoR pagm lis,R&enf:. Bug Fix(es):Segfa:spossibCDoS withcrafTquer BZ#19966GGCC Tool +ilthat providrec zsofCvelopm4. Un ApStream pawSoftwarebllfix: Tgcc--10-elfut-R hRbee pd{h¡jPwill fac%&-grao Rqy Linux 8.5 from4.Q 013)Node.jsMs$p fbuilrfasscalanetwork a;sJavaScripmlangu.0 +njs: Use-r-free clos9ttp2sca|lZ93<4Mc-)si¡#inpujalid8lho%nammay leadomahija _ Im1phmWuntypiy c ߪkXq1U-tasufficisym\kt allowparbitrafic 4Zwe2803nabsolu5pasan9zU)v4;nletetljUnauthorizedr9tl;9̢-p : vi:pDecR`TRe%P9Re34(}12/Make FI oA alwayv=3927):cont˹@duls u >6not[yddmaahkQoruncģkubelet3 illoEnvironVFdueSErdenic505Kc4#c4c ss Ap HTTP powerful, efexten web9er.qv:_rxy SRF re ١>"un"404\se5on: HeapfgS$H6=w =Redi}dvqd key-st. I oft lr a-uctur sinIs hes, sor. [pO, sn-mey9. Youwp st eiAby2isk evZoinwh, o9\enebm grujvh-bas't]624LIntegϧDcs>7>bug(zipl4M8MD ISt"ard Poco RESP)W75i>87>(10{g] z4] \ 3.0-.0 n[ K,cby [m cg.pea6 [RHOSP16.2]rnic x tro_nova_libt restarwi 1140`=En?priFoun Id OMan(IdM) rr ,w: m:! a oti/Mudy ees6 Dirsrv x*k360xPynYiVe, avVb -zdo,cies,assexce ,yghdy`edng. suppt4a\Eanyu}hllC ias ll.vound;I!p}-py!fin1loopSlexerOiLw72 AdChAҤjM%Tii\seR N{s T" safseYe ()@lvedj]tTsun061jinja27HurzdK8493KbaJla&gv`e#$t 2loGicp"codN009"t&712J: Wq!iso>z%.c_qsZG ux uolon3336.=lxm ,$[HTML5ribu7XS7895 ?D0~ )` F0 s -S whF : hrooolqr 6K(/4j:Q!malimag|r&Bipydoc42:gularpr AbstzBasicA Ha%[U73ZPkipadd:'oct@2Pg3̡IttURL 350piprei# seB_giZ5J clT&iC a 100%nh5p$73C_ w^J8pg iv.1'a Djo i])inoX9 sydx bl\.boxedJ! Hub0 ilpl^ %5#ngvie#ch s,ZchT arH -rv:A   J $oins9"#hevget0(i%$,117&36314KelYVuFMan KVkoff0 /ul#@o'umera hx)E:fs\ 1%us3spac*s4u< mâɤyXals/5o. nEed 6 QEMU:K*: e 0e:)>5585Kslir inr   | (bp  92Biudp6h3Ehg4Bgtf9 7ٺR l ge M;6*;[loO+/ACLRiSEP(LookupByT P\7c6s?Tenhw%4R6 "s48,6q&Techno%y$ef . A 6S6atwbr,.0NULL deSoapC5J : ? $?2D-$?p 'yL.P p.iv*9ssm'of gi&ph8Q=sPco@stLa c [oVP8id$(Resour I> F(RIFF)wmastAE`g  51,di'b|Aly:-of-bFa"MuxC718-2500&HEMyF1()@10@ˉJ2JShiftB?3?2unX=inadSymboȇ4ڇChunkV*fyAndAgn()mux/(.* !30ZQUijasp$H}?bu3>p_U< jpc_e( \?R-cjp2_sTT1>,SOu$-J269.K tQu)~U*U1-dwzN to CB< agSU½C/ZWcW2un11p>G vizh n-i -vis(. 5 wayreVe+F3 diaB6! 4y yRsVHXim agPR*ibiohcs,12%da,i, ,-)rn*!in n6formt>!QQ)ީp: K*-by-onG lblI / /sWE1QGEoPGP|  !7CheQPz 69 [Unz4ecY'Me7)SlqK OFF'b 064Co"F yn% 6J grin^oj _qlY 3mk]2%ruby:T#,;s4/ !jpeg-ebo$N !of-;ipu]% WsoFs^FIF~3jMsPs;.*aDj9asKDEbQ4[.r :]Zck"( nsW"-t75DnSquidOL-xyR06M7"FTP, GoA2Ud6nMF42s(25264z)>0:]URNo865!>DCHZrC2Cn*LKΌ6HiLPRjF3n6IXL"[[K7K{^@81)U2 ; Release Notes linked from theferencsection.For detail)informa chang,in>is r],=ePocky EnterpriwSoftware FoundH Linux 8.5'Tzziplib a4ghtwe rary to Vily extract aX; fs. Security Fix(es): *]:inite loop viareturn value of._P_read() as usE uncat!(CVE-2020-18442) ymo+~boutjsissue(s),Tcluding imp,CVSS scG cknowgmentsnd o/rat,f3R pagmNs, Addi al C&:?psutilmodule provi1anfface fo trievall runn@csesGsym fiz/(CPU, mey, disksnetwork, rKinportabway by`PythLp-: dou@fr]becauscMt mishlXl19l874Bl-X11 p anconȪ% rotocol clienS:ϳ$reques6engthecksN1-31535N$GriloframeK,ateshdifAt sourGmultimed ,olugg. gss]  KTLS certificaQ ver {936S^ K p ed, a&vobj1-or SggymWlu, which qdc Ncla" ,pcepx y h vel dynamictypeR l. sup/ Et many c Ciwe a.vouindow̤;s. p D*p Njinja2:DoS vulnzbDLurRet{)28493K: InoclosurepydocR426‡babellaM #valowRtt1load arbitlouexE"code20095, 42771Webche!isov̩.parse_qsluSaSolon^; &Jt333!lxm MinpuWanfcHTML51ribumay le4Z57C I$l  IABu|I)hoPU , ual'Unix-likper= Bugx3PrFfly,8GNOME WaylesktA,Ң =jindp-up(Mwi)UIߴ/l7ld nosq targefocuCmly. W_upHؚ*-Shxѹi#Ʋ«(BZ#g4064)httpd$ BApYHTTP Ser?powTulf 71ensis1 vlg0438T66916432 gcccomp,0}C++, Java, FraxO CAda 95YU0 D kenviron:'F0r(BiDi) orha5 can  troja ?425 foewerDducS7iOrd} - )d{m:jͲ  newXrfopH-Wp!mposy rO .w.r ~5 t: "ŀ=unpad"s ;i+ler xts#idefa.)inonee1 ff.4 ˙ ! !On] roxywrun tD|f$,7854, 5 6)MBm$s kpx e-mailv u2k,9: CSRFKkenpassk ts#;d takeP09K bd`ve7 admϢswNw r -e 4227s IdM dM 1n d ,3:m: solugbo /<ude*samba: S AD DC } aly &SIDqPAC9KerbK$i,5719N.jad{ ppuilfastshK ap$sy3 Scriptr havupga rme'inϡ(16.13.1),-m(2.0.15) 27610):;j-s0mGP".l)L918)H%@ia#ls INIl778Iglob-pare ularp xi;icK69La-regexK) chANSI e Q807mrzeUj526ll:Ra Smduisp{phead=2959Kwhebodychu \6@PostSQL nva"dqp(DBMS).6psql2.9Z(:$rin"ci67C U%un1ryp  -V-midd21$3.5_ nel VirtMaKV oWRl v# [ numd~sE:@) R(-#on^ E) mâlɤyXalsoWAPI0rSee) QEMU:?-by-on rrote_senI)hw/scsi-).\93U : e1000<.1l*ڳhrmit d <02(( _luY ee 9f)1#4479ar*t 9 w moorH1q$cTAs:ricse*Yanet \I$1ƒbJVM$S PDCo-P~$PCP)mLMMH Z1(MMVn d]2truaN{log4jn}L 1.xt qfigur5BJDBCAn20hUnsafsfflawvi!w.(ewM7MR"Fde%MSǽF104EnS*onxh - IHpo.s,'a Eon#Bo usa;G(1.20E,310K,2: Oinx_: olY_copy+l"seg[3rootM1maJ E } tool% _R 6s2y;dmah ko c*! !n4.18.2n0n"Q%su m0{B'9bol<)?@ v'~c[VocF77011W@&G'P+Keye+ra ct(PKI)[ rf li tC1S1 "Enh lRe :T 'Run2EAD / u.'M467+O: ERROR: 'ª(anbh#Y M{m+*4 M+4g*l9023&io-winP<e*dK%mQ MicXi'- ( PME Q-aK by{y{g9JSON>'sA RHST sh9"(P i-?nHmpMy483#mdb4#0.3.34#ga,#54-#50? my0wML0cPUr [ 15(5N5NIsIJ{I3725I89IOI3560-ĢLte7i=ql_lex.B,a,T46667TC"in _sz _by_Y 2yORDER BY uxLd5ds_wz_" H_1^s gg ]BrttIN|]8sA 0o3UPDATEv3ne`3%2bL` push cHAVINGN a WHEREm6mNo ?meudit,wALTUS<> NTIFIED198133~JBC/P/etc//&_map.! `%tZ"=-q.1l(oED"gz,Lst0:9siN#d3z"Y*t NSREP@3M scROLLED_BACK (FATAL)? Gdoes" 'Zp<)g'}-;L 5=6.49x--Ef5&:wEos8 )shws_sst_rsync_tunnel\2(52<)*PC*6146VwG (wG ewGH +fa +6OSB924ir1,;sGd:nbd dumpBG6K:Fedo 35+ x86pc4an6ly f)) U/ 8"}Pheri{ l٧bmpt!V764 Aa53:3.0N : -"d=GOCI aon1Ap7O1p9g6 :`4l VT(3.8),-dn1997680cT 87&:_+^Abs4BB!cAo Hk 37 __ CO2'HfTSVGbed!%RB 38 ;Ļ>+ 5`e:ASCIIl7 @91`8 pDikF/a F ntin 9J ')O_!~GLib/G^ cG'e0Fbc0 Gh@ (w'5aOnAYO'0gfbg(0.2.494p4!l#'e1Wn this release, seee Rocky Linux 8.6 R Notes linked from-eferencsection.Tmod_auth_openidc jan O ID Conn- !entica94ule for ApacFHTTP Server. It enableJ! to nrate anying Partyd/iOA 2.0sourcep Securi,Fix(es): *: Idirfin o_valid__url() (CVE-2021-32786)Shardcodlsta" IV AAD wiaquskeysAES GCM rypPi91iXSS whusOIDCPresPost OH2Hduetarget_8_K parametnot #db91Fmore detailboutvsissue(s),clud imt,$CVscG cknowledgmvs,Po/rin~m,fVRgms, Addi al Changes:Ҥj c%TCh~Exiv2 C++2brary[ac(s[ mazupportreadwe0Xf, IPTC"XMPD MakerS, extra1dtyhods}6thumbnx, classes}Ifd>S7variouˬbs followpanhave beypgra` rstm sC:C(0.27.5). (BZ#2018422:Bck haus7e printIFDStructurunc'may l~DoS0-18898pqovides2 greSQLi,@ ic s;g 6co Ed rsj p*sql:roune byman-in--middO Y 232*pdevctla utilfanagʲpXsb =iSwm ~ work of W nelnPHP_HTML-embed8criplucommonly 9GUnhp: Local6 vUesvia -FPMx1703)?SSRFpasFILTER_VALIDATE_URL;5Squid high-ncxy c&web^s,# FTP, Gopdz objr sut-of-SndaWCCPtocolN 4disclos> 8116Cetchm}AremoretrievwKM  ende  o^on-dem2TCP/IPXlikL-PPP s eMy-ArlyvInnet (POP2, 3, R, AK` IMAPESMETRNv6IPSEC)د. T through Ss$usca $iavo@cfz:E9loglom - 636WSTARTTLS s0U jRe27A K -ba` VirtuMKVM)C fy 5fuv#izsolu¤ numerZ!IsݣE:½L nsu -s pon runâɤyXal8WAPIKq iac| e ym83qemu-kvm (6.)bq (8.0-pynl-Sys-seabio1.15@tpm0.9.11997410, 2802 6 13 8 27716 935 YQEMU:Bio-@8eap-aftfre"_neivcu74* ntfs-3g: O Wbun,_atmbuq-)2orb cA _in_.JMFT 'o3285ėHf$ }ggere speci-D rd UniO str a6a_p_ixvNTFS 718^91^in;pathn f526=Smgdi)Gbetwݢ1MirrHs{A_lw81setup_flagw6rĄNULL3er 51  Le_lookupC2C_s_geNJ3J& gamevp oi_\xw4Ifind defnxmy_by_ǾEndlrA OpYɹunc bitmi~(%,gڣrnb casan5 olengz9zsync_nndar~ 60 rdM ũdeOFӔjrC nbcopy: mi eha¢}cWteAuH? {b2-04>hx ve cb ldr&62&bdkiq NBD_OPT_STRUCTURED_REPLY)jI71 :4faulG$VM shutdownvdsm7 m\_wait_on_. fli-i8lQ /#.ca414apci_hw/acpi/hpSS{: fY%n( _guest@sW 9C ^g tooTu= 65'(yd+,nsahkoV(csgo: P'Wp'122peus/_go.'a Ins("HerCe]21698^}LinijpJle#lould emp`764cA^5BaC(P1pre, }vp-ored m\. ve&I&ced vve.y~ +6typedl. >faԩ=yCw!iasll&wI :R=}-lxml:? Cq! vSVG ^u381?#&uwJy?2--GNU A, Ȥ Wesigne nUl!+ I-G7@ei5bd17orA7i&"p+"+lSa%9-9-9a'::Obj'::d>19-250D ^9 Tenh'r8 ad~$ŏ:4:}rU$ks6Go,daem;Ϭ mpulN,or,>techno%Axu@ĢB !xi m%l-aI cat> i+#27##a? Rr/2.7=nu5ra)vaG@^)orMy)3!83 : h>r:yg]r޲ߩAbs Basic?73.UftpU ="h'>PASV opon1!Qs .x>son m/sVASCII newline~abu!Q3J?mr-4oiZin4 p\a 100@t>e'x=h~BPublUKDInfP(PKI) fuA" 62#E9iSoft,Fo;Cef_F9JSS:J%ok Ll# OO54213Mave .Z - N$)a . BaU_E D 2Mtb.'sg6 oca cr9iec >p9-httpJ *$KmalLedIoH;/"URI7 395C"f~@8|u5783K|d2MCpowulf 3,@@vspA`xCq/2H }.eRpUAh319V$_uwsgiAha@-6]610]..-Di:> co>gur54M4\SZz&;_8/inSdig3545Il~XMLcg!5 R%72( slfM)/qdElTJM+Kmello&[6[s][1-m7 SA[feder/pEt|3AoS6`?nrPs gen[7IdP:[(bZvulQj*yl" p39j~Cairom2Dp$6: +u$qGty&+y,].epuboxe4D9CD4j:2 H6 h~sndfi%sd nn2 +%sa ,'|Zs AIFF, AU,QWAV :+Ei3 rc/f;jxus-uF\-sy2:mmlt24B599=in v`dt7ps6 {(DBMS).6ZiaZK [C j6ovacuum, REINDEX;ym5 "reYc!o1vz"6dq 5!2.13.7-5 ) VE js:12/ tto l,r]84Spd* *W]22]Es References section.The postgresql-odbc package includ-t$driver needed for applicaG"o acYs a POSQL system via ODBC (Open Database Connvity). Bug Fix(es) and Enhament(s): *¬ser-13 doesn't work with-10 (BZ#2080179)SSL itoolkitat implqSecurockeLay(:Transport. (TLS) protocols, as wella fultggeneral-pure cryptography library. compat-osslС\vilegacy 1.0 s of 檯uYoldbinariesv{hn: Infinitkoop BN_mod_sqrt() reachablehpang certif((CVE-2022-0778) Fmor_etailboutsissue,U ict,NCVSS scG, nowledg,o/rldFm,fRgmxs,<CheeseCnntakpicture"d os fromwebcam. It c@y Gl effh[DELL 8.6 BUG]nIR CamWnoSdefaultvic cʼ#78)yinput$$hlԤMsdisplay }/ELydirdeX:ymPQsvulPbil1mayaiprk*e esc1215Rubextiterpre=, obj.-onscriptlangulhaea>otY fiȢermanCskifollowcsbve beup\K r$am: r(2.6.10).9374)%: BufRoHrun@S,-to-Floatn928739PHPHTML-embedhmon-dUApacHTTPphp:ssdex2ivvggbf3o RCE316262Squidhigh-Mxych clisup "FTP, Gopd `s: DoS+ WTgO~wp.9 1-46784Es:gularpr'deni`Q zDate method1817)dCookiefix of8ICGI::.OeEKernel-d VirtuZMKVM)OfS ? M #iz soluLinux nu ouhrdwar[s. E:R y4 u C w hu r-scfâlɤyXalsoWAPII 0racFQEMU: QXL:Jg1sor_a c 2 heap%z20adoufetch]qxl_a[7[io-ne m8Eb oCrr{ u L e 6353Ih-vsJiy^queu=chW²me`P k`g9 9Xguest~; A zailed=>m110F=" 4Fbh496 g evQ_logfiguȬ^ Yglth cksv535ERRO[0009] Ewvtsign 18Xrootl Time:+sleel\# 704 *tatonitf4dsta E (C!e2100symmoxmGXrSELINUXendU462P.Sd ctSplu,jlike5rS9295)MaDB -U, n s My47gal(26.4.11),db (10.5.16(: ough 89 atta! 7_cZ t_to_iX$-aftfreyBIGINTi 669)×lack psv d"V H u^ocopycJfd-;s/ D 4048̓wexaanv 4 .ˣs<,w50 abefF 5 ecQ51vCONNECT5gHs 4Oy PEV q2qp 6I _Es::walk E7376EpoisoJlex}iv bY7Ycras cte_tmp_O ::fina@8@ _'rag:: e_1_R9Rmy_dmal::gor=;80;Field::set_r( y)f] tat]?SfyJs/upd\deWd_h_fZ p>inca 8bii6c-s.cW3Wɶsubq ::__r2R40 ry_aroviewXtse__s8HAVINGNOT EXIST daqK744_el^445IS NUݣ A)nP3!T n _px*oZ5ZsAp\ak{GER_ ::g5s/F+ort6 c/fuA\ (<Մ ,Ȑ8 K A!e-g07')6-(swtpm 2is;L{void*s 95'J_Ralca: T*v1]r CAO9mE87.6).42D828N8.jsoftXq Z,fas%1na!|%dgem"4sE%%beo!8]d!1i!8Mjmei;r205586Kgnome-jse$ G sh2GNOMEa$Igl""l9,mLbMf ktopds!Auto" 8M-s `GDM sX;6%."29WebKitGTKS&G  Cr%:bBc 7xN2gtk2.36.7!+*:^zma>UDontUKarPK\ 32_IZ)Ar ve_Tar:unser)r##ph.S$e#!t PHARa0- s: f$sa0*xwriOX9X T<3O 2teLNymbol+a361U{OH--&SPILSMB (ent 41318rof eMJMXXLU#e:col2o'C)c?scr:MBea%J%_,@tna.am&D= ,DIn6 ,|>i1 583.NET d-fre iUa-WC-severtnp#i9 CLRZa-w`&CZ  wY"dU'VSDK 6 1U7.0_dotGNuge6"n?>7orld-+032U3.1. V3Vv4w O 16 pwOFra;mn CZge= 52:RS\Rj-1.8.0q[jdkz ? J8Enl onu*SD>: ;TOH A X.509[(W, 8286533/OTiHttpY +} n" K (Lh \K d9 d8d _$NTLM6312sš``ns G&x iJNDIt$d0S717+&MByO0JGSS00xsG`l SNI /29P;ñ3939P, (s10,.))9325Q11+u1718.1;;?eo5=Ms(q:dk yW '@.7;<(8.0.30;;DMLhUu;@19978, 9355913014#řO.m,r8Ā5757Ġ>226783456?4123456253469395170_4124_67_405296Ư7/_25678O301?Y23Re2c4341sWHmyk96KC!:7{60Innok4 fM3vm8175A/53!2Gg;WP#!5n7Ő54ʐ!: })X":m}75&ό Vs! 2xGI C@'H?Di !L2LPStoMP"d =F0C2`nD{zD[eder a74aP)r!I1 Sma3pmjC~)7V7F7KPDDL4$4 2k@AM&hirSLL_^6a 3Ro'lRdm%bchangeGx (T).el` 0-0Fd;c3dwic: emu(0fs VPD.*17Bg k[MsӪareNg02M1G h3Psmls 1! P-whoiL#Z7gfhyp?B.tf*_ run5Bx05sb-SS uld?*#C99CJ8V1IPT&un$Eede7:}vlan<$isAepG4 +(BZ#2133391)PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * pdsql: ExtensP scripts replaceps not belonging to the e6. (CVE-2022-2625) For more detailbout6sissue(s), includZ impact, a CVSSG cknowledgs,/rinform,f pm lis,R&e]s:.Git Large1le Stora (LFS)s l!f!:uch ao samp, videosegraphics with tFinterss3 , wh}s}fcont on"remotTrvergolang.org/x/p: Panicu.ParseAcceptLp-u-0-28851)1hroYkbcp47 tagg2g: net/http:4ropsotiz of Trans-Encochead(1705Vhl^ errorfthenNGOAWAY7664Oio/fs:ʱĩAhausGlob;30630;path/C&e/gobBDe!@Luti@NewS^leHUReveProxy - omMX-warded Owork?k2148kmbi dig.FloatK RaXypc,pofmUfOtohor`poHially ow_ajniZ;iceĢ89 Bugit-lfsedsSbe_build 1.17.7-1 veRocky EpriSoft:oundIdfM(IdM) cralizau,ci:(solufboVradiɢ/cloud-*d eenvironr5EnhyZ+Re6: cn=views,compa%roken5slapi-nis-0.56.5-3.el7_9.x86_64 2.nampkcs11 crash2o dnslibraryltree [bind-dyndb-ldap]^33036^AtptloW"root" usLadmin'sNssHWeb UI doe j5fg5Tsainslmoduly6eab`pod, ah, skzoruncE::eced: unPertmu: Yn /dev/ /0r`ertLOCI1W7345)!chMein le,eVLinux 8.7t NsnkTfromUpd3 a-c 2.13.3.yJgi .depWyc esadurac0adpstConr31-3622 -o:Gy;N n5whenLkubpim黎? crypto/sshc19Smfes"ix *fu 1-4119t: 8disFsureXmfš9LinLreiniepabilG16jAdC:hFpak->@f&sLsourE,:\--mi-[e: hots-url ,D {di8q168D~LV eOff v, munT-d lK-?duEvrsuite. Itrbkey ktop pl2s,6"dorspsheept e &&ula eO8 dra Qmm. O6,simit"  d#Q lt(: Itruv  i ignatY m uous KeyI re256 ?  tobuf p ap Pc-Buff Goo4   .3dr>ured? 7i*yetv.Ravex,8 utommeismst Ł3W nullar.mbl̲"N%ptry2570@~uE PublKG  (PKI) Cqfw,requiby CertPki/:rGe+,XMLl.XXEL414KelVirtuMach^ (KVo all v#onu mer) h^pʢs. =E:½$whS -spon30 âɤyXalsoWAPIg 04 a)xEsZfodhavefupgra a rstPm: qemu-kv( 6.2.0).06_ZQEMUdc:Fp b oUf>DMA j t~-V507u  HliwANumOfNWFs= 089jguBȴget_s DoS21(swtpm: UnchecMs i1ogZ pO364'! ~Qt5r Qt 5,51thcr-8 frL 8y(5.15.3u7uq"QPul(  ?r6D f ] ATH525;~~riBidiP*0hMeik8(for37 He2&w, Arfc)aw,y^doneg#5way37W7O$tselfl$r/41<r4*ri: 8an1A38H+-1-v _V_rtl_to_u.5O9OSEGV?8ve_ marks>1?R$Graf*,fe*rMmetr;d#boarF+<+ G"3:/gzipCR.JĆ: >UnmhalG]U>;Y1AnJSON L (YAJL?smant-d3SAX-style)7 ANSI C1B,44ge$<  yajAhv a Einputsateg5!479A&Y?4 I14 M R N f~RedisgT 3-r u?Bs of vJ8# : 8e:sinceI3 stRh#SssOed. p| n\?S -P ep@YouPst i3itKby mp2ΡZk y}DM;R,Nby.Qeacr mmsog7#.r5719998+ 1: :djB6a Lum 6.NNMal|EoacHVMOSTRCi%!:hsKunphood mC,V*WavP9letely#_O~:le:l igh-qAy'qw hybridMm $wavj i(IS-of-b9aW#S`()V426d~PyenRL , Lve,lorb!eWZm' aj3:d e #s,edexGjiN[Y 3,[ eambLy i&S supptq![ yRmcCeF,well.vNw L#M p~il4: _ndch 9Wm>O(;;.rm*35ņ__ cpy()U;x.c284ŖIU8. Sa[pUd!n$cFelNblzdirþ09u+diYOBy ZWrop9^ 8 L w `p.Bqopp@ r P* Doc PDF}1dX ,_)hm$Ev**y: AFHi::8 )au $2733 9Se security issue(s), including the impact, a CVSS score cknowledgmentsnd o/r relatedFformation,ftoRCVE pagm lis,R&ences:. Addi al Changes: For detailj c%Tiseasseefocky Linux 8.7v Not6linkTfromΔ~~GStream _a s  media;work bWdgraphs of filters[at oper !:data. TwgUer1-plugins-good pf aconncoll`well-supporE <-=@qual und nLGPLcense_ S Fix(es)] *Ñ: Use-aftfreexroskamux( -2021-3497) m7 ǩGbouts unnprovidevsdngwsivecachDNS áSEC$solver. [fow']have been up_da r velon:(1.16.2). (BZ#7735)4:novel ghost dom}whema:ious usTriggWabi~5Ln\s*2-30698)ÆɂattO9BDcotIn IMAP vfYUNIX-liknym/wttprimarily withind. It also8l POP3tj<s e-mAei~Ģdirmbox0SQL drivyIau1ucQaA$sqbֺd(: P`ge escalZwhsimilarsnon-passdb|u550PHPYHTML-embedsscriptluaLcommon>CUApe>TP S#.6php (8.0.201008760n n n duee_[ _float() failHin 2170YRnin:zrra7pg_query_pa s(eao RCEA162D= 7.4.30͡ -pea 0.13b 55422 SpecivRrmbjksǩ`xml sME: DiroryL avulnD 261Kj~dns qD/lightweQ(D N )warADHCP'ync HYConfigurProtod) $ : Heapdhcp6_no_22-0934>1OpenBLAS> o- m libraG2 1 BSDla: Out-of-a'*lF v4048BMut> urcah cbltext-MIMEcli;. Km !s 1 s,%chrMa,Ap?st6bm: bufofi ud funN132Cij~ Berk8y InX net (BIND)lefX A NS). EeUF (d);I(r]in2foX ppl ifaci~;Itool=Wifyais8 lyCbi7>f s -voisonG252HoSsficAdr d TJ eR 39?JPEGNH. ,ge E2000Lajpeg:sfaultFopj2_mp su_t1http2pow!ul, eff "i _ b v:Nd_ :ad/yoN 23943)uggl=D63779 6t6Xsȱ: X-Fd Soppey hop-by-2%ismU181 vh%ap_r 8614=in< cmp_MchB5CI~disclosureso6C7Ganain'Pnce-Pilo '\ |RXrivpm VRe,ZP me"cbpfte>da,MsevIlshbosgo.#et/:r5 saz Transf'EnQ7heaY70ҦVio/fs:ax#exhausNiGlob630;/gzipCR.J1J/ߎ2Ce/gobBDi.Ln l: NewS^leXRseP ons<*3214~~WebKitGTK$` H9deiengN :pBpPGLibRX}dOblN2 C32]obj2m+iiNOME,%clo,nse&\t+uctureDkitgtk9l.arbitexI-262 9Q8QBR9RCookin|ZsHt&6g62gMemorrup;g6700;gQ9=Q1ǣ616>7GY)#C:TNMapLayer::Contq3029;KW"l"&VirtuM;KVM)f7 lM#Q" nu6?_:hw7s98E:½6u8@ whix&F-spCXonrunâɤy9WAPIE0ac@ `2ed9Bug iofsdbugg's5nmpNULL631)N.js Tft5de;opAfastAJavaS{g5AS38}=nϡ(18.9.169, 179?:xak romna!hryp~keyge'525?lRS!inO$ k3fiel/\ dI%{%6ly d1,ahkuoc 8:Gmf 98|,L94d&eao?D/etc/cni//.d .tead///4# (ZV% st)=dQ,new type "sig[,eSign"ZYkilyad(Erro6e:56!unocF:;&/_//02 m !CIssNeni[z] .- -/4J4RPM-GPG-KEY-red(-be [8; ADDl"@!rr ]Cs u@4]8-^.0`976[Twvark-d@Cntr))^*n)Urq.z]]*`)23^; .[g0"emptGj4sudd AB% lossI)PANICS F%ice w' hl( c412?BAg^gebIPv6 add'unexpec2@vlanisd`pG4 33* SP(shmo -HAU wasI640 )I3k$Bp+J%Jh8d\h729lEnhj(2[RFE])o{ cum aon/lthy91!U pyth5e*Pv '#w should Q!2C992)i_rr,mΫ8 madj-1.@-!+d6 GA. r oFi Y,3g <"i 'Fer- MDp[O pW-c. xtieL218rPa4aker s 9o[SRt-no?to toy , g il. 7Oaf Run@5crm_vOCFԡnt's+aang untf:_!1ca >s5 r-r h RuThreo 6CIBm8n natu|,trg9gmcli,or,M; ocf:heb :pgsq2sM reT fFshutdown338,# L1L;8DK 11%0Enon8 +SDKPrep\g,clu imt,QCVSS"G cknowledN Bug16/"adBDuci doKnot5t withcl,. [Rocky Linux-8] (BZ#2151625)WebKitGTKVport` ~web deengine :BFkitgtkcNmalously craf0ptmay leaSan arbitrary de exi42856hav?een7de4.21!#-feexposuAsensi^unauthorizбZX0235:W!: "qs"isonocauseha@ D4999BK.NETHmanJ-Pfr. Itletubse C- APIsfe=newiteICLRZaN0 d`thataZvulnfbil ; i. | U'VSDK 6^113Runtime3.6dotrU (s).uM7remp$HTTP pe aJSONJOA '2t ofl"Ush13-3C}2Enc"(Uz747:0252.z]`66)sldƪvimecism 3vRt7rvw sym"r@a. SruniufU d_service_ 2649 *bastf 836559USBGuar aga2trus4Hibyˡic whited blcapi@agQ ata buok !r-de$icy,$k el feat jusbgV:@=D-BuJ19-2505JLibreOff3Lnn3u,s mmun- -3ducV sum!key ktop ,,chdorspnhee. ^&ula edit8nddra . replaO6(sp M bed#ext Mlt(: MacroL s  3140)DE)֣[s Due =5 6305eSfc6:Ve A&sgRecmsss W ConnWs WiBFKn]Mast8ő6ȑWeak5Keys1S |EnpriSFoIdkM (IdM)centruinti:m:*x]XoUt i/cloud-eenviron'nd-pkcs11 >dns(retJ e [ -dyndb-ldap]30 AttB 'oif"root"P3ad 's p'UI`KfUg5vaul"e& ]oldhdbroke4825rpm -v ipa-sel4^6024,cli\-maintain ]affindu0XI gnome-& s-da [omsh2iom GNOME<)also)Tglobl4yell+numbFU-widsAutoc( u GDM sDi 3G229622fam J c ? 2  MonmoskEhy up.oblSh|# .sxy khppwn"e‚7251}/fJm puTagpIm9 Fil (TIFF)nleadT}{DikG ZeErrV2056, 72բWufHdup ()a"safe"ns (}4147ǫ killsYretZp 2M1G hugevs-mounyR217 VMs)ngHvnc_h pbon.48504)Nms oh n?o;nyIMltool  p.N l a1nR nimssfy neeOa`ough\ h=gdm irp7ou< 0vt #P ftSDNg 85' kub--D- ;delFcrebzriov#c7969vAjE figu]dift 2 han [i !յ90 y3f 70PgreSQLadvo-[i#a (DBMS]pdsql^t!@+pS bng6e6.2^CsuL6s,4a( pod,ahk|oc5[FJ )]ailafF -2F jRdS#y~(.6-3|2 &6&4) 317~ -SkDZ0.^77SIGSEGV:vio%390xc416$82Э9 bi8 s kƪd /tmp:. 929{6 gIHca/usr/*dtLd1dga,  i;4403-who 6&ll lEtwehyp?soCi?Agu[8/\5RmppE-yir pe!qu t ̥Ģg/ÈrtlXmaq*.Rstor5c̤alcaVM'd QNutxK'Ce+2481GCCNW12 +( }$4s n A~m= C%gcce ` ]C++,$, ,  CGAda 95sU6 i ___cpu_i"s-hir& pids")PRGTS12D+1k*us,_^   N%C6uC(VNCdisy%a'# vi%Gonly o whe7t 5I ne&! vtYarccij-x0 )i+psym&X$ 91 Usyi bp"puXadg ysL o#T 3^mon*isk, K I/O'=T`sadc -f`/$3424_s# eda FtMi) Hs-V(fC|g0wayc7'ADDR0,"MASK0,GATEWAYifcfg- dpdkD P) rn+,#dri, *aeU W V1hea B =% oyexhau|la12/ j-17DnjJ$17$EO+2?:Oke]#a=#DTLS JSSE, 8287411''8SZsbank Zloa(SJ93742JIn FIPS6)  NSShs aߢL-f]maPINE,edised…s7N aD%. Pu'  r!u ,(4%-\ps.nssdb.pa^-a fqFmalyu.* em ly%-l=gu]-(RH4747Prep`6nz 'resI01,(6)13010)K1K1K+K0m1>+8n7797)Mozil5'FioxU'-'3"w*,igsta$%! li , 1C4#.a.NL.s}s h++ ESR:Xsctpl$ 68t;A'='"4=(dr O |35#PMey ty "ix109VZ6'Z_!6&hiddeL Ĭ9Qjbe - g rw% tgd navigĻgeP"n'th @"o%So  W zo2oFucr 9b97ūa@z<`6>co8$+Q Pk 1 3 No# 4!`RDP1+i:;xDDcoK<),!$e3 cen1xardM6W0f), xJBox .=~A=188193:-T=A0- , ;:@suli)(B J!utsofarraRIMARY_DRAWING_ORDER_FIELD_BYTES15АT7T.__}_or__et]9]2'j .d7miZsa :i; dpegfx$;`51ľ-RLEDECOMPRES?>V c>_\_v3_K(6S!phMNAl. )7CY:,)UG:#= t=fo?H)sF0PDF6c.P-B4Gto\ ) ;^#)J ed#pr9+4Eg(9.27H74526:"-Hr-Cigc_re_s4ct_ptrU1[ :&43k27prn"_k6()ib/l4/g $G2sau6upj___|b@vpjetv8vOp3852u u90uO\dj9[1[mj_r=_cmdjpAn "wmjcw2wNULLy4dermmpoH_nonckb Jnd_iso_ maskA/gx)ݡepsc  q4lj_m@a_s2yx5GetNumWr.C"tw6wFloydSt0gDiOCĀzbjcaz@m@lor_2DdiX*ioy z9i j10vZ{({971 tfnxs30okiibms1t#t+prleeO ĆI_sh_i9_ ćveCx^ٍR HsJihsepe6#e[txtw.c9 psi/zbfon D\pjddjnlxm5700Wt$t>lM24rdm24s1>S17Mvc<28pcx_>_rl1G?a5 sN$4N$Rp7leaC uCCJSSY;DenialMS10w/.?D64Z-U4' zMa%xRbH+VlanIfon)bG2Jist=396X)-S>k2K@f"l!2cmg36_>.6D-.8.0-8-*&-iRresb*CORBAF(S-502--L?0LD5Be0I{Re#Lo(7#Tad(*@397_#/.8u362.rhH .99 |rPIVd< ("s1io.P1hon" "/g_/pki/!/cads"lQ"s, $~6#7IurlsplitPz#2 NFKDE;Py71bTSGlNNr)flexi =ugQun2HC=SWf) aA9rs vIa=+^nd>toQeV-lYT lKe/;fPrevc, gu Weylf)Eok8K,3Ar rF$`MAFF .vyDQW!t 5M+k to? l~de Bw|a46"9,_ͯ,{i;d9945*U=of,fE"!Gi@L s kd 26cF~7 ~+Be(lT>NDoUIND)5$)5SHNS)i$E'e d (nW);r *(ro?oUsezI<~;H Ki8U_J)Udf-- !6'e-f1PAQ ?!P@<et: acC*,Kor8W0']JSzMssex,^yI,g TZam&U5adi0CeuAYFC0,EDtoB\? P;V1"A3"V:Ir .Y3p(majo&FLܢt!h~osJQ-*(r% Krcusw2ZOS afacm 91Cx[!OST#i( .1rLd.xlMi1Zup*$5lL e"[Ϣ_& ccRpit LJ$/ /" /(/[dmd[xH9Rg&a2 /MkSbhysPG;c043 GiOa.i"u/V~"olO1dQ*hVO.`.'SsTfHenKS a aH'Xcop a'RsNyYexaq$Ghis/x PH2Loa#Mdt>YcSNH/us^9ir o?eC=PGm^sY8eånDIQYGgit:Ao 4&4l;b?Heap$`git?`,Ji--`r_6CE194:VSKcote display system which allows users to view a computing desktop environment not only the machineRere it is runn?, but from any 5Internetd! wide variet]fYartectures. TigerVNCha suite-vˢTclis. SecuriSFix(es): * xorg-x11-3: DeepCopyPoiClasse-af-free lead+privilege elevati(CVE-2023-0494) For moreHtailbosissue(s), includw impact,CVSS scG cknowledgm,otZ relatedFform,fR pagm lis,R&encsh:..NETcman5d-softwaframework. ItlebsetWC- APIsesal npDz<eICLRZa N0 sd`thaHddsrgs ' avvable6upd"A'BSDK 7.0.103Runtime3|BugC$Enha3(V2166775 - UkH@d_ [rhel-8. z]~fixA!6144u69u6uWRvPythʪxn pre, avobj'-ordproggmlangu,fTmodulemc\, except,y high ll dynamic a typel. supporfaʡmxcClibrgs wellousndow̤;Fp}:u()RPyLong_FStrFdo<limi/moundigiconvtextintpo DoSb0-10735)ƒopendir vulnbilhn/http/.py yco90closus1-28861sPsCPUniLʢViceHa ffic IDNA&codN2-450N&OuSSH1 tocol>Nbynumbt6Linux, UNIXs"larraO fil\ecaEfPb!bKkZIPv6v sftpe[Rocky 8] (BZ#2732)Samba0urce/S MnBlY (SMB)i+CommAe F S(CIFS; PC- bl shai,ZX5R/s: RC4/HMAC-MD5 NetLog1nel weakhoul8eOo' dF38r FMozilla,Doxweb br er, ignedstardDBi© ThisQ}  102.8IESR: Arbitrmey wr PKCS 12NS* 767)ECo[Cpolick?viol!reuis[25728\Sc ngjaFS fumodeF30FPo Brt/ mis SpiMonkey_5_Invalid ncast=VGUt::SetupYokeGeometrNRUĤi:domPcripad|xt::~b9bF>iwnu_Focu43OMAsaf X dF110٦Z4ZJ6JEx chaveNex~#schewithuoZi2WOu% b. dsWkEnVIneam2NWECrypIm=Kcrashab=WTh?erd84loniB sgrou&L*&Uz> J s  m l binRS/MIMEcm PGP61 ݃scap--gu Eviu figur Ѣfi7'q ;4xY speczTAuto Pd (SCAP)m.ctitutclop(ch e$ad,/7govrequR)applB9 -brid~gap twNgelize UF cjvl [ ]-I-DRRBru fզ)8 Rai=x%805GDISA STIGp ksero^f[ lm joJ_ m%_sshd_H_hiAX 맀enchmarkY=ait__@__;d\don'mOexisB+]6R@hc*+)'~/etc/7.( xccdf_ .ssgb.S_immut_in_0tig[sudo__unt6duepa" mp_ " uBwSovp,rbOyV(4U\Two CIS L2 B'sGE >1lf7U8&V1R9=/ RebaseG>st s  L9)f/-agUpG ollhlrtewerlusde/syer:ch oAcmpv09eOCFvd ocrn _ibm_vs-36203-rpm-oeEbitogek3PMGVU l~OST;ot^KcajcLbeQ dZn-s os-:t_toH .dzNjeJd]Xt7905mce4l_SyET(E)..e:{q{ud-] ta_5:Cen 9gբTiFet+veK/Q5e%le OfX -7Ennryf #xwsQ5318Jd[1] O^, Zjob]{r rq 'b'Ƿ4594s eng  dX o;Qy63ut/7ٮͣ8&Hi0 xmlVb6duiOVALul65577)2 KitGTK 1l"Teng:B pFkitgtk:TaS \ fZpIb ploi a~o 35,"C\x  !4 3 75026)NYS)|c s- elopYN N$06E nssGq9q_`JITi Z5 L19Z817 !-of-whacdtht 5W}98z9URLrdragg() y#gsis tgerehavigcx((UB9BQӦ# Y#=MacOS V2- L ?4.16.4-2.el82 03'-* ctdb#dep npi?$-(FsM4#pBW*sA) DiVU{QTuught)8#Ship A *397'gnutlV6GNU Trans Lay&(GnuTLS }*k cspIgor"hsgsL, R=D : ti+;-c%`= Ri)h#+_d03)OtrSopip:7feef81809f֤997419c0 error:0gͬ].so.30.28.2[<040+1dd 31152 M rXK3 s|(nު9tCp+oep -:.v.I=eU^,relg, b adb(WWAN)PPPoE,,;TVPN jal2t+lh$n(loo5r.*4362-Z | UEFINAb.oci-a: Lo2sn<<)5Nmst .+ rnyFet2&,a .,a5m%raim&tisfy es\ew4a`? ugnhd g3dm[iarkosou<R-IOV VF[3/ar61g Gdefa rou\DHCP964 DutaB ps $#ej-U  l078CwO$u0$ h"747UPZDB>ae s{3#ps3eM0S ׬kro4"-t87 MZ Hb#rcihhes cJ s.8dn'sq  Dlio we DN%(Dom"Nt w{"[eD;4H=C`#Y) sesCL"- A 6o yepNe7)d+2Adv%4sX MR\-F Q7R 2 E sx(5om,lf-dm'O'e or<di-fea:6 (el~;  y e-Be:~inS!c4:)8619* 86U86R83581)^106:v4 +/Mr'pc %ea3$ed 54+Max9bu9"e%º"7f tE42g+obscu=953+FCufo;G  C#oJ&_,7-JP 8'c>2;7,['[TSaB6CĠ1GHa)*po6Q+w+’47,4-DisB i t ?ceDDQloa- ,,,bVdUe ?A i4L$CARM64C/FSA-TMP^001VDou2.w pv6'L j(-17-jdka_Jb17XEB+SzDKit=?:(\'2xkC8474)19q1XSmHTML :?68.?9?ioenO 8r_int,c[8191[z+[ ˤXsongoti ^310^^+ngA?a NULLt ac 62 P  LPBuilp ^5308̯+sl6 [URIs-h,6c@IIPS,6D}3 |@edosctA fI%tF K-Ync"alsoSrib)0s+Cm0n,in-G RH8@Prev$5X un@ q?z.4rc?n D+Prw@ s"Ą "#\jy~@@t%6ns?.& b*0)w7(,B#wn..i0eaH ?*xp~ߢN( %1pApacGC'(APR$"ft=3BHTTPp/Yapr-T^_ (+ alD$;,o, LDAP,=E.E,S'-:ri%_g 21 H tzFf 3lKzoY4J$ HcUe [2ngZNy: .04("~% tC% :mphex2b( pm,8)e#22.&-)rGNOM+S^)]|=6%nQr6'0@KsNI)`kV lCG-arm K*c?e rDx Q n?0+GFn7toGF1.x bra$Cb11~GcA'!(is!>auq(ohere2seME,ine &>)&?55?5&S&9Han46v"ip]A dk |Dun FMIPAbs` @#6um_0+[Ž]=DqairKc[+. 92Ki V-+ W7fky"deiBy`G,i"A 8a lf93"9 ; ; 4 #7 ; / g5 7 8 L }, %061616+]62J8ob,H<:?@SunOw;9_b&@is'WdiQ "w&0š ɧ3TWFpE/90091 8 *^ 8I/E11EB[promMm,.b Wp>3220a.Crv(RLB-xpatBit8BYU 3bypassa ckJ\R/.?k.1[1}LrY_T=\K-ofEzkarH2HwIM/i.Reada:Do D!()TdV21eFhGiY a=r Wv;'Ad \\s9b'nSsTsL 9eSaW copa'Es9yexaJpehis/ s tu2utor&)p*cXU`Z/usril noZrit posmG` ƥno R2po:fee:Ri(aa`git&y -`0 >d &&+terCR[h i256JES<:[r5 aSaBx90(x*ex/ TN2490NK:&AiII6i6@#=K77/ir prefiH!:"6  =Ez"P e.imly_"rh=sPco&sd%QVP8i+er(Re *RIFF)wmas|4, qTeUyh,(v nC,sly 8199ZW$vurlT.1e bOnD2 43YZ'%[a9k= ;[c 37`?_/{32CdV%(UB!client. This updategrades Thunderbird to version 102.12.06Security Fix(es): * Mozilla: Click-jacking certificbexceptLs through rek(lag (CVE-2023-34414)WMemory safezbugs fixed inrefox 114 andESR[6[For Re details aboute sissue(s),eclud impact, a CVSS scG cknowledgm`s,o/rlforma, dR pagm lis,R&enc:.Ttexlive pw8s conn TeXLles of fLinux UNIX syrmsk: atracodӡ-Yallows docunyiwith oldL2700NetworkMan2r isO n+rviceBat m(sdes nWtC2o keep a:.v whev?able. Its capabiliti`7eUEK,estmo/e broadb4(WWAN),PPPoEs wellproviVPNitePa varidifEt +{BugvYb*cwn`IPv6nk-locaddrө r>veBZ#2209355_ifcfg]askBhiInfiniBP-Key IDgbF975)OpVirtuwMachine Tooʱ֢Zo"sour!VMw,6. Vy I̵ mNBDE U aer8 2371BelEnName DomPIND) ^)5Sn(DNS)I3E(P 7(n8d);tl(routa(c U1~; =aisrlybind: ' figdc$izemi@ onUqed y828 7MWebKitGTK$ % eng :vBpFkitgtk: mu"aol@43 Zty8= (W9(ODO:crin;t4.0OOffbeCanvaguld ha$ pross-= gre i404اZInKlu- WASMilH6HPotermissq_ia} ckQ7QCra n DOMParY --of-ndi8NYz 9=a s objY9YStabu ovSF !jC50C6, 15.1W,r&*ĕ67nmookie jaEcaunTcc%stfR_gtNbynumbf,s | 4boM!E RMtbish- MPKCS#11<840e j -1.8.0-jdkI gJDK 8 J1 RuW EnPon *SoftD lop+T>:r# hYl5MslractURI-D(8305312)/farradexc9[L4468L Prepf4t quarn# up!07, 8u38u[rhel-8](9727)_&lnewsgk p. 4!t$lxtdSpoofyTDi!ObrCg41) D-Bul@s Sbg1{I-wB$uPas--n-ses4 dW:-dan: r cdri^notodelP96Ienem;maximum TCP u4 u<ous pqmeUDP.lL,^jit,-grliP3!zJc. -= ETLSPOP36SMTP !. 30036:sub- ʴltAU4yu pos;Ry 9phe Found t : M te^ .hRHSM1 S$!od@`I 389]SQLitC/ (b . A nf"&92N% teA!torle#J#" API(Xd nu"! xi/#w# ;owerJfl Q4adm#hJF{#t Bsql? is[wKfun0-2473(c -{ #sYwa$aCommon(PrinCUPdibbuF n|dep. : K&&,h en7480 .NETtd-f^ fWC-,sS'LRfN0ʣ`I (ѭZ&A)MdU'VS6?1188-= a r?u:(t6(s))d m 7:KeVl:mn*=BX509 C-s9331)XD}stwNuGeherq$symtw7wCE-#@ohcun heap^(+8ÀBT )AD8Sr TPZ XML92   0*$J ws &a=.3&% 2S0A707A7=@7@r@K'L@Elev]prC1le - Tar.YToo*en7ssdAsync me h!317AD6D\20D20E E-!*3.*-s -f*~5RTC>X720rL.*uVV rtgQc *Sp MonA_2_5<)3))3p1Full+of"uQ&(L+of (L> DiagcabG/3Ce" .;p*zer-4"20HC}"2-DKB236C bz"22 2E C+7 0dQ67C)1^p: H Prc486-%zMSAtU.hK~0t;o7Tr~- CogSahsShif16rB @ 98j_1cpyT0V_unixV ev=׃1ۃ322-jY3-j24j%*cj= o0-2(/POS- "p$Am=%m)ڢiG sG6Hscd)7y$3o. W/seq,$ W60 c YH):yld.{Fh$esO`9 R:IVgRddrno-a mN"L527LpQ%06Caih_i] A16 &yrIn4WC>Trla C77EXPrPicOShWCz1M4ML5LJITRegExpS *SH7H 72>&=2Õ841mL6 7TB ^ dia#Q051 Q&i%QErro5AtAgOu XE-@Pushþs[Z6un=rypS`t@XY$?')e!lo(l6sRaB?c lo,Pr e!A%`;5U128d }9d ;d 4icme_H0geCZS@cFNSS7(!P%/gCA[M++(PAM)*war[sO4ped l/%/6/ `loud-ini"e(H75 0. H1 c0al9VunQTisthvbV it0(Of[Wdidv$e[1`_l Wpc(0kthTp `06\153-ipaB1 5bNElo6e_Ere(HYMs0 pwpoHy=je81056 76 K6Bar:ss:s=9al.?504:Sh 3,S8.9@LVNo"9 ($n010($0>CE c ma33539S5'$Ŀs` ?g$?3&1&IGnfn6%Me\$r| mcs]s9TgnnB n *luxDB &TSDBg: goEA:>/htt,?x/ ; [iB %3res \X Gs8A932_HTTP/2*8dm2l CDoSRR=448AISBul itves rdisQawAp"Tomcarv=  @o`#P (JSP)#o`:K4 -lW l~Avahi,$o&DivuMNulticast DNS speciftions for Zero Configur Networking. It facilitates service discovery /a local n7. Avahi and -aware applzallow you to plug r computer inaRK, with no$, view oth5peopleRchat0prQersn fish lԤPs. Security Fix(es): * a:-daem:can be crashRvia DBus (CVE-2023-1981) FmorNetailbout yhlissue(s),clud impact,#CVScG cknowledgmentsߤreldFm;refR pagm lis,R&encc:Addi Changes:ҤjRc%Tiseasseefocky Linux 8.9v No{linkromΔTSym Ss D(SSSD)providesIset of Ƴ*manV?rtrrori7baunt meismsAalsogName Sch (NSS)M!PgabA[Modu(PAM)'erWof \cripthiju vul-y7vm"--suid-wrappg9 WebKitGTK$' e web re eǽ%:vBpF@gtk: ArbitR C9 Ex6Qf42917fGSW! s edL frb5dr whe";a gVer1- ins-bad-free pwtainlle1-jD XFmuxܹ.-aft3tY6qnut\sMNU T"QLayhK(GnuTLSg ,s} y p gorm*htocsuch+ SSL, RD : ti- nelSA-PSK5NV ?zedsa,ss-&velop? P[/E nsattagtt4388EDK (Embedde[ `d UE 7 isa 64-bHfirIQEMUKVM MJ=4vs seboo G  5931RRou is jsofth I TCP/IPTr2;Q s BGP4, OSPFv23, ISIRRIPng, PIM, NHRP BR, EIGRP BFD ff*Fl9  hf.iWgpd/_.cd 840*AOuNbdadBlabel?7?r? 9<yfMP_UNREACH_NLRI-3 UPDATEuss-7234c[EORO5SQL CW(Z o^rgeb&92Ned% leA!tora sk ) API(ҩ xi|&enjo= wn^lexi Qadministy h ff DE8sql: heap-bu -seuzz7104Py\n> pre3, acg,-nQ$g ilup es,ex|%Lhil dyn c type iycC, wC.vous̤;ap}: P.errorem/addr.p9 'uG. (g5UuVa27043b891 9Apmc\ rvlete4J #P3(JSP)chnoOtq: HTTP sml%rd658GUmaxmjdbT 9MaxMDB[K:r tidump_ey_X_()? 0-28241mtcp|i4 uf4te kq5d6=8/a;& orsp7e s^I6u ed &2ra%V . la&^66EI> b5d# N"re(InpUV;oo(4s22i G618Ji- t6rovx&c6) MI8k!-CnutCptkeep aKe:.^FI;2V:uUE-nDwirel_,b7 adb(WWAN)=PPPoE,b( TVPN iY9(]of?+?Re3sX'ave$'48/etc/lv.c@ 060[FJ8.7 ]z's 9ml-|I`is/kal )y49689n$-l'a-El:Ul$* aT(A<,m}5ϡ8-& da5dbo  go-fips/A5{H^-ge8payloac39fTRIAGE &%c-pcp:@3054AfeCr Oc>G?t=InfluxJ1&TSDB${V~3]Berk yw (BIN=Nn  ( )^EaQ%(na4); (< g9o7R S~;E=vfyIP pI(n*a(l'\(iTiSu?UIPgeiwntK]!ubk S'dhc,3P2agtISC m(h:Y. y\8'sx3 s r44>%  DDE2D :D D*,DdetQvECDSA8E)3478W!_h toR8953=+a~ of(.@ y4flaw})n$p$m_vk\pulfp@i f,t,ra#qu.d7Ǥ{a,=ru~(Ll e o>tig:",/E.d/]*J" hy8a6l, "RjBw0 <sh@limit8K :੹ "- "y  se, "manÆv%dvis#mk. q+asX0 ,t| grep "Jmand7,!(B)ue)",۝dtlo^SR beitXme ^"LR|*.f 9_": Xxu8"ca r*ib48= [20RRFC 19 rT FzonVss>;My “nxd-!ɂ”g)51bE!_6m &-eքdu %5679xS3h7q ]n & :/b652/X2R A210C GetB.g-le w"+385+Cx + - mizeRbbTJK0uAo rgu`, ^,g)R\ar)promp^d 9#].i cjj-E.Ro_'%,HMzeFWP] dAlH@s--mm3J6-b-a-5a-10b-10e@j"-1F-jdkWJ 8EnNbon*!NCt>:BE!(;B&,W(83mD10/Ni CC1iQl DY22cYY&200 cJ/J0-JC25fS" 9_n_1s"ray"751\9cO21+Ϡe?/2Fs m5708ƪ~?]6@4M^CO4ENUATRE3kn1+l5swekIPsecIKE0 .6[!%ˢ:ustt !Wo*;e&o+,sepw|Tee\P@nuu$F"lW%(4)l@:cSowK05ZN3 MhNW0u?(VNC.'dvBY"$usa.xaGQ.)9eh;o ow!s7,8@" 5!hdp5YuitaiG8-sTg,xorg-xy3e5bN/,F$P(XI@SRed?U6)aPaGD7a1aUs0ZOR@n{tGlylKZ'F=q e(/POSIXp),Ah%m)ڢi%re7scd)$ypjGGWitdseq6n1w)g1ic@@-;I9qAGi7)FS(LF=3I->As~deos,$1eZ)J t1I !19}C''e.:T/httwx/ SunWu o ;sM:-2023-45288,VU#421644.3) For more details about the security issue(s), including impact, a CVSS scG cknowledgmentsnd o/r relatedFformation,ftoRCVE pagm lis,R&ences:.T chang,>is{easseePocky Linux 8.1` Not6linkTfromR~0libssh is rary whichler6f Pin' ZP Z3}QatY s [1[asN}cI 6-strsU> >Pykna ped, a, o- nQm*ngup,h ,a8 oy high ve a typeL l. D yllCB.vwowE; p}& vempf.To!D 659Hzi9/vuln|E-bombs0 :olniyf 045Jtunk K u D sr,1lYsm-s-sKneedupdv m.max_map_[k2124kxml2E dopbox XML u:--free?RUer?25064 0@ &@rpm-ostW r:PMamlOST; oot7" ;s$ oZnnשs{ "-:t_tr&Xsro <slkB dRw /usr/T/32243)I ;ebcomizOOS a$ fEs, VMG i%nosS unphood--sr: r} disGPGosi Q307 ~f-ag-c/. cript%h-<powerJus 7p w %un/!nooAcibrercxpvܥe. url3: {body ppWr x Z303tr@me:GET580 ! cryptodome4M-Dn  OAEP+din C9Jx~232ljaHTatbutlpaduinputkeyo9 2195ÀG)i6tain`ttWoP1S1PDF docu.Pss42mbitmap s) Cp2prg: Di>zeroPeps_A_AgG psn.c0-21710~X.Org X11 Xpm rum-: }R u lCre<4 FB()378fOoO *pM? ~!}WebKit$ / web engt : Bp/YFBgtk%ce) \  lrexR041%?Z2852AZk213ZaU Noi [_14-1745wU woBy aloua;xt-to-speecb y';1 59h6M aRe e{]GStm5 Sj9928!P198p(5[.[Y+90dA[l;rd pbe fi{r 06C/ -SJ;hHTTPH #(poo=BSPq }:%okihisn'@(crossg#438+ LibRaw=?fo}RAWstainOd,ta!hotomZ2RW/CR2, NEF,<DNGs)G"A" __sh::zs()#src/w .cp 1942L@(9;0# D }5(+ "` eff.nt "0r%fulx xcap^:rv++X lz t#}Dra`  -e:-(`6 +,84271Æ9 M*+f6(PMI)p+Vu(M "s%MI0.as%QxR-r+s 7)Pcesig ,us ( nQe~snm5./u0_\X0hipk #1~}!:v2::ASN18)& de Y1uc@u BER/DERil erl-g-f: & 91f3:t6op via /xpec h%3-74|McMm9a.,4 >,8MIME e-m{/. K4m>!s --m1Ma.r,4Ap?PPOP36IMAPm7z871D$3m;@o(l?hs\+s7";c\2gVer1-DdHO-1-f*ji:<geCl<wrmMXFbha-mM (o04IAES3Ddiz5ziw.265pAerxlH9tG,ymGpulaDTaggh4FAF (TIFF)=}(-of-<)B xE/,?6#@ExeBLyǪE!XMP1aeQ: # nLk#xID3V2#0-1865 ?`#_N!e| gooAa x -^ed @qua@,5=LGPL lF P: i" FLAC:"tag( 37327C:$X;J9Fz1tQ pz/%.1 Dj8spPnoDydx buinl\Ti an?sHenviron=%1Z)c:hby>1.NQC d4ftw Sbjmf \H E severb  ICLR;#U8[z6.0SDK .1305R7L( 530 >}N0 `shg]FnHeil e\dU'V3731989dot? vDouKgH 00G@%"=ASPdud lockHttp2Out3 9 ducpS5 Mk&Xw:WR x W2\ `fc8055mG1Lm*StdgQLF<Bl"nWv(sa_s,5uke\a8S0 `Cfq? 14 R g/h, x/ cm numbSf CONTINUATIONjssfS3:|)e/cJjar/"cisҳn(DJǤ8tK[v9v:Onio,\.MxjFUMU/x50ooVqIni_eanN0 blk"]gork4 7T*@SCAP<Gu$>cCApjTomca4 leZz@oer7(JS\t}QnWg]Fx:/2Mha$-54=Sot0J3HloSUshNR367u,8pebHt 9c87GLRocky Linux-35813) * Amend tomcat package's changelog so thfixed CVEs are 6tionexplicitly (JIRA:h8548hFor mo7detailCboutYe security issue(s), including imt, a}SS scG cknowledgso/r relatinforma,ftoRơgm lis,R&ences:.Mozilla FiDoxl open-source web browser,sigfstards com(aZ, per portabil. Thbupdšgrad}vers 115.11.0 ESR6SIFix(es):f6: Arbitrary JavaScript3tKPDF.js (-2024-4367)DIndeDBlr΢>privmodeM7MPotFalmSquest bypass via cakjVQ8QCross-origrespPeould b~CuishetweenR noԤcon-typesu9uUse-after-freemoc whenvdK70KMe'y safebugszж126, ,Thurdo7 g躒kl mգnewsgroupC]La]* E2 5nor5702 n8obj( nsplantJ68/ExFnrotocol hl leak#y timattN9 S=bofram'wefable)s%trisñW windowl1OIm?0OffźCanvasH3rCorrup Text Fra?6!72n20) FNpy.mbuil,ribut runn-`wktop ap s z:uescape&RjB l~3246v~{TGhostsuitiesreP1Sdocu.Pks4c,hm|mapcϡ )canye r7edg: OPVPvice ZKusL DNlib(3871^~ 2.1t6<N3RQp-L$CI  GitedOviMr!with*ecenliz,archcture. As7posk'SsT-"  l, ensures each copy of<'revit exact$ca eChis/. anotall 2usXr)ǮnehaveK/ush#0iirf, butms it poM ǥnoniRsives RCEv0-whil-loc646addi)/d465-in?eFrdlinkY20+sym!'>X.OrgUi΢z_AX WS_. Itvi4 basic -level funhalull-f١ophif rfa up`Bug[Xorram^c(): us%le/Ovari/fG[r-8]feonfig(DNS/semN -( v1P2713Suggt! OXtSff40d1a c '_'sma ro#.10z]ʁ971[][ESXi]VMwC a}tme[ ootguslose$aƍˋ32841Nj< lways llÖif3fi#5098) [Z6701]CoZ'/COS 8 AppStream a PCP, S# ;WSoft$U)D?] r! Hos4694jinja2s JUp0 ginte p.1a Dj' oLp d XMLdx s$l\`ry@8w environ:ceƦ޲h c act 406XNmst* F non^to mss " eas|Y lave1nime8ssfy eTse a`thga n"hbUgAPIdmNi xrS`<WAAdnhtowNMG Hr x3059)~JQ fPFfrKcHbteq\ 37827>Jaio#s@e6mon uhk,I/O aciSar6vhugU"~dealdsAk a .U551J.NETߴIdg Q<M w +subaC-Zs|K CLR N08sd`PJvulnf's#nd ilGdU'VSDK 8107Ru%E7 dot: DoSu .Jsx0103ASPC8152:1arPX.b9OzIde809j-21-jdkOJ21E+MD$op,Kit?CheckEl~array in (8321) 114 Qp UTF8s zeC0C31CExvmbol ngan\in e7 X98nX8X () -Mt0&0\Out-of-vss(2D"8;5ǭ4QRk dqt5-e Gt xml2 ]3Q# qtP:Delnmmun}l ryp()c#d9936-qT83366oRcond gUC1Cc c>@4 fO  ipula TagVFF(TIFF) \}: HeapdaChopUpSnleUn c edStif_dir18-1520&iB^O^//}/ crop3-25433JhӴcpToTU^\6228[Se Nin YRRGBA]()0[o e of k5235P 4us* rl7 echno/!ogei> 'g nu ii2 dm40?Set-enh. a~3S"youelildE1, ely Uc(#ncld9. Nr Z̳Ӧ} =o",+ipkg_&pa/emot&#deload" _] &ule\S3 BubjwraA/usr/bin/b)rCun/e@suid bjryUkel!V)AXD0CsC%p9s= (--y42472ApT6 "3 '#P_SP)Z7: prop@HaC n750u ,--gul$x,fi'q 4view@YDzAutomzP((SCAP)Q!.coitutcata19ofe"#e\adQ , #yIg bwhere4 -bridgf3ge.&po:yUcvg4E}8.7//R]Wyerv#2crox&nd+,pain 181)CIS L#1 r<"0 GUI":&JMUd(rrT'*+$ cdiy#ʩsed*;Ase2Dwi-5aly_fT(T938;NSSI-BP-02!ry)RT ssd'E 49O 9 Bel"maj2n "E( s &"tyC |st" ʒ712Re j0J-74)L538'L 539s= ]434-vpx DVP8,(E$*enc$! e w6C , uX'WebMzZ&{VP9 34GICi pxw&g_'i519;7`hN^"(r  (to'ac.!  dfWtN=31L68nss: W@1BjIIPS/ ;DH_Key()be$NG_Iwa&Ecal^26OPK11_E CKM_CHA20rPa1latx!%l[1y BZW$576)_2: }:5/).2"(%mTypnfuup! ^)" blo28381fX\+i,2$W0)&* E9/ J'=anĂ2Ădidasknfib": #i0f3fG6=K-c rKX$rtBsOOM j4jWASM tinvolvAD5DS[ E!>**ansifpups]!3a6a30m7C2ync G #eR8ES76 5XTd8ashֹrQvXc2Oayz3;U]J8.9 -tiCd-e% 1kP B-Pilol1h BAS!acquis,<)si,8pmu,s lUt-we=<.PruH/ly-K =  /cpmp/:?4Dng,G4>5IQcdL#  0m5c#= sOkJ3?Y*R=,Z-,DaZ23hPAP/J:yhv7s-y(`e@$" ":rAK3majo of9Ԫ-% 'sh b| 1Kr:Ɲ  ke u< ptkA81@ÿseVyDFm + G+EP~?L`lv "k" pre g un3*L.&uN"1-0? I$ N maVT ZIP-/Dg( 0OFO F NVD#o|GTK+Za6 1/C!tk's pL;:;L9"CWD65D6,crm_;;m6Vaw!ID499/A> Cq//25SSLv){0a#a >v"DiGaY> !"pi#4T1:! UEFIX={CmMba 64-bHm>IQEMUKVMNMttpE@edk2-ovmf31122-6.el9_4K04kgG-̫aemT B$@j ecrEb, <mC9lmlUOV -!KĮt;2 %E-100% CPUD?<"1!D coZ,U!MAPWUNIXke rCE m0|n mindc[0kmPOP3t e- iXrIm.% SQL )authenttplug-zas@A6a;d):"a s:P A :tSUD64-Cd aOCs#! exhaus@m1:b/ l ^3 ,%dFMiNNULL cA?ccXpb9.4844H,SLE:SDI (LF&Nl1?Mao:(s,Ie O4%M6X1}-U  (/gob:x YD)<Vdeepe u anu*s 3E9A2]ZKfac)VM A OSTbmmi%3ucosd6hooBe(sqM9Tu, up5*diy.to Imf!tAU]6-coL- Ar-fips/.sl l,ihdeRSAy1 HGraf  ,(0 r !ss K' edIGt=Influxf&6TSDB / ?Ci5d -ED}F1}c`$-"H= s e&F, # :oC`k 4i$gIRUP bonviTT:tb&$ 8dUDP INADDR_ANY:631 bei'0*b`cfGeterAOs`N0 9returIPP=i7076pp hC"po$\E PPD!w)6w)3 -(S=cr!d2T`)j( P 9Gp'1'31d403dkqk7/rG#k,,1>'2ыbT*enr_H*8 Q"JIT ilþ0$[aQm_cer+6k(nLif #/rQnh3hJSON i4iomiYqt:~dB,so39b/y33cpY6oY35W35YnYIO.(- M*.YvSoBLi)Q434ZD Jsus>&?tish flo]?P3P'/Z@7[<M3) * dotnet: Denial of Service in System.Text.Json (CVE-2024-43485AFor more details about the security issue(s),Scluding impact, a CVSS scG cknowledgmentsnd o/r relatedFformation,ftoR pagm lis,R&ences:..NETman5d-softwaframework. Itle+subset*WC- APIsseverQnewiteICLRZa N0:s sd`that addresZvulnfbil ; avable. Tupd6U'VSDK 8.0.110Runtime0SmFix(es):8kest: closan HTTP/3 am ccauseraYcondisleadremotde exr!q38229)yMultik?0g&Mozilla9Doxn openurweb browser, MignRfstardsliaZ, per pK7f}: Use-after-freAni *line (128.3.1 ESR Chemsp)9680ThunderbirdAvlo mգsgroupihj-11-jdk p*%provide chAs. NotThisnkZ.  ۡJnotany urgb dZShGoߪW&>AeCdocuì NEWS^lxy3araesGvv@igur\I[erN'ynamicjustgֲtopologysmñ%otpri hdedia how lug-imwaIBu!Enh(4L: nthX100 byteRPACչont-Lengpcould Q4u[rhel-8&0] (JIRA:Rocky Linux-30660)}ttSw<' W1046̆duDisp+Wbegnϻumart/x-mixreplpe|1|PermMk via embebjeV58VlayoxaccesU9UMsafbugs(x`132,7C4:'97ьClip"pa"ttGpacrosxabsX5XDOM pu`cripm$agngM6Ҧg$"oG3GOA2rmp+bpoofoURLb2Ҫu!dlayhvtocol:rj p X.Org< iB#$AX W  as -lx fa full-fe. u%sO# uponwxorg-xs.er: g nc: he r vQ ge s~9632BPFt!highu j # d Berky X"%FilteU)%@kKel4.x). uLLVM abUdile [5-b ! makes"BCC:act@ s,owells.%cap":$(kbe粸J%u%poil{iG{b|&wk9C@peorLr#s DTI&Tap1bpf=: unds2#Ooaoed l-hdr2313$!rll (e)9toolkr(,(cre%effic9 nipulPg$s.»n s.cc>41Q qJs eu[annotbin伕ralsoHex n+osVi<  On7]G0re,d yatrect9e9 wasdN&- utomcy agccNil flagG-rpm-m {CTُl[+\ y=nojidƲre h mƻAcc-et-13-\b-n8ll].soeadgts-[z53572)tiffxfk ykTagF_F (TIFMN}: NULL |derevif_dir.c:7006:Vulkanlid7 ?[Ere (z-+): gls4)F6 v-L4L}J5Jv՘6M L7L8K%-%W9Pyn v*2nl dtyped#J m1J nsph L r2wes, sive-kjh va7/^ g-:y0j p=" ".u:n K;3j majof03sԪ -%shed4a~Kr/*ǝ ked utkest8 ÿse<lyDi +P d#`elJ%-"gbur"3*L,nu"1-0 q1tar<:8Do ex kylel Suej 62j%a v-or.mod\!,a!,n y8  8 ypl.uup m$ פC,Sto!w)X ;s*S3 L-ro E cSAnM .@ \ !!co4s# "` b6++Hel!r.yequ| ea0H+rediqsDS Dgz defV ,tliz0ǀP+sAc/SOCKS'100%,g, xy-h znstrA2" V 37`) -ȫ ^POST .FRDPE&"R BDesk.\t$(<)lee"h$1Ahce,'xardpB좾"Mi5x#/chinvxJVirtBok Can'tg FL30B G!i.CD.CP1S1PDF Ptrp s4K mmon-tma#"ai)N%e](Y0U~mtJL>ntlar sW6)617"D)4>PZ/-Pil -$OE~2sepm ORe,bvCP;5!G#>,XIv5Z%C5haLt3rCCZp 4lM TC&appls!mURIn)e84 B o! deA:D tu3539i:340;#4YQL8 v 3,6)GDB,GNU,g3a s ,ZKᩢte9.D&C++, \)irT3FJ8.8 )]Ddb:pec}gr  [WR040 dwza2 m DWARFx )HELF#a! ! Zy a7Xh^̤8ihm&hqpoR%gdufxapK?i64/_TAG_i _uniI Zn~$(CUs)v9KPimedQtrA  $eaCU|V [T 8-PRP'J?PLAN-1696FBtiL as,wDG"$]2a mi f | g?f^F5E& )H) mA ymb):)>#copyѡ L3dHǦykQȤ6)#HȢ?n?!llVGv Awh2uorCBtrE mv\ E2lFTO& EtoI*)U[b,FA zo5y-bngw5xHB/s>y NOME[:"%%D#et| %Gsmnf  nuZzEysj;ͷ 6of5Uin':my*-DsvGmT ;in sh_&s118-1269GS/e0eg m/Va'7fc8sR on;gV- v q-- 5Itm: EXIFAtaEP)oOP445:Lek K. [U$1:CLIbH&#defo+ubuaOb'"h ".#][!keR/$[.%$.f6/8.x]5gsuryA LE upa254$R33t,c8()?7&?-w'0~wCst# 2D "M403SCin-E8s ->*cret "sql3.Oi0EY|oO"e587$ef3ghtwe ar+ 6D  <$s,OSW1Bvcg focV=ongP%`,*Mr{UBic3b1J[orc4faM_3/fTU 'b'Ÿfdr yOgUP9 RC 19031216276jg2 (9.0:X 6701)>sS=1.8:9%h>hW0L" p@(VN@dF1?E)@iewGd"e}X5onxs%,GVny 5rne&!de'SYt%(E"-T _BFCm2&k 9k#j6j6j36j(f3`MCglo8m1o6)CgoCWeb"]GTKo7`C U)+&e/e :VBschruEum-ON gNGLE 5OFgtk: 2 P malFl]-Vd&$a / |071}O+]bN]Yad:i d 'i0Ui7cPe#^2gVi}QngڭspbarN8O\ASeR+beh_o';971]hTr)?Vm2abe ];#x3`30%$5*exl_1AS Q}5h}2448}v CPo LDA32@ex)&onymbinr`Tsssd:GPO"Cg)__W@sb7 L$r{rhbz#219d+1MEC"D=o., '!- ?e7_n& G>AD7ׅ7[LabDP_OPT_DYNDNS_REFRESH_OFFSYInxrr\=h6A V'*krb5>ibv=Sambci YSMf BlojSMB)t6C5;(CIFS;g:=PC.a(z6ho",Zoismbd-7$d O(n*n)d ( htt4//'_.s../Jw_.cgi?id=k30 )w37L087 is the port of able web rendering engine WebKit to+GTK platform. Security Fix(es): *Fkitgtk: dataro1ion bypass vulnerabil:(CVE-2024-44309) For more details aboutspissue(s), includ impact, a CVSS scG cknowledgmentsnd o/redFӣ,f pagm lis,R&ences:.Mozilla ThuIbirdta sttaloSmգnewsgroup cliRtL: Pot*ial disclosu*˩intextOpenPGP rypmesso1115o* fiox:hCSP BXOExpovia CoptiShimsa694aUnhYlExcep$Add- SignatmVficE^6^Sel could bKhown ovan site_2_Mey safebugs(xF1 133, ESR 128.5'Ō URL Bar SpoofManipuPunycodeiWhs+har3er5mImprop2Keypre"HɢwExTFile%nFmDigk7ٺ]-sourg^browser,sݡRfrdmpliaZ, ] i(0Tcap--guid& rojvidecgurX sykm from'q po4view. YFspec4  AutoProtocol (SCAP).stitutc 85l henadviwkyIg`nmorequLwherpc(-bridget gaptween ge liz\po:yUcvl s.kf c|7Ir;asseeI#NGΥ$ no(1.NETra ldftware*< buff orSetTrans.wr()225B GStrer med bBdpefil s x";lVer1-plus-good pacontaa laN-<-=@qua  LGPL lnsel͒:Fini ck,Matroska/a Mmuxt47540)`OOB-QOJmp4/qtJ.cJ37JCt_to_s334_1aL9Lnu er,[4_gdk_pix1_dec_flusha613aZg\w fl7QP4/MOVKʭoco o cE `-of-ͱsČ0~ "Nmai5u7: ha-/,vo s__ide _et8)yIgOgg615OϹCopus=parse_h_0N Ser{ NSS)$ =?sacos-&op?en dvsvP  A shkeFIPSw e [rhel-8O .z] (JIRA:D 12J<31InrtB orsECDH9595789־G,N@Ki NmaRSA-OAEP unjrd 66*aS7zppc64le-di/g_NO_INIT_SUPPORT fooԺc87290g25)mgUNIXiS{ (CUPFp*layZ,Isimilar cups:ppr"cMin ate>( l2PD4717N9'Use-af-freen|eak U5-02&F@FuIusFJavaS THSef U41UAlt-Svc ALPN lid3fMcr¡ b446r63O15.19˟7&ٳ/ Cnsus@GuW depub 7Qqrtmis[{ 8JSONĦ` X iO l:)c! a}ly@ dpayJ anWexpqpD5 544 !Nn5021nJd5[eI to`mdmaximum TCPndwidthtupaUDPiss\lreLDl~jittR?e-6 l/ -iP: D`Su  DuD@358i dpdkT 1D Pe0u n rivfastaek`user ODesthyp!sB DPVhost%1B%+j ORapwRDF Pr TkitRedlz@p@)t lesʡ$/XML YN-T. rSjp nda"I#t*7823gco C(/POSmthrp),Amath%m)ڢinam/cachee(nscd)d?+ mults. Wiaq,$njnl4)FuiQ NeH$P 2961AlC HTTPeWGNOMEs[: "?UTF-8 s[-)6: __sAc5253tz8Gsru@Y "zoM$0#sa [ 8 7.B7B11B9.5764322gcV+ C, C++,U , Obve $Ada 95U, jqu!v tru: ta HTp!sDOM m+)34 hod0 0% +n&/n&NewK#V`add[*Z2njnF(udU'V&8&12&.12# otne4=VisC#StopC}E}V25-2117 UEJ$P W}1D3D,JF,2#{V|Ct+:O1UGNXdr(fe5r$ rB- shbo' e!o!G,1#(xDB &i:TSDB{go-g-argu !42ld!)@MF<DoSNG5xlg[JE21 t \E8.+S;:<r(0zz0ja2: J*bbIx#og"xsN632,SE7~MySQLzMua}Reu,mysql8lg1] 3a'9604.:ifWMsharenee92_runV*aa'j7againzVnMWM,qWr;at-cwkNp uoTs Red G v79"3MuI 2osiwm ) Ap}F+ktopnGL Obv&P-6s99nheriI8Mcńa9#usfCltKXSetWMHin0gno352860keep|*h \ si robust flDloa"/lW(M NP ) reoi~/nLw@:yTIPB5S#(IPV1*)%t%y.(4 (4)Ō.R=)Gadap8lyS0ACkeVpc"ac lݤ*sÝalso¢'RouunC 6,willO._//7053C "%k")&iJ.no _ mxfO8.8.eu:a a,ngVs ~cap DNS D/ECol 9le8reed[mA2nyo7l pesca-148-v:L|D_!'V8(@Lar9DS](LF'R= l!la", *os, gWcl/Y9i s^GF'}storc*a u eG-lf1FSD0mMex 8Ccre47als^RF95~ #"Buill TBB6 > bstB-tUneceL!mal"-1 1J([I((7p(7uD1~I4Custe H lRK0K4I)20p)& kK^P:aUҹ9(~ sn *AI1Amb(m{ i]=-0e1XSLT?#?C*@8=engt3aEp. dĔ 4MĔdu7r /z/MX7~-^nsaDD book ť OܥsAe-+s"7`4QAPe7,1e(Z05 c@~)-n -13-) ?T)(:iCRD@"hM)O-O35E$2,903iM80R creb`G,^HexGosViyD On7>F CC u ~at =V/c3-dNR- vSin[-b=3flag(GX-rpmE{C4UُLLVMm[YhvUySgiUdƲC;oy?}ƻvGTS 14.1 Aibin(9E]4Eͧ"MAYB: t>I h"i "[ZE/{7174(48/31rxml2zJP"<"G9u:5 XI# N{2-4904(9?#9_cJ_waitCedke(swbz#25847) 838BerkpUyrnN Do (BIND$ҥ)5K) tt EZ (yd); a(rout" #musH~;=Wais Kbi9:'$c\YLa9aCPUhaus@1iYAOq %2PIDgre( =*"stVKn E$p*(:6Z3ut`syx6#encouM"e[S3][MCD] MedLWcraR'ck.(b [ 839Va