Tuesday, August 24, 2021
LibreSSL 3.3.4, 3.2.6 Released
LibreSSL directory of your local OpenBSD mirror soon.
They both include the following fixes:
* In LibreSSL, printing a certificate can result in a crash in
X509_CERT_AUX_print(). Thanks to Ingo Schwarze.
* Ensure GNU-stack is set on ELF platforms when building with CMake to
enable non-executable stack annotations for the GNU toolchain.
Thanks to Tobias Heider.
The LibreSSL project continues improvement of the codebase to reflect modern,
safe programming practices. We welcome feedback and improvements from the
broader community. Thanks to all of the contributors who helped make this
release possible.
[USN-5051-1] OpenSSL vulnerabilities
Ubuntu Security Notice USN-5051-1
August 24, 2021
openssl vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 21.04
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in OpenSSL.
Software Description:
- openssl: Secure Socket Layer (SSL) cryptographic library and tools
Details:
John Ouyang discovered that OpenSSL incorrectly handled decrypting SM2
data. A remote attacker could use this issue to cause applications using
OpenSSL to crash, resulting in a denial of service, or possibly change
application behaviour. (CVE-2021-3711)
Ingo Schwarze discovered that OpenSSL incorrectly handled certain ASN.1
strings. A remote attacker could use this issue to cause OpenSSL to crash,
resulting in a denial of service, or possibly obtain sensitive information.
(CVE-2021-3712)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 21.04:
libssl1.1 1.1.1j-1ubuntu3.5
Ubuntu 20.04 LTS:
libssl1.1 1.1.1f-1ubuntu2.8
Ubuntu 18.04 LTS:
libssl1.1 1.1.1-1ubuntu2.1~18.04.13
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5051-1
CVE-2021-3711, CVE-2021-3712
Package Information:
https://launchpad.net/ubuntu/+source/openssl/1.1.1j-1ubuntu3.5
https://launchpad.net/ubuntu/+source/openssl/1.1.1f-1ubuntu2.8
https://launchpad.net/ubuntu/+source/openssl/1.1.1-1ubuntu2.1~18.04.13
Orphaned packages looking for new maintainers
are orphaned for six weeks, unless someone adopts them. If you know for sure
that the package should be retired, please do so now with a proper reason:
https://fedoraproject.org/wiki/How_to_remove_a_package_at_end_of_life
Note: If you received this mail directly you (co)maintain one of the affected
packages or a package that depends on one. Please adopt the affected package or
retire your depending package to avoid broken dependencies, otherwise your
package will fail to install and/or build when the affected package gets retired.
Request package ownership via the *Take* button in he left column on
https://src.fedoraproject.org/rpms/<pkgname>
Full report available at:
https://churchyard.fedorapeople.org/orphans-2021-08-24.txt
grep it for your FAS username and follow the dependency chain.
For human readable dependency chains,
see https://packager-dashboard.fedoraproject.org/
For all orphaned packages,
see https://packager-dashboard.fedoraproject.org/orphan
Package (co)maintainers Status Change
================================================================================
ant-contrib java-maint-sig, mizdebsk, 4 weeks ago
orphan
apache-ivy java-maint-sig, mizdebsk, 0 weeks ago
orphan
apache-rat mizdebsk, orphan 2 weeks ago
bugzilla2fedmsg orphan 2 weeks ago
cbi-plugins eclipse-sig, kdaniel, mbooth, 1 weeks ago
orphan, rgrunber
eclipse-ecf eclipse-sig, kdaniel, mbooth, 1 weeks ago
orphan, rgrunber
eclipse-egit eclipse-sig, jerboaa, 1 weeks ago
jjohnstn, mbooth, orphan,
rgrunber
eclipse-emf eclipse-sig, jjohnstn, mbooth, 1 weeks ago
orphan, rgrunber
eclipse-gef eclipse-sig, mbooth, orphan, 1 weeks ago
rgrunber
eclipse-jgit eclipse-sig, jerboaa, 1 weeks ago
jjohnstn, mbooth, orphan,
rgrunber
eclipse-license eclipse-sig, mbooth, orphan 1 weeks ago
eclipse-m2e-workspace eclipse-sig, mbooth, mizdebsk, 1 weeks ago
orphan
eclipse-subclipse eclipse-sig, kdaniel, mbooth, 1 weeks ago
orphan
eclipse-webtools eclipse-sig, galileo, mbooth, 1 weeks ago
orphan
felix-gogo-command orphan 1 weeks ago
felix-gogo-parent mizdebsk, orphan 1 weeks ago
felix-gogo-runtime mizdebsk, orphan 1 weeks ago
felix-gogo-shell mizdebsk, orphan 1 weeks ago
felix-scr jerboaa, mbooth, orphan 1 weeks ago
icu4j fnasser, kdaniel, mbooth, 1 weeks ago
mizdebsk, orphan
jakarta-commons-httpclient java-maint-sig, mizdebsk, 0 weeks ago
orphan
jlems neuro-sig, orphan 2 weeks ago
jsemver orphan 3 weeks ago
libcommuni atim, orphan 3 weeks ago
libspf2 orphan 1 weeks ago
lucene dchen, eclipse-sig, jerboaa, 1 weeks ago
lef, msimacek, orphan,
rgrunber
mkdocs orphan 1 weeks ago
mkdocs-alabaster orphan 1 weeks ago
mkdocs-bootstrap orphan 1 weeks ago
mkdocs-bootswatch orphan 1 weeks ago
mkdocs-cinder orphan 1 weeks ago
mkdocs-markdownextradata-plugin orphan 0 weeks ago
mkdocs-material orphan 1 weeks ago
nohang atim, orphan 2 weeks ago
olpc-netutils orphan 3 weeks ago
olpc-switch-desktop orphan 2 weeks ago
portals-pom orphan 2 weeks ago
python-django-braces orphan 3 weeks ago
python-flask-script ishcherb, jkaluza, orphan, 0 weeks ago
ralph
python-getkey orphan 3 weeks ago
python-lunr orphan 1 weeks ago
python-mdx_gh_links orphan 1 weeks ago
python-opencensus orphan 0 weeks ago
python-pymdown-extensions orphan, sgallagh 1 weeks ago
python-ruamel-std-pathlib orphan 5 weeks ago
rhino ebaron, orphan 1 weeks ago
rubygem-hashie jstribny, orphan, valtri 3 weeks ago
rubygem-logstasher orphan, valtri 1 weeks ago
rust-line_drawing orphan, rust-sig 0 weeks ago
rust-tower-test orphan, rust-sig 5 weeks ago
rust-tower-util orphan, rust-sig 5 weeks ago
spectrwm larsks, lsm5, orphan 5 weeks ago
svgsalamander orphan 2 weeks ago
takari-polyglot mbooth, orphan 1 weeks ago
tycho eclipse-sig, kdaniel, mbooth, 1 weeks ago
mizdebsk, orphan
The following packages require above mentioned packages:
Report too long, see the full version at
https://churchyard.fedorapeople.org/orphans-2021-08-24.txt
See dependency chains of your packages at
https://packager-dashboard.fedoraproject.org/
See all orphaned packages at https://packager-dashboard.fedoraproject.org/orphan
Affected (co)maintainers (either directly or via packages' dependencies):
akien: jakarta-commons-httpclient
alexlan: jakarta-commons-httpclient
amdunn: icu4j
atim: nohang, libcommuni
avsej: jakarta-commons-httpclient
bkabrda: python-flask-script
breilly: python-flask-script
brouhaha: jakarta-commons-httpclient
bruno: jakarta-commons-httpclient
cheese: jakarta-commons-httpclient
cicku: jakarta-commons-httpclient
cverna: python-flask-script
dbhole: rhino
dchen: lucene, icu4j
deamn: icu4j
deji: jakarta-commons-httpclient
dwmw2: libspf2
dwrobel: jakarta-commons-httpclient
ebaron: rhino
eclipse-sig: eclipse-m2e-workspace, lucene, eclipse-ecf, tycho, apache-ivy,
jakarta-commons-httpclient, cbi-plugins, eclipse-subclipse, takari-polyglot,
eclipse-license, ant-contrib, eclipse-gef, eclipse-emf, eclipse-jgit,
eclipse-webtools, icu4j, eclipse-egit
eclipseo: jakarta-commons-httpclient
fab: mkdocs, python-mdx_gh_links, mkdocs-material, python-pymdown-extensions,
python-lunr, jakarta-commons-httpclient
filiperosset: rhino
fnasser: icu4j
fujiwara: jakarta-commons-httpclient
galileo: jakarta-commons-httpclient, lucene, takari-polyglot, apache-ivy,
tycho, eclipse-license, ant-contrib, eclipse-gef, eclipse-emf,
eclipse-webtools, icu4j
greghellings: jakarta-commons-httpclient
helloworld1: jakarta-commons-httpclient
infra-sig: python-flask-script
ishcherb: python-flask-script
java-maint-sig: apache-ivy, jakarta-commons-httpclient, ant-contrib
jerboaa: portals-pom, lucene, takari-polyglot, tycho, felix-gogo-runtime,
eclipse-egit, eclipse-license, icu4j, eclipse-jgit, felix-gogo-parent, felix-scr
jfearn: jakarta-commons-httpclient
jjames: icu4j
jjelen: portals-pom
jjohnstn: tycho, eclipse-license, takari-polyglot, eclipse-emf, eclipse-jgit,
eclipse-egit
jkaluza: python-flask-script
jorton: jakarta-commons-httpclient
jskarvad: libspf2
jstribny: rubygem-hashie
jvanek: lucene, apache-ivy, rhino, ant-contrib, icu4j, jakarta-commons-httpclient
jwrdegoede: jakarta-commons-httpclient
kalev: python-flask-script
kanarip: libspf2
kdaniel: jakarta-commons-httpclient, tycho, eclipse-ecf, apache-ivy,
takari-polyglot, cbi-plugins, eclipse-subclipse, eclipse-license, ant-contrib,
eclipse-gef, icu4j
kevin: libspf2
larsks: spectrwm
laxathom: jakarta-commons-httpclient
lef: lucene, jakarta-commons-httpclient, icu4j
liangsuilong: jakarta-commons-httpclient
limb: jakarta-commons-httpclient
linkdupont: jakarta-commons-httpclient
lkundrak: jakarta-commons-httpclient
llaumgui: rhino
lsm5: spectrwm
mavit: rhino
maxamillion: python-flask-script
mbooth: felix-gogo-runtime, eclipse-subclipse, felix-gogo-parent, tycho,
cbi-plugins, eclipse-license, ant-contrib, eclipse-gef, icu4j, lucene,
apache-ivy, takari-polyglot, eclipse-jgit, jakarta-commons-httpclient,
eclipse-egit, eclipse-m2e-workspace, eclipse-ecf, eclipse-emf,
eclipse-webtools, felix-scr
mhayden: icu4j
mhjacks: rhino, icu4j
mikem: python-flask-script
mizdebsk: apache-rat, portals-pom, eclipse-m2e-workspace, felix-gogo-shell,
jakarta-commons-httpclient, apache-ivy, felix-gogo-runtime, tycho, lucene,
takari-polyglot, ant-contrib, icu4j, felix-gogo-parent
mlichvar: jakarta-commons-httpclient
moceap: jakarta-commons-httpclient
msimacek: lucene, icu4j
mskalick: jakarta-commons-httpclient
music: python-lunr, python-pymdown-extensions, mkdocs, python-mdx_gh_links
neuro-sig: jlems
nphilipp: jakarta-commons-httpclient
omajid: rhino
orion: apache-ivy, jakarta-commons-httpclient, ant-contrib
otaylor: python-flask-script
panovotn: jakarta-commons-httpclient
pcpa: jakarta-commons-httpclient
peter: jakarta-commons-httpclient
pghmcfc: libspf2
pwalter: jakarta-commons-httpclient
pwu: jakarta-commons-httpclient
ralph: python-flask-script
raphgro: rhino
rgrunber: lucene, jakarta-commons-httpclient, eclipse-ecf, apache-ivy,
takari-polyglot, tycho, cbi-plugins, eclipse-license, ant-contrib, eclipse-gef,
eclipse-emf, eclipse-jgit, icu4j, eclipse-egit
rjones: jakarta-commons-httpclient, icu4j
rlandmann: jakarta-commons-httpclient
rmattes: jakarta-commons-httpclient
rust-sig: rust-tower-test, rust-line_drawing, rust-tower-util
s4504kr: jakarta-commons-httpclient
sagitter: jakarta-commons-httpclient
salimma: icu4j
sgallagh: python-pymdown-extensions
smani: jakarta-commons-httpclient
spike: portals-pom
spot: jakarta-commons-httpclient
teuf: jakarta-commons-httpclient
timn: jakarta-commons-httpclient
tomh: jakarta-commons-httpclient
ttomecek: python-flask-script
ttorling: jakarta-commons-httpclient
twaugh: python-flask-script
valtri: rubygem-logstasher, rubygem-hashie
verdurin: jakarta-commons-httpclient
vrutkovs: python-flask-script
zzambers: apache-ivy, jakarta-commons-httpclient, ant-contrib
--
The script creating this output is run and developed by Fedora
Release Engineering. Please report issues at its pagure instance:
https://pagure.io/releng/
The sources of this script can be found at:
https://pagure.io/releng/blob/main/f/scripts/find_unblocked_orphans.py
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure
Fedora 35 Bodhi updates-testing Activation and Beta Freeze
Today's an important day on the Fedora 35 schedule[1], with several
significant cut-offs. First of all, today is the Bodhi updates-testing
activation point [2]. That means that from now all Fedora 35 packages must be submitted to updates-testing and pass the relevant
requirements[3] before they will be marked as 'stable' and moved to
the fedora repository.
Today is also the Beta freeze[4]. This means that only packages which
fix accepted blocker or freeze exception bugs[5][6] will be marked as
'stable' and included in the Beta composes. Other builds will remain
in updates-testing until the Beta release is approved, at which point
the Beta freeze is lifted and packages can move to 'stable' as usual
until the Final freeze.
Today is also the Software String freeze[7], which means that strings
marked for translation in Fedora-translated projects should not now be
changed for Fedora 35.
Finally, today is the 'completion deadline' Change Checkpoint[8],
meaning that Fedora 35 Changes must now be 'feature complete or close
enough to completion that a majority of its functionality can be
tested'. All tracking bugs should be on ON_QA state or later to
reflect this.
Regards
Tomas Hrcka
[1] https://fedorapeople.org/groups/schedule/f-35/f-35-key-tasks.html
[2] https://fedoraproject.org/wiki/Updates_Policy#Bodhi_enabling
[3] https://fedoraproject.org/wiki/Updates_Policy#Branched_release
[4] https://fedoraproject.org/wiki/Milestone_freezes
[5] https://fedoraproject.org/wiki/QA:SOP_blocker_bug_process
[6] https://fedoraproject.org/wiki/QA:SOP_freeze_exception_bug_process
[7] https://fedoraproject.org/wiki/ReleaseEngineering/StringFreezePolicy
[8] https://fedoraproject.org/wiki/Changes/Policy
[USN-5050-1] Linux kernel vulnerabilities
Ubuntu Security Notice USN-5050-1
August 24, 2021
linux-aws-5.8, linux-azure-5.8, linux-gcp-5.8, linux-oracle-5.8
vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-aws-5.8: Linux kernel for Amazon Web Services (AWS) systems
- linux-azure-5.8: Linux kernel for Microsoft Azure cloud systems
- linux-gcp-5.8: Linux kernel for Google Cloud Platform (GCP) systems
- linux-oracle-5.8: Linux kernel for Oracle Cloud systems
Details:
It was discovered that the bluetooth subsystem in the Linux kernel did not
properly perform access control. An authenticated attacker could possibly
use this to expose sensitive information. (CVE-2020-26558, CVE-2021-0129)
Michael Brown discovered that the Xen netback driver in the Linux kernel
did not properly handle malformed packets from a network PV frontend,
leading to a use-after-free vulnerability. An attacker in a guest VM could
use this to cause a denial of service or possibly execute arbitrary code.
(CVE-2021-28691)
It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle HCI device initialization failure, leading to a double-free
vulnerability. An attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2021-3564)
It was discovered that the bluetooth subsystem in the Linux kernel did not
properly handle HCI device detach events, leading to a use-after-free
vulnerability. An attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2021-3573)
It was discovered that the NFC implementation in the Linux kernel did not
properly handle failed connect events leading to a NULL pointer
dereference. A local attacker could use this to cause a denial of service.
(CVE-2021-38208)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS:
linux-image-5.8.0-1038-oracle 5.8.0-1038.39~20.04.1
linux-image-5.8.0-1039-gcp 5.8.0-1039.41
linux-image-5.8.0-1040-azure 5.8.0-1040.43~20.04.1
linux-image-5.8.0-1042-aws 5.8.0-1042.44~20.04.1
linux-image-aws 5.8.0.1042.44~20.04.14
linux-image-azure 5.8.0.1040.43~20.04.12
linux-image-gcp 5.8.0.1039.14
linux-image-oracle 5.8.0.1038.39~20.04.14
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-5050-1
CVE-2020-26558, CVE-2021-0129, CVE-2021-28691, CVE-2021-3564,
CVE-2021-3573, CVE-2021-38208
Package Information:
https://launchpad.net/ubuntu/+source/linux-aws-5.8/5.8.0-1042.44~20.04.1
https://launchpad.net/ubuntu/+source/linux-azure-5.8/5.8.0-1040.43~20.04.1
https://launchpad.net/ubuntu/+source/linux-gcp-5.8/5.8.0-1039.41
https://launchpad.net/ubuntu/+source/linux-oracle-5.8/5.8.0-1038.39~20.04.1
Friday, August 20, 2021
OpenBSD Errata: August 20, 2021 (libressl)
OpenBSD 6.9.
Printing a certificate can result in a crash in X509_CERT_AUX_print().
Binary updates for the amd64, i386 and arm64 platform are available
via the syspatch utility. Source code patches can be found on the
respective errata page:
https://www.openbsd.org/errata68.html
https://www.openbsd.org/errata69.html
[USN-5048-1] Inetutils vulnerability
Ubuntu Security Notice USN-5048-1
August 19, 2021
inetutils vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
Inetutils could be made to crash if it received specially crafted
input.
Software Description:
- inetutils: GNU network utilities
Details:
It was discovered that Inetutils telnet server allows remote attackers to
execute arbitrary code via short writes or urgent data. An attacker could use
this vulnerability to cause a DoS or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS:
inetutils-telnetd 2:1.9.4-11ubuntu0.1
Ubuntu 18.04 LTS:
inetutils-telnetd 2:1.9.4-3ubuntu0.1
After a standard system update you need to restart Inetutils telnetd to make
all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5048-1
CVE-2020-10188
Package Information:
https://launchpad.net/ubuntu/+source/inetutils/2:1.9.4-11ubuntu0.1
https://launchpad.net/ubuntu/+source/inetutils/2:1.9.4-3ubuntu0.1
Thursday, August 19, 2021
Check out this job at Microsoft!
| ||||||
| ||||||
| ||||||
|
Wednesday, August 18, 2021
Planned Outage - fedoraproject.org/wiki - 2021-08-19 21:00 UTC
There will be an outage starting at 2021-08-19 21:00UTC,
which will last approximately 1 hour.
To convert UTC to your local time, take a look at
http://fedoraproject.org/wiki/Infrastructure/UTCHowto
or run:
date -d '2021-08-19 21:00UTC'
Reason for outage:
We will be upgrading our mediawiki servers to the latest version.
During this time the wiki will be unavailable as the database is migrated and servers re-installed.
Affected Services:
fedoraproject.org/wiki
Ticket Link:
https://pagure.io/fedora-infrastructure/issue/10171
Please join #fedora-admin or #fedora-noc on irc.libera.chat
or add comments to the ticket for this outage above.
[CentOS-announce] CESA-2021:3160 Important CentOS 7 thunderbird Security Update
Upstream details at : https://access.redhat.com/errata/RHSA-2021:3160
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
245ac011d84f87d216206c87c125f53accc51bf59e77b4f325bd2519bbae562a thunderbird-78.13.0-1.el7.centos.src.rpm
d358a86339e24e16bfcc77c61f6f12dea5c1485847a4bd5eee6a6e06c3634ff2 thunderbird-78.13.0-1.el7.centos.x86_64.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CESA-2021:3154 Important CentOS 7 firefox Security Update
Upstream details at : https://access.redhat.com/errata/RHSA-2021:3154
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
7724d8a7b5c53b6b19107130e41d127672ad5e6814dd6d9cdf6130a27f22354b firefox-78.13.0-2.el7.centos.i686.rpm
73a1cda95043965a2075495410ef47a525580c614071ac8a4b643cff8fbb2c61 firefox-78.13.0-2.el7.centos.src.rpm
64a964dbf122edcb897186c8824b60976d45bd7ddce017d938404771e1396a1e firefox-78.13.0-2.el7.centos.x86_64.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CESA-2021:3158 Important CentOS 7 exiv2 Security Update
Upstream details at : https://access.redhat.com/errata/RHSA-2021:3158
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
bb452c600e6c925bf0e8b365957a5cb5741e5f38181ed32aed22124e690edc30 exiv2-0.27.0-4.el7_8.src.rpm
18defd29c31366e3f3fc7602eed4307dcdd1028a8e25fd6823379fa2ef33eb6b exiv2-0.27.0-4.el7_8.x86_64.rpm
4402a7fcf865ee506196d91c722ec2875470f134b63f3912ac69561ba10e5113 exiv2-devel-0.27.0-4.el7_8.i686.rpm
1a5b2d18101ca9a398c7873900403ed4ffc7daf7fb801a9ce1649c3fafe185cf exiv2-devel-0.27.0-4.el7_8.x86_64.rpm
73cda0f598ca90fe3470940ed62663a7a5a1091731757b8e057fc929d3c1a209 exiv2-doc-0.27.0-4.el7_8.noarch.rpm
037e885e4b00fa8c73772c5a2e0f05aa735f04807e080c5819a8a15dade3d5dc exiv2-libs-0.27.0-4.el7_8.i686.rpm
54b72bac2daf97a8d1ba79e4288be55712b5b35027f2df547f3e0af93bd9b6a5 exiv2-libs-0.27.0-4.el7_8.x86_64.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce