RLSA-2023:0304 Moderate: libreoffice security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libreoffice. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Security Fix(es): * libreoffice: Macro URL arbitrary script execution (CVE-2022-3140) * libreoffice: Execution of Untrusted Macros Due to Improper Certificate Validation (CVE-2022-26305) * libreoffice: Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password (CVE-2022-26306) * libreoffice: Weak Master Keys (CVE-2022-26307) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms autocorr-af-7.1.8.1-8.el9_1.noarch.rpm 98a866ad23fe0c7ac4349340425b1952cd54817a9ab6773c9a18573655a6552c autocorr-bg-7.1.8.1-8.el9_1.noarch.rpm 5be15c28438dcafa92f2e410759eda47843898555c99166e8398adae4c7f1b08 autocorr-ca-7.1.8.1-8.el9_1.noarch.rpm 142bcd322b14f574c87a5c774397ba55a6496f2ce2afbf297b3f81eed627d430 autocorr-cs-7.1.8.1-8.el9_1.noarch.rpm 2c9313ce95a2aaaf3bb3b8a999983db1b110e49f4fefe65f9f58a8c9204a50f2 autocorr-da-7.1.8.1-8.el9_1.noarch.rpm dcf03a78c14c9b775818e62d7ee01fed302d33d666cf1a30f62188b3ab281bde autocorr-de-7.1.8.1-8.el9_1.noarch.rpm ac6f40d7c93b2abe62ab1fc52856317ecd9eb335252c8b41f5e22a15f7a3d6b2 autocorr-dsb-7.1.8.1-8.el9_1.noarch.rpm 6e9f8cf9d81aac151fb35e1a2764f132ecc982dd4f9f4d3e088c377b4dcbdcbc autocorr-el-7.1.8.1-8.el9_1.noarch.rpm 131c22c7baa10ce6030572b97969abe0e895c3363b7473166a1cf17dbca340c2 autocorr-en-7.1.8.1-8.el9_1.noarch.rpm 3187289c9274e083b14457d6bac8abf9988b7e0e4824991090b39a1b2e8a804d autocorr-es-7.1.8.1-8.el9_1.noarch.rpm d88a43343f88e9b132ba01c1fb00cb6b6ef7fd8f46d05515cc23143ad7a7bc98 autocorr-fa-7.1.8.1-8.el9_1.noarch.rpm c5c530940ec82813d2cccdd9d599791faad2a25662a3e73d234305b9896c5b62 autocorr-fi-7.1.8.1-8.el9_1.noarch.rpm 2229172a62e5aedefe8bbdf5c16c13f24526a234de89f10f139f40564268ebc1 autocorr-fr-7.1.8.1-8.el9_1.noarch.rpm 8a38f3140a32919798846b7bd64bc3b95bb853efafa6f665298e5fcae983c86c autocorr-ga-7.1.8.1-8.el9_1.noarch.rpm 36b3819441723ce83fec6569a3bf909b95eaadd9732ea7e81777dd9601d6716d autocorr-hr-7.1.8.1-8.el9_1.noarch.rpm f7795276cf95ee949c8bb232a4b570af198f3927c399b46b16c99e24279eebce autocorr-hsb-7.1.8.1-8.el9_1.noarch.rpm 88bb6839b571445456084fe15445f9a0f8d8aebc96ec9254527741fc49ad463b autocorr-hu-7.1.8.1-8.el9_1.noarch.rpm e96996b3af11a7b07238fa3dda707bf0ec7f48259e0fd5994135b3190f88f446 autocorr-is-7.1.8.1-8.el9_1.noarch.rpm 77ca14ce9a589c1a4259295b7b34e0a78708b9fd57fad324a09a981d2592e1f6 autocorr-it-7.1.8.1-8.el9_1.noarch.rpm 59dbf71bfbd92e94eea6c3be2c4d3fdc75183f8cbc245c24330f972c9102b3a1 autocorr-ja-7.1.8.1-8.el9_1.noarch.rpm d23e2c44cd49310299fe60cd1fd813004acd59fb27a0f6cce623c09aac1176db autocorr-ko-7.1.8.1-8.el9_1.noarch.rpm 1add419b3e5e2dd5e631167183b4ceb7c163e6e6b1ca9595324647e06b49c4f6 autocorr-lb-7.1.8.1-8.el9_1.noarch.rpm cf06d6d997ab839a7fc4a137ccb028da00292a9a543b15c2bc2350f54d790ca3 autocorr-lt-7.1.8.1-8.el9_1.noarch.rpm aef12d41f081103dd7a8116f61fe79ffa9e5d31cf1f71c83cde4c48f24ec8841 autocorr-mn-7.1.8.1-8.el9_1.noarch.rpm 97928aaa2489720660577e94ce473bb3d825cfe43c0acadb939c5804fa8e33c8 autocorr-nl-7.1.8.1-8.el9_1.noarch.rpm 0ca37421eb5282668ec80111515c0e9c2c2d1fbd18a419c3929082dd6bc01287 autocorr-pl-7.1.8.1-8.el9_1.noarch.rpm 71c1e6f529d3e1f7fabccd2f7fd306542ab7f6321d6c32cc6433d7743b468e68 autocorr-pt-7.1.8.1-8.el9_1.noarch.rpm e1b8482a30bc4f70587cc0ab2b0058e58c745ff3d8f1caf631293d6f7efe3354 autocorr-ro-7.1.8.1-8.el9_1.noarch.rpm 0388586c4e8af8b9d026f0ba47c9a49834c9d66eaf2c1a134e6b77233e6aae84 autocorr-ru-7.1.8.1-8.el9_1.noarch.rpm a809c9adb4f697e87b80a47180c03348b5762be1a0ae6395a4559882a6d65b85 autocorr-sk-7.1.8.1-8.el9_1.noarch.rpm f8aaa94b8524340c21f520e77244ab447d627f126b82b2bab43fa257c37c4f36 autocorr-sl-7.1.8.1-8.el9_1.noarch.rpm 62e85dee0f858cd74c14c5398661ffa21997523490b29d901ee9bf3746b9f1c2 autocorr-sr-7.1.8.1-8.el9_1.noarch.rpm 831491f8902b83343bf9492ee7d5e16ac48e6b4893a3989d20f15250416bfca0 autocorr-sv-7.1.8.1-8.el9_1.noarch.rpm 7afb55a7fecc25e88d962f6a9114f463ddb45bf3b01433fabdf174b4ff111670 autocorr-tr-7.1.8.1-8.el9_1.noarch.rpm c710b8f912c6629e7466fba317398b73048412a1bbc18863d1c153292f86b60f autocorr-vi-7.1.8.1-8.el9_1.noarch.rpm 289bd8a57afbd57f77a2e7e10e8015010584361be5c3328ecd25032b926e4471 autocorr-vro-7.1.8.1-8.el9_1.noarch.rpm 4077cdfe5b2f02a5459a867c196591275042152a6d2d1eb32587381d59929657 autocorr-zh-7.1.8.1-8.el9_1.noarch.rpm 2d3cd2fa0d3c890bdbfa4ee9a5797272f56cf1e8fb63fcee3d0c09e7583e6b69 libreoffice-base-7.1.8.1-8.el9_1.x86_64.rpm 57b18282533ed9d7300e08346c5302164355e217f500677c2a241626632653c8 libreoffice-calc-7.1.8.1-8.el9_1.x86_64.rpm b4f939876bce2bdea906baeaef1df757ae0ef2b80f095b53243617b602f3cd00 libreoffice-core-7.1.8.1-8.el9_1.x86_64.rpm 3abd6d102d7542c276ce820a4c836458ef5397a4911fd285d21ccd5a8a3a039e libreoffice-data-7.1.8.1-8.el9_1.noarch.rpm de75ed47ee296c57bdfc71667ab6724d7e657e6e86008f6ec741c7f91b22407e libreoffice-draw-7.1.8.1-8.el9_1.x86_64.rpm 83cced1404bcaf611ad6760bf2a634ebb8e0a331eb18171593fe317c995efbbd libreoffice-emailmerge-7.1.8.1-8.el9_1.x86_64.rpm 3aae373899b3abffeb0bd129f52f0bf4da805e707431d6f32ddc40ec5baa4146 libreoffice-filters-7.1.8.1-8.el9_1.x86_64.rpm 46f4124d781e1abde4444591f66fc637af218844c09f49c7177601e3680686c3 libreoffice-gdb-debug-support-7.1.8.1-8.el9_1.x86_64.rpm aea35a5c39848b8a153296e963d94f6625f9e44cdc2928d404037f62f4185a3e libreoffice-graphicfilter-7.1.8.1-8.el9_1.x86_64.rpm 50a0ae067353ab983d6d5557d8d19f830c9e696c150883327960d3e89682f468 libreoffice-gtk3-7.1.8.1-8.el9_1.x86_64.rpm 957a501d6ecfbf9ecbf854b35eb6d33f377a4fd2aca89c2bd7c5a1369f3131ee libreoffice-help-ar-7.1.8.1-8.el9_1.x86_64.rpm 1cee6776d862f6c6f0c449b67dceeb0821a3cb9c22a74cee630d7f1873d764a9 libreoffice-help-bg-7.1.8.1-8.el9_1.x86_64.rpm 12f0745df802a25cf557468f7eb1f80f71bc85917c0b676c2d8027335a7ca01e libreoffice-help-bn-7.1.8.1-8.el9_1.x86_64.rpm da16b2a89ffba1b0f8a38d66506357b41a5ea47a558424d902d13e7f0d7d5d52 libreoffice-help-ca-7.1.8.1-8.el9_1.x86_64.rpm 8925f3ac02d9c830ef85555f86c18b915ea1ee4c8beeb032c2b50d9dac627b4e libreoffice-help-cs-7.1.8.1-8.el9_1.x86_64.rpm 2db61c5edca061761b0692309e3847d4114bf547f7e4bfb27c5bece7a0874e18 libreoffice-help-da-7.1.8.1-8.el9_1.x86_64.rpm 877e8750276393e4edd5b6391695ce8f5a0a4308ea9c8fea408566157b611f40 libreoffice-help-de-7.1.8.1-8.el9_1.x86_64.rpm 1b0147b71ef7a929c75299170a6abe6c63af2e514934133a57405c92688bf8fc libreoffice-help-dz-7.1.8.1-8.el9_1.x86_64.rpm d5b61f098b278e99ee9ca6ff2f1f9b145e6df50c518c5a67d9386a61085db1f8 libreoffice-help-el-7.1.8.1-8.el9_1.x86_64.rpm 74c02e8943e4f8d1836721b8bfbdcbc89a2e6c019ed5b5f4559d13ec773c3532 libreoffice-help-en-7.1.8.1-8.el9_1.x86_64.rpm a76e48f8ea4974cf1997baef1932cec5d25108384ff3ee461223759871c2b3a1 libreoffice-help-eo-7.1.8.1-8.el9_1.x86_64.rpm 7208ae0a3f5d248a7aa4df3da0aee40207414e2fe9c5362c81bad40a5bc6976a libreoffice-help-es-7.1.8.1-8.el9_1.x86_64.rpm 0b743090e6477a911e0956830ee8ec131aba5309d4bd3649d34bf680983fc70d libreoffice-help-et-7.1.8.1-8.el9_1.x86_64.rpm 6392a9d0f49f6f12f593f1d7f8153db4c4d23e1481be255be187cbad43824704 libreoffice-help-eu-7.1.8.1-8.el9_1.x86_64.rpm a033da0d75e50562cc4470c3c45e8c577843138235044b39f72cefcad2ba4d77 libreoffice-help-fi-7.1.8.1-8.el9_1.x86_64.rpm 3397c1b980933a8f61c278d753ee8d92c374bec45f82f43aa102a1f289194b39 libreoffice-help-fr-7.1.8.1-8.el9_1.x86_64.rpm ba5dee986d1067080ee459aea7fb4ea3a1a8233f72cea582ff734bd75c468a0e libreoffice-help-gl-7.1.8.1-8.el9_1.x86_64.rpm 99066543c10e5a58798a64dbdc8f0e2f126e8105c04ad38c8c1a3146f870e0ea libreoffice-help-gu-7.1.8.1-8.el9_1.x86_64.rpm c04e8a889aebecfab64241ffa35a1206c36cb191096e00da03e4181cdf8b8b83 libreoffice-help-he-7.1.8.1-8.el9_1.x86_64.rpm 52dee689f1c255b36d0d8c52e961ae4b8656ebff66fd85600313f57dfd8585eb libreoffice-help-hi-7.1.8.1-8.el9_1.x86_64.rpm 0b66126e37449026645069c3c9a92fcc8723954b2bdeff546d7ef0734b1a8438 libreoffice-help-hr-7.1.8.1-8.el9_1.x86_64.rpm d45d1f3dcb431a0b64c8b5643f43597338e7b23254e5e80847209f12f9c84d3a libreoffice-help-hu-7.1.8.1-8.el9_1.x86_64.rpm e2d92cf69ef478e0d40cfe27d8b6bfe79d192d4309dba2563e722d1963c58376 libreoffice-help-id-7.1.8.1-8.el9_1.x86_64.rpm 3229c7c6bc1fc2ad69fd53c79490ffab6a138a514a70a88a1df07b71fce5de4d libreoffice-help-it-7.1.8.1-8.el9_1.x86_64.rpm 2231a7682f9d2f3d760364c3a9e1cd87ff950c2c9369ee75b619f2c27dda0b78 libreoffice-help-ja-7.1.8.1-8.el9_1.x86_64.rpm b513d846726c880041a695b20426886249d95ccb3db7209bfe081f920a86f668 libreoffice-help-ko-7.1.8.1-8.el9_1.x86_64.rpm 9e4cecb152033b72a53ac5a095a5038acab8848ddc10c641603de3e4be081823 libreoffice-help-lt-7.1.8.1-8.el9_1.x86_64.rpm df393089d2f612f87fe7926f47dab15e30d9fe0fd3f80096e58642d4ae35e791 libreoffice-help-lv-7.1.8.1-8.el9_1.x86_64.rpm feb8eaa5f4c3c81b3bd8ac68022f6828d5fbb5893b143bbd814455355bc3cd23 libreoffice-help-nb-7.1.8.1-8.el9_1.x86_64.rpm 467f45c06f8060ebef477adcd188b4449628391025b35c905f86fe6c50d644ce libreoffice-help-nl-7.1.8.1-8.el9_1.x86_64.rpm 4e7ba6969d8e23e3ef79a9a96ff713079fb297b76cab9bbff1718b04f0c10317 libreoffice-help-nn-7.1.8.1-8.el9_1.x86_64.rpm fd7a10c5b9bc841f20c257bc65abd06f2245db2ba8c6f7db151f2ee27b9910ed libreoffice-help-pl-7.1.8.1-8.el9_1.x86_64.rpm 27e4509519f749422d388af5b6e24ace07257f56b28e3db06b38d48364b0ff60 libreoffice-help-pt-BR-7.1.8.1-8.el9_1.x86_64.rpm 73ea1126020c5bb199333adb344992b8d04c59d7b9a5f453fa7c0e3224334685 libreoffice-help-pt-PT-7.1.8.1-8.el9_1.x86_64.rpm bf5e248b778859b2a34fda87ce0ed50107786ac80d1db5e9298f5b86ea20bd5a libreoffice-help-ro-7.1.8.1-8.el9_1.x86_64.rpm 81dc93bf68a3d9a112072588697159cd1cb94c65b35fbdb7dccc03f153b18aa2 libreoffice-help-ru-7.1.8.1-8.el9_1.x86_64.rpm 6f218d76834d34313a54f0b8048b75897ab79e4dc49039437c3030a0ee022348 libreoffice-help-si-7.1.8.1-8.el9_1.x86_64.rpm bee7f9cea2846f2c39cf96cf0e1ea32593cf853c693c1ad423f1852b144b40be libreoffice-help-sk-7.1.8.1-8.el9_1.x86_64.rpm b07900f8cb97a7ed7a9ad82a0b19f4d5379156efa05ebe072f995829260d1099 libreoffice-help-sl-7.1.8.1-8.el9_1.x86_64.rpm 2a8fb15edf23fd13e606a98a8a2014563c9e1bc9c826fd735c4395fbe78d3a0d libreoffice-help-sv-7.1.8.1-8.el9_1.x86_64.rpm 3768bba8138af97a03f7b7f7a0fbef052285c129b0be30d39c9f9c38a02a147b libreoffice-help-ta-7.1.8.1-8.el9_1.x86_64.rpm 76e71b02e06de52e546f13f4f0f561b8afc61ff531ccf7e4cd1b017c976c73d2 libreoffice-help-tr-7.1.8.1-8.el9_1.x86_64.rpm 2b37d4ef225049052508560399f3f3de89795626ff86248cbcaaef05cd617826 libreoffice-help-uk-7.1.8.1-8.el9_1.x86_64.rpm f106df85ba89d100e03c5dcf0ab0b3dd99755e90e9b5d716a77111ab460eac07 libreoffice-help-zh-Hans-7.1.8.1-8.el9_1.x86_64.rpm 176d7f7748aab209a96e1be7ca389a9a24f2838914d9643036b645dede1d5a0d libreoffice-help-zh-Hant-7.1.8.1-8.el9_1.x86_64.rpm 042c953e1dc9a0bde12143fd05e9301f2d8edabed1468b77d323a985eec5a43e libreoffice-impress-7.1.8.1-8.el9_1.x86_64.rpm de369982ff0a2741c432f8fd10daf098a2581b908e0ef02e020436b5dc82bbe0 libreofficekit-7.1.8.1-8.el9_1.x86_64.rpm 05076f3643fc2de1edeee9f697248fc455d64c0923199d2d45d0a93b6567488a libreoffice-langpack-af-7.1.8.1-8.el9_1.x86_64.rpm da3aeaca79fb633c67ac334e6e1f5ae920859b5950778be7dde7bdf581b97190 libreoffice-langpack-ar-7.1.8.1-8.el9_1.x86_64.rpm 7357740b78ef97c6e786e22e0de8f4a9e975e14e80ae157eeaed79407584cf6e libreoffice-langpack-as-7.1.8.1-8.el9_1.x86_64.rpm 48da8f9a7fe08b94f137082717b3b3594641eb4c1be83c4a1959c68608cd6d29 libreoffice-langpack-bg-7.1.8.1-8.el9_1.x86_64.rpm 0e624733f2d83c06af1763f41447458afe6a651c539c570809cd00411f8fd834 libreoffice-langpack-bn-7.1.8.1-8.el9_1.x86_64.rpm a284954648ccc6f7af85142beeb4ce77377d65146ab48be617c2e72872faa6e5 libreoffice-langpack-br-7.1.8.1-8.el9_1.x86_64.rpm c7850db59a6c6fef169a7def0b123a9d8104582db9670a468361f9a420899bec libreoffice-langpack-ca-7.1.8.1-8.el9_1.x86_64.rpm a9b10907bda9a082745579d9137fe86303067998bf9c777e11b2c46af3c7136d libreoffice-langpack-cs-7.1.8.1-8.el9_1.x86_64.rpm 004f62c461ffa8b031b7b1178a2dad40de4cb5ed9c081162b401ee0abc64e397 libreoffice-langpack-cy-7.1.8.1-8.el9_1.x86_64.rpm 857b5b0dee6654940dfa86e77110268f9630978f2b5aa99345819e6556e7280e libreoffice-langpack-da-7.1.8.1-8.el9_1.x86_64.rpm e3a54189530cdc1c96dd238d6dfa1bb267e6daad7376ba68e1aab9e8b45913dc libreoffice-langpack-de-7.1.8.1-8.el9_1.x86_64.rpm c66f8ed05132b9ad4a64ab8ad35663ad570c01b9265997e43c57665cd467ae4f libreoffice-langpack-dz-7.1.8.1-8.el9_1.x86_64.rpm bf01d2e836c86f04349780f1ae92343c121d110b4cf5306600be7fa976550ac8 libreoffice-langpack-el-7.1.8.1-8.el9_1.x86_64.rpm fb1b98f7b63701f2d0a0047fa4d86a08dc13bb4c01a7ba33094c04fc0622454d libreoffice-langpack-en-7.1.8.1-8.el9_1.x86_64.rpm eae45b3a1037fabdf5d9e8859fe56560c9af97a2abe1950c659702ae0dd50fb8 libreoffice-langpack-eo-7.1.8.1-8.el9_1.x86_64.rpm 524795ec95bced0b3593fdecb64761ed1570e149d21ad43e7206903ff60b3474 libreoffice-langpack-es-7.1.8.1-8.el9_1.x86_64.rpm 40c87f68987a43a4baceb4dc164b80973c3ee43bb3211a5e47f2f6e96007454a libreoffice-langpack-et-7.1.8.1-8.el9_1.x86_64.rpm 1822e06ec22784bc5cbe037e3162c07681a76f049689406fc3963af66046552a libreoffice-langpack-eu-7.1.8.1-8.el9_1.x86_64.rpm 878ab847b89f5b9ccb6da265fcf60800a0c4d2cbaaf2929e277d04d89b1ad832 libreoffice-langpack-fa-7.1.8.1-8.el9_1.x86_64.rpm 3af3c245882fd0eb6f34518ce6b0b27c723201d80862bd6ba527097dff8d0ff8 libreoffice-langpack-fi-7.1.8.1-8.el9_1.x86_64.rpm 4e38129744276b294036fa41586e51cb276344da5e20bb401f98784c98ba1b66 libreoffice-langpack-fr-7.1.8.1-8.el9_1.x86_64.rpm 396c22992ee8d51a8d332ba2997220a1f238a74c98190add02f65e7287b63f1b libreoffice-langpack-fy-7.1.8.1-8.el9_1.x86_64.rpm 33d7d265814f83b6d76d485e6aa319b6072f8eefd7d720419e0f0c67b4b0dc87 libreoffice-langpack-ga-7.1.8.1-8.el9_1.x86_64.rpm a1c9570733a65c4998b7378e5460d874d8c4295f63218d33e66097ecf6a7c077 libreoffice-langpack-gl-7.1.8.1-8.el9_1.x86_64.rpm 86458aba6ff59874feeef581b03b716e2350f5a70ef6f6196fff7e91e1c2662f libreoffice-langpack-gu-7.1.8.1-8.el9_1.x86_64.rpm 53fa3e58d6b0c92bbd87021037b2c0f34425f4650346e49f3d522a2153cc15a7 libreoffice-langpack-he-7.1.8.1-8.el9_1.x86_64.rpm 3019f9c1c643009502a2afffca4d6be9db0efc9b9c11ffbfa655ebfc39b20e8a libreoffice-langpack-hi-7.1.8.1-8.el9_1.x86_64.rpm c8eb009e7fec0cc2e4c104c5c178c9efa8c141164ba11f57b81bf74a366bbf65 libreoffice-langpack-hr-7.1.8.1-8.el9_1.x86_64.rpm 3609cb30cc4853f2423d2611e6341df98e2af53a01ddce74c2d7b215be7c2644 libreoffice-langpack-hu-7.1.8.1-8.el9_1.x86_64.rpm d5a4456a41f5741323aaa1b6decd03a60dd7b454b62abaa9b36d7aeb7e509310 libreoffice-langpack-id-7.1.8.1-8.el9_1.x86_64.rpm 061fe1351ca5de0550542e9076e1a8c31a0896f01285ad7f818126d61f6d206a libreoffice-langpack-it-7.1.8.1-8.el9_1.x86_64.rpm 450bed82a06e85078c38e11076446a9f270d1224b09b712dd9677bf55cd609a3 libreoffice-langpack-ja-7.1.8.1-8.el9_1.x86_64.rpm 4ba221f1b220fe468eb5f1ee92ce54c536c827f02fe7f5ebf7dd8c040d3f74e5 libreoffice-langpack-kk-7.1.8.1-8.el9_1.x86_64.rpm e5b5bf45ec1fbe009c0573cb3ab591da20687d219bade4e098208701b62b4104 libreoffice-langpack-kn-7.1.8.1-8.el9_1.x86_64.rpm c2cfc1eed63c540aebaee11d134e840f33ce14673b4883b262fc28455564c903 libreoffice-langpack-ko-7.1.8.1-8.el9_1.x86_64.rpm 39e8afdb0d655bc8000c5b8b77a30f1ef29c280dc453a0e7442f9260012c20c3 libreoffice-langpack-lt-7.1.8.1-8.el9_1.x86_64.rpm cdaebe76d376c9b9d6d9e6e89c985133670413bf8fe207e9e0d1dc3b6303621c libreoffice-langpack-lv-7.1.8.1-8.el9_1.x86_64.rpm ebdc924c9eec7357ba2493ff19c2ce75a1d18dddcd2feae0934e34d557825b88 libreoffice-langpack-mai-7.1.8.1-8.el9_1.x86_64.rpm cdd17886c3c66cfaa29801d1c41ecabab499c73e3d3029c8c465cfa8f233a725 libreoffice-langpack-ml-7.1.8.1-8.el9_1.x86_64.rpm 1d5c74c5a4b3f4571a818e4acb9e79d28e6ed0b4849c74d2880215736aa55835 libreoffice-langpack-mr-7.1.8.1-8.el9_1.x86_64.rpm a03bc0376902dea76099461e3cf9b4ddad7dfcf09d66edd70323e92adb464797 libreoffice-langpack-nb-7.1.8.1-8.el9_1.x86_64.rpm 135f938eed15269d823e49fd8b6e110318084b3e355d2519836fab963a373911 libreoffice-langpack-nl-7.1.8.1-8.el9_1.x86_64.rpm fd055f3ff95be6244d851998244f8f0a47c96a2e899230ffb3d84e42a8af479a libreoffice-langpack-nn-7.1.8.1-8.el9_1.x86_64.rpm 399aadb5e0d0f87b376bdbaaf33f1a0cd5480d2317b7b9f16b0c7c8204197abd libreoffice-langpack-nr-7.1.8.1-8.el9_1.x86_64.rpm 25641b3c5edf2ebe6829ec5cd351f18be2bf9e74214ae3ae845667ebdab91392 libreoffice-langpack-nso-7.1.8.1-8.el9_1.x86_64.rpm 0dbd034032b4042f8f421ee381960d6ebecb2ff7055539b2ec51d9e7888b42b9 libreoffice-langpack-or-7.1.8.1-8.el9_1.x86_64.rpm 7480423d80e9c95ca7714d906b575c2956fee7c3a8c464d0bf41466480328ad5 libreoffice-langpack-pa-7.1.8.1-8.el9_1.x86_64.rpm 41bde9c91c1c383ad2a2a4d16bc108bd42924c2407dd1bbe383cdde8acf51c04 libreoffice-langpack-pl-7.1.8.1-8.el9_1.x86_64.rpm 30eed206605dd3d9d7fcb5bd5818180997e018c4f3fe1e67114693a14b4fd28a libreoffice-langpack-pt-BR-7.1.8.1-8.el9_1.x86_64.rpm d677f9362e8762f2fa1943dca085f22d9fc58730356fbf7e260b6f1746308d7f libreoffice-langpack-pt-PT-7.1.8.1-8.el9_1.x86_64.rpm 8f343a54dbc82b693ad7898b8d9d564ee5f135be3c3fec0340d0d022979424ce libreoffice-langpack-ro-7.1.8.1-8.el9_1.x86_64.rpm 485c19891954a4ec2a2b6fe833fb324c36d6f89ea4bd8b01f1e4bb0b158990c6 libreoffice-langpack-ru-7.1.8.1-8.el9_1.x86_64.rpm aaeebc33758066408294bb57e7b0d7fb500f653bd0385447e520bb9ccc087cf8 libreoffice-langpack-si-7.1.8.1-8.el9_1.x86_64.rpm aac0959398e6f71bd90bf41301b838c33b82c4bd1fdbeafd806130a97a9e7ad2 libreoffice-langpack-sk-7.1.8.1-8.el9_1.x86_64.rpm 2ef35119737080ed28ebbbc115496bf077b894fac27713340d48b8b517860291 libreoffice-langpack-sl-7.1.8.1-8.el9_1.x86_64.rpm d967cf834b4d69ce0e66bb046430d02a7c1f1ffd79025d1af0d94ed6e841014b libreoffice-langpack-sr-7.1.8.1-8.el9_1.x86_64.rpm c62154d5546ca2a3e45b970709e49ea9f136c1fd917dcc339b6936bc913314be libreoffice-langpack-ss-7.1.8.1-8.el9_1.x86_64.rpm d1f8c7f2de492bbcec6f2e6cab5871d9c16ada8c79511a73b2f078bff48df7ee libreoffice-langpack-st-7.1.8.1-8.el9_1.x86_64.rpm 523899f4b6f1719c12c9eedeffb0617e6c833c5868bbd3d76d7ccda8580a0ce1 libreoffice-langpack-sv-7.1.8.1-8.el9_1.x86_64.rpm 6e6e4f57f4b9de950be0e390da8bb9d4fc645a43ac1876bc3b8bf3bbceb2ab06 libreoffice-langpack-ta-7.1.8.1-8.el9_1.x86_64.rpm 897680819cbf2b0d5f71846d98b386b8de863a0bbd62e2ef138a86dd71205d4d libreoffice-langpack-te-7.1.8.1-8.el9_1.x86_64.rpm cabca3e3eb5e1e5dbd4910d55bf170245b7cd3ab53d70f78170bba5d383cd2fd libreoffice-langpack-th-7.1.8.1-8.el9_1.x86_64.rpm 9872d147b49f7bf2c59c121ea5953eadfca945318c0c1c574c7e3c8f20887822 libreoffice-langpack-tn-7.1.8.1-8.el9_1.x86_64.rpm f58cc910504897d59671a0a7367d1ac2ceff883192dba167f4866be7cf23795d libreoffice-langpack-tr-7.1.8.1-8.el9_1.x86_64.rpm 03f7ef93bfb5be6f4d2040571ad0d702b7a8cb2010ec773ffae6e43450c1812b libreoffice-langpack-ts-7.1.8.1-8.el9_1.x86_64.rpm 787f531de7b32b0d3ca24c513b98f45ddcf5eaa5bd1d8491afaf8268693cc948 libreoffice-langpack-uk-7.1.8.1-8.el9_1.x86_64.rpm 1b22877e3b0a95475fb8d64516890815b62dd7fda42011fad078f11ed1c98647 libreoffice-langpack-ve-7.1.8.1-8.el9_1.x86_64.rpm a1a1ec674d2b4d02e0fcd82722e6f8d2ff41c510b8a5c45a11a08bbcb74b6fb7 libreoffice-langpack-xh-7.1.8.1-8.el9_1.x86_64.rpm 68b4fdc4fc27b9008ea6aa6d699732913474cc8184c960728935267b6e1c9bc8 libreoffice-langpack-zh-Hans-7.1.8.1-8.el9_1.x86_64.rpm a41c35e49959e114c69fec5b68d8828a3ea871ae9e6a6dfa9add33b1ad647644 libreoffice-langpack-zh-Hant-7.1.8.1-8.el9_1.x86_64.rpm 4336e686b910a8bb714c37a9063191cb27375e8ad5527e68cce8be09e0e4d726 libreoffice-langpack-zu-7.1.8.1-8.el9_1.x86_64.rpm 6805ea930cc2a3da45202d047a57e6d922255d4bb382758ef2b9d3cee7d8633e libreoffice-math-7.1.8.1-8.el9_1.x86_64.rpm 76e4613f50ff1a4f2f5ca8e3e0cc21df68a861202d167f3ab0971cebb7d1bf9b libreoffice-ogltrans-7.1.8.1-8.el9_1.x86_64.rpm bfcaf58fd8827dc203f64a02462c44a1c0fdfe14bbe81f0a190af7347875e611 libreoffice-opensymbol-fonts-7.1.8.1-8.el9_1.noarch.rpm a7518cadf02101e619416247f2699d2c9a1906316f56afc6d47b13cf9ed81897 libreoffice-pdfimport-7.1.8.1-8.el9_1.x86_64.rpm 3124261d23fd724dcc54bc722bededefd99a37adaabdfa5e73883bc7a1e9bef8 libreoffice-pyuno-7.1.8.1-8.el9_1.x86_64.rpm 1b8a69dd7a06cb565ca8a9b4eeda9206a7512d4b3b292c7518087c72b7f21654 libreoffice-ure-7.1.8.1-8.el9_1.x86_64.rpm 3473b86db4de1a7b093f8b34f589f6fcf6ba66e1a2331b49a6507ccf12358c1f libreoffice-ure-common-7.1.8.1-8.el9_1.noarch.rpm f659477b9c1ea5ab9bb0de86642bf9df0faf7d342350c0adc7b4f3c420521046 libreoffice-wiki-publisher-7.1.8.1-8.el9_1.x86_64.rpm 386cacc2ab280263d1da67f6d4c9c262faef0860e25b8728a37f6e283490574d libreoffice-writer-7.1.8.1-8.el9_1.x86_64.rpm 1582abb87edda7350c2017b376e751a2cde290b826e5ca7c1e0d754b49b0012a libreoffice-x11-7.1.8.1-8.el9_1.x86_64.rpm 85ab4c3592df647d3258eeda31c2228616ddef3f0e4d36eb04b52f415faa616c libreoffice-xsltfilter-7.1.8.1-8.el9_1.x86_64.rpm f40276b2527383cc58d3cf74ac6fbb20cdd6af0f3d84c1736ac87819bccd7dc7 RLSA-2023:0282 Important: sudo security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for sudo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix(es): * sudo: arbitrary file write with privileges of the RunAs user (CVE-2023-22809) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms sudo-python-plugin-1.9.5p2-7.el9_1.1.x86_64.rpm 3c51c1e16d0fb0f70feb41a7bea3b9e142e87aca3aca6e552e75befd4761280a RLBA-2023:0669 selinux-policy bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for selinux-policy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es) and Enhancement(s): * SELinux prevents smbstatus (executed by Insights) from creating /var/lib/samba/lock/msg.lock directory. (BZ#2136760) rocky-linux-9-x86-64-appstream-rpms selinux-policy-devel-34.1.43-1.el9_1.1.noarch.rpm ec275286c991f4b745e1d772d063292a5a43bdabcfe832eb41116cf9e83a8626 RLSA-2023:0285 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.7.0 ESR. Security Fix(es): * Mozilla: libusrsctp library out of date (CVE-2022-46871) * Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) * Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) * Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) * Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) * Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) * Mozilla: Fullscreen notification bypass (CVE-2022-46877) * Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-102.7.0-1.el9_1.x86_64.rpm e8250a15f8ed8a8fc434e3905d38e23ff428c5d1c455055f7cc31b659aa424c2 RLSA-2023:0611 Important: git security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for git. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Security Fix(es): * git: gitattributes parsing integer overflow (CVE-2022-23521) * git: Heap overflow in `git archive`, `git log --format` leading to RCE (CVE-2022-41903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms git-2.31.1-3.el9_1.x86_64.rpm 1fd348be808204fc0ec966cb3f802924f7f28a240b13346b0920fd9226cf8d25 git-all-2.31.1-3.el9_1.noarch.rpm f6c54c0220a9bd68de0e305812df87264fd521bb08820715cf9dc1071291f511 git-core-2.31.1-3.el9_1.x86_64.rpm 7fd603310562ee6c65ee45d73d7797fd1b886cfa0a64d3365bf8a0265cbec2c2 git-core-doc-2.31.1-3.el9_1.noarch.rpm 45f316d495138f8be8ffe7388e1c19f8c21796c460a85e639e75678c106ce58c git-credential-libsecret-2.31.1-3.el9_1.x86_64.rpm 81046539f39daedada507d66e7d7cf6ca1511a199a40601f510b8f69bb61299d git-daemon-2.31.1-3.el9_1.x86_64.rpm fe8b6288f08ef1128956ace1230730b2bfaf09a95aca7ec6f093882e9a63acfa git-email-2.31.1-3.el9_1.noarch.rpm 70d637c668eb2f9e960961aae8245a6bde1d4d0f46698d9327f807cfc1c34546 git-gui-2.31.1-3.el9_1.noarch.rpm a2cf17eeca58483f8543fabbe00d271789e3b4f10c1319900c95da45924af047 git-instaweb-2.31.1-3.el9_1.noarch.rpm cf3ec0c9c039068358e74dddfc4d2fbfb53352f58a1045df21a51753a8ddf8ec gitk-2.31.1-3.el9_1.noarch.rpm 2de11da7c71d9d9ba0c74776e512ebb9019a637d0d1c1bc849e6615ca0cc597c git-subtree-2.31.1-3.el9_1.x86_64.rpm 79483d59a6386ea967a8bf104c6882a71a4165fd8a08ea8bdefe7cb8fbd53da1 git-svn-2.31.1-3.el9_1.noarch.rpm cfb06cf9a2ea4ffc9626bee74546252fa10d2c7cdf31e71c6e7c1dd456cd5950 gitweb-2.31.1-3.el9_1.noarch.rpm 730d688af3395f1aaaddc4df6c48afbffa83d9edc6ce4198a2642560e8ffcfb5 perl-Git-2.31.1-3.el9_1.noarch.rpm fe65cd3944f1c22159235b304df53845d209bec44b2c7932055152898179d500 perl-Git-SVN-2.31.1-3.el9_1.noarch.rpm 55754fdb2a22c8039445f3c63291adfd309e2a3746f20309d20926dc75f10c82 RLSA-2023:0903 Important: webkit2gtk3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.36.7-1.el9_1.2.i686.rpm 0ba47951b812a1b238f8644bd539de823aeff91f869f75c5a279f1dbe36676d9 webkit2gtk3-2.36.7-1.el9_1.2.x86_64.rpm f00132e4938cfef7ac2dc522d80a44444d6a02a090693b4dfaf57e7c1a8dc4fd webkit2gtk3-devel-2.36.7-1.el9_1.2.i686.rpm d6aa5b7b626bd571abe15f9d6f4860b724883069e1af9c59133310f952021638 webkit2gtk3-devel-2.36.7-1.el9_1.2.x86_64.rpm f9bca967a8fc2772b1803e12bd69dd1f956a1da3ab713d3290eac80188a2439a webkit2gtk3-jsc-2.36.7-1.el9_1.2.i686.rpm 0daf588685caf28e8aa9c929107b19e01a69e5b3e558d2979692e36444d02c44 webkit2gtk3-jsc-2.36.7-1.el9_1.2.x86_64.rpm fa1a001c089a5fc19521593bf134d6c9b26a65bd5a840407f08adbcd483fc71d webkit2gtk3-jsc-devel-2.36.7-1.el9_1.2.i686.rpm dc78f39eca36f81e1f003a4de9f92fa06c4547153be3d7630b31404fcda2afce webkit2gtk3-jsc-devel-2.36.7-1.el9_1.2.x86_64.rpm 36ddde218826001fb8bc8d30abf64280f0219574378da5b46de5d411ccb91e1e RLBA-2022:2772 new packages: cmake Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cmake. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cmake-3.20.2-7.el9.x86_64.rpm 1a66674b62288319c001b776e9d899a99a7137ff2274c3a5a33f59d37af58771 cmake-data-3.20.2-7.el9.noarch.rpm 0ff25e58986c65b2d412516476ef690bd8d0285ac05b5ed0c1c1d9ade597a09d cmake-doc-3.20.2-7.el9.noarch.rpm a049cf081975f91a4175682e4586cab51ecd4daf5884a86956f36e07960fe209 cmake-filesystem-3.20.2-7.el9.i686.rpm f0c7140e1f4b6d0a99301ee55a0307bc8d278f91116c10154075be92c85552d8 cmake-filesystem-3.20.2-7.el9.x86_64.rpm 08777ad8dddfbd07fe838ed879eebffaa3d5d9daf381efaeae4514a496034e86 cmake-gui-3.20.2-7.el9.x86_64.rpm 91c78667cffb30ab94aaf450bba3a2d6ab91678202aefeddc23e77d00dab2feb cmake-rpm-macros-3.20.2-7.el9.noarch.rpm 46e1833802525aecdf3d4b3aba944e86beba8fdd0b5704dd2ed3f9fe23fb9133 RLBA-2022:2806 new packages: espeak-ng Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for espeak-ng. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms espeak-ng-1.50-7.el9.i686.rpm 303cff5af8450fa62e4ca56dc96e2b3ba87f0d329fa614a4d513ec5451c0eb0a espeak-ng-1.50-7.el9.x86_64.rpm 2063ab95d5f7fb821d29ddf7fa7ea89be880dd2d46ec1d49113509cd437ace45 RLBA-2023:0309 keylime bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for keylime. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution. Bug Fix(es) and Enhancement(s): * agent fails IMA attestation when one scripts is executed quickly after the other (BZ#2142032) * Registrar may crash during EK validation when require_ek_cert is enabled (BZ#2142033) * Segmentation fault in /usr/share/keylime/create_mb_refstate script (BZ#2142034) rocky-linux-9-x86-64-appstream-rpms keylime-6.5.1-1.el9_1.4.x86_64.rpm 4ebeccd3fa45154859133692dd6e8e7f2ae6b60b4451f3294956928ab32b336c keylime-base-6.5.1-1.el9_1.4.x86_64.rpm 44389a08b4c3b149c3432bd37888893de9bc2c3261069d71a0e873224add559d keylime-registrar-6.5.1-1.el9_1.4.x86_64.rpm bc7a81d8e8e9e3547550806883103a9cbc1d95f78b84494c940912a65bbdc91f keylime-selinux-6.5.1-1.el9_1.4.noarch.rpm 2829767011452d2edcfef51925c82770435032a78ca2d3c6de6efafe149ac9ac keylime-tenant-6.5.1-1.el9_1.4.x86_64.rpm 74d2ff21c54cd23d1f2756838008f2640b69a17b4de8070de7c282b47eeaeb43 keylime-verifier-6.5.1-1.el9_1.4.x86_64.rpm 22b126056912799186d289c10e59d6c86b3a802b7fa697722a19fac6a166fb16 python3-keylime-6.5.1-1.el9_1.4.x86_64.rpm a289908636025492c0a33826cb1057d77c797d8e52dc02d0779f3e844055d470 RLBA-2023:0324 libqb bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libqb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libqb packages provide a library with the primary purpose of providing high performance client/server reusable features, such as high performance logging, tracing, inter-process communication, and polling. Bug Fix: * pacemaker command "crm_attribute" intermittently fails with error code 102 (2151305) rocky-linux-9-x86-64-appstream-rpms libqb-2.0.6-2.el9_1.i686.rpm f2bb5efe9142fc3e9de3fab35d624b45a64f427ce6b09805815cab3cd8ada97a libqb-2.0.6-2.el9_1.x86_64.rpm 90c57e61e0139d4aff8aacd0a0f56fe91f75110782c4e910587913df69f2e15a RLBA-2023:0781 .NET 7.0 bugfix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet7.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address bugs are now available. The updated versions are .NET SDK 7.0.103 and .NET Runtime 7.0.3. Bug Fix(es) and Enhancement(s): * 2166776 - Update .NET 7.0 to SDK 7.0.103 and Runtime 7.0.3 [rhel-9.1.0.z] rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-7.0-7.0.3-1.el9_1.x86_64.rpm 8d74085987d0ca148e5d3efabe9c5c594884ba3e4849af8010e5a6b76163efcb aspnetcore-targeting-pack-7.0-7.0.3-1.el9_1.x86_64.rpm 82198a380750546bf594dc1e7c414763328c57352174a7af1cb93c4875aff801 dotnet-apphost-pack-7.0-7.0.3-1.el9_1.x86_64.rpm 0fa38121471632bb00f5bd89c3c2a5bfa03fc86d4b825ac70117380788f042fb dotnet-host-7.0.3-1.el9_1.x86_64.rpm 935c287837d4a432fda9bf5ec46f1ff7d0757bcfd8ce6ce4497bd770aef8018b dotnet-hostfxr-7.0-7.0.3-1.el9_1.x86_64.rpm 292c97ab6ec6cbfba273d424c7bbbfb9f17d0bca0431d4c8da0bc208ceb1e2b3 dotnet-runtime-7.0-7.0.3-1.el9_1.x86_64.rpm ff594ff0f646a30a2df056db825a7faf4e3f237d7721d5cd72aa28fd06089301 dotnet-sdk-7.0-7.0.103-1.el9_1.x86_64.rpm bbb42bd873f8bbcc947d4efc529e76ef711ea6f75b0f4e69d2b7b5498663d611 dotnet-targeting-pack-7.0-7.0.3-1.el9_1.x86_64.rpm 1367f3d48df2baa2cb540e141e45ec875183aa7714cb88b972ec8b7f85b8c80f dotnet-templates-7.0-7.0.103-1.el9_1.x86_64.rpm 0d1eda4deee9f044bdd596d447bfd741b41860b2d7cc0e3b5e9fd75577708afa netstandard-targeting-pack-2.1-7.0.103-1.el9_1.x86_64.rpm 8a4b18610827db7e9bd67baa84e5715f5eee76c244405c951af3076539413533 RLBA-2022:2739 new packages: autoconf Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for autoconf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms autoconf-2.69-38.el9.noarch.rpm e470bf76ef876897ed2ce1ee703a4ef973a12fc51a27d33d545a63dbe704fa76 RLSA-2023:0303 Moderate: usbguard security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for usbguard. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The USBGuard software framework provides system protection against intrusive USB devices by implementing basic whitelisting and blacklisting capabilities based on device attributes. To enforce a user-defined policy, USBGuard uses the Linux kernel USB device authorization feature. Security Fix(es): * usbguard: Fix unauthorized access via D-Bus (CVE-2019-25058) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms usbguard-1.0.0-10.el9_1.2.i686.rpm ed1d7851cb634fe120cc8fb62b664d797203278440c07cfd8e0bb50ff3b90a5b usbguard-1.0.0-10.el9_1.2.x86_64.rpm 237bf57bcb21ec99e0f4f605a1f685c29e8fbd52be85215c8091175a2ca2b3af usbguard-dbus-1.0.0-10.el9_1.2.x86_64.rpm 821f7cc58d4632a98a7470a2f86ebfe04c447623af52700a88c28120b955f508 usbguard-notifier-1.0.0-10.el9_1.2.x86_64.rpm ff7701135023660d1eb0217503379c5f0bceee00374f4d30c8e847ba04881248 usbguard-selinux-1.0.0-10.el9_1.2.noarch.rpm 0ce8975252348d310c552128f6c02bf750a9e74b44fad8c58824a2b195aa7ca5 usbguard-tools-1.0.0-10.el9_1.2.x86_64.rpm 335ecd55f5170814776f7fdcc360afc5acf61947ed0607939d25f8f34c442ad2 RLBA-2023:0306 stalld bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stalld. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The stalld package provides a mechanism used to prevent the starvation of operating system threads in a Linux system. Bug Fix(es) and Enhancement(s): * Rebase stalld to latest upstream version (BZ#2136572) rocky-linux-9-x86-64-appstream-rpms stalld-1.17.1-1.el9_1.x86_64.rpm def949af97937fda0cc5a1ea4388e42c825f62a31631631e7ceeffc47425ec4d RLBA-2023:0782 .NET 6.0 bugfix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet6.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address bugs are now available. The updated versions are .NET SDK 6.0.114 and .NET Runtime 6.0.14. Bug Fix(es) and Enhancements : * 2166770 - Update .NET 6.0 to SDK 6.0.114 and Runtime 6.0.14 [rhel-9.1.0.z] rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-6.0-6.0.14-1.el9_1.x86_64.rpm 6d3550fac0f794bcd60b016851ffc020d2e2383cc36980248354bbed4b97e27e aspnetcore-targeting-pack-6.0-6.0.14-1.el9_1.x86_64.rpm e10002387a96cd906d844d65278ef886fa3c03312e4748a0e27719d8dd4058d5 dotnet-apphost-pack-6.0-6.0.14-1.el9_1.x86_64.rpm 3e8d84d3e1447ec293fb85ff3a651c1d074576e73db9062d41b3dc398bb0d5e2 dotnet-hostfxr-6.0-6.0.14-1.el9_1.x86_64.rpm 4327a8ccea25d032b12caaff4e53796a6e0d1b64f80c625364665061b1e4a788 dotnet-runtime-6.0-6.0.14-1.el9_1.x86_64.rpm 4654059f94716cd2bb67e4dac40c86e8028e764bdd6feb77bfa159d04397d32e dotnet-sdk-6.0-6.0.114-1.el9_1.x86_64.rpm baf52245bfc68db77c75c68991ba63ddd0921bce8c1b838f5279518d0117187c dotnet-targeting-pack-6.0-6.0.14-1.el9_1.x86_64.rpm c0a0af82f1fa6f12e0bc9e13aaaba055c36cc70b7e6f6df8b589df8c65d7405e dotnet-templates-6.0-6.0.114-1.el9_1.x86_64.rpm f6a52d8ad8eb0ed59bb55d57adf8aa97571f3cf54bcc11dbc94198b9f54bb2da RLBA-2023:0307 fapolicyd bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fapolicyd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fapolicyd software framework introduces a form of application whitelisting and blacklisting based on a user-defined policy. The application whitelisting feature provides one of the most efficient ways to prevent running untrusted and possibly malicious applications on the system. Bug Fixes: * statically linked app can execute untrusted app (BZ#2137254) * fapolicyd ineffective with systemd DynamicUser=yes (BZ#2137263) rocky-linux-9-x86-64-appstream-rpms fapolicyd-1.1.3-102.el9_1.7.x86_64.rpm cd924613bfa40361bd6fc83f191d0731e67b05452dfa0a8df8e70e889d5c8640 fapolicyd-selinux-1.1.3-102.el9_1.7.noarch.rpm 2aa1d2f4150492c7cebf8b4e832c5b6d4c5d019112591a5ce9754a6e0e2f3e7d RLBA-2023:0323 ansible-core bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Use python re to parse service output instead of grep rocky-linux-9-x86-64-appstream-rpms ansible-core-2.13.3-2.el9_1.x86_64.rpm 4f5bd9ddcf7a9fcc7d88d4a39a9ae34ac48d2cccf7e3ebec6a0eab6628a21a16 ansible-test-2.13.3-2.el9_1.x86_64.rpm c9597222dbc1ae9c55f1087950dedf6e7d632433b6f7c8bc37fc76330f18f51a RLBA-2023:0310 conntrack-tools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for conntrack-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The conntrack-tools packages enable the user to set up a High Availability cluster and synchronize conntrack state between multiple firewalls. The conntrack-tools provides the command-line interface to interact with the connection tracking system. The conntrackd service is a connection-tracking user-space daemon that can be used to deploy highly available GNU/Linux firewalls and collect statistics of the firewall use. Bug Fix(es) and Enhancement(s): * Rebase to 1.4.6 or backport fixes (BZ#2126627) * Fix for covscan results (BZ#2122946) rocky-linux-9-x86-64-appstream-rpms conntrack-tools-1.4.5-17.el9_1.x86_64.rpm 74526a63f2aef409c913f379f272fcb8b59069dbe660d08837baa23084616c92 RLSA-2023:1068 Moderate: libjpeg-turbo security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libjpeg-turbo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance. Security Fix(es): * libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c (CVE-2021-46822) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libjpeg-turbo-2.0.90-6.el9_1.i686.rpm 76394adb6682caefc4ac48ba6ec5308c1583d8c93e64993e248f0b6d3061e25b libjpeg-turbo-2.0.90-6.el9_1.x86_64.rpm c68c08fb07237db183473d39d98173881b89e595cb75345f92488e99280c95e4 libjpeg-turbo-devel-2.0.90-6.el9_1.i686.rpm 14179002231a67b6280f275c0894fbd36101981641c8b6c02bae849eaa270541 libjpeg-turbo-devel-2.0.90-6.el9_1.x86_64.rpm 969335187349c8981fb76cceb807a5d3fd4cdc93e79177796f120bf95ac8b119 libjpeg-turbo-utils-2.0.90-6.el9_1.x86_64.rpm e7980527a6778d1dabd71de991d7fe27acb72f4a5c26ea17d2f9e91fe2b3eebd RLSA-2023:1067 Important: pesign security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pesign. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The pesign packages provide the pesign utility for signing UEFI binaries as well as other associated tools. Security Fix(es): * pesign: Local privilege escalation on pesign systemd service (CVE-2022-3560) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms pesign-115-6.el9_1.rocky.2.x86_64.rpm 2879481369fc2706539a86c005a3cbd9f01307657e56584aa3b6b661a92f723d RLBA-2023:0311 libvirt bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. Bug Fixes: * libvirt doesn't catch mdevs created thru sysfs (BZ#2141364) * libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2152083) * qemuAgentGetDisks cannot parse response from a guest agent running in Windows VM (BZ#2154410) Enhancement: * Backport the qemuDomainGetStatsCpu fallback Implementation (BZ#2157094) rocky-linux-9-x86-64-appstream-rpms libvirt-8.5.0-7.3.el9_1.x86_64.rpm c708779a396e230d2c5b07e0bfe51cd01f49ccbd4c83869d8073d60d6370dd64 libvirt-client-8.5.0-7.3.el9_1.x86_64.rpm 7e78e4b314f9391dae14046061f56a0877ba5d2fa8fc6c80e50ef539c8cb8643 libvirt-daemon-8.5.0-7.3.el9_1.x86_64.rpm 48b52a90c97c6b7ad233f63d5e89b6e755018153285734c21f78660409585d1a libvirt-daemon-config-network-8.5.0-7.3.el9_1.x86_64.rpm ea06d4aa7466a860568cd37e88f867968d093a0323d9f4d47a57c2bbeb18c91e libvirt-daemon-config-nwfilter-8.5.0-7.3.el9_1.x86_64.rpm 420ff2d0519c7e21815e4beb165018e69bbdc52f3bf3c93b961e9873a55eecae libvirt-daemon-driver-interface-8.5.0-7.3.el9_1.x86_64.rpm 7e3a7d4ecf369c032a337355427483db927474305d71c1815f888aa28197a218 libvirt-daemon-driver-network-8.5.0-7.3.el9_1.x86_64.rpm 3ed76de2a5b5b77ace56a63991e4b9f57579d0419976dadd00cece896e6be893 libvirt-daemon-driver-nodedev-8.5.0-7.3.el9_1.x86_64.rpm ca05c2a76e07f5ff4647ce9db4ad488a0d4f02a7047be7d15618e969a6a1961b libvirt-daemon-driver-nwfilter-8.5.0-7.3.el9_1.x86_64.rpm 792d48eae60612d2edef25f085c8d1508d110d575b40c3c4a1631ca7177d4b1e libvirt-daemon-driver-qemu-8.5.0-7.3.el9_1.x86_64.rpm b0f28d516b0edc48b0b922dfafa3eb67df028ef014c04e355f31e80aba6005da libvirt-daemon-driver-secret-8.5.0-7.3.el9_1.x86_64.rpm de5bb1b4844f9ff342ccc76b99404624c2d77209c7c4de29253080dcc85c6ef5 libvirt-daemon-driver-storage-8.5.0-7.3.el9_1.x86_64.rpm 11d28b80a7e3f9d171f9d48637e61241c66003ae24366dbe34328c0595e37b7c libvirt-daemon-driver-storage-core-8.5.0-7.3.el9_1.x86_64.rpm 37d0168e2a00cf5e6928bb0a5bfda4b762fc83455f8d60dd9ee459a0cfc95167 libvirt-daemon-driver-storage-disk-8.5.0-7.3.el9_1.x86_64.rpm 24e8e44a9eae16af22f0a4612baaba359e4df0efa8197bba24b03ce0ad2072bd libvirt-daemon-driver-storage-iscsi-8.5.0-7.3.el9_1.x86_64.rpm 4019867e2bdd85da3b6fd73d8649fa476875224fae7f21d06c84af2778797e5d libvirt-daemon-driver-storage-logical-8.5.0-7.3.el9_1.x86_64.rpm ac268085630e07135f22f6d3224469f1b1fed919758eb843017c3356e41e153a libvirt-daemon-driver-storage-mpath-8.5.0-7.3.el9_1.x86_64.rpm 43a2dd82596de9414d0e7ada2acaaa89d864a20c5b42623b322ec4b86b0890ec libvirt-daemon-driver-storage-rbd-8.5.0-7.3.el9_1.x86_64.rpm eb0ac684f2d54aa112510c00b04ba8fca6043aabc83f5b6d3052b5659e701037 libvirt-daemon-driver-storage-scsi-8.5.0-7.3.el9_1.x86_64.rpm 92c62e1ff027648c615425c0b1969373bba89fdc99e4c6a95d84be5e1a806c15 libvirt-daemon-kvm-8.5.0-7.3.el9_1.x86_64.rpm baaf46cf94b070312b786a26aa1f21c16d1e17e7a6a7bf6217b7a0cad0cb3bf5 libvirt-libs-8.5.0-7.3.el9_1.x86_64.rpm 676aee21a6ccef29385ddeb6118c7e29c2ca4250acf8ea9af15905ad3ea44e0b libvirt-nss-8.5.0-7.3.el9_1.x86_64.rpm d829f341c6a3e196c3b05e1cee3af14c96f9fd387883a4d76f5afc45af0ccae4 RLBA-2023:0313 nmstate bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nmstate. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Bug Fix: * Cannot move bridge port to bond (BZ#2148394) rocky-linux-9-x86-64-appstream-rpms nmstate-2.1.4-2.el9_1.x86_64.rpm e97f018f1f7cd2b042099960fa5340ba729f2bdeedef9347d5e2166cd82d5449 nmstate-libs-2.1.4-2.el9_1.i686.rpm dd9bbeb03426c672c4fadf6781d0c6b06610031ae44baa56fccc98aaff0a329c nmstate-libs-2.1.4-2.el9_1.x86_64.rpm 1101d5e8008cfed4b44e4c8307f9b57678479ddb5b1c4769f0f783681bb298a0 python3-libnmstate-2.1.4-2.el9_1.x86_64.rpm 5283d7ae58c28c5872f1207fe6e75d14090db6742cd3581024e3dfb96e8d7d55 RLBA-2023:0314 podman bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Bug Fix(es) and Enhancement(s): * [FJ9.2 Bug]: Failed to remove a pod which contains containers with podman-remote (BZ#2136928) * FailingStreak is not reset to 0 when the container starts again. (BZ#2149776) * SIGSEGV: segmentation violation on s390x (BZ#2150433) * podman: ubi8 sticky bit removed from /tmp (BZ#2152026) * podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152043) rocky-linux-9-x86-64-appstream-rpms podman-4.2.0-9.el9_1.x86_64.rpm ce8412fbaa7fd6b47fe9f40bfe3fffb2c175f73d4f25104e715f64adc56854aa podman-catatonit-4.2.0-9.el9_1.x86_64.rpm 4f2fb4365deabf7265c2af633fae5018ff360228bfc76bf599d3f88cc999d80d podman-docker-4.2.0-9.el9_1.noarch.rpm f458a6a217cd912f9d966f529c37f69013ef746104c22639b829b1dfa702d446 podman-gvproxy-4.2.0-9.el9_1.x86_64.rpm b26f3bde0d57f2b1f7276dd7e3eeb0e81fc63b8149b79e5e481a004abfc23e69 podman-plugins-4.2.0-9.el9_1.x86_64.rpm 068edd55880260e2c3cab7f059da365ceb6f32aeb1a062dbf0615189238570ce podman-remote-4.2.0-9.el9_1.x86_64.rpm ffd70f0ea6097b4011e905767ed6ae686c21f518fdd2629a725a2658ab47ce29 podman-tests-4.2.0-9.el9_1.x86_64.rpm a67d1d437a7b43844234a4e434a5eccd1c103761766f2d4c7ab752d377ff425b RLBA-2023:1244 .NET 7.0 bugfix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet7.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.104 and Runtime 7.0.4 [rhel-9.1.0.z] (BZ#2175027) rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-7.0-7.0.4-1.el9_1.x86_64.rpm 884dc4c45a6b3f6dd727007ac5286130a45d7742755cee88577c3e47dd1af41c aspnetcore-targeting-pack-7.0-7.0.4-1.el9_1.x86_64.rpm 655a5ac2173b2ea716e5cf046abc81c1b4d7effea9409d882397a972269d6d2d dotnet-apphost-pack-7.0-7.0.4-1.el9_1.x86_64.rpm 53b4f12386aa8238ada6e3930ad64e715c5da2f217c3a32549b3545717e0f238 dotnet-host-7.0.4-1.el9_1.x86_64.rpm e2a2108c282f8f165efff8fe0a757d732f789a493b2ff99f77ef8e9bbd9c65af dotnet-hostfxr-7.0-7.0.4-1.el9_1.x86_64.rpm d1f203efe2857577be6c90da1604e69da70141656b53e997d6aa2868af819b32 dotnet-runtime-7.0-7.0.4-1.el9_1.x86_64.rpm fc3f2f4c7a90cdcfc08809f96b537629e86c9c7ad336fece6427eb9027bb11e5 dotnet-sdk-7.0-7.0.104-1.el9_1.x86_64.rpm 298e415b0171c015ed3ac610b47f365a42b0cadf55798b3c4e4cbcef6d9b6f87 dotnet-targeting-pack-7.0-7.0.4-1.el9_1.x86_64.rpm 9383641bbee8d533ed259ba96e3ab85b341069c24a5cd7aa95142b23669bac19 dotnet-templates-7.0-7.0.104-1.el9_1.x86_64.rpm da78f1b77136613f1a2e139834e1991bb1a324bd1f35b7798fa0319deba2c638 netstandard-targeting-pack-2.1-7.0.104-1.el9_1.x86_64.rpm 0036392fe67c142d59737a20590dd4d374b4423acd163034749b0404c7147612 RLSA-2023:0194 Moderate: java-17-openjdk security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-17-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * In FIPS mode, the use of a SQLite database provided by NSS was assumed, which was opened in read-only mode and with no PIN expected. This prevented the use of other databases or setting a PIN on the NSS database. This update allows more control over database use using two new properties - fips.nssdb.path and fips.nssdb.pin - which can be configured permanently in the java.security file or temporarily via command-line arguments to the Java virtual machine (RHBZ#2147476) * Prepare for the next quarterly OpenJDK upstream release (2023-01, 17.0.6) [Rocky Linux-9] (BZ#2153097) rocky-linux-9-x86-64-appstream-rpms java-17-openjdk-17.0.6.0.10-3.el9_1.x86_64.rpm 4409381234e9e28121971447acbe4f89491a7559f18934fa55653dc46b0b18fa java-17-openjdk-demo-17.0.6.0.10-3.el9_1.x86_64.rpm 2289ddbca594e14f4f05d39e4da3b3e44f1994c34c4adb912842ad325a22c2a6 java-17-openjdk-devel-17.0.6.0.10-3.el9_1.x86_64.rpm 2b5aed4d7296f9f168dfb09f40f0b480453fb4a5fc2e7acf522365541b454f61 java-17-openjdk-headless-17.0.6.0.10-3.el9_1.x86_64.rpm fe66df12861f6373c7e8922a622bee5034f91ff32650fbeb6b59b0ea5689b420 java-17-openjdk-javadoc-17.0.6.0.10-3.el9_1.x86_64.rpm 40f474416097aec3d4d877477170ecf0e4fc1eaebc39eb31090b095c3cb441a1 java-17-openjdk-javadoc-zip-17.0.6.0.10-3.el9_1.x86_64.rpm 384c363d515eec71cb89b4fea5d65b1fc088e4fb42e85b260140011b545f0432 java-17-openjdk-jmods-17.0.6.0.10-3.el9_1.x86_64.rpm bd51be60766e26132a7c67cdb701bbef8eb88e2158f2f8bb080077daf8400236 java-17-openjdk-src-17.0.6.0.10-3.el9_1.x86_64.rpm 167de51cc3c1c77aa2a6f9715deaa89d7922bcfb67e7bc933aa41d9ee9eee612 java-17-openjdk-static-libs-17.0.6.0.10-3.el9_1.x86_64.rpm fddbc4dcdd185cc68d1ee00316f3f524bbc5f3cc3b58193c6b33def4c142421f RLBA-2022:3062 new packages: ibus-anthy Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ibus-anthy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ibus-anthy-1.5.13-1.el9.i686.rpm ab986ab8f658ff1ba64716d3da86c11cd270660c91b08e9e0ba028b38d365dc7 ibus-anthy-1.5.13-1.el9.x86_64.rpm 92d132f11def65d48538222cf5ab69c20c007e4ae1b08bf34ab4b77784f22652 ibus-anthy-python-1.5.13-1.el9.noarch.rpm 69afbf81a7b99beb4ac74227259299f19beceb55ce57a222ef4dc00de56e4716 RLBA-2023:1246 .NET 6.0 bugfix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet6.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.115 and Runtime 6.0.15 [rhel-9.1.0.z] (BZ#2174986) rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-6.0-6.0.15-1.el9_1.x86_64.rpm 3347349797afd3b3c1b87e5d9a109158cd94f66c9c0df364e75e4e1d2961d471 aspnetcore-targeting-pack-6.0-6.0.15-1.el9_1.x86_64.rpm 9f12b7b2fb812b17c805fbb79ea3fa27ac1837b7e4c6e86432e30c8e8fa7c60d dotnet-apphost-pack-6.0-6.0.15-1.el9_1.x86_64.rpm f9d269693d9ffd0b673739f296b717fbe51ba037e2651e57e13d35f3590b7fc6 dotnet-hostfxr-6.0-6.0.15-1.el9_1.x86_64.rpm 392ae47ac3a96f62db4dc3b08159c04f88ab234b916dd8c4aba57ef4908b17ce dotnet-runtime-6.0-6.0.15-1.el9_1.x86_64.rpm 842311ab2deacf80c5c7a9e9f7c5b176b7dac648dadd68f80fbb5f6a9d55b923 dotnet-sdk-6.0-6.0.115-1.el9_1.x86_64.rpm d353ac37d20a8dea9995baad8117cc570fc572611d5fcfafaded915d1a6e7b9d dotnet-targeting-pack-6.0-6.0.15-1.el9_1.x86_64.rpm d881f4fd2c081412d551914b94ce84441e973dbccf53b1a13f6cfee949f08365 dotnet-templates-6.0-6.0.115-1.el9_1.x86_64.rpm 8d6613cf3daca5e8eb38c841e568274366810998baef612bb98ad3209eafdd9b RLBA-2023:0315 buildah bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for buildah. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides command line tool for creating Open Container Initiative (OCI) Images. Bug Fix(es) and Enhancement(s): * SIGSEGV: segmentation violation on s390x (BZ#2150432) * buildah installation includes runc as a dependency (BZ#2150525) * buildah: ubi8 sticky bit removed from /tmp (BZ#2152022) * podman build cannot use Rocky Linux subscriptions when the HOME is located in /usr/* (BZ#2152042) rocky-linux-9-x86-64-appstream-rpms buildah-1.27.3-1.el9_1.x86_64.rpm a772360c5fc26bd1e7fa9876dc6a911c2cadd9f0a7ade2ca8676e56b6e2111c5 buildah-tests-1.27.3-1.el9_1.x86_64.rpm 0d0940205101c9b48982d9899eeeb902388510f3be0be45a9512826fb473ba7b RLBA-2023:0316 nbdkit bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nbdkit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Block Device (NBD) is a protocol for accessing hard disks and other disk-like devices over the network. The nbdkit toolkit utilizes NBD to create servers with minimal dependencies. The package contains plug-in support for the C and Python programming languages. Bug Fix: * nbdkit: error: /home/vddk8.0.0/lib64/libvixDiskLib.so.7: cannot open shared object file: No such file or directory (BZ#2148498) rocky-linux-9-x86-64-appstream-rpms nbdkit-1.30.8-2.el9_1.x86_64.rpm 867079f83d60b98561624545fb6dcdc33c15be17a4fd32d0384672bf8a272109 nbdkit-bash-completion-1.30.8-2.el9_1.noarch.rpm 5bcf99b438a3eed79e72f377af0cb7826eca08f26d9722c6fe07cea6aaefba23 nbdkit-basic-filters-1.30.8-2.el9_1.x86_64.rpm 0ce13e80ed907b0e4b8e83de94153c81f4370dc1a1630f453d1c3b45b728f7a5 nbdkit-basic-plugins-1.30.8-2.el9_1.x86_64.rpm 3466dd341ea657ded09196fa0826e601c193f57348ef69d949e0406da7458e87 nbdkit-curl-plugin-1.30.8-2.el9_1.x86_64.rpm 6692b075148c449525ce62f7a72d3c8918d9c1fdd543d32b204fee5ccc223879 nbdkit-gzip-filter-1.30.8-2.el9_1.x86_64.rpm b18ddb2915c2631bf71b00624c3b871e4b4bca6a8aeed43dbc85210a26eb5ef2 nbdkit-linuxdisk-plugin-1.30.8-2.el9_1.x86_64.rpm e009b2365155c2d1058d7761ce5d9e6df3aa5cb5fdf94285c3fd513b715bdc06 nbdkit-nbd-plugin-1.30.8-2.el9_1.x86_64.rpm 68b47d17a80513e063fb78691c54d4f48cac11d190fbac5fd7fffbb7b2e87fa2 nbdkit-python-plugin-1.30.8-2.el9_1.x86_64.rpm cd0e7aa9610de45b69caa26490730006258dffe58ca0d5c602f9a8566c20f116 nbdkit-server-1.30.8-2.el9_1.x86_64.rpm 4c42d726845b1c2dc42cd59704e80ff83aeac9d8d55e97cbd876b391b554d752 nbdkit-ssh-plugin-1.30.8-2.el9_1.x86_64.rpm a81229467e8cde4ee0559837ae18c4f3fbc6c7253216077c3a8634c5a58108c2 nbdkit-tar-filter-1.30.8-2.el9_1.x86_64.rpm 38b2c68a41a962c9a9f87aef69efdf4ee64317d6a91e09d0029d6039a0ca1be0 nbdkit-tmpdisk-plugin-1.30.8-2.el9_1.x86_64.rpm c65cdd3c1a224feefd167bb5261ae9547fcde717d4a22d215ee9aed168355fe2 nbdkit-vddk-plugin-1.30.8-2.el9_1.x86_64.rpm 68e95e4d99454fe95f7257ec03f1b6f8241edfae3bfde1c45a505c8679e449c5 nbdkit-xz-filter-1.30.8-2.el9_1.x86_64.rpm 03f3832746fe5fe0cdbb21f3a63608cc505de23ae791fec5addc894b388a1d58 RLBA-2023:0317 hyperv-daemons bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyperv-daemons. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The hyperv-daemons packages provide a suite of daemons that are needed when a Rocky Linux guest is running on Microsoft Hyper-V. Bug fix: * Cannot set gateway properly when set static IPADDR0,NETMASK0,GATEWAY in ifcfg-eth0 (BZ#2150268) rocky-linux-9-x86-64-appstream-rpms hyperv-daemons-0-0.40.20190303git.el9_1.1.x86_64.rpm 9ad347656af733f0c9d08193e6de68afe2f1c24128adff9fe1cfc78b21a25721 hyperv-daemons-license-0-0.40.20190303git.el9_1.1.noarch.rpm fa9059871f00dc113015c27e01e5388e9a52d1b097cd94109f4d4a4bbc886694 hypervfcopyd-0-0.40.20190303git.el9_1.1.x86_64.rpm 617d5a94fef2e4b902531feddeed690e976e40c53b42044290243a3dbfda1ca2 hypervkvpd-0-0.40.20190303git.el9_1.1.x86_64.rpm 8a55232a6b273932785b24fecb7d71713c578450117e564480c98318e426d17a hyperv-tools-0-0.40.20190303git.el9_1.1.noarch.rpm 0140116450ab5a94be5e1d93e8a9fd4694bc666bf0a2ac5c3c1f43eac4fd85c9 hypervvssd-0-0.40.20190303git.el9_1.1.x86_64.rpm 3efd684f075bee685a748ab5aee1f363a971517d20dc2d4135cde72c0b07cefe RLSA-2023:0318 Moderate: postgresql-jdbc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for postgresql-jdbc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system. The postgresql-jdbc package includes the .jar files needed for Java programs to access a PostgreSQL database. Security Fix(es): * postgresql: SQL Injection in ResultSet.refreshRow() with malicious column names (CVE-2022-31197) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms postgresql-jdbc-42.2.18-6.el9_1.noarch.rpm ce261fcfbadb40e68387bc472ef528b45f3c3612089125d3c98f262eb8d9b7dd RLSA-2023:1670 Important: httpd and mod_http2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for httpd, mod_http2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: HTTP request splitting with mod_rewrite and mod_proxy (CVE-2023-25690) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms httpd-2.4.53-7.el9_1.5.x86_64.rpm 183ebb744b109133015141c33750d7881ef29c2c90b4a37193b0fe08bd0066d3 httpd-core-2.4.53-7.el9_1.5.x86_64.rpm 2157d121431693b2092c522e836d0fe7f39a6f3f78f5233706fc9ff9268556b5 httpd-devel-2.4.53-7.el9_1.5.x86_64.rpm 0b1b747dff809e5e15cf9bd7535773e8eb7f470d2ce72d9e741549e690d97603 httpd-filesystem-2.4.53-7.el9_1.5.noarch.rpm 434ef5817087d04dc9c4ad74f4cd8c000da031bce2248c29302f7278c02cc29f httpd-manual-2.4.53-7.el9_1.5.noarch.rpm 2ebeac5aed899c14b49856ff8a9ef34391dca4cfe9465215a44bdd131b570afe httpd-tools-2.4.53-7.el9_1.5.x86_64.rpm c170cd77505c1070843712be0cb62831e9c9b479967689b5fd55baa5f0d0ba7a mod_http2-1.15.19-3.el9_1.5.x86_64.rpm 945dbbfae5bf5291fb6c7132eb6c34d09f09e90ef935915a5804b97de5ce34c5 mod_ldap-2.4.53-7.el9_1.5.x86_64.rpm c69b735f0fe584050d143c4a71e24dcd760e8460ae2f44e6bbd86a958bf6acf7 mod_lua-2.4.53-7.el9_1.5.x86_64.rpm 696e5e1a81a907eb850bd89399984e07f3ca5b4a78b6a193581e0962db481792 mod_proxy_html-2.4.53-7.el9_1.5.x86_64.rpm b3ae614753b0ca018178a7c0609cbe1b759e61e9c72158bccf4403215d1b519a mod_session-2.4.53-7.el9_1.5.x86_64.rpm 4697ccc2b35556ad9516e63bc9424c472427f683751554ae9a1d11d22a6ed9b2 mod_ssl-2.4.53-7.el9_1.5.x86_64.rpm 944adb6abad6c2367d7ee30896186e9656084d99f1c55ab43a9acca76e675566 RLBA-2022:3127 new packages: libX11 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libX11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libX11-1.7.0-7.el9.i686.rpm 1d79c9c277e81e11540d4f6b5a8849b7a34a1a8bf1bc1a201976a02b01389063 libX11-1.7.0-7.el9.x86_64.rpm 8162e2d25c807c473f8559f042bbebed27fe6acb9ec8df46d243850f3a687fa5 libX11-common-1.7.0-7.el9.noarch.rpm ada046fb459ae18b792e570ecbdf3bc89afadf45b0f7e10761fdd00c061c4c62 libX11-devel-1.7.0-7.el9.i686.rpm 4d2274b809b32edd13fa196f03e4745032af9d01deaaa13855d86b4df7e2b470 libX11-devel-1.7.0-7.el9.x86_64.rpm 50b556b29899f258863b35dd099ee7d2b5731b3216eb552e23e3d20f9c45c7e4 libX11-xcb-1.7.0-7.el9.i686.rpm 38bafd811016229ce899b546722b399d5487026126ba14d1ed26804839f4b30e libX11-xcb-1.7.0-7.el9.x86_64.rpm 7b9e224a0c54f1a4eae7eba0d86ff1cddf2117c63cf25f9be1d402d351cb40cd RLBA-2023:0320 ipa bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es) and Enhancement(s): * vault interoperability with older Rocky Linux systems is broken (BZ#2149274) * ipa-client-install does not maintain server affinity during installation (BZ#2150270) rocky-linux-9-x86-64-appstream-rpms ipa-client-4.10.0-8.el9_1.x86_64.rpm 511d2f0c4dd71cd1563504049ee39e9a51b86c60cbb6c83328744706dbcbc55c ipa-client-common-4.10.0-8.el9_1.noarch.rpm d1dda6cbb850b804179b67a46dd0d84c1378575495514a6da967bcde9dafc01d ipa-client-epn-4.10.0-8.el9_1.x86_64.rpm 09439c201ee287e17b1bde1cd1e8c46125b44ae17a219187557a5a66aa15f346 ipa-client-samba-4.10.0-8.el9_1.x86_64.rpm 5d7c12e6a4954d4d126cbf01371eb5639fa585817a2cd151ae0b6aa35585c090 ipa-common-4.10.0-8.el9_1.noarch.rpm 276c52e480e2d7a11b8cc95b95226eac4fe22eb9af91e1177448b2348c6024df ipa-selinux-4.10.0-8.el9_1.noarch.rpm 63c7492e6faf1f238ec96ce6d48bb903890f745223b44ec0fd48614286c1be92 ipa-server-4.10.0-8.el9_1.x86_64.rpm ab9243aec5974629b88056b46049d94fa4bb255a86acf5ab30633026ce30bcb5 ipa-server-common-4.10.0-8.el9_1.noarch.rpm 546c8064270726c9f3159d8be7c4c411c72eeaa39c58d5df238272f241350bce ipa-server-dns-4.10.0-8.el9_1.noarch.rpm ec35ba0af90eaf5f42c56e0589b41d58b5d6cac6eb7018956658b32b59810754 ipa-server-trust-ad-4.10.0-8.el9_1.x86_64.rpm 4f893f369df72cfbdb122467e8164ceeee3f634ecac0b7640df8fb56e6b74702 python3-ipaclient-4.10.0-8.el9_1.noarch.rpm 50405d81a373f97c8f4aeafd1b35b1f229045d1760ba00e051704b0164bc7ac5 python3-ipalib-4.10.0-8.el9_1.noarch.rpm d1792d66c98e8351803ac9fc16a8355e672b9ecd7cd8d874e39cd0a187a54253 python3-ipaserver-4.10.0-8.el9_1.noarch.rpm 00ba2877876739f123773f4e06eeac31671771f7b01658747cdc09660cb8d885 RLBA-2023:2480 libsepol bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsepol. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libsepol-devel-3.5-1.el9.i686.rpm f9ab384c1398ed2b4b19323860e5c1cc01d72ee55acf5476feea500a2633ccb8 libsepol-devel-3.5-1.el9.x86_64.rpm 95adc4102e6f723ee4ffc98dd800cf96ce36d5aa65a9dcb05295368ec41a18eb libsepol-utils-3.5-1.el9.x86_64.rpm 87dd56404ad9bd0da000769df96d863d14560e55d2079f9be6dcc1676cdf89d3 RLSA-2023:0335 Moderate: dbus security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for dbus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010) * dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011) * dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly (CVE-2022-42012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms dbus-daemon-1.12.20-7.el9_1.x86_64.rpm e4bef9396a76a1a35f988e05cabcdbe24abba844d163e99597ae039cf500b21c dbus-devel-1.12.20-7.el9_1.i686.rpm ffd7cf2c7d3df426b4188a06c63711e1f96b15c29fbe33481eaa407cebfba01b dbus-devel-1.12.20-7.el9_1.x86_64.rpm 9d945fe9e08c6a574e23be1dbe12502e233ddb7324e250cc403fa5398a5773fc dbus-x11-1.12.20-7.el9_1.x86_64.rpm c5b74a375b87c45afdba308b0eae7bf474754c3d7ea460d600c3acb8681f7732 RLBA-2022:2305 new packages: udica Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for udica. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms udica-0.2.6-4.el9.noarch.rpm 54817f989f1f166523eeeae9442c1621f1e4c1452531c3a4833613442454e659 RLBA-2022:2318 new packages: libguestfs-winsupport Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libguestfs-winsupport. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libguestfs-winsupport-9.0-1.el9.x86_64.rpm 7932110c60482d36a73da0788b3e77b3e5bbbf1a3037378f5897f025fbf7d0bf RLBA-2022:2321 new packages: hivex Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hivex. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hivex-1.3.21-3.el9.x86_64.rpm 419e145c2cfffc26fc6439c8042fdd7b34e39d440a93e130cefdba838dcba095 hivex-libs-1.3.21-3.el9.i686.rpm 3cc03ce54f84b8e4c49ba9dbae3ab70ef0bbb6bb4bda08764e1b7f288e2b889f hivex-libs-1.3.21-3.el9.x86_64.rpm 3204db0bf220ffa122b53cf2c9d93972f837576de92ac730eb5b119abaad7092 perl-hivex-1.3.21-3.el9.x86_64.rpm 513e23e3ee6efb64b2634e92e6cfb43fcc9fd553d959f95d9044947b73ed0772 RLBA-2022:2323 new packages: nvml Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nvml. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms daxio-1.10.1-2.el9.x86_64.rpm deb874ee4297b855ab257aafaea95fab73dcff72dee467bb6d9f87d571ef8724 libpmem-1.10.1-2.el9.x86_64.rpm 594c5dfb4205afffbd250597b1867975ae660c6d088660ec1f309487815f839d libpmem2-1.10.1-2.el9.x86_64.rpm abc2a70b9d24dc8c7b93395f8d8f38fc68fee63f837407e5e47696871ead1968 libpmem2-debug-1.10.1-2.el9.x86_64.rpm 4025588361bcd871ff043b7d168027677e728e6aee7d1f892923732c2976a2b6 libpmem2-devel-1.10.1-2.el9.x86_64.rpm 6f4db16a75bdb075568a27a93bc3ef42feab20c7c70fe8a3310fdfb2e8746169 libpmemblk-1.10.1-2.el9.x86_64.rpm 268956db1650cf2107eaf852d8ebedab47a4671a1ebec5ecfa226a3bae38b5a2 libpmemblk-debug-1.10.1-2.el9.x86_64.rpm e9a0a48f73eac91ed54aa91d183bb3b517e05d6dc640e3bd8051866075eddb66 libpmemblk-devel-1.10.1-2.el9.x86_64.rpm 32268084f61346b062925d37838b816797bd240e5426ba58234ec9d1c24544ce libpmem-debug-1.10.1-2.el9.x86_64.rpm fd19262cdc9fb34195a7958ab94ff74e3975eb4e7000e1ab11d582f818bcecef libpmem-devel-1.10.1-2.el9.x86_64.rpm e054c99d8d0e7a793e25597fbd462e8b9e550424b141e8948666ec29c64fd31a libpmemlog-1.10.1-2.el9.x86_64.rpm 2ac80c20f9df80ef4f6b619f330fdd78d75574b162d2ab4451d71fe657f1ce35 libpmemlog-debug-1.10.1-2.el9.x86_64.rpm 27ac1e27b51074d83695cedd5b6d655d5142d365b47ef32a0c98480567007253 libpmemlog-devel-1.10.1-2.el9.x86_64.rpm 59bf2adbeaf4ba578aefc6f1941f62f61ac981af406cdb7ec32e9ee2c55a30d8 libpmemobj-1.10.1-2.el9.x86_64.rpm 7cbafb3c2c87692c4dff0a2b4be0baad0b8dae32e53d04b0da6cf1dbd4ba76aa libpmemobj-debug-1.10.1-2.el9.x86_64.rpm f656bc7148a9ef1a89a366c17a6df7400fdc57a31453b776f3dd8882e23f6702 libpmemobj-devel-1.10.1-2.el9.x86_64.rpm d970ae3991156e5628064aefe0b7bfe1320a1771258e2296c9d32fc55d38b215 libpmempool-1.10.1-2.el9.x86_64.rpm 69ecdf513b924c69695eb43b8bc49b46f69f79d42cd25fd7472651cafcf4622b libpmempool-debug-1.10.1-2.el9.x86_64.rpm 8d1cd134b6ea707cbcff40c39c1034fd880b9d97dc6567b129eacd93fbe30b96 libpmempool-devel-1.10.1-2.el9.x86_64.rpm 6f4231908548bff2294524bb8e49ba7eb978f0ba147c34ab4a3d0e3d87d68a07 pmempool-1.10.1-2.el9.x86_64.rpm f3edd0117b7f2815fa8b6c5314407b615bb47b648bb76eecb638fbabb6b866d9 RLBA-2022:2325 new packages: libserf Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libserf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libserf-1.3.9-26.el9.i686.rpm 764d428b435c1dcfa73132faa79d4807b6a289a515a38d98d693b212f6d16ca0 libserf-1.3.9-26.el9.x86_64.rpm fc083199cfeb80e0a8afaeee5694208ea72778f43983cb676268601907c954c1 RLBA-2022:2329 new packages: gnome-control-center Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-session. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-session-40.1.1-6.el9.rocky.1.x86_64.rpm 8dccf0f721843777180534415dd263fc13928f7e5f0fce7cbdaf65d86ee38538 gnome-session-wayland-session-40.1.1-6.el9.rocky.1.x86_64.rpm 0028de11fb85de213dc99a86161d8ed3751323842f056b2801df93a8c576d01d gnome-session-xsession-40.1.1-6.el9.rocky.1.x86_64.rpm 7d15bf23ab26edd27fce86270f23558415238305d1b97d9b4b96989b1a378fc4 RLBA-2022:2335 new packages: flatpak-builder Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for flatpak-builder. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms flatpak-builder-1.2.2-1.el9.x86_64.rpm 59077807b106baa7e87ac3d59807a00d64fd99748a9ff22a2a88820ad9b79e76 RLBA-2022:2337 new packages: resteasy Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for resteasy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pki-resteasy-client-3.0.26-15.el9.noarch.rpm d40d5975d4bded909f13de9bbfb206ecda9a963e81a2148e3ef3e13f88c195cc pki-resteasy-core-3.0.26-15.el9.noarch.rpm ce9e2e9b809e5b278dae5f411c8644e5ed84ce4c95dc0deb2fc60eda48ae7383 pki-resteasy-jackson2-provider-3.0.26-15.el9.noarch.rpm 6427fc10b739350fc46f21253bbab10efc6dfe58828651598332bad6d03ed966 RLBA-2022:2343 new packages: mutter Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mutter. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mutter-40.9-10.el9_1.i686.rpm 4e3d16a73c4d923e5e9af5f5a8138cd682cfeb5ab527375cb3e3a323470ffac7 mutter-40.9-10.el9_1.x86_64.rpm 2d3b70879b9922cc48ca36a67b707aee6d8dcd283fffaf3c81104f9e9da621d7 RLBA-2022:2346 new packages: jss Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jss-5.0.3-1.el9.x86_64.rpm 3c1cf2a2ac4aa918d80b1101abffe89c3b25b09250958ecba59f6e40b1b62098 RLBA-2022:2347 new packages: jackson-modules-base Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jackson-modules-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pki-jackson-module-jaxb-annotations-2.11.4-8.el9.noarch.rpm e2553e02a8e0b5629ecf746d7831aa392412be30c7a9d9ef33698491ca39e2b0 RLBA-2022:2366 new packages: tomcatjss Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tomcatjss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tomcatjss-8.0.0-1.el9.noarch.rpm 6aed98268ad54cbf0e771d579f2274ebcedf460eff72ba8c8d3a1a6119592e0d RLBA-2022:2367 new packages: ldapjdk Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ldapjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ldapjdk-5.0.0-1.el9.noarch.rpm c8ee60c5a68c25da964a182d1b0c4ee00bf617c94e05382dec38a74ca6eb8f88 RLBA-2022:2369 new packages: emacs Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for emacs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms emacs-27.2-6.el9.x86_64.rpm 46aad26c8380125d22978d88ab4f9fd0905f2d96acb1f8b297144c53ef558887 emacs-common-27.2-6.el9.x86_64.rpm 5632fc384ba44b82ca8ab327d6feeadf5c84036da790cca6bbf0b1840457f4f8 emacs-filesystem-27.2-6.el9.noarch.rpm 602bb41ecc4c7f0690bcf07105ebd468e3ab50c856d27bf1f02e1c3292a29a24 emacs-lucid-27.2-6.el9.x86_64.rpm 14b0d64ed26ea0ba198dc027a10c8ddf51714a488c83221a916e5f06c7a4f7f0 emacs-nox-27.2-6.el9.x86_64.rpm 3a7a89f6f63a9781cdf0bc1ec34172d0ead85a5fc6618eef2557f6dd86deefea RLBA-2022:2375 new packages: dwarves Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dwarves. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dwarves-1.22-1.el9.x86_64.rpm b2a0897bbe16d9916ab8ddb44cc14e9e3913168575e23c59b6b8c8f7d8df57a5 libdwarves1-1.22-1.el9.i686.rpm d62ca19172c762a6bcc681ce4af26bb62cca8716249659fdf027564a961f098f libdwarves1-1.22-1.el9.x86_64.rpm 2a1d8a4d51adbc3820fe07643a51f42660fc8b75624ae64532b28c3bd5e722af RLBA-2022:2396 new packages: appstream Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for appstream. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms appstream-0.14.5-1.el9.i686.rpm c99e533591bb4d472cb4861ada7730cbdc9d510b8b9ca8abdbd634e7e74c524e appstream-0.14.5-1.el9.x86_64.rpm b9f5cae3c6406a04a1d8f208616cc018217d166c51f496a4bd08b9163a1599cd RLBA-2022:2399 new packages: usbguard Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for usbguard. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms usbguard-1.0.0-10.el9_1.2.i686.rpm ed1d7851cb634fe120cc8fb62b664d797203278440c07cfd8e0bb50ff3b90a5b usbguard-1.0.0-10.el9_1.2.x86_64.rpm 237bf57bcb21ec99e0f4f605a1f685c29e8fbd52be85215c8091175a2ca2b3af usbguard-dbus-1.0.0-10.el9_1.2.x86_64.rpm 821f7cc58d4632a98a7470a2f86ebfe04c447623af52700a88c28120b955f508 usbguard-notifier-1.0.0-10.el9_1.2.x86_64.rpm ff7701135023660d1eb0217503379c5f0bceee00374f4d30c8e847ba04881248 usbguard-selinux-1.0.0-10.el9_1.2.noarch.rpm 0ce8975252348d310c552128f6c02bf750a9e74b44fad8c58824a2b195aa7ca5 usbguard-tools-1.0.0-10.el9_1.2.x86_64.rpm 335ecd55f5170814776f7fdcc360afc5acf61947ed0607939d25f8f34c442ad2 RLBA-2022:2400 new packages: libjpeg-turbo Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libjpeg-turbo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libjpeg-turbo-2.0.90-5.el9.i686.rpm 79053792d2695935a2b95d49c7858df91734639bb991e051c48dbdae75a40396 libjpeg-turbo-2.0.90-5.el9.x86_64.rpm c48fa172b999d4101e3c3762345951f99837e98ff30ceebf1a9f0f16208847ce libjpeg-turbo-devel-2.0.90-5.el9.i686.rpm 26a689974cdc5139f86835f5c681709dcc429b710c02c6c591b1db466e7f942a libjpeg-turbo-devel-2.0.90-5.el9.x86_64.rpm 5d28b5094204d82d1ef763a42e9b77aa968e5472857b20b3e4e0445a0bd8214b libjpeg-turbo-utils-2.0.90-5.el9.x86_64.rpm e6a67414b8453cee40563f55654fc2abd9fedaf4b956c4e64ea6fda86dff01d6 RLBA-2022:2402 new packages: ibus Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ibus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ibus-1.5.25-2.el9.rocky.0.1.x86_64.rpm c477e9eb2a472e503bc451c92f80f350d870d5246d8e2eea0d8ed8230d85eeb6 ibus-gtk2-1.5.25-2.el9.rocky.0.1.i686.rpm 562473b4b79b840e4c3e38100822f1bf0cda1d6f0fa70b6835481e756f0d6575 ibus-gtk2-1.5.25-2.el9.rocky.0.1.x86_64.rpm 135672c41ba069be017a4f1bbf084302973f19c205f438085e5f528e49878fb9 ibus-gtk3-1.5.25-2.el9.rocky.0.1.x86_64.rpm ca4e328bbc820b7e7dd0aef7f09fc3abff550c63e6b200dab27dfca22f27af3b ibus-libs-1.5.25-2.el9.rocky.0.1.i686.rpm 1906bb921e345ee20e87b8cf8bf81f50b9d9823b7efab6a3001183ef9aa8eca8 ibus-libs-1.5.25-2.el9.rocky.0.1.x86_64.rpm 8ff44621304d495b9159ca2528cf919079db1180352ed7adc7a068e9ae32b078 ibus-setup-1.5.25-2.el9.rocky.0.1.noarch.rpm e6a45e6240188ac1099f5568ae3f32aaea6f6913d58666208bb93c48b714f42f ibus-wayland-1.5.25-2.el9.rocky.0.1.x86_64.rpm c4f36e5bf45cde39822d5e9a4a153ff4e248412e8bc01547537f22344b71f3b6 RLBA-2022:2413 new packages: udisks2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for udisks2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libudisks2-2.9.4-3.el9.i686.rpm c72b824b39a74d8696aeb7ec5cd907707a1fcbd754fad2cd04e06205520cb2df libudisks2-2.9.4-3.el9.x86_64.rpm ed7b91cc3fc2ac6f7cbdc0fcae5872488a6c5597d8740c8ae7754013686d200c udisks2-2.9.4-3.el9.x86_64.rpm 0338d861fb0d7c048619a27449efceafc9d0a438727b797c298ef3bcb2423376 udisks2-iscsi-2.9.4-3.el9.x86_64.rpm 5c14415b05965cc6940425ee32926cc599c52daa8821df51d84a633fcc515945 udisks2-lsm-2.9.4-3.el9.x86_64.rpm 66f35294c4983e86ebddc8becf55bb15bffaa6e438acbb4482337d8363bad7de udisks2-lvm2-2.9.4-3.el9.x86_64.rpm 4d9a9c8939b950aa0afeb37927c6ccea70c5599596e835172b58d608dd7841a9 RLBA-2022:2416 new packages: appstream-data Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for appstream-data. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms appstream-data-9-20220302.el9_0.1.noarch.rpm ab80b8cf5b42b71df8de8ab4bb99d46cd36ad1594e61a615b63b14164395c595 RLBA-2022:2420 new packages: createrepo_c Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for createrepo_c. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms createrepo_c-0.17.7-4.el9_0.x86_64.rpm e16425dd36fd05a79db1b9e00aff464c600a8ff66d7b2fe96eefc2b623e801ac createrepo_c-libs-0.17.7-4.el9_0.i686.rpm 5d16436d83159e7affd3a31cb1686d85f437febb6dc533250c06cc2a72815141 createrepo_c-libs-0.17.7-4.el9_0.x86_64.rpm 5e874a3f33e0bc2100c735d523dafd97eee487b3de0be4c28202587636cd4c15 python3-createrepo_c-0.17.7-4.el9_0.x86_64.rpm ac15f4c0ce4d70f36af8bc8dd9a42b97209dba40062adb29dc2ae2983317f84a RLBA-2022:2421 new packages: net-snmp Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for net-snmp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms net-snmp-5.9.1-7.el9_0.1.x86_64.rpm 45c7fdf8bf7ac6873f0836dd4b5b9359ad1426f8e0b7c2dc50db7b4b24c5e77c net-snmp-agent-libs-5.9.1-7.el9_0.1.i686.rpm 34386bc8151023ac08fed088cae847fbcdf6c225b30a0be60ecc837cd66ff27d net-snmp-agent-libs-5.9.1-7.el9_0.1.x86_64.rpm 5c34051105cfeadcc20cd1b0ee7a657ad7964a91a7d4d6e4bb023aacce2a7173 net-snmp-devel-5.9.1-7.el9_0.1.i686.rpm e9b29003e4aa7b52ebf51da7323935394bd2d3c96ac4d1bc8109e59ae0eefe4a net-snmp-devel-5.9.1-7.el9_0.1.x86_64.rpm 68cbf14158d98027adc73958b26b40b5e19d4e11d077c8822baf6a0f5c984462 net-snmp-libs-5.9.1-7.el9_0.1.i686.rpm 112c41409b7cfd1bd61ed78e827fe263dd12b507c97126b6be17478ddd96a32b net-snmp-libs-5.9.1-7.el9_0.1.x86_64.rpm 30715b3db6c7797ede2f3014db8a4b367d64ff5176173d6fd752b2dae9351d0c net-snmp-perl-5.9.1-7.el9_0.1.x86_64.rpm da1af97bfa7c44f028e4b574657a69d62143d9fecc996c76911ff79bf7d98b99 net-snmp-utils-5.9.1-7.el9_0.1.x86_64.rpm 63c6fec11b84ca7b9bc0dc713db458663a9f44fd91f6b12dfe4581fc4fc66d1a python3-net-snmp-5.9.1-7.el9_0.1.x86_64.rpm 0f91007d6139d5d60efabc69cfa31f1b78b9f5188ec70235502c5609524ac0b5 RLBA-2022:2423 new packages: python-rpm-macros Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-rpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-rpm-macros-3.9-52.el9.noarch.rpm f82b79bb8c4d24d5f038c05121f59fad10d7e6cc0fe41b5cd8a7d4413e6d09d5 python-rpm-macros-3.9-52.el9.noarch.rpm cd61fd5094890aafb8eb2b55058d0caaf0e7327cae5541479b64ca332afe472e python-srpm-macros-3.9-52.el9.noarch.rpm 507b18e7016e92b68b200102f55150747c03076d1e34a5a3ba140e1735faa9b5 RLBA-2022:2424 new packages: wget Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wget. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms wget-1.21.1-7.el9.x86_64.rpm c2ff8ef263f7fd77f9e999cd9f35a3c04a158acc065efed413456792f8f7ffc7 RLBA-2022:2441 new packages: maven-resolver Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for maven-resolver. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms maven-resolver-1.6.1-9.el9.noarch.rpm 6d3482a7a58e801812875c73975ae80a5396613724593c82621c4f710263dadc RLBA-2022:2445 new packages: maven Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for javapackages-tools, maven. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms javapackages-filesystem-6.0.0-3.el9.noarch.rpm b42cd1429b4d01f1482fa6fce44e41f5f923219d2fcb09634bd99a1792884dd3 javapackages-tools-6.0.0-3.el9.noarch.rpm bc51f441311b63d60154d6b4daeb1ef129e10fafb492b32d3d89a11bb8ae4181 maven-3.6.3-14.el9.noarch.rpm 927085462768f8c5324c2b514013b57ab1d4edd0824fbcf19941ad12b6146a11 maven-lib-3.6.3-14.el9.noarch.rpm a2bf639d6a73b7db1ecb51fd1e9a0b6e8f3be2cd2ac546672694b707844377b3 maven-openjdk11-3.6.3-14.el9.noarch.rpm c011fbb97732621901480150dcd2393ed34eb6a330ac2e0cffeda38b87881ce7 maven-openjdk8-3.6.3-14.el9.noarch.rpm f86e0f9eae59ffff3b747234512e7ae5c53c5cbdd43f5b8dd124f90f77820928 RLEA-2022:2452 new packages: kernel-srpm-macros Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for kernel-srpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms kernel-rpm-macros-185-11.el9.noarch.rpm d836fc7f59884c4922b04cc663f594b91662b4276102d0a84653b6795d247b3e kernel-srpm-macros-1.0-11.el9.noarch.rpm 13756a83577da6b61f0dfae132e7a4955c672e6a323c4b977783b857f716c496 RLBA-2022:2458 new packages: libstoragemgmt Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libstoragemgmt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libstoragemgmt-1.9.3-1.el9.i686.rpm 0546372061909d29d048acaa2a967fee4cfb87ff0d0ed9a2476b25d855e7a265 libstoragemgmt-1.9.3-1.el9.x86_64.rpm 6e257b5e887466f9a79f8d26502b38780f8037da4f3413a4bef1aa6ea2361eb8 libstoragemgmt-arcconf-plugin-1.9.3-1.el9.noarch.rpm ff1bd143abefa4edf2d4282647623510fbecfeaee527f04ac866a50df3a57285 libstoragemgmt-hpsa-plugin-1.9.3-1.el9.noarch.rpm 2e878f9190bdc4755b7d3942e6d22acc85bc74806826e6f4e0a79146109d2730 libstoragemgmt-local-plugin-1.9.3-1.el9.noarch.rpm 34fc303faed416d336aee8e13a0d94b3ed848a05d62dd309a8dbbc7459ee0de9 libstoragemgmt-megaraid-plugin-1.9.3-1.el9.noarch.rpm 970a5e0ad4c639317caf2c523079437df83c13cde5cbc2d99a65b1bdb6d9e456 libstoragemgmt-nfs-plugin-1.9.3-1.el9.x86_64.rpm 828a31ff417276cdc93faab9f9231fe091e835398dec5a03b7111e328f695f62 libstoragemgmt-smis-plugin-1.9.3-1.el9.noarch.rpm 1eb8a4dab5429adb7a2e15be41dd62fa78d8530e64b7d57a2ed7584029b0da8e libstoragemgmt-targetd-plugin-1.9.3-1.el9.noarch.rpm d88b517b69d2178b5e9e199b189c8fcd13175de2e742f0bcf530eeef5898fdf6 libstoragemgmt-udev-1.9.3-1.el9.x86_64.rpm d1fffa96caefa03640ca0cf7ea8d138c1cc61a2256c6f005b9cd947977461bfa python3-libstoragemgmt-1.9.3-1.el9.i686.rpm de493de47939478c2d770e3579ddcbf3202fcbb04e263a2d2a92466ebe435e1a python3-libstoragemgmt-1.9.3-1.el9.x86_64.rpm ab95ada794564bb369cab180ab912e57d6755f24be902ebe390c3de6a0ea9a87 RLBA-2022:2460 new packages: wireplumber Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wireplumber. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms wireplumber-0.4.8-1.el9.x86_64.rpm adcf205fb635d08933179b35b045f4dc31a31b31b166ad13e4b5ab5e73319934 wireplumber-libs-0.4.8-1.el9.i686.rpm e35832342cf238538f5d3667b1b9b6f38ce2a3168c03abb83ec266bc9ab1606a wireplumber-libs-0.4.8-1.el9.x86_64.rpm 52d86f8c1b70a33db928845cdc13d54734b79f4e5ca3133a5629e60be56f3b8d RLBA-2022:2463 new packages: kernelshark Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for kernelshark. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms kernelshark-1.2-9.el9.x86_64.rpm c413be58954f425f7e8d6ae4fc2a87872014e8658c744f4471ef5b12b4d73f5c RLBA-2022:2464 new packages: vsftpd Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for vsftpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms vsftpd-3.0.3-49.el9.x86_64.rpm ce2527df2f94c34359f495732051c205461028c979725a4fb2a1488cc0bc8546 RLBA-2022:2466 new packages: libecpg Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libecpg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libecpg-13.5-1.el9.x86_64.rpm 827d780680f2275fe5e9ab67d3d602b2d105af00239a55cb1d777e53583dbbd9 libpgtypes-13.5-1.el9.x86_64.rpm 24cbec009eddcfc7076367ed6522f2e691fb7bacbdb93df120ca9de695a25076 RLBA-2022:2477 new packages: totem Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for totem. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms totem-3.38.2-1.el9.x86_64.rpm 7d46f365675aceec166e48262915ede9d32e89f78172d23b3a3252f8a8af2de3 totem-video-thumbnailer-3.38.2-1.el9.x86_64.rpm f8f38a481e269c3efc5d096c305628fe0a4d8d69e4373c30fba0c92b3fa96003 RLBA-2022:2480 new packages: texlive Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for texlive. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms texlive-20200406-25.el9.x86_64.rpm 837a54a5cc06c9fbc84b0a1c2208b9c50c9b22b2061b300021fa47edb028635e texlive-adjustbox-20200406-25.el9.noarch.rpm 23986ac559b8a930cea51afeefc45693c1f52f3ec61ec8decd7121fa37a39371 texlive-ae-20200406-25.el9.noarch.rpm 67dbe8589fe1279d7e0eb69e74d398f98723b6c5c4553fbee9d3b580997055ca texlive-algorithms-20200406-25.el9.noarch.rpm ecfbee5ee927ed4a5f4bcbc59b96b9f2984495392cd55072463e1abb26fdbffb texlive-alphalph-20200406-25.el9.noarch.rpm 92a182f81eb744da3555b91b709e0a83f0806266e0487e8fd53fcbd3bae7cfeb texlive-amscls-20200406-25.el9.noarch.rpm d07a868d557c286fa763d87c51b029942703218810da8777ad597fef9d88b3a6 texlive-amsfonts-20200406-25.el9.noarch.rpm eaaf57ef9a79e796e70cfa004aec5e88ff30b5ea8ee01a6b828ed7f25cc13f00 texlive-amsmath-20200406-25.el9.noarch.rpm 4cd3814d72aaeb03bbfbb29070ef69dd3e6f73d2c1ede68163b56c02ef3ace3e texlive-anyfontsize-20200406-25.el9.noarch.rpm 38efa1236c4cdce4086b04814eac594cb6761be22757665314c80e16f559fa60 texlive-anysize-20200406-25.el9.noarch.rpm 9e44abf02a32f415b678813f77f48025a78285ca520a13afd0daedd3b6c96e02 texlive-appendix-20200406-25.el9.noarch.rpm 19ffa63b7f3b9480edb919fa4681237726d8d8b9fe8f3b4acbf76a0cb44f57b8 texlive-arabxetex-20200406-25.el9.noarch.rpm 50531935361743f2a10cffc17f072dfd4b945a98290b97e5355118d9c2441eff texlive-arphic-20200406-25.el9.noarch.rpm 1e6e4c8699a3320f4b1dfc47640a5677cda047dc455ec7752672f7fe2affb111 texlive-atbegshi-20200406-25.el9.noarch.rpm 426f80b252c6768c59de4119b06d8ca53c178fe2e391e9d39eec1ed74c061681 texlive-attachfile-20200406-25.el9.noarch.rpm 2d5811e84279a70a355ed937b90d90154b72f111bf9cb5f215ca50d6be3d2916 texlive-attachfile2-20200406-25.el9.noarch.rpm 61f392911c9d355d48c3a7dcc5ffe595bc071f2728cd222893bf2bff95f363b0 texlive-atveryend-20200406-25.el9.noarch.rpm 5caffd52e1c44edb146c3d022bc7c157941b6010a19931934107feec92a971a1 texlive-auxhook-20200406-25.el9.noarch.rpm b8aaa92a5fe9da0f51588cc06fd485230fdae231a2231b3545248eac89ced0c7 texlive-avantgar-20200406-25.el9.noarch.rpm 0826f7b6bf012527612f1b85260656ed9fbcba8a3cd53f67d89161c8848dfe80 texlive-awesomebox-20200406-25.el9.noarch.rpm 8e7653afd6a2a38af116d14f4d54cf3b53455f669dde540066f2bb03bc438ec8 texlive-babel-20200406-25.el9.noarch.rpm 5be9822084cc127b43e513f0efb9a8e46dd9e9fd0cbccc540a0a00ea14fa20bb texlive-babelbib-20200406-25.el9.noarch.rpm ea1ffa5c9b6ee670e44fbd2a71aee7907c87bd68aab2b5e5a8a516060762ba7d texlive-babel-english-20200406-25.el9.noarch.rpm f50470c5ff5a09b5ebcbf32546dd8be46de1a910840388e4154a64d16a5120ac texlive-base-20200406-25.el9.noarch.rpm e9888fe78a25175ab1b60d871dbaa178f8832d46cdd2ec636d2c441361f761f2 texlive-beamer-20200406-25.el9.noarch.rpm 82a80262cba453c83c873b7763d54bb3df53ee37fe031c2cc4643ee5cf19e4f0 texlive-bera-20200406-25.el9.noarch.rpm a7df84d164ebe2609db6e1885dc9c994a85b81bce9bf22a588c1eb337a59c051 texlive-beton-20200406-25.el9.noarch.rpm d6052d826ee2a1107d1d5915ed8a7d00528d3a1d60d95b42b2f17f7aa5602ed8 texlive-bibtex-20200406-25.el9.x86_64.rpm 53ed42f4c7a3a487f95c9dc9f40c98374f55940e2758f7452a169e7fde6a2610 texlive-bibtopic-20200406-25.el9.noarch.rpm 8cb74c5eeb22f097f0292bd21d822e89f0e7c87035682f64f714052b52f8b11b texlive-bidi-20200406-25.el9.noarch.rpm e8513731892093bcdfeb92e160019ac12d7a206ef6a9a347a30d1913dcece1f7 texlive-bigfoot-20200406-25.el9.noarch.rpm 05f1b753b6f8b98ea18a985e1185d400bb52ad36fa09d86f31dd98f783b99217 texlive-bigintcalc-20200406-25.el9.noarch.rpm 1b93279ecd762db12fbae6471a5871373fbdf0e087fd90a647e6d8b4b1193948 texlive-bitset-20200406-25.el9.noarch.rpm 6a6e98448af522c41ac187a7e08b4d705e7b7dce5fe7ff38d7007804bafec845 texlive-bookman-20200406-25.el9.noarch.rpm cde8fc4d040bf79a99f509ac741aafc191ab2d653120c9a961db8853d32ba8c2 texlive-bookmark-20200406-25.el9.noarch.rpm 76bc6cf466907ed85d86f4b7be09bbb61c4c9526c08f93504b2713d13765ac5a texlive-booktabs-20200406-25.el9.noarch.rpm c15ad22c2f99309b8dceeff2adcdb3e91a02ccf508b637fa21c9c16291ec222c texlive-breakurl-20200406-25.el9.noarch.rpm 40a305d18e457aaa7b0e35490cdddd5a2e4e886a755940a297ed5341eb5d3348 texlive-breqn-20200406-25.el9.noarch.rpm 20ef84afe747e30c445ff8510e98164904a1a98b035cbfa6b2d6ad47cf773960 texlive-caption-20200406-25.el9.noarch.rpm 3af05f99f997f13f5f089f0d51079ad3314a4c3e9388c1c292fa50b000107e9b texlive-capt-of-20200406-25.el9.noarch.rpm 0bf59ff906dc33ce60efe158818faebdf673c0f72b3c6b00f5f16f68be6e0688 texlive-carlisle-20200406-25.el9.noarch.rpm 93a6c357f517cd0d4a13dfbb9efa80dbc3c0d1775da75ec6628d805b47d58452 texlive-catchfile-20200406-25.el9.noarch.rpm 2d9703c560956ad8eb8d4df38463098133ea802cca5a2740e82500238f57e5f5 texlive-changebar-20200406-25.el9.noarch.rpm 4ba7ce4338aff5e83c7e19761329d3987593d62c49ec9f9e4380a6f09adc8914 texlive-changepage-20200406-25.el9.noarch.rpm d2b5d6b49959ca70a749fcb46c2702572c6a74a99ad390dd49ef35f048e8290d texlive-charter-20200406-25.el9.noarch.rpm 6af22d6463efd8db26e3f9811efbc603865cca00db81601536acab1306a7afc2 texlive-chngcntr-20200406-25.el9.noarch.rpm c6ea0ae1cdd3f1a093605346734a17d8536f8da4032797be97cdc6a11d03d2f0 texlive-cite-20200406-25.el9.noarch.rpm c5b7ac2bc24456796dea1f22b10e1fc379e41171b38f08f140e683e401c30785 texlive-cjk-20200406-25.el9.noarch.rpm 574c427c93450cf5b0d31f48bcaebdaf1c3b6796bd02b0ecc3dfda146711ad9d texlive-classpack-20200406-25.el9.noarch.rpm d03c425e78d02f77c4bd6e9540253ac80e2d25b236ba1686484d82c0b4344d14 texlive-cm-20200406-25.el9.noarch.rpm 5bc610d26cc86c52dbe924c936d0170d8e324a229991b5e281bf8f31161cec5e texlive-cmap-20200406-25.el9.noarch.rpm 4078d0d604008cbcb92eccebf235ae7f27ff6dd5918c04eae6e2abf465873efd texlive-cmextra-20200406-25.el9.noarch.rpm 553dd883223d85c53104fc1c8478f80cd4ad9ca6f6797ba9ee89945098e845a6 texlive-cm-lgc-20200406-25.el9.noarch.rpm 243cb790c082db01380d1b47baf622bced06f0fb095caded509810af51112a52 texlive-cm-super-20200406-25.el9.noarch.rpm 545582ac9cf1e191e71ee111467fd4c2f4c931cf5e33992e3d5f1ffb40a97799 texlive-cns-20200406-25.el9.noarch.rpm 38dcc549680c69fc71e7379b4170fedd46a890a38b68b99696c3d6d8b67363c5 texlive-collectbox-20200406-25.el9.noarch.rpm 3d814cff7b9bee0b3bea8a368e81d08afedb7fba7a632b112dd389bb7f22b1e4 texlive-collection-basic-20200406-25.el9.noarch.rpm 741f64f4eb99e6e93637957e6f731eb57e3772a362fed6ab6693f9e1bdef4e93 texlive-collection-fontsrecommended-20200406-25.el9.noarch.rpm a0d3b69578a582e3a781c70c745581657c519550b11819bc801cff1e1eb3d0e4 texlive-collection-htmlxml-20200406-25.el9.noarch.rpm 3b21bf473604f3a49327752f3a469d56fb8450f523dec2274c7df878bfead59e texlive-collection-latex-20200406-25.el9.noarch.rpm c85e9fe109f3bdec6e6cf3dd1ecf1e2193e8196987cd32875f83860e3abc7809 texlive-collection-latexrecommended-20200406-25.el9.noarch.rpm b3bb4918d2242e6949e11890d0ba7578f84a88bc500cbc4b4e584f492e4ffd62 texlive-collection-xetex-20200406-25.el9.noarch.rpm 21d612c87d033640430f4b0c3f0cdc15ede733d7d860fc91ee8f7e6df4cf7fe8 texlive-colorprofiles-20200406-25.el9.noarch.rpm bae084b4179948804595581fa5704309ea56409dc525ff4448b1f2146e514c37 texlive-colortbl-20200406-25.el9.noarch.rpm 639db372d27d02efb0dbcceeff5157535652ca9078f117fadd8ef7fc1da1cae1 texlive-context-20200406-25.el9.noarch.rpm 6add123fdb48ed0e1992f91a80852d6145879bae1c746d57286e2d7dda6ee44c texlive-courier-20200406-25.el9.noarch.rpm ddcc817b45352ed31d6af3ca35d8f6a053815de62f29b8d39e7b02ae1c022ba7 texlive-crop-20200406-25.el9.noarch.rpm f831ed203a3c4abf147f28cd16316a36996dbf4fed70014e2691fee1aa4e5144 texlive-csquotes-20200406-25.el9.noarch.rpm 330f17438e14ec7c149aae6a488ce6e5d6b89cd7c55df24a71a479f9b4e9a49b texlive-ctable-20200406-25.el9.noarch.rpm 0461b2cd916f7047f724fd015bc2fe50bbb32ef1be36e6e2e0f9044c7431fb82 texlive-ctablestack-20200406-25.el9.noarch.rpm 438151a5e204296eafe25c63f57fde1b664a3c08c3b6519a11f2eb0bdaef85ea texlive-currfile-20200406-25.el9.noarch.rpm fa7cc430ddef9dd5cc8a14d73eec2bdd30e9345645309aafb90b5a81c340d3ec texlive-datetime-20200406-25.el9.noarch.rpm e5028b027d09e30e0b2c6bc470f154a23ae525fbfe376c469dc21a6e684b1c2f texlive-dehyph-20200406-25.el9.noarch.rpm ec9d231ab6cb646d2138cf81c3344856c87eb53176c9c9bf38c54a6c4202bcdf texlive-dvipdfmx-20200406-25.el9.x86_64.rpm cf6aa93a0a5f87cf7c9c3828a449474120d2289897ae322600d8ae8226270017 texlive-dvipng-20200406-25.el9.x86_64.rpm d60b3300b838f9ebb4ce6e6de9207250abcdd8be7e529073eebaba036f8f8a07 texlive-dvips-20200406-25.el9.x86_64.rpm 743fe301c9609ab05799d0aa31909584524d700d95bc9ea5d21e7fc00dc34db1 texlive-dvisvgm-20200406-25.el9.x86_64.rpm 4c0c4020c59c9deec513ca41c3a17ecc53fbaf7fa5a97739a1af6e2f3bb239ba texlive-ec-20200406-25.el9.noarch.rpm 7fd5581aaa471e3febf104ff74077d35c629198077719dabf6a9161d77a647df texlive-eepic-20200406-25.el9.noarch.rpm 507b98fbcea6788b82e0e099b67e68354845f58f727d2f4b451439233a283460 texlive-enctex-20200406-25.el9.noarch.rpm e52242e8715e403a7949d205d130827fad0b782e6e042e7c951b5b45aadc538a texlive-enumitem-20200406-25.el9.noarch.rpm 3b2aa3b72090a3b2bd74478fb282a7f4186d9a9e4fe0388be812167430526bfc texlive-environ-20200406-25.el9.noarch.rpm 01673ba34feaeb303b6710f307bbc9b45aca8e57fd3ae2412b2461e42c542ce8 texlive-epsf-20200406-25.el9.noarch.rpm 0d5cf870c5b572f330f14d65d9f787b061c02a029c145746374898babc93eb2d texlive-epstopdf-20200406-25.el9.noarch.rpm bfef6b55fdf5948a7111e6e2598361c062e726e16c1c011ee6cc6338b3f2d526 texlive-epstopdf-pkg-20200406-25.el9.noarch.rpm 3c45ce18cd79225bebb8a54a31863db712d4d607fe561deddbe36477d585c868 texlive-eqparbox-20200406-25.el9.noarch.rpm 9134929c5b0fab7c07feb44a49468467a55069c83985618ae9ead709128d41f1 texlive-eso-pic-20200406-25.el9.noarch.rpm c55d3fa12a85b7f3e163312a1d1b437f3b8deaf25ffdf1e8a50997c44eb4d7cf texlive-etex-20200406-25.el9.noarch.rpm f42611b17fc617a782d28e39c6760fe6e857e68cb93ebffec44a0efe08b492e0 texlive-etexcmds-20200406-25.el9.noarch.rpm be7efee598e9993843c2dec643e529638a4c44044e17dd3d872fec276768f302 texlive-etex-pkg-20200406-25.el9.noarch.rpm 29f3745eee6f4d29cfa8dba912a0eacc512524c44bd5642d789fdcaff25d5d27 texlive-etoc-20200406-25.el9.noarch.rpm c8cdf4279fd6cff6bf12e59f0aef2810c25f05089b88710e4d6d59a56ecc7388 texlive-etoolbox-20200406-25.el9.noarch.rpm ac213fe16f7ec576253a083a1649f99fe748535062e768e80aad66c71d3893db texlive-euenc-20200406-25.el9.noarch.rpm 5faea46824f4fa276a5a580a2167a13e747ccef32766df3969eb5d100b2412f3 texlive-euler-20200406-25.el9.noarch.rpm 74eceb479639454e6d23f8eca496b0054e113a0defab1f944d98c79694397cc8 texlive-euro-20200406-25.el9.noarch.rpm 3780438bf0cf8f357d0f8c05633574675468a12ceb4812b42c6a7fc617e65c5b texlive-eurosym-20200406-25.el9.noarch.rpm 6291ba90c0149b3341aa330a2a768761c536607488fa53b2613a5e65bdf7bca7 texlive-extsizes-20200406-25.el9.noarch.rpm 70fc0395d91e9c89dc6b9c348dc8e5a779a6d5daa11245939b82ee798d6a39a0 texlive-fancybox-20200406-25.el9.noarch.rpm 1ee8d299fe06743f27c8c9c8d8e44d884d503773c41741136ac7dc25b41c10f7 texlive-fancyhdr-20200406-25.el9.noarch.rpm 2a52c662c54e9c6f88e9a31b7bbeb2f2577a759ca8d32f335c8f4f078700eb96 texlive-fancyref-20200406-25.el9.noarch.rpm eaf7309d1318e93b33ece081bfa80c03da5498bfce7f9ace692162deab8db0fd texlive-fancyvrb-20200406-25.el9.noarch.rpm fcc2b9ce9fa84d1549af47b78300642ccf96cf42add1c115e727801cfed9c053 texlive-filecontents-20200406-25.el9.noarch.rpm 170059d0db85f126aded1e9db5326e83a6b647e88331a68658a860215545ae16 texlive-filehook-20200406-25.el9.noarch.rpm 780b601a9a006523553e41a934b77d4758cca21c4db034cd7ffeebbb1d7fc1b4 texlive-finstrut-20200406-25.el9.noarch.rpm 63509d82a725cdf89df8b907d74b396002e2cbe0355d910617b2c3bfefe62cb6 texlive-fix2col-20200406-25.el9.noarch.rpm 9c72079f34640dbb57c0c7409ca3dd4ee3e1d336f2cad68a8aa40b0f4dcc4eb8 texlive-fixlatvian-20200406-25.el9.noarch.rpm 1ffa2b1d4cbffd299538823f484f122d1ccb5bb013fac751398e3498a11643dd texlive-float-20200406-25.el9.noarch.rpm a03edf1f974a74f15798f3ecdebebe1aad3d64f6a46a7bb71185099d9fd2a877 texlive-fmtcount-20200406-25.el9.noarch.rpm ad57a3a2efb8a0053260da2b81c0eee925df3c21e328bac88625d44222872b75 texlive-fncychap-20200406-25.el9.noarch.rpm b33f6ee4889205ad8bc96d4a0ed62ef17ed95c1610c607a114a6d88b88bf5bd1 texlive-fontawesome-20200406-25.el9.noarch.rpm b046ae3235dd28f2db3c4570bf6cd7fbf9ea0147f2b01f4cf1b009eaa1540ab8 texlive-fontbook-20200406-25.el9.noarch.rpm 63e960f45617067b2ba7b44ee64f94cb1f621a4117d9e8b2b04b142b56efc5f1 texlive-fontspec-20200406-25.el9.noarch.rpm 26dd4bc3f6f39083606cd0305850245adb4dc8435cf121a11d900b2d5131d5b9 texlive-fonts-tlwg-20200406-25.el9.noarch.rpm 6a6456c95c6446fdb155c1c63412afae827076bf1c29aa43e259c55276482962 texlive-fontware-20200406-25.el9.x86_64.rpm ce2c0ef28202e54dd8713d3f5c6ad28fd287e5be8c33d3c3d1b46e15eaa1b254 texlive-fontwrap-20200406-25.el9.noarch.rpm 2419044f529cf2f2f28a6c58b14553c6060cf7d8c8eff4e28036e9a20134d6b0 texlive-footmisc-20200406-25.el9.noarch.rpm fa91900e08750f06ca6010d2f40ad994572a1f466113e448d039e763e76f8e13 texlive-footnotehyper-20200406-25.el9.noarch.rpm ab3ef46a0f83b66db99177eb1ceb2aba0c569637528e6c652708d2bf5fad20be texlive-fp-20200406-25.el9.noarch.rpm 9d736c64c28c6415acb64d87efd9f8f56414b769c7d0df8600542970b245d5ad texlive-fpl-20200406-25.el9.noarch.rpm f972dcfee22a919a58c0f04444616dbbecd82eee32f8ab9bb55052cbf0d9e0ae texlive-framed-20200406-25.el9.noarch.rpm 17f11a898b718c2109b84ca933a15937d38b97d1e3fa510ffbbcb6c1123a2b62 texlive-garuda-c90-20200406-25.el9.noarch.rpm 25500083a9740ad8588207d892a41b2f6e9ee2c0b5a49294c00f8550455e3565 texlive-geometry-20200406-25.el9.noarch.rpm 9f61e8c972e291783370ffc03960bd130e80b997a72db451eb54477cdcfb8a9a texlive-gettitlestring-20200406-25.el9.noarch.rpm 16d520d8dc94551dfe06602ac2cb2165e580a71b611b300dfe170452c4fbf23f texlive-glyphlist-20200406-25.el9.noarch.rpm 543535f55f96dc5e9749c87c54456e4fd92985225860c95ad42cc690eb6f47a0 texlive-graphics-20200406-25.el9.noarch.rpm 171020277bb76ff37ea37ff4cb614d2eed99be9ef38c6479942716de26e45342 texlive-graphics-cfg-20200406-25.el9.noarch.rpm 91b088357f1991f40a46aa2dcac0d584089cb9f48ac417877f935aa9d7b621ae texlive-graphics-def-20200406-25.el9.noarch.rpm 913a2a729d7bed63b31f783db16882e2c8580ef4f6b4392f2c0db7e3e8245579 texlive-grfext-20200406-25.el9.noarch.rpm fd0726cdd44c54cc3de496aad0a4b62320f07e1e6e9ce143b7fe8da4695f6130 texlive-grffile-20200406-25.el9.noarch.rpm 5a4943947e30942b0ce97551a3568ee70835c0c2c3690da133e23d603e968a3e texlive-gsftopk-20200406-25.el9.x86_64.rpm b662ecdcc75d7ea8bc661c3feedae0aef5032e3c83f72fbdeea649a2f2f48d1a texlive-hanging-20200406-25.el9.noarch.rpm b6a32be3292055d832506536925a027bb8ec0dea76feef62bf19dad7e4aa1b23 texlive-helvetic-20200406-25.el9.noarch.rpm c31516bb0f86bc98aec447d4926ed31b25bdf7e669f321969e45286b0873532f texlive-hobsub-20200406-25.el9.noarch.rpm 3cddfae64b6d2cc5fa09459282d53b414fb401b5d2290453dbea277ee50302b3 texlive-hologo-20200406-25.el9.noarch.rpm 65d86d0c1c8dbac8504d0c115462f3062300832cfab0afdae8054a7ee827b716 texlive-hycolor-20200406-25.el9.noarch.rpm 62113811f56673efed936b202936a1a81d6610ace5dfd015e219c45ce8f6c3c8 texlive-hyperref-20200406-25.el9.noarch.rpm 446ad06e02b81baeb1aecc3dc8fffad403131e232e2026936fdd37a18f0c8ae4 texlive-hyphenat-20200406-25.el9.noarch.rpm af6ee67b4bfd13d1203cf4406d7cf58d60f6dd43461558a26e96633d37840daa texlive-hyphen-base-20200406-25.el9.noarch.rpm 16db2ea263a4ead5386d8fb8638926981aed67a1b4c0ef217a2cd5478566abc4 texlive-hyphenex-20200406-25.el9.noarch.rpm 34517cc2b31232e5db1de5764d52815cf1d96ab25209270a22b637e0bfd8fd76 texlive-hyph-utf8-20200406-25.el9.noarch.rpm 856bb855cc46e20dddbfe3cfe06fd7718ba26cb448ff1c68db27a60fd3d6275f texlive-ifmtarg-20200406-25.el9.noarch.rpm 82ded51e4f5cc888917eb675c8e0bc317f67aef0f2edc9bf8a122c662dd8b3c4 texlive-ifoddpage-20200406-25.el9.noarch.rpm 17697b642b7f994fcb8e278809505d25146d52b28363ff931a4cbc195cbfdc8f texlive-ifplatform-20200406-25.el9.noarch.rpm b55df9029314aec1477b0e1065dbffaf682e3bc8039880bdb11bd54645f3b4cc texlive-iftex-20200406-25.el9.noarch.rpm 23a72034abc547bbf4dcc7a3180093ccf1e69ef6c9b6fce59a87648814e0891f texlive-import-20200406-25.el9.noarch.rpm 1ce6711af9a8de0866c60a143062a654c35d4f842f9412fbd412353a253a17b1 texlive-index-20200406-25.el9.noarch.rpm 89acaec879f1aa593fbdfe86e873feed411c08ee01346b7093c83f498eeb84fc texlive-infwarerr-20200406-25.el9.noarch.rpm 09599e7a8b70f7b2992de3f140089d3942fac23a26f3002c630ffdb8826cee76 texlive-intcalc-20200406-25.el9.noarch.rpm 485e10c2061d44e5abe72b53f882de43a28ca20dfa23b66e4ab51a73873f622f texlive-jadetex-20200406-25.el9.noarch.rpm 8704abeed3d8a057516a511a60153b4904ef968383d55280067dada0e1dec0d2 texlive-jknapltx-20200406-25.el9.noarch.rpm 8839f070a6630692f26d836ee44b8f4ef49bc26119ee32a3565d8de33cdcdad5 texlive-kastrup-20200406-25.el9.noarch.rpm 5395025b30aeffe738ad59be5a4c29a65c8100455d6eee54c8762c0aa34752d0 texlive-kerkis-20200406-25.el9.noarch.rpm 93b4bf5bf9fa698b52359875d8ee334599651c702cf81b2d3f746e8907b0eafa texlive-knuth-lib-20200406-25.el9.noarch.rpm dae531d9b9073c5b6c5cf349a64a954bfb87066bbb92ec99a79ca694579c7473 texlive-knuth-local-20200406-25.el9.noarch.rpm c1a285c30a7a105b647cef0c146e1aebe4f6087203e43eb311ab063e586f4812 texlive-koma-script-20200406-25.el9.noarch.rpm d73fdb442093c26ac30398a5b5b41ca9d9fced776ffe273e61b5ce152eda5322 texlive-kpathsea-20200406-25.el9.x86_64.rpm 8461f5b8d21a068ef87ec095073498fba40189e2b0766fdf761caf7a5fcc9f5e texlive-kvdefinekeys-20200406-25.el9.noarch.rpm 351d028ded3217656df56a77b16d20dc3b96dbb4b2fc6d8bb365f1371ffe6d3e texlive-kvoptions-20200406-25.el9.noarch.rpm f17ea1e7870d0eb34f66e12e787915c7da84c86b25e4463b4cb34b07995189cb texlive-kvsetkeys-20200406-25.el9.noarch.rpm 525c8cb4a6dd0365f4c072fa04d8d9b29276d882e0da0e14697c25aa84ee996a texlive-l3backend-20200406-25.el9.noarch.rpm 0953725fa1adaf10ce87c8ae26949261340f5a614238112105fade39ed5051d5 texlive-l3experimental-20200406-25.el9.noarch.rpm 4dd0e8e848312d24fdac74797f786b7e3b738790bcf885de289d748ca431d4db texlive-l3kernel-20200406-25.el9.noarch.rpm d0178ba34b1bede7f17d43f79ad54a7cd3b254da6895d65a616c22894f74f116 texlive-l3packages-20200406-25.el9.noarch.rpm d307bbe382bdfff6e01bee4ec179602ac2c83e591c66d6c2f5bb6d5ad99f8953 texlive-lastpage-20200406-25.el9.noarch.rpm 423f90503f8835fb912fd56efc0b3b69cf3dd1c620d12f7ce7f4d43ace16d54c texlive-latex-20200406-25.el9.noarch.rpm 9da4f0e77b12a1269d6f37b3c4e1177fc62bc902bea4d433332d78728817a562 texlive-latex2man-20200406-25.el9.noarch.rpm 3df9b50d9cf28409df035bf2aee40f54d5d768078f8d647987fb05a32bfa65df texlive-latexbug-20200406-25.el9.noarch.rpm 193ecf4b3d5a5775f298e31b8e5f2db345e62f345bd25b24850d6b02046f0eb6 texlive-latexconfig-20200406-25.el9.noarch.rpm 38ee316fe6276d64f43dfd376c475af88976c4f4144ce9e9fe9720b92bb005f6 texlive-latex-fonts-20200406-25.el9.noarch.rpm 89fc2b97ed8d1f2b5bd1597d0eaf956f2cf9afcacdf08f3dc30ff6becdbf4900 texlive-letltxmacro-20200406-25.el9.noarch.rpm 1d2fd51cdb742e957af3c89f0c2ba001cf607f5e67ee8e363a117ad7f5b2271e texlive-lettrine-20200406-25.el9.noarch.rpm b7cc0e257cec45cbf38b406d2a9a07cc8baff369630a70d4481a97a65286d905 texlive-lib-20200406-25.el9.i686.rpm 5cb9f285421261df4c8cb55c0e9c2a08a81b39b8998abde14528855540352bf4 texlive-lib-20200406-25.el9.x86_64.rpm 2a124e50d9db2a68c45c034cbecdfc8a7eb33efc4cf30d44ee2d477837cec813 texlive-linegoal-20200406-25.el9.noarch.rpm 30df149db842ffd1782eab6f3aa5a49852a7dafcf46ab890bbe421fff5f55a50 texlive-lineno-20200406-25.el9.noarch.rpm 1b0efd7c2420f6ef413c8144ed626f7e6ac00b3ad6565ec2b394f4122909a977 texlive-listings-20200406-25.el9.noarch.rpm b8ba763edb88516b961ffe8defdef4392353d4200a6b9336bf6356bdccbe559a texlive-listofitems-20200406-25.el9.noarch.rpm 47a01e02af9dc420e258ae1733ca2c74ec3b9980bfc9c025e1132f0dc4b28425 texlive-lm-20200406-25.el9.noarch.rpm 3792db1db193c08828bac9add69d9d4d1c578d21471588516792c56e602497f6 texlive-lm-math-20200406-25.el9.noarch.rpm 95270a15e0e434ad69ecf292263b5b96845a4b8cbe2847e0f6fe300421b7f4dc texlive-ltabptch-20200406-25.el9.noarch.rpm 60bea50e637e6f2475eb1fb0ad72f574f48eb2671513dccff549d600ba182667 texlive-ltxcmds-20200406-25.el9.noarch.rpm f6992f0513512647d2416904e95c754ed4eea5ca13ae85fd577ec96a38b3b109 texlive-ltxmisc-20200406-25.el9.noarch.rpm bc64226524092303b70ded56960d6a97a1325b7384546b6245c0041ad1a5cf50 texlive-lua-alt-getopt-20200406-25.el9.noarch.rpm b0065dd35f9b4eaff7da4a6d1ddc0f605de82b265f75d88da8d004cfbbe73dc6 texlive-luahbtex-20200406-25.el9.x86_64.rpm d91ae8a8c1a7ae8a641fadc3c24553d841af638a4c51b78dd549951c2fb29c0f texlive-lualatex-math-20200406-25.el9.noarch.rpm 9c5e76878035b327e3bfd934a36bc1ecd2f60c1d9b87eac446db8dca73a7d07d texlive-lualibs-20200406-25.el9.noarch.rpm bba0a43a389742c435d139181a98c5b3b7c37c03a6e087d01eaa4a1b5f0e96e7 texlive-luaotfload-20200406-25.el9.noarch.rpm 01f73a8ff7e29329bccdadb8d7a9d1e25dd520875a9d89e1503b031ef5d44120 texlive-luatex-20200406-25.el9.x86_64.rpm 87b6db33d2b51feb6ca29488b2428d766232938ab2235bfe2f131693269a2d07 texlive-luatex85-20200406-25.el9.noarch.rpm 05b0fdfbea60ca8ea7785088cfd02a902092fe7c8b8e0bb24021afe66976e03d texlive-luatexbase-20200406-25.el9.noarch.rpm 513c16c6a87af15a12b9efe129b81474d0b350f641809b5d723ebde474ee3e94 texlive-lwarp-20200406-25.el9.noarch.rpm e4fff295be0b11e774a3e0bdff9207765536a18bbf6e434a02adf8c2578221d8 texlive-makecmds-20200406-25.el9.noarch.rpm 0036f630755d753612f9cb00524a0b1ed63633d690e6d74c5d47173182562ec1 texlive-makeindex-20200406-25.el9.x86_64.rpm cc236137949733f0d49227af50a5e4d41d42fef05c3d1022391cb05fec7cf910 texlive-manfnt-font-20200406-25.el9.noarch.rpm de180eceaaf8d889af7574330d49c9d6262dee26663e62c7b3b33b97cef60bbe texlive-marginnote-20200406-25.el9.noarch.rpm 864359c8c3712ace44f0eec16b4bced44421f3334b61e581f87da22964b049c9 texlive-marvosym-20200406-25.el9.noarch.rpm 5e9ef272397b6cfddb11dcabe69a00d5f7455fc2c5d25ede85f5280e8eedacd7 texlive-mathpazo-20200406-25.el9.noarch.rpm 58c5790696bcc4a76daf58d3cf86041286ae5dea0b463e2fd19ff760afc7d9d6 texlive-mathspec-20200406-25.el9.noarch.rpm 2e51a33f36543a8d5545b6dfd83f0397b1ec9322a30776bfe61c480e50a802aa texlive-mathtools-20200406-25.el9.noarch.rpm 81d014b6f9c1d1255ae3b3dab3ad7ae862fe6b47796f182b9945c696eefbe271 texlive-mdwtools-20200406-25.el9.noarch.rpm efc50baa870fdd49e732ba54982b319027c165352f5c01e040ca5ec4a3d2fc57 texlive-memoir-20200406-25.el9.noarch.rpm eff39127d155c52bed0e44b897df30bdfb76471cbc459e2d7db5af215b349c7d texlive-metafont-20200406-25.el9.x86_64.rpm ace3a3594b1b16a06c69f0244122dbefc74184aa91d4fadaa333d08e85ef8e46 texlive-metalogo-20200406-25.el9.noarch.rpm fd95b8abd702f3473ed7e80b0d9702345693b89ba1a175d8c939f87a1baec501 texlive-metapost-20200406-25.el9.x86_64.rpm 6fbb79f6e587ee777483734c1e5226ce2c4cf3698283adc66c1db84b7f586cc1 texlive-mflogo-20200406-25.el9.noarch.rpm 1afc6f046d9812521c2636fc385522ae02ef4ca8d5bd0fa5fb7e5cf50aab99b2 texlive-mflogo-font-20200406-25.el9.noarch.rpm fb2fac571c04d381cfb61752f63fcb57d30089b09dca7cbdcc20427a5b8484c0 texlive-mfnfss-20200406-25.el9.noarch.rpm dda66b977ade784044923c3af0999c676bb3f33f75b30347794708e247e8469c texlive-mfware-20200406-25.el9.x86_64.rpm 58da28904d9ba7afec00aef0981f5e734dcf1e89177f3487d3eca4200245a588 texlive-microtype-20200406-25.el9.noarch.rpm bf6a25abc838c067acf1fa19ea4a0b8a7047cf27a84206b5b31b29a928b5b51b texlive-minitoc-20200406-25.el9.noarch.rpm 3c9d58f4b4001f0b1639b4306719fe82009ed4cd4bf64b2bcc2d31a6d5660160 texlive-mnsymbol-20200406-25.el9.noarch.rpm 119ce08b739c292ff2c8e92ad17d13e5dbb9ec50566b585b1646f5ff4c307e91 texlive-modes-20200406-25.el9.noarch.rpm 2b6b01563fc9dae1b7a1c69dc5564462bcbf26fc2e06b1664f99e1cfe6199c56 texlive-mparhack-20200406-25.el9.noarch.rpm 4497f869676d6e90593e23b626ea1a1888a9fe1a5f0cfecb37f496b8539d2dfc texlive-mptopdf-20200406-25.el9.noarch.rpm 5c2f4670cec9e8aa28153bb426af3c6235ef429e864d9a52d9f07be8bbf8cc88 texlive-ms-20200406-25.el9.noarch.rpm b10b0154d0376a4610cde1e27a99c68701833548575015060e1c9bfb10958ac2 texlive-multido-20200406-25.el9.noarch.rpm 2ceb75c3b03e832f68bb44cec37c53399ddbc013efb93337bea92ae39a91c1a3 texlive-multirow-20200406-25.el9.noarch.rpm d8e9725313e1b5b33b69120ac5f3783249338603c963106a301f4c23411ba41f texlive-natbib-20200406-25.el9.noarch.rpm 994862a0c3432b57cf428fde7d44a946b7a5e28b8db97f36e797220ff8c0c83f texlive-ncctools-20200406-25.el9.noarch.rpm 978ced7b787affae5cfcefe29a78b05837600ab6b7204d9db01ef59db368b1f3 texlive-ncntrsbk-20200406-25.el9.noarch.rpm e1247220e2d528dfb8a923f956630b0a7964500950ac5269f9a18fc76791ac43 texlive-needspace-20200406-25.el9.noarch.rpm cfb8cfd5679c9f8bd87004994b9d49f8c92d3da38cb4d00395cab7cad476e2bc texlive-newfloat-20200406-25.el9.noarch.rpm 95c0f2f163c39301b5cd52148f96d006ec21ee7aeb8e002cae9d3100f1029941 texlive-newunicodechar-20200406-25.el9.noarch.rpm 400ec7f4812690f8e721e876570b2b9cb0bfe9e5b83487c76d6c00a09d81ddb4 texlive-norasi-c90-20200406-25.el9.noarch.rpm 2cf0fb88ad2f3ade78f77971dc7395801ac75ea84040cf517f373a0a6ea3b129 texlive-notoccite-20200406-25.el9.noarch.rpm e6ade9f118f2f4526fc2f4512bf2a3893fe06f47053a29acf986d6d220870f92 texlive-ntgclass-20200406-25.el9.noarch.rpm 020362c734bd55750242017ec8f18debaae8cf90041c3b5d2be8d08c5dbecb70 texlive-oberdiek-20200406-25.el9.noarch.rpm b1ab557ba78c19e427dab7dc6b4672a4c032dac197f2b6f55fcf53ba9987f85f texlive-obsolete-20200406-25.el9.noarch.rpm d06c3883791f9b892acb1d45d1a458a896bcd13c428cd985f57f5069b7432a94 texlive-overpic-20200406-25.el9.noarch.rpm f5549641883ce8a04da34562d93d49567fec38c8b86c940ff7b85f05b38b6111 texlive-palatino-20200406-25.el9.noarch.rpm f2bf49c285378767dd4278029ddd4c109abf2b4595f8872d0c8e0c0758f82b72 texlive-paralist-20200406-25.el9.noarch.rpm 7b9550d3578d2799a6df4cad660261d170f7cda3d5ce8349c768fbf7d6e92172 texlive-parallel-20200406-25.el9.noarch.rpm 48f06a46cb8a65328f274ba4f574bb748d0ea4e5aad0a6dc08b72894195915a5 texlive-parskip-20200406-25.el9.noarch.rpm 46a6ed23bcec5539cabdb67e2864ce5b88f2c8183e185073b1ad891c39536218 texlive-passivetex-20200406-25.el9.noarch.rpm 67ce13efdff507306be4ae126121cd035215cfc5f71c5cf77c2cb027a703ede9 texlive-pdfcolmk-20200406-25.el9.noarch.rpm 3b3544ceb75d7f9d0569766ec9909e13787267b8f8df4c9c9bf84c448c9bf40b texlive-pdfescape-20200406-25.el9.noarch.rpm cc47f90869fe4af51dd17368f6a91291a8e050abc8224afe56e64bdf2c1768cf texlive-pdflscape-20200406-25.el9.noarch.rpm e2337ea4964520c8f97109d1181f475157459e6eae5307f0015edb646efbb3c6 texlive-pdfpages-20200406-25.el9.noarch.rpm 5484b413c0b52c7ea09da03e8aff7be9791460b86b202f23a8ab8fc19941405b texlive-pdftex-20200406-25.el9.x86_64.rpm 91f33963e4364395001058d317100753cf1e1162ae79f87c230238cc289536e8 texlive-pdftexcmds-20200406-25.el9.noarch.rpm 73227e722a6ba1314d0f35cdbd070571cf657fb84a5bdb4d35baa415fe9e9e17 texlive-pgf-20200406-25.el9.noarch.rpm 96c9488dad4eef71ac8c88f4b0892c6783cf79cddb79ec93a2d494db09e6068f texlive-philokalia-20200406-25.el9.noarch.rpm 0128da4b085b239b266abd80a540cdf13cfccbbbd083ed1dad150750638200bd texlive-placeins-20200406-25.el9.noarch.rpm 698a46cc7eb8759bebfb3ac156f8fbc24d88c455af179b37c1cbc2f30c98bffe texlive-plain-20200406-25.el9.noarch.rpm 81f92c89d121442717cc8a4ad13ce1fb63b2cc286e7a6e33479b211d83a408ca texlive-polyglossia-20200406-25.el9.noarch.rpm a95d9f25375e4936ce0b6ddc2d72bc180b8c77eca8c18e5ba32b06cbc78e8d7d texlive-powerdot-20200406-25.el9.noarch.rpm 952942fde6dc86db4f9ed1f24051b79828f64d0bd87b9610be4eaae00b491d1d texlive-preprint-20200406-25.el9.noarch.rpm 2686e593feb6ecf2269bd5282c6be63b2c3451fafcd22026a9a6235b5d675d05 texlive-psfrag-20200406-25.el9.noarch.rpm c5afecfd2f68354ea4f6744b6030fc7f6e443ece2107b0937f1d164bbf98965e texlive-pslatex-20200406-25.el9.noarch.rpm 9847409bd94e3a7f855c66e2826fd1570f73c7980488a021d3b1e99282be5a22 texlive-psnfss-20200406-25.el9.noarch.rpm 03c3544608a35082d9dd549f575c627a3b5906d03ea4b2d2bdc1c9aadcaf0ba0 texlive-pspicture-20200406-25.el9.noarch.rpm 9e3fbb29e121a5211af3e9f4031bce0753cf8f2a6bcbfec7c30560b2108a63b1 texlive-pst-3d-20200406-25.el9.noarch.rpm aeec938b535b25f3b00e9ee113eaae486ac37cf8a21b8ab61124baec2fb9924b texlive-pst-arrow-20200406-25.el9.noarch.rpm 25491cceff03df8b1c5ebafc20a952b9b962cc90ccdf871f3f95a19da2eea0ca texlive-pst-blur-20200406-25.el9.noarch.rpm 19c0a11ebc89ee46c6ed39f08e10dcb937fd3f1d9f797ec0d3ca26825c58f8e8 texlive-pst-coil-20200406-25.el9.noarch.rpm 12826590e1af92e8d56c5a98ef2cca6f8331657b808e3708ae9edd45c64d4058 texlive-pst-eps-20200406-25.el9.noarch.rpm 09c6bebce66f7bd561f42317b5360064620af3b1d17e6b629e3052d5d39a520c texlive-pst-fill-20200406-25.el9.noarch.rpm ba011dcde9e06229ac41639779481721fbc605c5ef3f563a7c933cdbb69097ea texlive-pst-grad-20200406-25.el9.noarch.rpm 9c4de4b759085b0ed7723e8fc8a9a2e8df38dc5d4d68a53122cfd98741412d23 texlive-pst-math-20200406-25.el9.noarch.rpm a6fecef207a39605788c1c888809ab0334cb2d335b04908e4ccf75376128bcd9 texlive-pst-node-20200406-25.el9.noarch.rpm 3e074a82e14f18d17f2fbef4be40882de6cbef844deac006f6b523e3a0cfb494 texlive-pst-plot-20200406-25.el9.noarch.rpm da752da70547dd8ef6a4f017d4d3a22b704c5596fec1eee25b00ec34b53df804 texlive-pstricks-20200406-25.el9.noarch.rpm d89780e5aebd796b75bd64a13619c213ad49dcc0289b91eb0a2da817c1b69848 texlive-pstricks-add-20200406-25.el9.noarch.rpm 70379c9017efd66105b522958d22d60b024e7d7f3914b5c46eafa3cbb70ec6b1 texlive-pst-slpe-20200406-25.el9.noarch.rpm a4e795690600c2bb92c414e341b8a013d6d19befc6cdaf4a64182d5d395f2942 texlive-pst-text-20200406-25.el9.noarch.rpm fcf4bdc9a22207aa25a452782f7d5366f73582f5e67eb3f0aa2986fceb89ed73 texlive-pst-tools-20200406-25.el9.noarch.rpm 4c61633afdbfbab31599ab4ffa3f1000819ac02c785b3fae0c2a754da9da6d45 texlive-pst-tree-20200406-25.el9.noarch.rpm 1bc668a2085cd4e07573f31b7b60613fe17b49d2f60c7af0f700ad66897d70b2 texlive-ptext-20200406-25.el9.noarch.rpm 5b5af1a9486ae25908d5973449c9330c62b35a3c5d403541b4ccce72cfb62a15 texlive-pxfonts-20200406-25.el9.noarch.rpm 20ba00aca9571b4b88db8c97f3bb6d041106071e86081b2ebfe2c8bdbee234a2 texlive-qstest-20200406-25.el9.noarch.rpm 6b3eabb90ae5d1e42a54dc54d50c77f22ad00de3e1fc75813ae8f98f011d7c76 texlive-ragged2e-20200406-25.el9.noarch.rpm ccc1663424a7d7e8c9b2e09bc27ef8fecbf2feeb681830f90fb527150af59b91 texlive-rcs-20200406-25.el9.noarch.rpm 290386a22b1faee86362be1b64a8c871a1d172d15e36890bc2970b1792914b74 texlive-realscripts-20200406-25.el9.noarch.rpm 508bb1c9454ce09edc17806e4df3f6bef0582659fdcd8ee58c464b43032bf094 texlive-refcount-20200406-25.el9.noarch.rpm d4836ac7c8c8507c9ba52f8f3995e2be0425fb842bee9e27a27a1fc07998c34b texlive-rerunfilecheck-20200406-25.el9.noarch.rpm 5b125749deca9f4c08273eec2a012bc22ddd0c21d27d41c173ff193bad357999 texlive-rsfs-20200406-25.el9.noarch.rpm 9438a38e43d2a936ca88fd7b96ea3e5618ae87847c1d9e5e1d3d6e9158ba782f texlive-sansmath-20200406-25.el9.noarch.rpm 0b54104e3a155dff625ec906ccdcd17ab1a9d7b254d89296dd22bb03e9ee7292 texlive-sansmathaccent-20200406-25.el9.noarch.rpm f017d679e4cf2bf97481d5c4e6c754803aa774570e8146b57dbd26694685affa texlive-sauerj-20200406-25.el9.noarch.rpm c2384124bdcc29adba71a86e29a4c1fb126144cec8a9a274a309513449f71025 texlive-scheme-basic-20200406-25.el9.noarch.rpm 604e33cb408eab81c83492aa71778866326d0c39823ff9af142462ed56dc69be texlive-section-20200406-25.el9.noarch.rpm c9e8b1953ce2c61e1ad2dd200b9409c37a9435c088b60b1b4c5cb0b53d651313 texlive-sectsty-20200406-25.el9.noarch.rpm 65deaf5972533b9c7c7e56a96906a4e64c1e1963b7f261274cf1aed31c8c59fb texlive-seminar-20200406-25.el9.noarch.rpm ede79a44a35fc1ed7bc5cb3b1ec66edaafb18a7396909a5b26c8a79d0f8e9101 texlive-sepnum-20200406-25.el9.noarch.rpm bea445e926a419a00c9dd5f9e64e4c384f84fd0e3c5943ff08a46e1e60bfb551 texlive-setspace-20200406-25.el9.noarch.rpm b9375ee1fa009ca226ba030dd30f8edbf2c2756f89f12a5c78506675d173921d texlive-showexpl-20200406-25.el9.noarch.rpm 0dcc1a6adadcd5f66282d3f1c44f91fc540b22a3a55c3b6439b7fb682a4627e6 texlive-soul-20200406-25.el9.noarch.rpm df4a2daf964c19791725b1b51855270882be78a13139404aa5b77e23552099e5 texlive-stackengine-20200406-25.el9.noarch.rpm 4522def90f5d7d345cc7d666dd5efc92d84ca1a9c60eafa7cccf6ba034eb6b48 texlive-stmaryrd-20200406-25.el9.noarch.rpm 6f215f784a976c907f6cbb5dca1b593a304c34c6c7625d310375baaa8073acc4 texlive-stringenc-20200406-25.el9.noarch.rpm c92239d5cd9b940b2b1d839fc5e3ed33c92bd9a2a5534724174791ed0a9c9b66 texlive-subfig-20200406-25.el9.noarch.rpm 09b41a872644f0f859d687baf48319317e326a4f57dd8b8815d0690acc75def3 texlive-subfigure-20200406-25.el9.noarch.rpm a2f6acaef7c3289ca357cda490ab9dbc758434897d5a6faa7409880ab7d64353 texlive-svn-prov-20200406-25.el9.noarch.rpm cddf69d3ff8db867b22e1f143e37407a9b22167722d83d5ef1c1a59f7812d89c texlive-symbol-20200406-25.el9.noarch.rpm 55e6709574343018182bdc912c3d9beb9890eaae2a3faf617fcef013ea61d84b texlive-t2-20200406-25.el9.noarch.rpm fa2e2003f8380f601cc0d1caf549336dc65768f07b03e601241d9f68a2ab61aa texlive-tabu-20200406-25.el9.noarch.rpm 7a2d58c069ab1fa324bb1f6ce4bade227944d8e95782a3bac76c8ea480ca4695 texlive-tabulary-20200406-25.el9.noarch.rpm f92d6e1af56c2ed6b81ea6078398494028d7ab7b52b007f273f5459ed302e529 texlive-tex-20200406-25.el9.x86_64.rpm 6d07476bd9ae8b9ff2a69a9dfb98640f21725edb4d27470ba215e64487a7e43d texlive-tex4ht-20200406-25.el9.x86_64.rpm 7f370d30eb1b283b19d9499c3f96bbea23ef2d5f1359b5bdc4eb8b88192a7d4e texlive-tex-gyre-20200406-25.el9.noarch.rpm ec064b3921ff28eade93c13b11ae2930a86a0c0b7feb2cf0818b1a8d6212d326 texlive-tex-gyre-math-20200406-25.el9.noarch.rpm bed88e6700ddd69e5e76d6adb07bb122fb5308e114fa70eb6e981f5ef26587b4 texlive-tex-ini-files-20200406-25.el9.noarch.rpm a02992283c6bdf768fce09cbfe8b3d0412ce84cf1cc6eac44f45c0cabcc53ecf texlive-texlive-common-doc-20200406-25.el9.noarch.rpm ea28ab74687d1a6bea0b7753a83d39b053e76784d144690b4ab297da1a28d296 texlive-texlive-docindex-20200406-25.el9.noarch.rpm a9f5c9644b7f95e11e138e8379d5b57fa6bcc571bd4fbee734eb0835982b6028 texlive-texlive-en-20200406-25.el9.noarch.rpm cad82513b5f8592a37c96806903976ee30e3218c9cd1c5bb685eba8ca8b0fc56 texlive-texlive.infra-20200406-25.el9.noarch.rpm da72db9c7460fab1f640b319784d9474d58c9f216516c1842d81d1c7f4ea48d2 texlive-texlive-msg-translations-20200406-25.el9.noarch.rpm 175e43bc21f4eaa81524094fcd09b7edb5667a9b173ca6525e1ee604a2a7217a texlive-texlive-scripts-20200406-25.el9.noarch.rpm c6d1c66776c030852e1b02e1a72f29a686d074062043fd8151e281f4fdf093d8 texlive-texlive-scripts-extra-20200406-25.el9.noarch.rpm 40d8136ad92b59cab6cf045478fd45cb79ae0ae9c31de9be40c8c7a7bfb5c693 texlive-textcase-20200406-25.el9.noarch.rpm 2f8cfadf73e9aed6b6276d0be3995289fe3291acdad2dce168decf56532787f5 texlive-textpos-20200406-25.el9.noarch.rpm bfb0186e8e9d3a61e3ac74de1abb4c64127e7fe7decf8f7bf1c5ab1a12e5a897 texlive-threeparttable-20200406-25.el9.noarch.rpm 0f255d8e626a80f347b783ce81f1b978119b1e9c900b3e6cdb43e23a8770fbf3 texlive-thumbpdf-20200406-25.el9.noarch.rpm 5a130b14b45b5614f577a922e1e4fc432996aa8791f52537b2482964e13243e5 texlive-times-20200406-25.el9.noarch.rpm 9418deacde7a5d618fd85ef263542d4d609838e34db4ec6cd339440f5ae8f45c texlive-tipa-20200406-25.el9.noarch.rpm a8f19dc804f7ac6b1d292271b724e73777143b2868fb438e314ca0c95837fd6e texlive-titlesec-20200406-25.el9.noarch.rpm 12e0c3b29f9cdf7a89c2bb2bd46dd0d02d6ab1ccc481f9b2a9daf860e1f0345e texlive-titling-20200406-25.el9.noarch.rpm b28121941b4e5bc05ef3770f0012bed289b593586ec25370ae1d0762fac8ce76 texlive-tocloft-20200406-25.el9.noarch.rpm 57d2ead533c7a2ea4dee00173ee5066133063c87e0dd8f841e5fa40c1e4782e7 texlive-tools-20200406-25.el9.noarch.rpm 7666ea34c5c50cd3ce19c622a7aca644e3d277ec17498e6097c8e7d3213c9fc3 texlive-translator-20200406-25.el9.noarch.rpm ed25ee47a6d497b9da17971b90688c6ecce05c2d4043e8c0868dc21d6292fe3e texlive-trimspaces-20200406-25.el9.noarch.rpm bf180a21bed6370d0d22495ce8a380da4eb85092d81a43b804744367c2f7b002 texlive-txfonts-20200406-25.el9.noarch.rpm 98c4cfc3718fe4d4ff33708fcf8e07f5c0db260d0b31912ca21c8086d04ef10b texlive-type1cm-20200406-25.el9.noarch.rpm a689773174410205b40e55c5b457cf317e25bb84a595c9e76033a39f84e4222e texlive-typehtml-20200406-25.el9.noarch.rpm 0c50cd800ce54a83c376adfa2f3d67be4a982494f9c70acf884bafb188740f2e texlive-ucharcat-20200406-25.el9.noarch.rpm 28c0785063de63a0cfc6f3f00bb65141a9763c40a6452bd8b80cc59268b9bf48 texlive-ucharclasses-20200406-25.el9.noarch.rpm 9e7d1246c59514b05ae5534dc6e7fd3d325dba2c43e5d7b4562482dd828fa1be texlive-ucs-20200406-25.el9.noarch.rpm ace272d52430f78f859b44bdd14d3779a1ff144720608d86d35fe5dfbae99099 texlive-uhc-20200406-25.el9.noarch.rpm f273a8b8dffde6f41ea5157905fbc5322b3fa7f5587f3331b7bf7c45892a56ac texlive-ulem-20200406-25.el9.noarch.rpm 3b703fe1545e3b1848376cd61d9c58a3943b584a8cfb5c7cebe500145deae22b texlive-underscore-20200406-25.el9.noarch.rpm c48c3f6077ce0138eb519383de45241574a83a187372f64ca24823989b70de2a texlive-unicode-data-20200406-25.el9.noarch.rpm 9bd29b49c438c6691ee10688a50e692a61f1ba623e643fd0b5dfc3085fd3abd8 texlive-unicode-math-20200406-25.el9.noarch.rpm cef2e2188f6bcb94fdc5590a435d29e50bb6976445658ef196292b062e9f9dba texlive-uniquecounter-20200406-25.el9.noarch.rpm f5352e9fd14eb60534a040b4a949ec90193aac2755a882b4a525000856c5bcf0 texlive-unisugar-20200406-25.el9.noarch.rpm 2f860da9e67bcb21961011ddd5638044e3058b0d2a875161c09c06f87af38c0c texlive-updmap-map-20200406-25.el9.noarch.rpm 99dddb855aba0cf9837f2441edac725dbaff64099543552914a84785d7788722 texlive-upquote-20200406-25.el9.noarch.rpm 2094b7f5526adf652180cf09f09e0798ee878a9c46bd0f8e7db04d453a11ca21 texlive-url-20200406-25.el9.noarch.rpm c12dca17f89b388b5e544b56cd7c24222e6dbd83ef02680200221b1f3fca5cff texlive-utopia-20200406-25.el9.noarch.rpm 77797f6c90fd67eb9a81e71ad643167571d0048b816dc31d7ecf1bccc1bde398 texlive-varwidth-20200406-25.el9.noarch.rpm 8db316c8fe0e7e3d285a4f43f3fe31a3f14eb03928c82223a22da31d08b95832 texlive-wadalab-20200406-25.el9.noarch.rpm 3be9c56baf2205cc7213aa15db773a377cbc55397f365aaca74eaa1610433dc9 texlive-was-20200406-25.el9.noarch.rpm a1045da1c6443180b525e021f298be9b98c8d73d651eef627c65288e946c504b texlive-wasy-20200406-25.el9.noarch.rpm b70c8baa98f5450279e409c6abc4346d406925e9e508e58c449894035f6bec40 texlive-wasysym-20200406-25.el9.noarch.rpm 353a4132d0325d49776fecba86dfd6302c83f795d6c882d17cf3f4f9eacf3327 texlive-wasy-type1-20200406-25.el9.noarch.rpm f86fc46d1db9da44cf24e094e8ad945154c470db4db4e4590bc416e5d05790f7 texlive-wrapfig-20200406-25.el9.noarch.rpm 653dcd2b0cdd00d465f35e6804001895c330002e351b2b0666c5bedf69113efa texlive-xcolor-20200406-25.el9.noarch.rpm 45d29bd70c364ac048caca925267806bc7b398c0c92cb833f57a958458a33d10 texlive-xdvi-20200406-25.el9.x86_64.rpm 26c636cdce22e66c30cfcc71f1cf5abade583e879d3643408171f1ac559af2df texlive-xecjk-20200406-25.el9.noarch.rpm a1feeaa1aca990dcc540f3c3864c834156bf26490f32359d23e2612cc8adf4ea texlive-xecolor-20200406-25.el9.noarch.rpm cb7e4673d45370bf7d6294f896f13986cc571b002edbddc797d0c03d060b79fa texlive-xecyr-20200406-25.el9.noarch.rpm d1d46638c81432a9d1ad2906d655e979e028c71e76b183f4c861f5e7e8c5b1cc texlive-xeindex-20200406-25.el9.noarch.rpm c90a43536e43c4ee8d0e5971384d0244892302264dd2b7c01789440953bcac8f texlive-xepersian-20200406-25.el9.noarch.rpm 364504a4d63aadab975d2f52a0d022c575ff64b4b474f2fad7aa2dd3bdbcf509 texlive-xesearch-20200406-25.el9.noarch.rpm 771e205e39f0621e3f7446e2f8b97c372970300c1205bbc5d7b5be27019cea4d texlive-xetex-20200406-25.el9.x86_64.rpm 0779e9e75452f4e827b3017a71946bb2568730fb954d3f856ddb40e39e4b8067 texlive-xetexconfig-20200406-25.el9.noarch.rpm dd2da96c08a88f5f32598e6c07c78e86728eeb3aea12430f5d58bf8e2aadbac2 texlive-xetexfontinfo-20200406-25.el9.noarch.rpm 71e286ef82c45745606f448f8c233a4a78d60ef57038fadd452724dd5ca65589 texlive-xetex-itrans-20200406-25.el9.noarch.rpm 2599a967b0e400d6530083659d8bfe199a01bf888bd451e30cf8182a754847ac texlive-xetex-pstricks-20200406-25.el9.noarch.rpm 5f01f0b999a680c40bb464e10cba4297f25bb42ae4f219b9a16f7eb02afaeadb texlive-xetex-tibetan-20200406-25.el9.noarch.rpm 4178bebb0541ffe4cac350e7b41a7810fbe1fcfbcad79f11a87c21242f5bba26 texlive-xifthen-20200406-25.el9.noarch.rpm 6a25652f0272f64ccb4df17d223439e2d2c78fcec55a9d0a6816ead7192ffed2 texlive-xkeyval-20200406-25.el9.noarch.rpm 288ba1407d18f0c156c31a78894851c80dbab1225d27ea4b4bacb022d02d1b42 texlive-xltxtra-20200406-25.el9.noarch.rpm d4840248317ae32aa5ad710ae9717726dd2d47b931be59594e377155495135a1 texlive-xmltex-20200406-25.el9.noarch.rpm 78bbd46acb7cc5ec1763302e0f22a92b07b1dd003cf27e6e8cc4e65e72a1a83b texlive-xmltexconfig-20200406-25.el9.noarch.rpm 5664b151f49581412039305093784e35ae431e095a35ffd4e2e36ccddc96ce5a texlive-xstring-20200406-25.el9.noarch.rpm 2f16884e0c906beea2e2f97ba9639789df25c709759c31a59871d94f3835b4ba texlive-xtab-20200406-25.el9.noarch.rpm 054d5dab6ab73edfbd43499c42c8e6810fd16b5b79901b45d4754dd9dad77db8 texlive-xunicode-20200406-25.el9.noarch.rpm ba063ce789a9d57258cafb4e6fb0cdfc1b6e0e32730269118053749f4a5ce749 texlive-zapfchan-20200406-25.el9.noarch.rpm 41b83a458ffd2e359e3a0cfdd44aa7bec199f44642c36c56e5558aab0b19c19b texlive-zapfding-20200406-25.el9.noarch.rpm 913ab45b626cd7a60b0fec8506263a882c1a9e63f766e619fc46e8414183516b texlive-zref-20200406-25.el9.noarch.rpm 501847890309386d5549e72547b5df278d430d6a0532cf6d0070a7ad2a34f586 RLBA-2022:2482 new packages: gnome-remote-desktop Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-remote-desktop. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-remote-desktop-40.0-7.el9.x86_64.rpm 1bb548a4b0df9716372c983b5e61a13d19df6c8c1f83b200fadb836975061a02 RLBA-2022:2484 new packages: mod_auth_openidc Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_auth_openidc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_auth_openidc-2.4.9.4-1.el9.x86_64.rpm d8e146dcd658eb59cd20c82e56a1759fe8a5e019e1f4f2da41be2c9ef1e3b0e7 RLBA-2022:2490 new packages: libosinfo Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libosinfo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libosinfo-1.9.0-5.el9.i686.rpm 325c1a1383a155bd68f8ef9663a0e63799fa7e01ad6675a7d085ea866d461f52 libosinfo-1.9.0-5.el9.x86_64.rpm 69eaf3333428c449d54851af95245a88b6399df1f30915f89bd6f68a59a3a127 RLBA-2022:2491 new packages: dlm Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dlm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dlm-lib-4.1.1-2.el9.i686.rpm 6835ff7cd963c6822dd7c19e8c7f48b32faa0b36484a047a74eb5d6a38995c89 dlm-lib-4.1.1-2.el9.x86_64.rpm a564dbe1861dc4092b61b3399f97a001e73f3ae87dba4f15e9d260fe9de13b0c RLBA-2022:2495 new packages: xdg-utils Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdg-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xdg-utils-1.1.3-11.el9.noarch.rpm 220b2000ec1a08d98897ba2f14e1d115376d9b31057936d8fc35a11e94a83cc2 RLBA-2022:2499 new packages: pcm Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pcm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pcm-202107-5.el9.x86_64.rpm 58e3876c6aab62f467ad1581ca7500d8530a0139e0431528509ddd52b773f32c RLBA-2022:2506 new packages: libpq Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libpq. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libpq-13.5-1.el9.i686.rpm 79963f26b44799709f05b55ba3633f8b2d39b4b8c07bfd380247b2d9edec7469 libpq-13.5-1.el9.x86_64.rpm 4599a7ea3ee60dfdbc124bfd3fe8cb05fc52bae1d6edefb363c324f0daec1b6b libpq-devel-13.5-1.el9.i686.rpm e3267862ab1c7b049f5829816ddc7218ba33d20724708182a236b83574d3d981 libpq-devel-13.5-1.el9.x86_64.rpm 7b15c9c7aca79e4f7b5939517db22b9ab806b9dbc79ec600a81bc34932417834 RLBA-2022:2508 new packages: php-pecl-xdebug3 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for php-pecl-xdebug3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms php-pecl-xdebug3-3.1.2-1.el9.x86_64.rpm 82c9b726e9eece6677886d0f70fbed226494bb85fa1d5416d5478a774dea99b8 RLBA-2022:2509 new packages: apr Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms apr-1.7.0-11.el9.i686.rpm 90b5907faadb1e7878a8dc968762c3c91884c382628850aaa7c27e778811411c apr-1.7.0-11.el9.x86_64.rpm 24e25d0caf0c4ff47d4fb15cfe717dbb7b7912fced684a5d1ec67b92d2f1499a apr-devel-1.7.0-11.el9.i686.rpm 3022936af26e8c56bba13c8984582a3950316d245610fd1723f547607e93a726 apr-devel-1.7.0-11.el9.x86_64.rpm 8e923160015c8c6253546ec6c5930da36b0c7a5eb7df2ae1baeda82d3cb36f98 RLBA-2022:2510 new packages: crash-trace-command Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crash-trace-command. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms crash-trace-command-3.0-6.el9.x86_64.rpm 5ddad5528d3cdc46dc47db43ad858944325cd70e6e251bd18e21bead821420d4 RLBA-2022:2511 new packages: crash-gcore-command Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crash-gcore-command. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms crash-gcore-command-1.6.3-1.el9.x86_64.rpm 01ee46cd4550b25297cee37e722b3a37ca5a2c24ba79e227546aa275f668844d RLBA-2022:2512 new packages: gtk-vnc Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gtk-vnc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gtk-vnc2-1.3.0-1.el9.i686.rpm a07efff961dae5dda1a58f66c8d059670ba659f9bda8058579c103d688bf5851 gtk-vnc2-1.3.0-1.el9.x86_64.rpm 493893f13f97a88cb99e9ac929dca31e5e5d8b8b10e119b3869dd9e6ecf0c807 gvnc-1.3.0-1.el9.i686.rpm e057326de068707e25070236ba953426cf6bc4fe390fbe45552f870d110d5585 gvnc-1.3.0-1.el9.x86_64.rpm 94d3b3c4ebcd1be8155da7b1a0983ab260ddf378f40929c142b54b3d8785efe3 RLBA-2022:2519 new packages: tang Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tang-11-1.el9.x86_64.rpm 20961a1f20a4ed4830ad87cc7a0d5ad47acc305dfbc097d1fa65cebdaf768783 RLBA-2022:2521 new packages: LibRaw Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for LibRaw. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms LibRaw-0.20.2-5.el9.i686.rpm d8b1559627995de547f4717d1a4d66e012768d3677e9e21e7af1a58d49c06c45 LibRaw-0.20.2-5.el9.x86_64.rpm e6bdf330e3a585687dbba3f343d2d4afa49b4f1c66c33d30b6b7f2cd85bfcdfb RLBA-2022:2528 new packages: gnome-connections Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-connections. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-connections-41.2-1.el9.x86_64.rpm c8dfa4da28c4c5b266457647887ea577d50251850ab2b6439ac4eb6d550b3adc RLBA-2022:2532 new packages: libdecor Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libdecor. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libdecor-0.1.0-3.el9.i686.rpm 51144a547d76e0f18690d22a5903b1e0fd56262112ad8cbf2d884e350121fcbc libdecor-0.1.0-3.el9.x86_64.rpm dcbe03cc019c6f35fb17457c6bc3892e221d3f0e85542c06731d56df862564da RLBA-2022:2534 new packages: hexchat Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hexchat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hexchat-2.16.0-1.el9.x86_64.rpm bf3551a9442b1635087966f7c1ec82c16109bf1cb49a3b8286a5e18c497abbd7 RLBA-2022:2539 new packages: spice-vdagent Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for spice-vdagent. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms spice-vdagent-0.21.0-4.el9.x86_64.rpm 55fa9ca090e47aad3fb379c604ccf29619abbf7ef797a8ce3d32c092a6fa6c46 RLBA-2022:2540 new packages: php-pear Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for php-pear. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms php-pear-1.10.13-1.el9.noarch.rpm 2eb530f9ebc42a1821c95cbc4ce649443262714e836dfcedfbf869bf29d83be0 RLBA-2022:2546 new packages: perl-IO-Socket-SSL Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-IO-Socket-SSL. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-IO-Socket-SSL-2.073-1.el9.noarch.rpm 2382ad1e09c5c221da1147bebdb35f98cd895dc8575f9be9901b6dce9071664d RLBA-2022:2547 new packages: SDL2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for SDL2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms SDL2-2.0.20-2.el9.i686.rpm 6d7d24c4f07598c82efa9980f99a27fb6dd0e3a68a9cc930a6c3f597472f3838 SDL2-2.0.20-2.el9.x86_64.rpm 3b76b222e49e134e9526a621a64ee05cd46d45269df2c8974381fe3c905ed106 SDL2-devel-2.0.20-2.el9.i686.rpm 893879268d2622db009aba39080599a42c3d4bae1f9268e6afbff10e6976198d SDL2-devel-2.0.20-2.el9.x86_64.rpm efc14fd51ce5f071335802903aa15821e33b5dc5b12b6fbbb8f4ada66fd10135 RLBA-2022:2555 new packages: anaconda-user-help Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for anaconda-user-help. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms anaconda-user-help-9.0.0-1.el9.rocky.0.2.noarch.rpm 951fd0ff610db3ed38639c69e73a74d9d84ddc30e44ad9a2447a6dc3beb894ef RLBA-2022:2564 new packages: ghostscript Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ghostscript. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ghostscript-9.54.0-7.el9.x86_64.rpm fccb7c011bf7fb1071590b2745cfd3b30c7621686645f12be44f69870c4e806f ghostscript-doc-9.54.0-7.el9.noarch.rpm 8daee07013356a24e5ade282169f7857546d7a6fa60abe29696b82b480489a30 ghostscript-tools-dvipdf-9.54.0-7.el9.x86_64.rpm f33eec32a66a8922c5a8187eaba0cd7e87d7280ff54360b34acd9ec01b217fb3 ghostscript-tools-fonts-9.54.0-7.el9.x86_64.rpm 6856b83bd33e53ae2d9dab3c4495ae829e7f388803787ceae2cbbbe946a4f1d1 ghostscript-tools-printing-9.54.0-7.el9.x86_64.rpm 8d1fdaf25b0e573fb9ae7b0656033c4b6aa23ea839844ef456a75a3f1cf96df2 ghostscript-x11-9.54.0-7.el9.x86_64.rpm 0d1587d3f31a7faf21ff5d5ab9e7e9128bf4b72e414942fd8f950291a2e8e3f1 libgs-9.54.0-7.el9.i686.rpm e17c5d163ec3bdb4696ad25a39ee7c6f3e33a6ad49f021f69d0ff39d735ef810 libgs-9.54.0-7.el9.x86_64.rpm de7f605d8a4d167d0ff06812335caccbcdcbd7e1f0dff072576f15b2211087f9 RLBA-2022:2567 new packages: fido-device-onboard Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fido-device-onboard. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fdo-admin-cli-0.4.5-1.el9_0.x86_64.rpm 7911001cda26bee37a0e48d613021e9285624f160da716b11d51bbff21a0b144 fdo-client-0.4.5-1.el9_0.x86_64.rpm 7d8869d88ddb181dccdcf4f8c355c3555056f507f19a0fbf33484b078563e5c6 fdo-init-0.4.5-1.el9_0.x86_64.rpm 580da2589395d71de58e27ce11991ebb1ab69c69ecd7883a43a7b04ac2b8911c fdo-manufacturing-server-0.4.5-1.el9_0.x86_64.rpm 41ead387e384ae239a1e12b1f394f2d7258f5987f362500a2ad97884f42dcb4e fdo-owner-cli-0.4.5-1.el9_0.x86_64.rpm f1d7df9b9912131169cef6e1454b7af100e0f53a6fb64b2863a7113bbe48485c fdo-owner-onboarding-server-0.4.5-1.el9_0.x86_64.rpm 51eef5558ca8859d3536536f99b482a6797cc5f40c83f29ff8c375beb70d3136 fdo-rendezvous-server-0.4.5-1.el9_0.x86_64.rpm 4200d0bae9acb9e2f92ad1ba467b7e5b58c53f8c959038ab540d0ad1d3cb389b RLBA-2022:2570 new packages: spamassassin Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for spamassassin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms spamassassin-3.4.6-5.el9.x86_64.rpm 6b9030200c7133f63bd3a434ffe8f421edf28634173c6738de5afadfa74d8b8e RLBA-2022:2571 new packages: geoclue2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for geoclue2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms geoclue2-2.5.7-5.el9.i686.rpm bc74a47fec7e7d46dfe5b2f6ee745b2ce1822b523bfd3f45ec6407845aa494ed geoclue2-2.5.7-5.el9.x86_64.rpm c90750340fd35f6fe572151c7764fb1a377e4a74a98b400fe8a49729c5d2a094 geoclue2-libs-2.5.7-5.el9.i686.rpm ef8cb7c7cab6e85c4ff5488d4eeaddb7335327d8a927c37820c96d2d6a5b2bcf geoclue2-libs-2.5.7-5.el9.x86_64.rpm 3f07e6523055281b4f3c3683f3b3a0a440d69531783783166129a925bc9f5175 RLBA-2022:2572 new packages: gstreamer1-plugins-base Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gstreamer1-plugins-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gstreamer1-plugins-base-1.18.4-5.el9.i686.rpm c7cdbfd3525abc08017ac27e4506b3662bb888767960b4cc081962f2ff89b29c gstreamer1-plugins-base-1.18.4-5.el9.x86_64.rpm 0cfca79f1e2f645681fd396585570e003502a50b8b783af8f501b76699f351d4 gstreamer1-plugins-base-devel-1.18.4-5.el9.i686.rpm e08ead4412cc6897576fd860009a7eef9042b1c758afc4d7438638ff0f42ac89 gstreamer1-plugins-base-devel-1.18.4-5.el9.x86_64.rpm d1eeefab4b42ffc1b66e58aa2841c9c45909747de79bd382860187eeb3aaf457 RLBA-2022:2575 new packages: libreswan Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libreswan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libreswan-4.6-3.el9.x86_64.rpm 39d3491df69d8917a67c3ba6e6dec852e55cd80e9f4988c8cafe4bbb8fe862f9 RLBA-2022:2578 new packages: graphviz Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for graphviz. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms graphviz-2.44.0-25.el9.i686.rpm 1d9f2dd7f408ee121faddb3cfb75766606331c79e55e9abebaf8f121535f9ba0 graphviz-2.44.0-25.el9.x86_64.rpm 032a47e02640242c70e014e27fd662e4bd5ba5c559657d848910a988b7769cde graphviz-doc-2.44.0-25.el9.x86_64.rpm 8eda93357e9e14354697152b7ef95324dabcac98bbebb01242ef79f3591df31f graphviz-gd-2.44.0-25.el9.x86_64.rpm f0e6d9e100c47fa5e4170812ac440e92abefa253f4b9d153bde3c796b686ca58 graphviz-python3-2.44.0-25.el9.x86_64.rpm a02e44db1ca835a797f775e18624970a058825ba35df9d25d11110a7e34fdb26 RLBA-2022:2579 new packages: libnsl2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for slapi-nis, libnsl2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libnsl2-2.0.0-1.el9.x86_64.rpm f167e9ccc69ac4000940a4bcdc7e3b2b5bb4c74030d10e5151b0b28257d1e355 RLBA-2022:2582 new packages: go-rpm-macros Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for go-rpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms go-filesystem-3.0.9-9.el9.x86_64.rpm 5227d232121281c39301f81bda168f6fdc3c736229e5d8b173a6a129ff622271 go-rpm-macros-3.0.9-9.el9.x86_64.rpm e9aab999cad301bf14cc9792f0d0628e744bb6a6d9030ec93f906c6b06a427d8 go-rpm-templates-3.0.9-9.el9.noarch.rpm d5546eae726d51c84d8e27d0fefa3770e317a32b5b4feb4f5b12d520c60815cd go-srpm-macros-3.0.9-9.el9.noarch.rpm cdc2015013f127552e107ccad833a17ad37a222a99e65cf0766c97cd3ca7d443 RLBA-2022:2587 new packages: aide Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for aide. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms aide-0.16-100.el9.x86_64.rpm 6fcaa1dc4c67715770486b52d6f282c4fad0ba052dacb200beb85bf31e42ecac RLBA-2022:2588 new packages: libpmemobj-cpp Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libpmemobj-cpp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libpmemobj++-devel-1.12-8.el9.x86_64.rpm 2c76c09583c12fcad6bcab4a23e219920948a546f5c95727ce8368e70ac57057 libpmemobj++-doc-1.12-8.el9.x86_64.rpm 97f1c0d060bb1f1402a4afc5dac29794f3953d46b6568688965c31870ed5fc3b RLBA-2022:2589 new packages: libtool Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libtool. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libtool-2.4.6-45.el9.x86_64.rpm 2b234d758f3b10c9c0a5f1527abad8a2b70a28616c1425f4b5b6fd494c316017 libtool-ltdl-2.4.6-45.el9.i686.rpm ad1a7003fcea82d251ed54e61f22668f5eb2bd73449caea99af6b2ca4eed7539 libtool-ltdl-2.4.6-45.el9.x86_64.rpm 39031cdd1458c857211736b88cef8c9eb60ef7802cc2e9155f0dd8cadc2eeb8a RLBA-2022:2590 new packages: hostapd Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hostapd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hostapd-2.10-1.el9.x86_64.rpm 679c0ea8a9eaf5e197c56be4628a3dbbd12b9cb905f81ce82887b0102679d3b8 RLBA-2022:2595 new packages: festival Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for festival. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms festival-2.5.0-17.el9.x86_64.rpm 71d12571f32e1567b2ec8dbd90ad8f17156ea6e7bb309a8772780d90a00d3aa0 festival-data-2.5.0-17.el9.noarch.rpm 5d3c9cce4e93c2e35570f4326083af0dcc972a1ad485e08fdc0482444059b06a festvox-slt-arctic-hts-2.5.0-17.el9.noarch.rpm a100049ed3d6be6f84fdf13f7daefaf4bf02ad1e8919eabc43de32263172cee2 RLBA-2022:2600 new packages: OpenIPMI Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for OpenIPMI. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms OpenIPMI-2.0.32-3.el9.i686.rpm 16e22a1ff7698c5169b32f9766e2a1028ee664b75246c1775466fd26cccc5ccd OpenIPMI-2.0.32-3.el9.x86_64.rpm 642e651edcca1752588cf8ab70c02953c72cae2cd7f56e2e3b2549bd634c8b6d OpenIPMI-lanserv-2.0.32-3.el9.i686.rpm 62bc9ed20b29427116999e51ceaeb1297c02daeeb9e94517ec379aa00293b311 OpenIPMI-lanserv-2.0.32-3.el9.x86_64.rpm 4c82eae23043750ff749e31b010e791bb6c347b844c4048e73007251f71b9362 OpenIPMI-libs-2.0.32-3.el9.i686.rpm 4dcc708af9c28a522899aabac9299a9798175ab75f19ea8e798dab438e0c1d93 OpenIPMI-libs-2.0.32-3.el9.x86_64.rpm 7dd3d958a07e83ae829727dfa59358f9a0caed0202ea4368c927eeb9331b6e88 RLBA-2022:2601 new packages: greenboot Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for greenboot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms greenboot-0.14.0-3.el9.x86_64.rpm 73ceffc59748060cf4cdb4d25aaa4671fc22054e4072ccb3972e040b6205fa57 RLBA-2022:2603 new packages: plymouth Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plymouth. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms plymouth-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 5491632f8f97666a2d8db6715f089aa34c1fa4557acd2a619858b06f06ae2335 plymouth-core-libs-0.9.5-5.20210331git1ea1020.el9.i686.rpm 8d844837cec8aafe906ccb0bd0c8d39a33469aa5b58a6837d76464ca0a1cdecb plymouth-core-libs-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 79819dedc5e635493b3fc70224a728645e12deaaa31d6916dc49d92ad5195a7a plymouth-graphics-libs-0.9.5-5.20210331git1ea1020.el9.i686.rpm e91ea56f94b329a71c5ff9c018d8ac21f640f2a06c93d987edb5e8383ee834ca plymouth-graphics-libs-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 7ac51de1c3a54cacfc42c96dc86f12499b0dd49c2599da1f621aa4c2c5daa821 plymouth-plugin-fade-throbber-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 1c0750db912a3a914905b78bf514606b1f0049eca0f8bcb34ce27172d0ca0aab plymouth-plugin-label-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 6f93469c6ae998f16c38b78139bfaf0eba7f642657695f81581b142a19d67904 plymouth-plugin-script-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 29ea9329990c59b0c722377eb346b777a464d2687ab52359666bf4575681e835 plymouth-plugin-space-flares-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 3cfce895e646e6b9b100a4a550d3166c45f08c3a06987d230939a642029bec80 plymouth-plugin-two-step-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 96f0ef9badf547abf621e6848563c2a5b27c4a0c6468e7f86443a21519fff7a0 plymouth-scripts-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 602a1ec404b2c8f5e4cb66835e235830a8622aeea6c9836c67e7542d1b1b554e plymouth-system-theme-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 0a5bf089d1b06b26b9f5c5c95a9dbc94df3f7e24451110c64b6ef310bcff6998 plymouth-theme-charge-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 3be601b895d6a5104ed8b21bf4a5d828077c07f5b936ed928d1572f333b8433c plymouth-theme-fade-in-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm b813d1539feebc7eccd430e049644e46ed002ef97b9aae4ccbb20ee1ff358c40 plymouth-theme-script-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm be94478da75dea04db4a55b4d156faf6365397bac4c96160177a878d55046eb2 plymouth-theme-solar-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 57eb49f0b879c736f94791c8262f6cab04f0aa7ba5c2d2453c7a913df737ee04 plymouth-theme-spinfinity-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm 4410d6b71b994f022cc0f7799e22b319789c724918d1a7de4eb26c0b857ff336 plymouth-theme-spinner-0.9.5-5.20210331git1ea1020.el9.x86_64.rpm a3ba2794c84a6be4e6dfd2f4f19798331e4dd3b9b1c82401280b4c38babd350a RLBA-2022:2604 new packages: libxslt Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libxslt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libxslt-1.1.34-9.el9.i686.rpm a5db9d7a0a47d8089ba2e0a3b77503fd671205e1de43d9101f11f72a7a548a6d libxslt-1.1.34-9.el9.x86_64.rpm 0127ecfbfb6b1f3bafccb4057e882b9f5f39123fdb55d33e64a5f0fb943810d6 libxslt-devel-1.1.34-9.el9.i686.rpm e515a2b825e91144ddeba22f857312b0e76ad7bd75fd06391c90f39eaa53c433 libxslt-devel-1.1.34-9.el9.x86_64.rpm adf4aa40236c34a439ccd85d66b2ce9b00dfd066300a138e426dcc8d59aa0795 RLBA-2022:2606 new packages: python-rpm-generators Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-rpm-generators. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-rpm-generators-12-8.el9.noarch.rpm 0cfa5a242e5b68eb6efee236b3569e76c61287d76ac36f495eb08fef9800528f RLBA-2022:2607 new packages: gegl04 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gegl04. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gegl04-0.4.34-1.el9.i686.rpm d4d2f6b32f0b603a8fb0bb9863fdd15986dffe6d571f7fddbdd1889c6e8444db gegl04-0.4.34-1.el9.x86_64.rpm f82f5fac1c1f0833648a03ee2e1e017a742e226ef08f7781b97e08df2427c0d6 gegl04-devel-docs-0.4.34-1.el9.x86_64.rpm caa1a7534d4eb7d0287b210582b008a79fdd31fcac40a44671c7824daf1d0092 gegl04-tools-0.4.34-1.el9.x86_64.rpm 4cde242dde4c14f647b68a78aafbc31137c3a74991cd1eeafd636fca544d0953 RLBA-2022:2608 new packages: gtk3 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gtk3-3.24.31-2.el9.i686.rpm 5c8523beaaed9688950fc210e62a010f703df18310d3af6964181390792f7af9 gtk3-3.24.31-2.el9.x86_64.rpm 93e0f50705292497b818bb5f49939e5f14565130ccbf4268f68f3b6980f6b976 gtk3-devel-3.24.31-2.el9.i686.rpm 987ea7c3ecf3a3f6140b6f00361dc6deea407f1c427227579c4bc04532d8846d gtk3-devel-3.24.31-2.el9.x86_64.rpm 131f36505eae9d1aa1e192cf80505b9268d0fe40ff262353eaf08d816aa07c65 gtk3-immodule-xim-3.24.31-2.el9.x86_64.rpm 202312c784b3fbd7f296af76f29d761067e9499fcf33bdcddd95af153d01aef3 gtk-update-icon-cache-3.24.31-2.el9.x86_64.rpm 4be87b4d18af9db3941f10257790a763cf6be8238d100eaba7590b530931d640 RLBA-2022:2616 new packages: gsl Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gsl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gsl-2.6-7.el9.i686.rpm 89a3f11169512610c938e5f0ba3e6d60e8387674b844d3cf463ee924eefa7e6b gsl-2.6-7.el9.x86_64.rpm 6ad7c0869388e9fa92edb51cf895cffdda934117bb65031d182f782020281aa5 RLBA-2022:2624 new packages: freeipmi Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for freeipmi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms freeipmi-1.6.9-1.el9.x86_64.rpm 9ac36fa6cf7185ca85b45645ed841a64252047bdfcca502561ffdd40a5a2d8eb freeipmi-bmc-watchdog-1.6.9-1.el9.x86_64.rpm 02d8d90ae839d968ae0908576d200340373b258c3955ddaa5301eb7193b378ca freeipmi-ipmidetectd-1.6.9-1.el9.x86_64.rpm 6a4157ee20f5218a3146cbbd15a55dd4aeb391a4ac6ee56de9bc1ab1524edc53 freeipmi-ipmiseld-1.6.9-1.el9.x86_64.rpm a086017d77150d4bc0fb78653ff651ecb27b2e95be8bed7d64c91134068b444f RLBA-2022:2625 new packages: ipmitool Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipmitool. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bmc-snmp-proxy-1.8.18-25.el9.noarch.rpm fa3e5c3e8a69d6f3d01886923818eb4c150aecebf5f44943ae4a61add8d4af43 exchange-bmc-os-info-1.8.18-25.el9.noarch.rpm 3229d11156343ab7aca8103e8b73ecbda1ba5c8f5da2593dfb6ead7d83ffe1fc ipmievd-1.8.18-25.el9.x86_64.rpm c3dc44a53e1a1553885e85a16f30771fbb2ba9a8b2e70eb9db20687b8fc76493 ipmitool-1.8.18-25.el9.x86_64.rpm 7772feb2165d59ac339b9a4f65a0c58a61b3fe4d8a6d1c616e76cd2c4d0c9c44 RLBA-2022:2626 new packages: xterm Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xterm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xterm-366-8.el9.x86_64.rpm 752a66e66837c536800810d245cdf2ef74a287fb98ed53e993635c6c788e562f xterm-resize-366-8.el9.x86_64.rpm 47a505aa55a2e9eaeb4fa24327044c80a9cd24aec2c87a8fb2bc1e6a34feb014 RLBA-2022:2628 new packages: perl-CPAN Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-CPAN. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-CPAN-2.29-2.el9.noarch.rpm 0154c44a893525c8e2d0943ee129f3b6a1abbfaf31677b756d7be0bd1dea0016 RLBA-2022:2631 new packages: libburn Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libburn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cdrskin-1.5.4-4.el9.x86_64.rpm 864312cf79bb2ca5f7b8e61cf100c9d9a8ea82b57aa3d5270de47b504e6a65cb libburn-1.5.4-4.el9.i686.rpm 242e6a78e9e854e9343512d6c63bf385f06678770f431ea006a1a170f91bac69 libburn-1.5.4-4.el9.x86_64.rpm 9e09c60e46163d003b03f397578ebbb0a43d4e372e426df617ff9eb71ea7336c libburn-doc-1.5.4-4.el9.noarch.rpm f69119c079ee8482dbbf70590080437b9c1bb9f42b584061c2c4d0fb87b1a625 RLBA-2022:2632 new packages: libslirp Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libslirp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libslirp-4.4.0-7.el9.i686.rpm 4ea8040d110efcf2c2026862525ce29d33828fe308b1c0b9f74330feae27c32a libslirp-4.4.0-7.el9.x86_64.rpm 9e139bea16fc979b10db9af8c6f29cd205f50450d09db2a1dd6744512193a4ae RLBA-2022:2657 new packages: python-ply Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-ply. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-ply-3.11-14.el9.noarch.rpm 668d21e24211e4080c65b67f184afe59dd22b98814d11583c65bbb2897516b7a RLBA-2023:2495 dnf-plugins-core bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dnf-plugins-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-dnf-plugin-modulesync-4.3.0-5.el9_2.noarch.rpm 3fd73dbfc5e2c7105bd0641d4ae0004521cc9006e9491e9f74714537154072f7 RLBA-2022:2658 new packages: numpy Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for numpy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-numpy-1.20.1-5.el9.x86_64.rpm 634f138213b0f5acf5fb6a5ad9635278bce15867c9afe8af749c1b99f333665d python3-numpy-f2py-1.20.1-5.el9.x86_64.rpm 939dacdf39c4f56847d34891617126d916a6b02175ca9bba7f8d6aee970a5dd6 RLBA-2022:2659 new packages: fio Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fio. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fio-3.27-7.el9.x86_64.rpm 857aa63abe2da0fad40d53fcf47b8882489d21c98d802efec1477c30ca010298 fio-engine-dev-dax-3.27-7.el9.x86_64.rpm 56a06543591a112c038684dab3092af15298f4f06895139fda30dbf7d42578b5 fio-engine-http-3.27-7.el9.x86_64.rpm 2021b900bdb515e9d1c7134678dae87f65210d090cd1e8d50b9980bf338a633a fio-engine-libaio-3.27-7.el9.x86_64.rpm db94c1f50fc2823ec254ef0742458e96f8780105e9c71429f543adc998786f5d fio-engine-libpmem-3.27-7.el9.x86_64.rpm 194d011d90a18e1249e7ae97c04c3f93e01c293c6e034a1899c7d37462e54dae fio-engine-nbd-3.27-7.el9.x86_64.rpm 99e1dec81f9f794dc3b348300f2563798e2061237067bb6fa80fcc3bfebbbf29 fio-engine-pmemblk-3.27-7.el9.x86_64.rpm b312a069beda94d481e7c251a91c4c786a28cb1490d4f6855c294a08f43be7b7 fio-engine-rados-3.27-7.el9.x86_64.rpm d92834a0e6f7b7584e10cf971198414139d285c757c8d7e601d53a47dccf13f4 fio-engine-rbd-3.27-7.el9.x86_64.rpm ba3e345ae89340f6074b0dbc0aebaf31a236a04f6752c2ba2127f27032448ed0 fio-engine-rdma-3.27-7.el9.x86_64.rpm 9320c89427683b1a56b70510c6a83e5414290d63210a8cc5d491ec510b384eb1 RLBA-2022:2664 new packages: scipy Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scipy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-scipy-1.6.2-8.el9.x86_64.rpm 1103fbcc787606536866b7cffa5d11b2ad54ffd11909b68af51152508a24f5af RLBA-2022:2672 new packages: varnish Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for varnish. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms varnish-6.6.2-2.el9_1.1.i686.rpm c068a1f9d3a1c249487d18db2f18b2012bc8c6cd9b8ee37e136cdbf6469b5d9a varnish-6.6.2-2.el9_1.1.x86_64.rpm e59a3aff50bf54c2855693ea6a88f52aadd286ab784af4b9c19258dcdaef326d varnish-docs-6.6.2-2.el9_1.1.x86_64.rpm 1f4218dfac56d7056b83497444bf39bd2dd07bceade816145460324491df49da RLBA-2022:2681 new packages: zziplib Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for zziplib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms zziplib-0.13.71-9.el9.i686.rpm 9ab7a8be4608f6b4982a8874f58677beaec8a28ed6c3f85e22d4078d8230835d zziplib-0.13.71-9.el9.x86_64.rpm 3f8f9fb3ba71e761f50e96baccbe839b377c05d9f6e390ddb65f5cb6c52f0265 zziplib-utils-0.13.71-9.el9.x86_64.rpm f3734d71b45db8836784f81d4d7cf4ca91b871196de58590cc72afcb31e96109 RLBA-2022:2682 new packages: protobuf-c Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for protobuf-c. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms protobuf-c-1.3.3-12.el9.i686.rpm dfb9eb68cb6b22eda56763f7856d2b74b93ee03ce762c9ec020f7ed82688c49c protobuf-c-1.3.3-12.el9.x86_64.rpm f82bae4489cf7e438599ceb47eb215634feb0d276b244f2001d8cea4ca692a8c RLBA-2022:2684 new packages: flexiblas Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for flexiblas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms flexiblas-3.0.4-8.el9.i686.rpm f336e1a423300a77afb38c3a626c8e476fe7b1e535efa7e5357bb430305434d6 flexiblas-3.0.4-8.el9.x86_64.rpm 297fc04bbc8d672d056339f8d7b46812877cf2472f144b6045861701a4a57afc flexiblas-netlib-3.0.4-8.el9.i686.rpm daf8edcd71de545ad8feb844dcbb1aa2a64c7dfd45e27617cbe1fe6922fc20b4 flexiblas-netlib-3.0.4-8.el9.x86_64.rpm d1aa224e759b5f752c2cfe7bce002f3a3ea184d175296b6cc749db2ad302b253 flexiblas-openblas-openmp-3.0.4-8.el9.i686.rpm dc1921db8c601f4fe01f341017aee3c1ffbb3b5025b54e218741d3c2c3674d02 flexiblas-openblas-openmp-3.0.4-8.el9.x86_64.rpm a6d92eff898f6e8d7162a52e52d1b554cb0d9785d6ee1e83c9418060c97c3df3 RLBA-2022:2687 new packages: xorg-x11-drv-wacom Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xorg-x11-drv-wacom. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-drv-wacom-1.0.0-1.el9.x86_64.rpm bbece39942bcdacf9a7ca991333a4984a50e718a4334a41637a10649ff7273e3 xorg-x11-drv-wacom-serial-support-1.0.0-1.el9.x86_64.rpm 573678790ccc3929cf3c65356d75ec3bab380eab5c58bb438d8a3d60cb9b51a8 RLBA-2022:2688 new packages: openblas Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openblas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openblas-0.3.15-3.el9.x86_64.rpm 47461d2fa724b1437330f2fb5cc45073a4c3f598d02880af488ed6e8199c2bdb openblas-openmp-0.3.15-3.el9.i686.rpm 3e98a4008a4c5c7f43940cabd9ed43469c563fd2274b9c805b256570d5b80f9a openblas-openmp-0.3.15-3.el9.x86_64.rpm 9fb2ca11be237ff5e3aa5ebcf1466ca5c10389c4a94dd35b01a8ac6a70d98a49 openblas-serial-0.3.15-3.el9.i686.rpm dd7a77530dd942f00efed08900d22a192ceabfaaba16176ce2a820e231e69a93 openblas-serial-0.3.15-3.el9.x86_64.rpm 774951fbb53756cc9e4d40a3a7cb34ca962ea4986bf8cf7deba3fdcb85703682 RLBA-2022:2690 new packages: gtk2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gtk2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gtk2-2.24.33-7.el9.i686.rpm fef13bd3676631d3fe0151287a9d5ef0919e4f7021f1e40d9d5fdc8e04b645ab gtk2-2.24.33-7.el9.x86_64.rpm a5ff6d0a4ea4884492ee43ff851813c5193fac8bb9614fd03e3ccb6f4a0b218c gtk2-devel-2.24.33-7.el9.i686.rpm 17f22be6035c4cc3cd0608b40b2e51adf1f6e5f5e35967d61b349144840b27dd gtk2-devel-2.24.33-7.el9.x86_64.rpm 7204ab2db2e5bae2f15c40cabac32655feacb3e60228ba39346cdc69047c4d1e gtk2-devel-docs-2.24.33-7.el9.x86_64.rpm e9f9e832c10ab97f63acd590ab86e3f52492040a77e8f1cd85904ce92f1c2d0c gtk2-immodules-2.24.33-7.el9.i686.rpm 6fa9af22762f243f54736e73221ad7e06582d51ab35480a6dbf0f273c47cf886 gtk2-immodules-2.24.33-7.el9.x86_64.rpm 248dcf74777dd09228718ee69fad6f9e53e4f03741a98e6cb59488bc501da5b4 gtk2-immodule-xim-2.24.33-7.el9.i686.rpm c60aa6b938b01c3e73e226f681aae51814b181a94976ad4ce4144e7484b3fe3b gtk2-immodule-xim-2.24.33-7.el9.x86_64.rpm 3d436bcab671daac47b6e3140e19c4dc19f057299d2102fcd635adff36192c18 RLBA-2022:2694 new packages: sysstat Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sysstat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sysstat-12.5.4-3.el9.x86_64.rpm cdf8e58038036a4c049075d2dc89e84379fdc7b3eaecb9df8dd65a7e8c7d55ff RLBA-2022:2695 new packages: libsndfile Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsndfile. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libsndfile-1.0.31-7.el9.i686.rpm a9557dfcd6cf92348d40660d30b33e147463f19df3008b2278db48d25ffa79e1 libsndfile-1.0.31-7.el9.x86_64.rpm 5ea30db5acfda545cd737faba2198a359895727129ecba6a6cda1cbc5a7725da libsndfile-utils-1.0.31-7.el9.x86_64.rpm f29ff3b04a0e71df22c71fa31e38ecf3ef2a19e3a540172975f60ad12c4fb0f9 RLBA-2022:2698 new packages: butane Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for butane. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms butane-0.13.1-1.el9.x86_64.rpm b8b27afaaf88085738ba5ab2198aa130de9c3d5b9016f664c9d07b650622f933 RLBA-2022:2701 new packages: rust-ssh-key-dir Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-ssh-key-dir. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ssh-key-dir-0.1.3-2.el9.x86_64.rpm 21e8becf78429865faefecff1e0ff2dfc16c6a05789c61374af718ae7b0d1294 RLBA-2022:2709 new packages: NetworkManager-libreswan Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for NetworkManager-libreswan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms NetworkManager-libreswan-1.2.14-1.el9.3.x86_64.rpm 47c47547035bca999e6708032737f4b6102a0c07ab6df79a95be0bb9831283ad NetworkManager-libreswan-gnome-1.2.14-1.el9.3.x86_64.rpm 697d1dab309b66468b78607688384b872fb598051c781d273a11b751a189702a RLBA-2022:2710 new packages: PackageKit Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for PackageKit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms PackageKit-1.2.4-2.el9.x86_64.rpm 9439d096cda6783d255252f9ce40300dd325201e3f2ad0f97e609a39983a336a PackageKit-command-not-found-1.2.4-2.el9.x86_64.rpm f9a7bb3aff8f47f8026cb8c820f3df2230c51e52084deacadadd47f596553df4 PackageKit-glib-1.2.4-2.el9.i686.rpm 81bd6fdf75c9fd76bdf08a6e2cf8474bb79063a87dc9ccbe7c64aba2c5ca9f3e PackageKit-glib-1.2.4-2.el9.x86_64.rpm 617b3455a255169b99c525ed4907530d6bab052e88d337ffd6ce9d5534b7fd9c PackageKit-gstreamer-plugin-1.2.4-2.el9.x86_64.rpm 907e151fbd020e2339e6afc731c8f287898b3b53eb9dd64061500c2b783c967a PackageKit-gtk3-module-1.2.4-2.el9.x86_64.rpm 42cc8cf15e4ecdd43efb85b03dd75704b68e6aff5865aa38bd264a458d475199 RLBA-2022:2716 new packages: acpid Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for acpid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms acpid-2.0.32-6.el9.x86_64.rpm e450fab884c5db92d4fe42c61f4f6ca078a2e425a1a228259c9ff30502fc3663 RLBA-2022:2722 new packages: ant Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ant. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ant-1.10.9-7.el9.noarch.rpm 5dd82a5473e28d529a8e024f97172316293df4c6a1c1869c937a5292aaa8dbe8 ant-antlr-1.10.9-7.el9.noarch.rpm ce891388e9a881eee29fa94658980e0013e5f42ddc053b1e03f4165603a36582 ant-apache-bcel-1.10.9-7.el9.noarch.rpm 5e2f32d22f215e315f39668bbd0b1f695e58f0035e8d31a0d8cd52c301b7497c ant-apache-bsf-1.10.9-7.el9.noarch.rpm 7f2897d381309c6b008f6c34af14923110d8be5c85bc7c4397a2b2515e8906f9 ant-apache-oro-1.10.9-7.el9.noarch.rpm 5257ee162956358ff32dbd5b3a60fe7565512bd7d9e6d3c21d4a9386ac3039eb ant-apache-regexp-1.10.9-7.el9.noarch.rpm fed33d36d798aae884b36af109a0a7b331688c3dbb635dea72162aedb015f88d ant-apache-resolver-1.10.9-7.el9.noarch.rpm 5bb7ba30aaafa875f36179a3f9dec063a07e51f8a80bfda050d06cf12b8c29fd ant-apache-xalan2-1.10.9-7.el9.noarch.rpm d106e75933c0afbd6411b4bd44815b8b994f271bd411e4dc7626e23912772ead ant-commons-logging-1.10.9-7.el9.noarch.rpm a4c55a42c65f20bcf848f65195b80ce22839383b86394323bcef5a7bbc5ec9bc ant-commons-net-1.10.9-7.el9.noarch.rpm 3122d26c8967ba9ca689cb8cc62678f5e3c7f49220f0759415dda9976294441e ant-javamail-1.10.9-7.el9.noarch.rpm 2dd935ae72844e6485473c6dc08413225d8feec03a3fd803dfdfb023108e6710 ant-jdepend-1.10.9-7.el9.noarch.rpm 187e9172164bb6e65da61bb12e5e7c09af167d046523099d6c3c77722f30daef ant-jmf-1.10.9-7.el9.noarch.rpm 512cb607a1ba59c686132cba975af89ed80cbed860ece7d3f0485d6e5a6f5323 ant-jsch-1.10.9-7.el9.noarch.rpm cc6a0f89caf58bce281d5ee57acccc827aa9e54b7f9f124c8f92e9f0c8a093b4 ant-junit-1.10.9-7.el9.noarch.rpm 00005d6682fcec33368b40c79136be51cb7fb07811cd8a89dc542b8046f703b1 ant-junit5-1.10.9-7.el9.noarch.rpm 7c35b7ec77937fcd32499896663378f030f1c166f9fd917d70d21f9ca9f2af4a ant-lib-1.10.9-7.el9.noarch.rpm 29e8c79cbe0a1eca4757ce5874a6d5e1a96a908567c92c6882486d0af5d4000e ant-swing-1.10.9-7.el9.noarch.rpm b1d663c9043321e40fb912dd87ac3d83699bfe479f5a45b8b0c7ed612801bd62 ant-testutil-1.10.9-7.el9.noarch.rpm 0847f9bddb7026114f3c4dbe144de6d4f0234f68d3355767ec41583787be223f ant-xz-1.10.9-7.el9.noarch.rpm e88547e3ccde8c3d3a52c1d4d5275a1dfdcb2878e833185a2afdb4be6e437adf RLBA-2022:2724 new packages: antlr Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for antlr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms antlr-tool-2.7.7-68.el9.noarch.rpm ee5331d966b70ce98f207f6ce35c0606bc1267c1336dab3a9835099c0d3851c9 RLBA-2022:2725 new packages: apache-commons-cli Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apache-commons-cli. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms apache-commons-cli-1.4-16.el9.noarch.rpm e4bced660157e7d0e00ab919c581c0027942f15da682b072cb273b4bf13e71c8 RLBA-2022:2726 new packages: apache-commons-codec Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apache-commons-codec. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms apache-commons-codec-1.15-6.el9.noarch.rpm b90a08c48f3a4fbd2818f5eac8c5d8c929f750c7cfc4ef9b4f05cbc99308f2d2 RLBA-2022:2727 new packages: apache-commons-io Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apache-commons-io. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms apache-commons-io-2.8.0-7.el9.noarch.rpm d4b463881cdcf11c963a2554e9d7e61b942748d7b239b25597037a820dc36322 RLBA-2022:2728 new packages: apache-commons-lang3 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apache-commons-lang3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms apache-commons-lang3-3.12.0-5.el9.noarch.rpm 4a62f2bf3193773ea81bb59b1af12ba79c0e709cdf4db04213d3852914cea56b RLBA-2022:2729 new packages: apache-commons-logging Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apache-commons-logging. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms apache-commons-logging-1.2-29.el9.noarch.rpm d200953d49f68c73614e68207574dcaac866c0f86544dde92431695323b1cde8 RLBA-2022:2730 new packages: apache-commons-net Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apache-commons-net. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms apache-commons-net-3.6-14.el9.noarch.rpm b03b7f1ba91383c647420193e5c30d1a5379c96d33e15cd80d319b71e571c4d7 RLBA-2022:2731 new packages: apr-util Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apr-util. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms apr-util-1.6.1-20.el9.i686.rpm db39e48e07695bb1509dfecc43fd4050c86a8f9d1a02f2fcbf90e4d552cd0d77 apr-util-1.6.1-20.el9.x86_64.rpm 4df3aca6bee14682fbbd835dbaf77e11f6853e1a4a3c0ed61bd8ae8d7b58a233 apr-util-bdb-1.6.1-20.el9.i686.rpm ecc683ed3cd6d694f464f5ce31cb7e3eba10b5351b4dc1bac11049fc26540f39 apr-util-bdb-1.6.1-20.el9.x86_64.rpm 7a9f7b7d8012e2d5227edb90d7ffe3154039952680d6e6dff50117b5869e2763 apr-util-devel-1.6.1-20.el9.i686.rpm f963f7fa2a4598df9dbbe892c9a558bf5afe35491d85e448603dab2ed76846e1 apr-util-devel-1.6.1-20.el9.x86_64.rpm d5edb3c184182ea22e0b4d56e67083387e0c4b07f1f527efb53cdecd9e99567c apr-util-ldap-1.6.1-20.el9.x86_64.rpm 414345d067ebba19c20b7ed1e81b5c5cac1973b6fd4cc457e26118c9a991b1af apr-util-mysql-1.6.1-20.el9.x86_64.rpm 7b4b167157717d62ee175c17c986030451f4af7ed1a212dc7917067cce59b584 apr-util-odbc-1.6.1-20.el9.x86_64.rpm 7b6ee924b4baf61f5d7a1f0ca2914936b3227e60d9be0344690a27a810d4e51c apr-util-openssl-1.6.1-20.el9.x86_64.rpm 293cd825b42b9b69ade16c217162fc3c2a60718142e77a3cdac2d9a21233d696 apr-util-pgsql-1.6.1-20.el9.x86_64.rpm 0a943b5ac371dec132740cb408b03fbac00826a3ed375021f2925ccc483d12f7 apr-util-sqlite-1.6.1-20.el9.x86_64.rpm 2b9494fcb1df01da25dd538cbaac4d5f299b9175b3fe9460c1aa5b91fa723178 RLBA-2022:2733 new packages: assertj-core Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for assertj-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms assertj-core-3.19.0-5.el9.noarch.rpm b0ecb801853f69851e15c77175df15a66090a114e187a626696aa4772832e920 RLBA-2022:2736 new packages: atinject Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for atinject. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms atinject-1.0.3-5.el9.noarch.rpm 6dedd2de396871c941848b4b20d03d421c1c96c22acb0e0ac640f4a15bce3b54 RLBA-2022:2741 new packages: automake Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for automake. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms automake-1.16.2-6.el9.noarch.rpm bf4d3d82d35a393a8c9c087ffa6c47b2a5b7a6c284958b3847300dd080b2267c RLBA-2022:2749 new packages: blktrace Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for blktrace. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms blktrace-1.2.0-19.el9.x86_64.rpm 2de11c2efdc662820a967b26c5b7e842f9cf9ab6702414e99f4a8d3d8ea580c9 iowatcher-1.2.0-19.el9.x86_64.rpm 2507b85e1d1b2bbb1e57b0d720395eea1ceab4cdfd27993446ba82b35d3e65e9 RLBA-2022:2751 new packages: boom-boot Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for boom-boot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms boom-boot-grub2-1.3-3.el9.noarch.rpm b87cdfbcc5fe206e7018276fe3ec0f03ebb8ec4026834b445a2f4f3e7919a307 RLBA-2022:2754 new packages: bsf Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bsf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bsf-2.4.0-43.el9.noarch.rpm b9f7e00bf8070255a3438cd9ce423a05056e884aa10486b7c705344c7692ae6e RLBA-2022:2756 new packages: byte-buddy Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for byte-buddy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms byte-buddy-1.10.20-5.el9.noarch.rpm 1f8f8d3fdf7fb9864ae4b7e1bb0ccef1b2d85f8406f29ee6e751305e5122e952 RLBA-2022:2760 new packages: cdi-api Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cdi-api. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cdi-api-2.0.2-5.el9.noarch.rpm 47c872a8badb47fd59604af059267200281f516d1a5e3c1ea0f31ee62e483e95 RLBA-2022:2764 new packages: chrome-gnome-shell Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for chrome-gnome-shell. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms chrome-gnome-shell-10.1-14.el9.x86_64.rpm 6dc5c5e9ac162ed887442252180b73e150747ec267dbf725d477e0198363112c RLBA-2022:2766 new packages: cjose Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cjose. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cjose-0.6.1-12.el9.i686.rpm a2e35185bca9628a39aa2be64c5c557aa4b1cf3660ef0e3a2a68d52533b97582 cjose-0.6.1-12.el9.x86_64.rpm 33e80558b78a36a3b42ef08dd455ffcf53ae5651805849f63f4c9789b24bafe8 RLBA-2022:2768 new packages: cloud-utils Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cloud-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cloud-utils-growpart-0.31-10.el9.x86_64.rpm a87779012026b5a6875875690291b7c222b6c38e4f9e1a0a091ff207f061e907 RLBA-2022:2775 new packages: colord Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for colord. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms colord-1.4.5-4.el9.x86_64.rpm d7c5c64892db81088deea94b081cb75427dc2644c8b0667d97f099bd63af0dd0 colord-libs-1.4.5-4.el9.i686.rpm 8abbb5d71189e7e24cae54c7978aa736bdeaeff35305c30edbd101faf1c5c18d colord-libs-1.4.5-4.el9.x86_64.rpm 09c659915ffc516d047be14b1e4b57df743052a69f8430e2d2fc0f37d2660f97 RLBA-2022:2783 new packages: cups-filters Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cups-filters. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cups-filters-1.28.7-10.el9.x86_64.rpm 822a67d58c1fb35bea6f385daf76cf6a64588f316f681a46e6fc5711480f1567 cups-filters-libs-1.28.7-10.el9.i686.rpm 44660e330435eb3a969556c44daf710bf97e2d0ea30091643e708737d5e6d1b2 cups-filters-libs-1.28.7-10.el9.x86_64.rpm 41f1d3d844c6b480af9417bda4ecfb6c1eedd70d0f2faa66223b28723ca1f53a RLBA-2022:2789 new packages: debugedit Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for debugedit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms debugedit-5.0-3.el9.x86_64.rpm fbf01d928226d8b1e18edcf15ddc7520791661f637ac1a5db410e9a58517a12f RLBA-2022:2791 new packages: dialog Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dialog. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dialog-1.3-32.20210117.el9.x86_64.rpm 4fdb03442000fedf51cba70f413a0b002c3e4ec72b306153f9c91b548e05ff1d RLBA-2022:2798 new packages: driverctl Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for driverctl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms driverctl-0.111-2.el9.noarch.rpm e77dd4061be1384ba336ef3dd2ba144e51776fa8c2c47ca16fe41a7ddfee0d66 RLBA-2022:2807 new packages: evolution-ews Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for evolution-ews. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms evolution-ews-3.40.4-1.el9.x86_64.rpm 086f243bfd6e5f2d5bbcff154412f04b497dd3b11e4a6066026b8f71c4060e7c evolution-ews-langpacks-3.40.4-1.el9.noarch.rpm 4b31c7ec19f5faa7b9bbff90cff988f0cc593e4c376bbd9526d0b0cf300f6499 RLBA-2022:2808 new packages: expect Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for expect. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms expect-5.45.4-15.el9.x86_64.rpm e890a6d145e259cca893006ab1694d3ade888eea110db6acd5b7eecdfa03682c RLBA-2022:2810 new packages: fftw Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fftw. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fftw-3.3.8-12.el9.i686.rpm a874d81e852854fa1f69e4c6ad5202e5d0f27a034990c3809d5a169d01d68128 fftw-3.3.8-12.el9.x86_64.rpm 761d5c76f0b417f53fdd27fec6e51748d47cfae543de1c0cdf75a26d68d88051 fftw-devel-3.3.8-12.el9.i686.rpm d8c48a040b19ec49608b3513142b4e3156c06ff6761a18167ec1c37df308e455 fftw-devel-3.3.8-12.el9.x86_64.rpm ae33de7c8d47953bdacd0a0e2a17bcb8cfc1efb015f52b40a9f09390f27ecbc6 fftw-libs-3.3.8-12.el9.i686.rpm cdc05bb0c089fdf43167fd04636d00f241f2e87ae27734d1f8d98afe43800519 fftw-libs-3.3.8-12.el9.x86_64.rpm 2f84faa5aafca04d4a3833ff201e5212d9ba03366a343c242f2779d6a906a8e8 fftw-libs-double-3.3.8-12.el9.i686.rpm ff634ae36b5a85c7fbedb07b1753db9a2d431c9065654213e533c6b7bf0ac65b fftw-libs-double-3.3.8-12.el9.x86_64.rpm f2abe9068f5662f29fd5bdabea1189154519f4bd926d6103a590f1fcce9ab249 fftw-libs-long-3.3.8-12.el9.i686.rpm 21c699b766311aef915ed641d29fb6726f865b3f76f516f59e59aae8daf0ab72 fftw-libs-long-3.3.8-12.el9.x86_64.rpm 8bf5ec47fdd06e32574813af31c7a279b60ffbfce8b57b0e65aa3e7db845a582 fftw-libs-quad-3.3.8-12.el9.i686.rpm 97ac3c93517c4f8a17a76e68ff586bbbf589942b5c3e2bb37dc5587a616b555b fftw-libs-quad-3.3.8-12.el9.x86_64.rpm cdb5f2159787bb36f0ae9f4c6c7bb3f2847f37986496920914f346fced958903 fftw-libs-single-3.3.8-12.el9.i686.rpm 6eeed678747c0122928b8046ede45388ba88077c27b949a98321176ee1f1e20b fftw-libs-single-3.3.8-12.el9.x86_64.rpm eeb531a232788956f7e8be19fc4e1fddea929cfeb470b533ad89dcc79874578d fftw-static-3.3.8-12.el9.i686.rpm 23fe76ecad1ca04517f3c94609a8d09f7fc2ddc5f3e855bc127e396c4cd7e1c1 fftw-static-3.3.8-12.el9.x86_64.rpm bdc8eaeca6d1f4e541316cef152f5492a51937d5e0c9b5426a313703aefb120d RLBA-2022:2820 new packages: freeglut Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for freeglut. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms freeglut-3.2.1-9.el9.i686.rpm 323b5e56cc72d0c9f83df1e64f1ef86c18a4f5566e8b2011213a7f93f81026ec freeglut-3.2.1-9.el9.x86_64.rpm 401261f14c32a69cf59b80ef5d6288f2a78a96830f7de1eb5d0ea7b15043c812 RLBA-2022:2821 new packages: fribidi Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fribidi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fribidi-1.0.10-6.el9.2.i686.rpm 34e056cbd3e37b9cbd1da8430012d747b45d0eceaf9648f2cb507c6527a1539c fribidi-1.0.10-6.el9.2.x86_64.rpm da453272ba50af82b42370ab516b4de94977072a4069f657c84e5c357d572bc5 fribidi-devel-1.0.10-6.el9.2.i686.rpm 223dcd2aea91860af3b6e68ec99631a3bce23a1c4c752296e6dc2af0b3f16870 fribidi-devel-1.0.10-6.el9.2.x86_64.rpm 4a6b9992cc89bc774d8141080df63af1516eefcdfe6450ec85da36fd47e3e51f RLBA-2022:2828 new packages: gdk-pixbuf2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gdk-pixbuf2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gdk-pixbuf2-2.42.6-2.el9.i686.rpm 1f821cf3440c3dbd0921eaaf1d78600884768b143c19799cccc9d08f66c12fa9 gdk-pixbuf2-2.42.6-2.el9.x86_64.rpm c49e2787cb1125c68ada0d454294b784eafcc7f0c5f2bde350a8aa5e4c06fff7 gdk-pixbuf2-devel-2.42.6-2.el9.i686.rpm a8c89b82c1b36f1d4e916057c7d48ba6d0d4897f63e6de1d56dd4f055a2284fd gdk-pixbuf2-devel-2.42.6-2.el9.x86_64.rpm 9175e8153149bc62821444f8b4238668f7dce9336663a05c52366ed0295845f5 gdk-pixbuf2-modules-2.42.6-2.el9.i686.rpm 8b7b6c33ff5d89e6d640955ff597615ec46c0bec82a2ab4d2977a2a812ee5c31 gdk-pixbuf2-modules-2.42.6-2.el9.x86_64.rpm 708eeff086a38b98320d9e64a58d4f66514d38c504e59b52a12640ed5e3f2b71 RLBA-2022:2835 new packages: git Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for git. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms git-2.31.1-2.el9.2.x86_64.rpm 92e2638e66d5251fb60041118ddef480cad39cf8a63c2cd74c6178f855b70793 git-all-2.31.1-2.el9.2.noarch.rpm d72122ad692b5aa2e211fd4f967963a090705c0b2aa732e62f258d59a83a29d5 git-core-2.31.1-2.el9.2.x86_64.rpm f0cf85dc06e6a011d1260a49eb0413186a21b10eb3994d0d6f7be1557ec03d3a git-core-doc-2.31.1-2.el9.2.noarch.rpm 00661514e7725bf4c3aa4f6eb9320afa68fc0f5b6696b9aa2c91c71f350098bf git-credential-libsecret-2.31.1-2.el9.2.x86_64.rpm 44ad06011dae10d2d0a9bdd499925bde235c8f747e3815709f6a28caa0dd5067 git-daemon-2.31.1-2.el9.2.x86_64.rpm 2f9182b76717a630d914080e34cbcfa636b66e926500500f869c6550381ed1dd git-email-2.31.1-2.el9.2.noarch.rpm bd4b553254ee70914e3503d32af1fb6d5f9787fb8142092e02b415c152b1fdd0 git-gui-2.31.1-2.el9.2.noarch.rpm 2c5741b7bb2abfb1f70b0b4c6917af6ff128dfb4a0c06aaec63e1a512dcb5cb7 git-instaweb-2.31.1-2.el9.2.noarch.rpm 890c167d4cb6f097094e709bbc20c78a0feb5da712cdbd059a4ed4d99dd01b95 gitk-2.31.1-2.el9.2.noarch.rpm f92063b5fa6b5af42aee0aff0546f1d6ecffe07447855c62b5e15b43295bd920 git-subtree-2.31.1-2.el9.2.x86_64.rpm 758b315dc0ee1f620d5aa26a018ee64fa8a008989424fe80a953fe10ae0c7e41 git-svn-2.31.1-2.el9.2.noarch.rpm 09d939d6c20a4125e3c58b57ef501f30592b50957adbc4cc4d17d1db92393f4e gitweb-2.31.1-2.el9.2.noarch.rpm 6a3afef85437a58ecaaca470c69de3641c40318b175dd612ebc2b210493e3268 perl-Git-2.31.1-2.el9.2.noarch.rpm 29bea815d1845882343874a2772945877209a4f17634f5dfc3723872f9dcf57b perl-Git-SVN-2.31.1-2.el9.2.noarch.rpm dbe6a04aec1b67299448716cc566ac8f66f513415991b1411649bce667b0b3a1 RLBA-2022:2836 new packages: git-lfs Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for git-lfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms git-lfs-2.13.3-5.el9_0.x86_64.rpm 63cf1802904a33fc7648d6348b4ad13b16f614bf07bbca937c524c9204928ba0 RLBA-2022:2853 new packages: gnome-keyring Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-keyring. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-keyring-40.0-3.el9.x86_64.rpm 9d0f45f353391acca405b382844e5cb5bf296a3012f893da5eae12b7590664af gnome-keyring-pam-40.0-3.el9.x86_64.rpm 00933fa1c62c7dd9bb840ffb45fc952366bf2ff6e2f86b3f7295e34b3f2d3e1a RLBA-2022:2854 new packages: gnome-kiosk Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-kiosk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-kiosk-40.0-4.el9_0.1.0.1.x86_64.rpm 3b5fe97407268d86c0090601c0f86ce2e2ca4a6b8268fa0985430145e1e13948 RLBA-2022:2855 new packages: gnome-logs Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-logs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-logs-3.36.0-6.el9.x86_64.rpm 688fe03b5fb957f9f5ea67b848cfcab2c63534d96a6b47f776df8c609ed320e5 RLBA-2022:2857 new packages: gnome-online-accounts Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-online-accounts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-online-accounts-3.40.0-2.el9.i686.rpm 33b9bf8ef37add4b3bf9944bd20a70c57d9f57b3d819370a6b8b82ef50352b7b gnome-online-accounts-3.40.0-2.el9.x86_64.rpm 964dcbe239ef892246568ca063ef610a88fb2c9b386d604810d79af1aaa7fca3 gnome-online-accounts-devel-3.40.0-2.el9.i686.rpm 6ea4d506ffa66474522091cf9f72f8d74e1b02d184ab686aeadfb105ff0ba1d7 gnome-online-accounts-devel-3.40.0-2.el9.x86_64.rpm 4141e75f821415d728058027f3e13cb6997ea4e33b3a18c34ce43e875de693de RLBA-2022:2868 new packages: google-guice Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for google-guice. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms google-guice-4.2.3-8.el9.noarch.rpm 227b36966c2d5f5bb32099845b30eaf4d7efbe1e6c0c7646447b09e911de9f78 RLBA-2022:2869 new packages: google-noto-cjk-fonts Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for google-noto-cjk-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms google-noto-cjk-fonts-common-20201206-4.el9.noarch.rpm 77e6ccf7598f49e26fad88fe958204f63afb68747bb8a8268ef5ebe7433eb463 google-noto-sans-cjk-ttc-fonts-20201206-4.el9.noarch.rpm 5684559192ca1ce0c04c74f24bea09734b634370ccc16205f6cdb24adf5b3caf google-noto-serif-cjk-ttc-fonts-20201206-4.el9.noarch.rpm be6aa71a448e9074af2651ab4e8ab890a6d3d623c49b9477e17fbf03f7591850 RLBA-2022:2870 new packages: google-noto-emoji-fonts Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for google-noto-emoji-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms google-noto-emoji-color-fonts-20200916-4.el9.noarch.rpm 2037b162cb3560d93289fa41d45af22afc6370183def183fd1932a433ac14625 google-noto-emoji-fonts-20200916-4.el9.noarch.rpm 8e65582822fcd3933a3dd3d1b476ac44edab76d0823bd45fdafc95bc531a9cbe RLBA-2022:2881 new packages: gstreamer1 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gstreamer1. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gstreamer1-1.18.4-4.el9.i686.rpm 8712974a333df308cc1ff8b86cbbc17c0c9c7d16fbdefdd2d8daf285ce7ff084 gstreamer1-1.18.4-4.el9.x86_64.rpm 1f42c80d0c92269ab5d21f36bf4929067ffa160e601bf8338dcc4cf9676704f5 gstreamer1-devel-1.18.4-4.el9.i686.rpm dc7ca6cce3528a206d2d3c61213a8266c51ccb345102f14aafe80d8e4f69ba03 gstreamer1-devel-1.18.4-4.el9.x86_64.rpm 09542d576034247bc7dfa2c35c594dc252191c0c743c80a86ab710ce8e4c6679 RLBA-2022:2882 new packages: gstreamer1-plugins-bad-free Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gstreamer1-plugins-bad-free. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gstreamer1-plugins-bad-free-1.18.4-5.el9.i686.rpm 85265e248cbc46f1a417b19608d070396598de4c7b196a7e43466a2c6e66b75a gstreamer1-plugins-bad-free-1.18.4-5.el9.x86_64.rpm 9e9563da7d22b5944b83e33ca46352b7904a900fd6b94401ba5118d4b2e41823 RLBA-2022:2883 new packages: gstreamer1-plugins-good Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gstreamer1-plugins-good. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gstreamer1-plugins-good-1.18.4-5.el9.i686.rpm dc3c2e83c583937a399043bbb255ae3f8b9a1b15a2eac6be16d99c04ce4b34a0 gstreamer1-plugins-good-1.18.4-5.el9.x86_64.rpm ac3ed569780c6d98d0af08cc74f11869ea2dc680268783022a3abbf3c803ecd1 gstreamer1-plugins-good-gtk-1.18.4-5.el9.i686.rpm 2c4039d6d99f9cf631fbec97f0a0b02cfcc4a90e17755f40c8926eb0af0e42bb gstreamer1-plugins-good-gtk-1.18.4-5.el9.x86_64.rpm 1cc4571c2a3b86f158b82740ff72fa84a2bb58da4244001aeefc2eabb4265c13 RLBA-2022:2884 new packages: gstreamer1-plugins-ugly-free Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gstreamer1-plugins-ugly-free. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gstreamer1-plugins-ugly-free-1.18.4-3.el9.i686.rpm 02caa0fe5a4f3e05892c14a25f817588e34bf57fe90c38f46b6c347685f9c8b9 gstreamer1-plugins-ugly-free-1.18.4-3.el9.x86_64.rpm 9c2424fa970f3f8784edf6be058a403d75d5e74d02e949cc09edcb275308357d RLBA-2022:2886 new packages: gtksourceview4 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gtksourceview4. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gtksourceview4-4.8.1-3.el9.i686.rpm 37e80b2c99ebd7fe2aecfde032d4a46c43f156dce88e63d1773ea6efc2d1dce7 gtksourceview4-4.8.1-3.el9.x86_64.rpm d08ef82031b8dfa8a8d047e20656819c1964188b515a117d2c76ee64309cd907 RLBA-2022:2887 new packages: guava Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for guava. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms guava-30.1-5.el9.noarch.rpm 219085b48874b4ec87431af3388cb61a9ca40dd6eab82e590b37d8b91d37c285 RLBA-2022:2891 new packages: hamcrest Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hamcrest. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hamcrest-2.2-7.el9.noarch.rpm df9f44dcf80056602fc9555da3d4b098ab33e407a36901f472e89f9f4a34b2c5 RLBA-2022:2900 new packages: httpcomponents-client Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for httpcomponents-client. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms httpcomponents-client-4.5.13-2.el9.noarch.rpm aa9bd4932146ffdcce0042433570a1a9308419488f43d8ec12040cb1110ff7a8 RLBA-2022:2901 new packages: httpcomponents-core Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for httpcomponents-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms httpcomponents-core-4.4.13-6.el9.noarch.rpm 6a5be7b8a5732e3a9da091b4be0ee6cc6de95d3129df00643c9c7204bf63b111 RLBA-2022:3063 new packages: ibus-hangul Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ibus-hangul. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ibus-hangul-1.5.4-7.el9.x86_64.rpm 31bcd082d993cb409cdc13d552a2dee47eaf7e365f62a5955c68156e77613868 RLBA-2022:3074 new packages: iperf3 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iperf3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms iperf3-3.9-9.el9.i686.rpm 45339f8aae668338987f12c480c270708b4f1aee3530aee753268451e2f54cc7 iperf3-3.9-9.el9.x86_64.rpm aa1f19863a7b9f94a97eda4d8d55ab4e914f519ad109802ae42962eecc9bd9cd RLBA-2022:3080 new packages: jackson-annotations Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jackson-annotations. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pki-jackson-annotations-2.11.4-6.el9.noarch.rpm 662d7fe507e8a64eade7537774cc99fd6bcf6be71d4e6dfe43d0cc1b69268a46 RLBA-2022:3081 new packages: jackson-core Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jackson-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pki-jackson-core-2.11.4-6.el9.noarch.rpm 66c0b0d69ea90a1b91d53d00d7a22abe42a9fb404c2f3f314e95ee9847cebbb9 RLBA-2022:3082 new packages: jackson-databind Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jackson-databind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pki-jackson-databind-2.11.4-6.el9.noarch.rpm f69b9e4a0c7ceaf8dee7a3bae27921bf79a1d137c4bbd7eb8ada3823f3190627 RLBA-2022:3083 new packages: jackson-jaxrs-providers Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jackson-jaxrs-providers. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pki-jackson-jaxrs-json-provider-2.11.4-7.el9.noarch.rpm 77f9dd898572ff59bb1eba50a7c93d45763dd42588d48fc84608726044f1d1b0 pki-jackson-jaxrs-providers-2.11.4-7.el9.noarch.rpm b858f61f38495669ffe780b50150ec8b13c071c622a157705bd4edb1b3beb1ae RLBA-2022:3084 new packages: jakarta-activation Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jakarta-activation. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jakarta-activation-1.2.2-5.el9.noarch.rpm dfaf539666f4713dafdc08c7edfcb410bf7f811293bb5e262eaa9a0d4874ed4e RLBA-2022:3085 new packages: jakarta-annotations Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jakarta-annotations. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jakarta-annotations-1.3.5-12.el9.noarch.rpm a7f70d6dfdb497888d71179e7c0a723c4654f76acf7712956d8412c550ddde62 RLBA-2022:3086 new packages: jakarta-mail Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jakarta-mail. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jakarta-mail-1.6.5-5.el9.noarch.rpm 5103d1786163af1b0f7757ae9e7274a896f83f95ee2d343ae84c53ec9ad527d5 RLBA-2022:3087 new packages: jakarta-oro Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jakarta-oro. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jakarta-oro-2.0.8-34.el9.noarch.rpm 8704e29366500c7dfcf348a6a0780a668a7c8646d22f078b80d853199dc32ea5 RLBA-2022:3088 new packages: jansi Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jansi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jansi-2.3.3-5.el9.x86_64.rpm 7b9d644b0ad13aa9c0f7708124e5af593693913e54e605512f58d71459a5d0b5 RLBA-2022:3091 new packages: jbig2dec Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jbig2dec. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jbig2dec-libs-0.19-6.el9.i686.rpm 7de44052a2b5e537ecd15df068f89ad9264df5b0f292b5007be82d8a3a104751 jbig2dec-libs-0.19-6.el9.x86_64.rpm 8d8ec9c50784f2b98a9ac2f0d120b116a388c852933b41d34a096bd7e49d5f0f RLBA-2022:3097 new packages: jdepend Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jdepend. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jdepend-2.9.1-28.el9.noarch.rpm f7577a1506f4f0232dc6ffcb35902f1f53a5852b3e894c7e2e4b89f2db132248 RLBA-2022:3099 new packages: jna Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jna. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jna-5.6.0-6.el9.x86_64.rpm 5de6706a2bc1154dd3571a92e295b3e4237e51903a06df5447ec524a4607e40a jna-contrib-5.6.0-6.el9.noarch.rpm 96f77846701b3b6cb271a77f4c719511f43934c99040518b1e98def7f15f8714 RLBA-2022:3101 new packages: jose Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jose. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jose-11-3.el9.x86_64.rpm 405cd1c00aecd1d9bb7ca085e4af0bf4023725754df9a6096df36ea086e98a8b libjose-11-3.el9.i686.rpm 4b0adc4191384d191fb8f03726574460445a54a1c08fdc2c32f931d9bc274518 libjose-11-3.el9.x86_64.rpm 28c04463df72fc361a1f83d9ed5ec5fed641df902847b7e5039ebfbcfa6e135d RLBA-2022:3102 new packages: jsch Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jsch. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jsch-0.1.55-5.el9.noarch.rpm 123a345d955d756e5ff7d599bb983ff955bb2d0ee60cc10344040790a843362e RLBA-2022:3103 new packages: jsoup Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jsoup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jsoup-1.13.1-9.el9.noarch.rpm 75e744b58b0b413fb4f05ca0aba036e416ddd9c5ec1579a928ed477661e455bb RLBA-2022:3104 new packages: jsr-305 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jsr-305. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jsr-305-3.0.2-5.el9.noarch.rpm 7199bc454e427504c7084b5c75529b6150f1e4cab9fc7e4e2621ce8c7de1a6bc RLBA-2022:3106 new packages: junit Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for junit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms junit-4.13.1-5.el9.noarch.rpm 2a5753590012ed5d6b51f8cef92c821b34fa316695f7a710f5d057d42b745e17 RLBA-2022:3107 new packages: junit5 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for junit5. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms junit5-5.7.1-5.el9.noarch.rpm 3228a66f87bfc070cacfe4985abefc458d84bffb6686bf0ecdc2d7178a955f92 RLBA-2022:3108 new packages: jzlib Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jzlib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jzlib-1.1.3-19.el9.noarch.rpm a50e904363f5577889b04605528cc9bf12adf554d669e077909c336bda94f7f8 RLBA-2022:3110 new packages: kasumi Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for kasumi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms kasumi-common-2.5-36.el9.noarch.rpm 76d48f5f5b94470188d190ed35c0c4e5fff81e2e848abd41b198f463f5a7efb6 kasumi-unicode-2.5-36.el9.x86_64.rpm b1330860800ba7cf3953360189482c1ece37b8f76fce4709013ee6a03413c7fa RLBA-2022:3111 new packages: keepalived Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for keepalived. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms keepalived-2.2.4-2.el9.x86_64.rpm 3b7219363a88cc76fd7e985df0c88c7e0a4fade103b357f7752e969832c558da RLBA-2022:3113 new packages: keycloak-httpd-client-install Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for keycloak-httpd-client-install. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms keycloak-httpd-client-install-1.1-10.el9.noarch.rpm dc472168d12c000d18a7f680047f8be1a5dafb88eca1dcec8569daa1ba97af66 python3-keycloak-httpd-client-install-1.1-10.el9.noarch.rpm d90658e7cb4110d8a43bc32db1d16be5a1e31fb6caff3ab993bf887d308b5a66 RLBA-2022:3115 new packages: ksh Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ksh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ksh-1.0.0~beta.1-2.el9.x86_64.rpm 3ce230e14c4ed81c488c76be78b90603d4441fafe173a1062828c53084222896 RLBA-2022:3119 new packages: lapack Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lapack. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms blas-3.9.0-8.el9.i686.rpm ebad46f4e2fad45e534ba6bbc9df153d6842b9c169f4f6c0f978bddfbb498f13 blas-3.9.0-8.el9.x86_64.rpm 851f8672e184a9559b9eac883f9d313effc98b229b5c6998f08fb95af576ebbd lapack-3.9.0-8.el9.i686.rpm 7dfc8c6a5d60dfc23303e3dfd75e97fd1882106bfc3d5cc4aa0458e6d02484d6 lapack-3.9.0-8.el9.x86_64.rpm 1a536d4d6cb79bd3f8aa0d31d941fc58aac684438279fcdf27fce903ba9d1357 RLBA-2022:3120 new packages: lasso Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lasso. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lasso-2.7.0-8.el9.i686.rpm b934f1997ec363f8e2956bafb2b6d10f9fc121f9e0d2ca4944fe19bc21e0c434 lasso-2.7.0-8.el9.x86_64.rpm 7eeeb43b7b5d00e565534830cefa11aa3cf0e787a017dd0a9ab23c9f7c236906 RLBA-2022:3763 new packages: scapy Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scapy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-scapy-2.4.4-5.el9.noarch.rpm ed652a097831710be2b84c850661f68e28ed8e82a27e6f24602e205ffe711252 RLBA-2022:3764 new packages: scl-utils Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scl-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms scl-utils-2.0.3-2.el9.x86_64.rpm 7d756665c09b0af15269e4688ef3cc2ab9250b4297233dd9fe37419af051a3d0 scl-utils-build-2.0.3-2.el9.x86_64.rpm 34a4c60c7c5c5b88645247d869455f2c2d53769a75a84fb66cee9f6144e55acd RLBA-2022:3767 new packages: sendmail Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sendmail. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sendmail-8.16.1-10.el9.x86_64.rpm 0c6a02ca170b3c6d9e39f645df27bbe91fff20c763eb1fa810c9f06fb176d3f2 sendmail-cf-8.16.1-10.el9.noarch.rpm d9d513de6a486ebd8e39241d43908f99e359bbcdb970a04cea98cb3b06124404 sendmail-doc-8.16.1-10.el9.noarch.rpm c9eccaf1122d9d221d3d3e012abf1e7f034dfb7e6b3901b82e1cd15de2039131 RLBA-2022:3154 new packages: libappstream-glib Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libappstream-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libappstream-glib-0.7.18-4.el9.i686.rpm 5282207860b80ce69969b865e94693ee353c33beabb31f7f19c32aa36d33c33c libappstream-glib-0.7.18-4.el9.x86_64.rpm 7599776277f865bf7778711d3d62185d42309847b94801c74a8623ebf0ae526e RLBA-2022:3158 new packages: libbytesize Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libbytesize. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libbytesize-2.5-3.el9.i686.rpm e6ab43d53294c1dfeea578058c326a337922e8bfe2cf300f40de732a71d318aa libbytesize-2.5-3.el9.x86_64.rpm 2f33d75361f43d90983fcccff3c972167efa4906900121ad885e7c86cdc7f5fa python3-bytesize-2.5-3.el9.x86_64.rpm 039bdcd5a20ac8721beab51a51b10dc1c5f4ee9196c205279bd49b65095b9487 RLBA-2022:3159 new packages: libcanberra Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libcanberra. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libcanberra-0.30-26.el9.i686.rpm 36fa6a0f18f6ab7b146bb9e1a6c4f6777ce12a2dddab1655feea509d9de93750 libcanberra-0.30-26.el9.x86_64.rpm c23330111faf4001c75b9abcc529199abd7c29d931fa1545ab278333a6d2773e libcanberra-devel-0.30-26.el9.i686.rpm 0d27fd277ac91b1c57d54615ca6eee190d507d2e8e2c1c1d4d4616cc3167cf1b libcanberra-devel-0.30-26.el9.x86_64.rpm 0a95f8ae61c6e5a3177d56ab95b0e6b6416b4d69e8a1ebe1af8ed622108391e6 libcanberra-gtk2-0.30-26.el9.i686.rpm 7087b4014a50edd82eac0efe6764c17a55f76081924fb01ad91df02d98ea79bd libcanberra-gtk2-0.30-26.el9.x86_64.rpm ef64949a88b809cbbc7281117938b5ccc5c8ae0ebc10b44be59f3aef50d63713 libcanberra-gtk3-0.30-26.el9.i686.rpm 62a00913d58ebca5c05319c76c17089c03ae2f88e75a5624142578bc14383f70 libcanberra-gtk3-0.30-26.el9.x86_64.rpm ccdd9f877f9ccd1d2854cb17d3a215c22547aed31f1af788a2d47847ebdcdb79 RLBA-2022:3173 new packages: liberation-fonts Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for liberation-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms liberation-fonts-2.1.3-4.el9.noarch.rpm 7d7ba08fa5bc1e356c8039fb512953ef13d943a984268b3eb2eaa2c6bad83862 liberation-fonts-common-2.1.3-4.el9.noarch.rpm 14af23e3af64c7548ef01e923484512a471bf4df80ae022c7967180519d12ba7 liberation-mono-fonts-2.1.3-4.el9.noarch.rpm dd7103b13739d6c67ad6b79bac32971794ac96171fb21da541821e37fa59cc03 liberation-sans-fonts-2.1.3-4.el9.noarch.rpm cf9cc9c939c501a69079a87b872a33ab34b9a9e49c4118856dc4a30bc1f80f49 liberation-serif-fonts-2.1.3-4.el9.noarch.rpm 6148528532a0dcf81bfe74aa92b7b9ed29d8c9a052f0964083796cf4735c5602 RLBA-2022:3180 new packages: libfastjson Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libfastjson. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libfastjson-0.99.9-3.el9.i686.rpm 25b6c34763c7134e9c6d5154c2f53aae041fd319fc1aa21be52e2b456feb764a libfastjson-0.99.9-3.el9.x86_64.rpm ce22f4ed04a47249099a2af7bba764e0f4b93c62798e27f6dd936b1e6c964c62 RLBA-2022:3184 new packages: libfprint Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libfprint. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libfprint-1.94.0-3.el9.i686.rpm 604d53446f84e7250328fc9ff7d0c31ea796fb5e8e170eab3e6bd50abd3fab7f libfprint-1.94.0-3.el9.x86_64.rpm 0646a04de10e47e9271fbc6455cbca18c6e92a81b6af96c7aeff84e235ae0173 RLBA-2022:3200 new packages: libiptcdata Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libiptcdata. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libiptcdata-1.0.5-9.el9.i686.rpm fe281a4be45e8dc0327d42aedacc9eb6ce87d32237561c0993545cac45686de1 libiptcdata-1.0.5-9.el9.x86_64.rpm 15e54296720aabbd8ee28980061beed948f30b616a374015749bfb4f49455764 RLBA-2022:3206 new packages: liblockfile Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for liblockfile. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms liblockfile-1.14-9.el9.i686.rpm 9d9ec19c8803b3081d64ce74062a2c49eb9431a1155daafc30c47bc7897f167b liblockfile-1.14-9.el9.x86_64.rpm 5de17271fe6db36e5a5ac7110479196946e6536a9cdf5d09a1d7482cb3c3c636 RLBA-2022:3207 new packages: liblognorm Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for liblognorm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms liblognorm-2.0.6-4.el9.i686.rpm c09b6a1800adc53732bfdb280a914e04866b1449eb323741359be1c089c1502e liblognorm-2.0.6-4.el9.x86_64.rpm 64a9e05963063dcb3b49731ae08021d4bd4485eff394cce5d305c5939b839977 liblognorm-doc-2.0.6-4.el9.x86_64.rpm a6a435dcc7fba0fe999978400a72d4e054950db26f316fce23387136b50c217f RLBA-2022:3208 new packages: liblouis Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for liblouis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms liblouis-3.16.1-4.el9.i686.rpm 606ba88939bbb6b3ec37968acdb2e71533a7bc9bdfecb0c6406067c3ddb2090a liblouis-3.16.1-4.el9.x86_64.rpm aec3d40939ac98a69c80509d5a299cba61d96c743960b03126399f8430798b17 python3-louis-3.16.1-4.el9.noarch.rpm a4945addf0b5a6369ab3e741ae4ed598caa67384a88950a9edea2bef94dab160 RLBA-2022:3211 new packages: libmaxminddb Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libmaxminddb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libmaxminddb-1.5.2-3.el9.i686.rpm 3c0acb144438dd4a3251ba9bf26499510bc5421b05888cee0128a910c18180a8 libmaxminddb-1.5.2-3.el9.x86_64.rpm a42f8a9f73ecf3ca7fb709e72dd4bce9213d34027db57f8d27dcf512e8bccbfc RLBA-2022:3213 new packages: libmicrohttpd Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libmicrohttpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libmicrohttpd-0.9.72-4.el9.i686.rpm 38e34b52510e5c2b9cab48908f27f210c72c96b4fad418db928594129b3ca708 libmicrohttpd-0.9.72-4.el9.x86_64.rpm 12d851dd92e0653994dbc906f4a8b4f51e1b2addb7d8e3ad1000d5c334946fba RLBA-2022:3215 new packages: libmpeg2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libmpeg2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libmpeg2-0.5.1-24.el9.i686.rpm 650b842357176930da5ef81d7cf9d6c0a19298d5a1cc1d6abf9d3c6efbf45889 libmpeg2-0.5.1-24.el9.x86_64.rpm 54145513ea13f614c5b1afb5c98aa565d066891704aeaad13d5f1c06c3a367cb RLBA-2022:3218 new packages: libnet Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnet. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libnet-1.2-6.el9.i686.rpm 88c9b8668fcc6fbbbc7d6d6cd8ed9ee35862748fd8df48c211741545e98d015e libnet-1.2-6.el9.x86_64.rpm 3ee2d74468370c1bcd5c5107dbedf048db66f8b59830c88fe86755b8c4a2c998 RLBA-2022:3232 new packages: libpfm Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libpfm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libpfm-4.11.0-6.el9.i686.rpm 1adff96fd145e2db14921a6501275c421851c3b5812dada6cb586aa4009dc6f5 libpfm-4.11.0-6.el9.x86_64.rpm 988348915075d1eb3b2d7f27091260f13d1a14b268abe7d23fec0a901742c32a libpfm-devel-4.11.0-6.el9.i686.rpm bdea2b369a95285f968a2a554519505cf822130b6e858f0aa1bffc52a9066c73 libpfm-devel-4.11.0-6.el9.x86_64.rpm 8924ecef7341192116bb8a113dc7a5b2bbda9a31ac4c60e5a6c472e0d4af7947 RLBA-2022:3237 new packages: librabbitmq Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for librabbitmq. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms librabbitmq-0.11.0-5.el9.i686.rpm 3192b3e578a9ef68a57ca3756867054a3e412dc8aacc05afe99ca3775f3a1124 librabbitmq-0.11.0-5.el9.x86_64.rpm 5dd63c92bf9cd9ffbb1ef0c391ac3f8ef2cac279867b222523fe10754e4eb966 librabbitmq-tools-0.11.0-5.el9.x86_64.rpm 863da4b3ebe909be94de567ca549a11b55b238c99bdca527612eadcf0dc8ac7c RLBA-2022:3238 new packages: librelp Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for librelp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms librelp-1.10.0-4.el9.i686.rpm e7e6502880c5a56a9cd719597bd17a009479e770e588997041a5b635e827aaf3 librelp-1.10.0-4.el9.x86_64.rpm 634fc3d551060e09c87c2b8a7ed0cbe09eda683db669832ec27e8795f218a39e RLBA-2022:3242 new packages: librsvg2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for librsvg2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms librsvg2-2.50.7-1.el9.i686.rpm 28834770f52040b8f0a5aaf7ab7c7854f809b634c1489432224164c0e42e5493 librsvg2-2.50.7-1.el9.x86_64.rpm d507e190bcab36b3a224fa4efed7416fe6c65fad462f191d7855f2f24609794e librsvg2-devel-2.50.7-1.el9.i686.rpm bf4bb5ecc8b77a527e188a0f1f6ee43ef7254439949e8eb76e0d073758b649e7 librsvg2-devel-2.50.7-1.el9.x86_64.rpm 089de21919e73d223335f4dafeb4ea7a69cb7022cadf0eb6626e922322bbe244 librsvg2-tools-2.50.7-1.el9.x86_64.rpm 6fdb15ae0835a14d36d84699e2f86846f168d0d5b30cf6b656eeb4ce4f627b8d RLBA-2022:3249 new packages: libsoup Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsoup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libsoup-2.72.0-8.el9.i686.rpm 62f74b93cf517bb5c22fa32070a96db967c7cc8841cad28033fffadb4be36ec4 libsoup-2.72.0-8.el9.x86_64.rpm 29de6bc5022554f6554629c453fd8f021248c5a134a2147310c8facb967caef1 libsoup-devel-2.72.0-8.el9.i686.rpm 4957447415f5cdcb8360352e45f1f0370735d3f71b66d0583d01fff3ca2919ef libsoup-devel-2.72.0-8.el9.x86_64.rpm bc56983bc66b6aa4f67e482a5134c0e02619c32f7d0c8d82f6ea33dd5ae37966 RLBA-2022:3251 new packages: libsrtp Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsrtp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libsrtp-2.3.0-7.el9.i686.rpm 5e9ff370b92cb19c5a32d8f45829aa00b9af96c653641a53ae4fda290d498cf3 libsrtp-2.3.0-7.el9.x86_64.rpm a6b7bbf89719c0062d1342bd726417577ec259f10e510f13d4fb5f6ad60acfca RLBA-2022:3258 new packages: liburing Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for liburing. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms liburing-0.7-7.el9.i686.rpm bb52884e5a7e7a10ef273cad1bd78a0eeccca55782e3f5d27fabca844477605e liburing-0.7-7.el9.x86_64.rpm fa78ff026c3f74fddb55dcc7a56325390f7f4dd9d4e8b99786d35de47f1bfdf2 RLBA-2022:3260 new packages: libvdpau Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvdpau. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libvdpau-1.4-6.el9.i686.rpm 68e9094c677d1e71399211fb37155a1af49d3eae73b48f1b3359892b5eee7fd4 libvdpau-1.4-6.el9.x86_64.rpm 2d7d51005a7a087334a6faa61462e7715cbe18a87832f8ebaa7febcac08b3cdc libvdpau-trace-1.4-6.el9.i686.rpm 573219ba4515664c75151a7e5a3e53fe60142d1ddbd789f5f8e577052e3702c1 libvdpau-trace-1.4-6.el9.x86_64.rpm f78ef13ee698bdbd9dfd66ddf390cc1e6708dcea4b2b63ccc5758e992926b01e RLBA-2022:3267 new packages: libvpx Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvpx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libvpx-1.9.0-5.el9.i686.rpm aa9f90478f5d6030cabe42290bf9f49e5d105ab0cb76dde262df5bcc2a68c7b1 libvpx-1.9.0-5.el9.x86_64.rpm c622cd5eaaec519f1c49e197259d54d20076536bf31d208bc50325bdaf298723 RLBA-2022:3268 new packages: libwebp Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libwebp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libwebp-1.2.0-3.el9.i686.rpm 3f5170905cb36ae60209b56ef69238af3bed0fd910f87ddc0aa76d3aa0374964 libwebp-1.2.0-3.el9.x86_64.rpm 3d19d8c911cfaa907698f9d4bedf9aa22269a67fb707fe4148b2e4261244235e libwebp-devel-1.2.0-3.el9.i686.rpm 349098e5e9957c5401f89de303f362ab0133c6a7f00748d8daf83bc751f550fc libwebp-devel-1.2.0-3.el9.x86_64.rpm 65b8a68fbb345a96a17266e035261f01b9aaf38dd7e0a0c7710e82ad1bfe1caf RLBA-2022:3280 new packages: libzip Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libzip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libzip-1.7.3-7.el9.i686.rpm 9a208bf2a59163641eb32a444e6f679ce5cbed0f26877f598f3cf408aa0acca7 libzip-1.7.3-7.el9.x86_64.rpm 3c60ebff40aef76fdd88aa98aeafa39d037ca266f6318dc76d0adc52e9e73fa0 RLBA-2022:3285 new packages: lldpd Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lldpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lldpd-1.0.4-10.el9.i686.rpm 6b4e3f4c97f725e49770c04f11a0c4cab92a9b5ea1222a2f2b0131fe4b9ec99e lldpd-1.0.4-10.el9.x86_64.rpm d4d29cc1b54a7898578622b67ce3b1b08c70a3aa5741a71be0d6b1bf98379a88 RLBA-2022:3287 new packages: logwatch Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for logwatch. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms logwatch-7.5.5-4.el9.noarch.rpm e57f612dfe6ba6d0abf0c224279288ba05a7cfc37a8cce8257ad67d776a2c489 RLBA-2022:3312 new packages: maven-shared-utils Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for maven-shared-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms maven-shared-utils-3.3.4-2.el9.noarch.rpm 0a94272c449294555eae6fd085d5a8d5af746d8bd31069eda701c2556243e4e7 RLBA-2022:3313 new packages: maven-wagon Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for maven-wagon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms maven-wagon-3.4.2-6.el9.noarch.rpm da1f99fd64f685c69f3a8e7be5f8da0fbbcfcab1ff239e091349fc1913edf64b RLBA-2022:3315 new packages: mecab Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mecab. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mecab-0.996-3.el9.3.x86_64.rpm 62631d13849946a0b31605ff6b214de5cffb8f218cee25e652982e60066edb9f RLBA-2022:3325 new packages: mingw-srvany Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mingw-srvany. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mingw32-srvany-1.0-29.20210127git89f2162c.el9.noarch.rpm 969bf17d1ca59d9be2d6bef5f7e78220eda9e0bc915b92edba5cb7f60bdb06ad RLBA-2022:3332 new packages: mod_http2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_http2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_http2-1.15.19-2.el9.x86_64.rpm fd31034a7df3b458dcaa3a0eba86b80fd53dcbbce566587b2c51929bd39255ea RLBA-2022:3334 new packages: mod_jk Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_jk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_jk-1.2.48-22.el9.x86_64.rpm 97674abd7f01ea94cde6847f6793f591cd1780e24ef24b962dfabae94bc7e7ad RLBA-2022:3336 new packages: mod_md Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_md. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_md-2.4.0-3.el9.x86_64.rpm 0d9a0f4f5dd82929e8306be4be80765280e5ebe7c9c1ea7f8e05b4da7ebb7572 RLBA-2022:3337 new packages: mod_proxy_cluster Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_proxy_cluster. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_proxy_cluster-1.3.14-23.el9.x86_64.rpm 4602affdf3cc3e628482523eec14b94d46f823de8b723bf5896d4707a107ed8e RLBA-2022:3338 new packages: mod_security Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_security. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_security-2.9.3-12.el9.x86_64.rpm 17261bdc873959db7743d4890e03689ba318c541b7ee9b6d5d76da649f5fecc4 mod_security-mlogc-2.9.3-12.el9.x86_64.rpm f4fe13bc74055b4dbfd127b8c9fb378281601c5d02ba26c90da56bfa94abc39a RLBA-2022:3340 new packages: modulemd-tools Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for modulemd-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms modulemd-tools-0.9-3.el9.noarch.rpm 30c86ee4a454c2126f24dbc6ba8d5497f8a246d369520000b1f101a35ffcf1f2 RLBA-2022:3341 new packages: mpg123 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mpg123. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mpg123-1.26.2-5.el9.x86_64.rpm e13ca78b6d8fb99769efd2278f067f3a220fa75a642360d364a7b8a7e353a2c0 mpg123-libs-1.26.2-5.el9.i686.rpm 387fa6a59ee2a0907adbff5db5f35cc274db141225402208268edf7c53dbc1ad mpg123-libs-1.26.2-5.el9.x86_64.rpm ae5017ee654fefc2b93283e0cf40d33512992d3f2285c3a183be55fca1d847b4 mpg123-plugins-pulseaudio-1.26.2-5.el9.x86_64.rpm ffa9b74b8322132864728b547937f93898132f1e7aeb696227ca187bb78d266b RLBA-2022:3342 new packages: mrtg Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mrtg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mrtg-2.17.7-10.el9.x86_64.rpm 39d710e93487d6df6608978dd1aa49e3b97dbce6d2759afc8289453bb37971a7 RLBA-2022:3347 new packages: mvapich2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mvapich2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mvapich2-2.3.6-3.el9.i686.rpm 290f20ad060e46bb47908dadcac3165802d146da4b6dad56263d52334bfecd29 mvapich2-2.3.6-3.el9.x86_64.rpm d40244c339969261b3016e89a5bdaecaf54e620fc44c6014e2b658f8ef8af472 mvapich2-devel-2.3.6-3.el9.i686.rpm 73a5561960be21b4953bf40ff0d930d441c7e4ef51a3b8f4b1d53b95a7b37829 mvapich2-devel-2.3.6-3.el9.x86_64.rpm 03cb36382df386c5d40f8fddb9b252cd87ffd5675862131660041865f010241d mvapich2-doc-2.3.6-3.el9.noarch.rpm 26d068dc07b6831b9651445a2c3197565c4c64ad3eceaa3bfe4fb5908603d26f mvapich2-psm2-2.3.6-3.el9.x86_64.rpm ca36499080d6ae8032e76af3668d41813e03dd50194e1b98c2d66c77ae9e4332 RLBA-2022:3375 new packages: nmap Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nmap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nmap-7.91-10.el9.x86_64.rpm ee236ffca7659faeb51bd74ac7dc6667867a79b30c27b1344ccd7d96b6e83a1b nmap-ncat-7.91-10.el9.x86_64.rpm 68c404293d3a392dd0576d5f683c7448a912de26b6ba59900951308e8c308473 RLBA-2023:2514 sssd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sssd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sssd-idp-2.8.2-2.el9.x86_64.rpm 316b60f3bdd036694de3a0f2ea3b2afe956b3043d2d4c2e7f4f06237611038d7 RLBA-2022:3380 new packages: objectweb-asm Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for objectweb-asm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms objectweb-asm-9.1-5.el9.noarch.rpm 4dd93dcacd0a3f36b6f1191dc286780de798c2a0190a0cf769eed9bb12bf81fc RLBA-2022:3384 new packages: ongres-scram Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ongres-scram. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ongres-scram-1.0.0~beta.2-15.el9.noarch.rpm 67117ccb0bef7edf510d7dc808554ead8151a0a74e6f433e124c7c39e4c21580 ongres-scram-client-1.0.0~beta.2-15.el9.noarch.rpm ef4f44fc7846ce0792b62325340cfbaa205fb08577a0fac07a23c63fdba45dc9 RLBA-2022:3390 new packages: opendnssec Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for opendnssec. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms opendnssec-2.1.8-4.el9.x86_64.rpm 3cf3df63f0edfb5d0a091005cfe7d8b1f3c213181ef687313ac53fabd944f070 RLBA-2022:3391 new packages: openexr Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openexr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openexr-3.1.1-2.el9.x86_64.rpm cad2b18ef4e06fdc32c7d62aea55a161d5f989cc3a506e9fd0317a78ca76048d openexr-libs-3.1.1-2.el9.i686.rpm b95d50ff0fb0ff2061f17d1fbddfda9cbaafe6b99de1744f5b814aca1d4b1d35 openexr-libs-3.1.1-2.el9.x86_64.rpm 6b152c299a73ac7bd009eb1f709a72e416a36682d2d4b115ffa4c834262477c9 RLBA-2022:3396 new packages: opentest4j Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for opentest4j. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms opentest4j-1.2.0-9.el9.noarch.rpm 2ac518475aeb4bd5d8aaf664cf53304169fa237a13271ebbd8d82f947a194876 RLBA-2022:3397 new packages: openwsman Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openwsman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libwsman1-2.6.8-22.el9.i686.rpm 4010ab11dd7b743bcf97e624813012d32ff2f27bde863ee228687595559417a7 libwsman1-2.6.8-22.el9.x86_64.rpm 2f30722870cccdb82b6449c9f7ce2626670a468925e602ecddb1c4414d4f7861 openwsman-server-2.6.8-22.el9.i686.rpm d91a049139bf23dcbf728f4a7fd7f3a1b99725cded1a1d7265ab0b3631ae024d openwsman-server-2.6.8-22.el9.x86_64.rpm 4f3da3696a5048e2d6f5f7c669ededd3e651b996f77df6dcc641b6e4f4c993f4 RLBA-2022:3399 new packages: orc Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for orc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms orc-0.4.31-6.el9.i686.rpm c7ee17dd26a7e08fe2a4aee71bde3310b61123d696161e8cd765b0e0c9625146 orc-0.4.31-6.el9.x86_64.rpm 576764e1949b329ca17ba895be5ddab29472fbfac8be45d16f20a9d595f0d8a8 orc-compiler-0.4.31-6.el9.x86_64.rpm 5a1a5c037aeb555cfe6c88f16a6cb237f04a0fe2c434e9b2b7833e7f855bbfd0 orc-devel-0.4.31-6.el9.i686.rpm 759527a00245e1642ab3abed06dbce368b1b0b0914707d8457adabead12642e0 orc-devel-0.4.31-6.el9.x86_64.rpm e447a415c6c395e88d9cfc4ce3ee88ad2298f82964a9d701c91811e97bec1732 RLBA-2022:3400 new packages: orca Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for orca. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms orca-40.0-3.el9.noarch.rpm 072db53cb31fe01840c4865c4cc4eb86259298c7ddd8fbcb91444149dbec6ed4 RLBA-2022:3401 new packages: osinfo-db-tools Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for osinfo-db-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms osinfo-db-tools-1.9.0-3.el9.x86_64.rpm ead1a0c072b15e08587f888395a77efd6e7e1e5864004be9ab294b16c3f1876f RLBA-2022:3407 new packages: pango Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pango. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pango-1.48.7-2.el9.i686.rpm fe231369b196617584dd72fdba18d992c31c45b5527b7e0096d5e2fa8f4297b7 pango-1.48.7-2.el9.x86_64.rpm befb665fe617febb70cefff6fa3313b9d7f87a7cf99e9ed067c7535c4aa9d558 pango-devel-1.48.7-2.el9.i686.rpm e93b3d14aa79b7cda01541aef433a655c116877a8e1418b2d23abe940627d935 pango-devel-1.48.7-2.el9.x86_64.rpm e7ad675e5684c63a943d6d7147c2abbcf399098788196eb19d7ebcf2b3ba00fb RLBA-2022:3417 new packages: perl Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-5.32.1-479.el9.x86_64.rpm e33ab1b77636e133143215f0c59d01007aa4ce99cb2f7ccdaa5a35aa44ac2315 perl-Attribute-Handlers-1.01-479.el9.noarch.rpm 1306819729e96e27da3c69160a9e383aa49431ca396669fb2219d68a694ad707 perl-AutoLoader-5.74-479.el9.noarch.rpm de126737f2568d7cc48ace946b5c5a8b00123ef1655a2ef3eabdc3931bd51a3e perl-AutoSplit-5.74-479.el9.noarch.rpm a9cdf12b568bbd2d05e0af8ef4a0f90d8b1b466a118d66c23784ce5495598354 perl-autouse-1.11-479.el9.noarch.rpm 379a9157fde71791fce35097fa0df9db038b071e67ac05a6e757a37b5e27ca2e perl-B-1.80-479.el9.x86_64.rpm 80504c6be273e46037d16ed933b61b97e776adfef2d43cac081b38505528bb17 perl-base-2.27-479.el9.noarch.rpm 617fc317493cf592d17b1d0f36f12f9160ca4510a2801b258d641e869abb2870 perl-Benchmark-1.23-479.el9.noarch.rpm c8a38526a3e5c84afbc241772985c64b68929b693282fcda826d5c6ff6ff6f3a perl-blib-1.07-479.el9.noarch.rpm f88b66ef6c64c9687754bbe918c68018667f78d2381bb7d633f0069955317337 perl-Class-Struct-0.66-479.el9.noarch.rpm 45770669108af7457ce79781831593f480acccf54478909e96d4c7ed0a80984a perl-Config-Extensions-0.03-479.el9.noarch.rpm 95e2e3d1c0914f34199e94ee50d7535a086f0feea1b1bd9134fd18acf9b5919b perl-DBM_Filter-0.06-479.el9.noarch.rpm fc369fa6a8ed44a3739b9236c2438f109e2b99d724b86412603cee5f8b9f7a72 perl-debugger-1.56-479.el9.noarch.rpm 22b3a23bd34da5736e371fc1ef97c852ccd641e8c570a8bffbc4141666f37823 perl-deprecate-0.04-479.el9.noarch.rpm f16ddedabfd6eb9f27212730cf7b64cc01a8d0156e465d87ee39983815888422 perl-devel-5.32.1-479.el9.i686.rpm 6d444ffce62549d805791f3fd4c8dcac98ff253cbfb97f4f526ad11002f813b4 perl-devel-5.32.1-479.el9.x86_64.rpm 52319d0bcf957455dfbf4bb1ba989d8ce1260a33ffad2b9fb459e4abbbca3a12 perl-Devel-Peek-1.28-479.el9.x86_64.rpm d0171e37d2da8004f50c84b23288432e36f888aeee733024cdc7fcacc2f9f139 perl-Devel-SelfStubber-1.06-479.el9.noarch.rpm 03da81dcad3d204013ee1b847531619aa900c1dece5846985e20dfd466b0d76b perl-diagnostics-1.37-479.el9.noarch.rpm 9a718213410853f9e6d915ff894650e6f5e286aaef39e246ab9cbb2c6b8647db perl-DirHandle-1.05-479.el9.noarch.rpm 1f990bc9f79235d1949d2ece7d1fe0bfd61862a564133785cbf6facec4e3e5ba perl-doc-5.32.1-479.el9.noarch.rpm a66f79d53538a2b34375e75b515ac62f7ad4d32e97a3a2e108a509ca0cdd21af perl-Dumpvalue-2.27-479.el9.noarch.rpm 6e824780bcedfa7cc8f25902581cb63b14af52a6459cc1c9b78575daca522378 perl-DynaLoader-1.47-479.el9.x86_64.rpm 7d67e9d680baeb6ccc7e265dca114ed00c1928a5b63989e480d859c77ecd1b39 perl-encoding-warnings-0.13-479.el9.noarch.rpm a5a1d52a3f0e6c090370c0d09c48de801390c67e85c17d886470c3b7731488bd perl-English-1.11-479.el9.noarch.rpm 6873fe92a079403ccaf19cf5b2d2fc653f7ca5104cf456265bc3d64899e6f157 perl-Errno-1.30-479.el9.x86_64.rpm 9294d0854d99c320d06255a4949a850d0e5d85739a83b946a0ea18c5af9b31a0 perl-ExtUtils-Constant-0.25-479.el9.noarch.rpm 80a14d83ffae2b23863c086cc9936b49e207197f499552126d6be72df595debb perl-ExtUtils-Embed-1.35-479.el9.noarch.rpm b48608ee1ed1488bf2fcfa65101f28152d7a0abce0c06cc34bb35fe4cf7c2f8f perl-ExtUtils-Miniperl-1.09-479.el9.noarch.rpm c53f4d9aab3c372097a192645d0f0d483607139be895c1c9d6f0ae10dea47794 perl-Fcntl-1.13-479.el9.x86_64.rpm 56cb35e61436eef1e1cc9e4baa541680db3f38211d0aaa0bd9de833a1a63746f perl-fields-2.27-479.el9.noarch.rpm 486ba18d3fa23f4445287731c30a48e17bfb972295df599b184e948236ac3494 perl-File-Basename-2.85-479.el9.noarch.rpm 17454567c250ec113ac216de94e9c1bba733de373f9ce1a5065f146ac44e0e50 perl-FileCache-1.10-479.el9.noarch.rpm 90ba4138ef7f11afb807472f87c1b077bbb685af3f4c53946b2f00a442587ee9 perl-File-Compare-1.100.600-479.el9.noarch.rpm 5230e821b757029dd346e36cc7d2ebebea6eb2db824c41950c839dbfa143aa1f perl-File-Copy-2.34-479.el9.noarch.rpm 64b6824c5aecb0b2e8d81b9e3350adc5e7548c25aba9748359f8781f7b038cb0 perl-File-DosGlob-1.12-479.el9.x86_64.rpm 6a2beb8892bbe4d6dc3067fdf666ad0ca037e18519cca15511bbe09f81a22183 perl-File-Find-1.37-479.el9.noarch.rpm 6edb8d78319a62b9933eb05f196cf4c5c80ea92a0c6e3c3f93a2da788d1811bf perl-FileHandle-2.03-479.el9.noarch.rpm fe8a728b970834e974577ccc3352f6f2bf8642d4f25903845651fcd4c641814f perl-File-stat-1.09-479.el9.noarch.rpm 28312b10f75967a7df9cbb302c730092016be042920f473e5f4d652ea720a0f1 perl-filetest-1.03-479.el9.noarch.rpm 6e68d7d2dec5a7b6cdb736cf2c5abb3e9b16ffd69c329981e2a2fdc4831cd346 perl-FindBin-1.51-479.el9.noarch.rpm 48de689527c8004fb2d1a72ab7497581f5bef9920cad51b7a31a79013312a813 perl-GDBM_File-1.18-479.el9.x86_64.rpm 77a2b828226f8d7aca828890e9ec5e4d6e8232866ab752b54584d4a486b95282 perl-Getopt-Std-1.12-479.el9.noarch.rpm 340c7e9a511fc53d82a9fc584bdad8215e4d0eebb5d7d2568af8b38a460b5009 perl-Hash-Util-0.23-479.el9.x86_64.rpm 6cdbb8366e1eb3dd4495a8a8e351a027a73b6ff30b11c6cfa73414ac4470b801 perl-Hash-Util-FieldHash-1.20-479.el9.x86_64.rpm 7415b030f2a4feab08d4570fd36f7aec7617a15c2ebceb0b659cb08d7bb9a466 perl-I18N-Collate-1.02-479.el9.noarch.rpm dd3c8fc259b61ef01b78a7f9398f3de2e4a9a51955ef3cf397696e9a35d48e5a perl-I18N-Langinfo-0.19-479.el9.x86_64.rpm a502cb3b1f1131eff971e3bce520767aee4bba313b99635006a78ef76f491a35 perl-I18N-LangTags-0.44-479.el9.noarch.rpm e64c35a0ea9566be4cd8b1c236c39587aa4bd7c3bd6a26d83aeea08d635acbef perl-if-0.60.800-479.el9.noarch.rpm d93d6f5ab112030ace26dedc156d8f6e007553b2319e6a604ce4297d5263a812 perl-interpreter-5.32.1-479.el9.x86_64.rpm ff8daff6eae5efd96fff88d01ff6da824483d51dee6d5268b1497e60b7fcc319 perl-IO-1.43-479.el9.x86_64.rpm 92acc2529705ef4f7c4d27be78e22681c3965641db45f9a096dfc0b324df2c85 perl-IPC-Open3-1.21-479.el9.noarch.rpm 86beddded68d9ec55d36d0ef7c42228c3fdc1103263fe1d9a18c00f438a14fd7 perl-less-0.03-479.el9.noarch.rpm a0a342d3aec542a53cf96ab91dd2ce870d99b6af9cd236d778148f10745047b8 perl-lib-0.65-479.el9.x86_64.rpm 7f7111d81acbffe263faec49857bbebe9e0ed5db4aff8102e75bb3a52ace3885 perl-libnetcfg-5.32.1-479.el9.noarch.rpm d81d853116bbff5df8fff3c891042d249a83ce4ce72f725af22c10922b95bb65 perl-libs-5.32.1-479.el9.i686.rpm a2f05a5d0991e660f9570fa9e6483d25cd046e36eec393041c6d5e59b1d041b1 perl-libs-5.32.1-479.el9.x86_64.rpm df20b5ec749712b747812adc5d65128888d67b891a11ad8ef990de645952e174 perl-locale-1.09-479.el9.noarch.rpm 38ec2e1a1b3eded8c0aae1e8eeb314303c8734129b0b784ccdafbae46d7f17b9 perl-Locale-Maketext-Simple-0.21-479.el9.noarch.rpm 13fb77e5f71b91d94b0dced57e08a1ee7e6a4212d302bb0de30d507b5b7639d8 perl-macros-5.32.1-479.el9.noarch.rpm d43cdb8257da464255221693e7b386482f3b95bb60f23fe6fa04b5226a28f09d perl-Math-Complex-1.59-479.el9.noarch.rpm 576e774249e1df2de036505faa3f18fd41696e940fcd697cf227e644aac1476f perl-Memoize-1.03-479.el9.noarch.rpm 8bf8a8e6c20ca9393f6795ad88dac1c3ba0224b71ee42784c21bea8ce5459086 perl-meta-notation-5.32.1-479.el9.noarch.rpm 56b1d3a2a814523756753d845974dee94f13fb9c13cbb9719d4600cf049a7a33 perl-Module-Loaded-0.08-479.el9.noarch.rpm d1b76475a866ef663c9e552893e0c894f199c3a0acb5766c1c2ba59fab16529d perl-mro-1.23-479.el9.x86_64.rpm d071dac6870f5bcdaa6be3ae1be348efee96a1514e2a6b03ee3af5b7a14af945 perl-NDBM_File-1.15-479.el9.x86_64.rpm fce0f451a8dde16ca037bae31ae6135dd00c3b290200b12ff24a4805383b5ff6 perl-Net-1.02-479.el9.noarch.rpm c863c8ab9bfbcdcd6b536665b69ab79d2f8e73475b7e91e5fbdeb35cb225b8ae perl-NEXT-0.67-479.el9.noarch.rpm 1fac0bacfdfba85156d89b14364c824922a8080e5af76571b1d548d128065c40 perl-ODBM_File-1.16-479.el9.x86_64.rpm 79de369c22015e1439efd9aca5c53c817b1f0d489a22b90893d2005cf4d30ec2 perl-Opcode-1.48-479.el9.x86_64.rpm bac67c6ec0a893e09c29b0bfcced117050799a9b2d788b7402a5394891992b39 perl-open-1.12-479.el9.noarch.rpm 47b23621952aed071a574d14b09c635bf24a7049bdbb02280f35756d5b821d8f perl-overload-1.31-479.el9.noarch.rpm f482b8996a6d0d84161f6862353882114aa9ad98460891f13384cc7f6ce37ddb perl-overloading-0.02-479.el9.noarch.rpm 16d4fa2d70531bb0a7cde3caf6afaa67a25604eb64ceb2870811eb2f693456d9 perl-ph-5.32.1-479.el9.x86_64.rpm 8e7faa030561690b64b0be43682660f872f4003e22f3eb34f01b9ab1841309a0 perl-Pod-Functions-1.13-479.el9.noarch.rpm 5f49ca25e407bbc56169a51c2cf06c0a935a5334dabf65dca53fc45ecbe88575 perl-Pod-Html-1.25-479.el9.noarch.rpm ea4b11a3d8c8a457f71ecb8107cecb68f549281f2fe7204c7dedfb859464dae1 perl-POSIX-1.94-479.el9.x86_64.rpm 7cb7aa9eb5821378476a9c78985013dc18c9d9da8dca87afe79822b26b68ee55 perl-Safe-2.41-479.el9.noarch.rpm 28db03ce508ca215f9d3ccf0c2798ee205806bacd71a7ea3aa632aa3938eae1e perl-Search-Dict-1.07-479.el9.noarch.rpm b203f0f75cd146fbd0d74c9a1308bf593f8f4f1fa715751079ef776e35ba58e0 perl-SelectSaver-1.02-479.el9.noarch.rpm 5c1d254f27e258df2ff1c37cb979485fe2068a02e796473daab2a1d7382cf82d perl-SelfLoader-1.26-479.el9.noarch.rpm d0f7227f90244271723cf652dc3580d5addb2d814b18b35b40df30b67dbcfd60 perl-sigtrap-1.09-479.el9.noarch.rpm fd0400b4dca1b73d5871c3ff61a74a636a6891cf07c382d5974b034acf0c1979 perl-sort-2.04-479.el9.noarch.rpm 22063eb4e21da51f363c03ff68f2e52783dadb9d9a9455421038644eaa27ba47 perl-subs-1.03-479.el9.noarch.rpm 97915fa7a4e0d80c5f947cee182db0a4a595b38af54752226b4e0c216a3bb2a1 perl-Symbol-1.08-479.el9.noarch.rpm 8490f7b67ee7b1c58ce1a6bdc6578ec9bc997c14a9e03eb746769167e4a7e621 perl-Sys-Hostname-1.23-479.el9.x86_64.rpm 7472ae5bd85b641847db7cbedbd9a82649d1311071d12e2fce09a23ff7dfc82c perl-Term-Complete-1.403-479.el9.noarch.rpm a603d3dce35a5b86266ae545ec80aa84213ebc325bce69d813edaab03ed976f0 perl-Term-ReadLine-1.17-479.el9.noarch.rpm 1a0c85ffee7a3d4e7f9d285dae4b4a2452da4ec51dbcc17ea7fef5e9326185a2 perl-Test-1.31-479.el9.noarch.rpm ab455afd77ee3f19e715e4cb8c4d439bea465e5340aeed5f100fd96462ecf0e8 perl-Text-Abbrev-1.02-479.el9.noarch.rpm d85d4d9a3b7aedd9bcffda3fb9e7f3af3afbad3ce5a94e511bc8202c7c44dc43 perl-Thread-3.05-479.el9.noarch.rpm 0dec0ef10efc7b57790d770d410412706bff3d6a454fdaa83b366ac2139c0277 perl-Thread-Semaphore-2.13-479.el9.noarch.rpm 3e397205265c3ec8bbaa1effe9a6e252f772abbdf170e774f3fd08c5a94a9f88 perl-Tie-4.6-479.el9.noarch.rpm a5a73678e556dc0ee54c07fcd10f93634cd4db24021265f69f5a38623e1dfb90 perl-Tie-File-1.06-479.el9.noarch.rpm 85711f2ea7466fa753a4001b3c2cf7ea2ba039d1b34f67170241ca6dcb2f9990 perl-Tie-Memoize-1.1-479.el9.noarch.rpm 746c0e9c5a67cfb26c781f596457f5591d31cf8a6b2af5e52591ef0e0a438e32 perl-Time-1.03-479.el9.noarch.rpm a6de2353b343ae13c2ba72b1b0415b4dbfae51538fe3e5e2b3b05d1ac9414457 perl-Time-Piece-1.3401-479.el9.x86_64.rpm ac8c280211dc2669793c3aaa807b212a69aeddb65de817f4383f5899eea66dff perl-Unicode-UCD-0.75-479.el9.noarch.rpm 1c886c53e3984fb2d5e4d4a547b4a4a2fb54d9b1679764993ee78397ab549ad2 perl-User-pwent-1.03-479.el9.noarch.rpm a8b82c2c6a4095761959c75c46c4e3485c9888b06ff2163497472080c7e8455b perl-utils-5.32.1-479.el9.noarch.rpm eee7dbfc25a96a722a6ccc4ddbdcd0b7954fd5fffefb6b47408267241812fc07 perl-vars-1.05-479.el9.noarch.rpm 5d7248a460e62639ed4ee82565b54f672258a2d09511d4150a73a3c2fd87ffd4 perl-vmsish-1.04-479.el9.noarch.rpm f2d6e9869251e6ed929e4a9ac1b2aaab2668f6fb4a5447105bd4dbc60f06d99f RLBA-2022:3419 new packages: perl-App-cpanminus Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-App-cpanminus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-App-cpanminus-1.7044-14.el9.noarch.rpm aa994e604155e03ae9ae787d467b39059ab859881029ad2c5ba8492748d44e84 RLBA-2022:3442 new packages: perl-Crypt-OpenSSL-RSA Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Crypt-OpenSSL-RSA. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Crypt-OpenSSL-RSA-0.31-13.el9.x86_64.rpm e28b237917209dd7d385ea85f9bef5ab9630d11652d35b2c89bbb1e612450c2e RLBA-2022:3496 new packages: perl-HTTP-Tiny Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-HTTP-Tiny. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-HTTP-Tiny-0.076-460.el9.noarch.rpm 28677597158fd32f04e633e51164d4f9ce6da979ff1bd0da68ee1590ba754df6 RLBA-2022:3529 new packages: perl-Module-CoreList Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Module-CoreList. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Module-CoreList-5.20210320-3.el9.noarch.rpm 45835adf2872ac762d6013b113d8645bd01bd0f86357a08857a3036ee3991f2b perl-Module-CoreList-tools-5.20210320-3.el9.noarch.rpm 63d197040742424a8c3843e798639e07627125dc2a421684f36642d2b4b5fd0b RLBA-2022:3536 new packages: perl-Net-DNS Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Net-DNS. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Net-DNS-1.29-4.el9.noarch.rpm cc71d58536bbdb09d4429384f3a8dbff94b5beaa551352c460dcd8dc1d3372a0 RLBA-2022:3556 new packages: perl-Scalar-List-Utils Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Scalar-List-Utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Scalar-List-Utils-1.56-461.el9.x86_64.rpm 3c4720fe49d11a8b5909c9c52bbedf227645b1b774d402bde4ecdda9191c0cef RLBA-2022:3588 new packages: perl-Tk Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Tk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Tk-804.035-7.el9.x86_64.rpm 9e720a020005d77c21abbcd38d35bf43a9205ee5f8abbb6cdb3e2fe342183f13 RLBA-2022:3610 new packages: perl-generators Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-generators. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-generators-1.11-12.el9.noarch.rpm b102f03c897fb4a2d72503a776506c5c93d969c2eb1cda0e10fbb4c93c95c0ff RLBA-2022:3617 new packages: perl-perlfaq Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-perlfaq. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-perlfaq-5.20201107-4.el9.noarch.rpm 21032d25448b2c2433b065797235e71bfc664ca2599a523a34fee4e86fcdb830 RLBA-2022:3621 new packages: perl-threads-shared Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-threads-shared. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-threads-shared-1.61-460.el9.0.1.x86_64.rpm e574c136c044d3b1d6cc2fbd28d281fe71b1de81d2c563dd83c35acedfcb81cf RLBA-2022:3625 new packages: php-pecl-apcu Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for php-pecl-apcu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms apcu-panel-5.1.20-5.el9.noarch.rpm aa48096ed5141719e41c942ff1742328bc4b1b45aff90f413c82b0ad6e4a4bf0 php-pecl-apcu-5.1.20-5.el9.x86_64.rpm d4761c7c1f804587af6cbf16334dec38a205262585c14b50d40e7741006dffe0 php-pecl-apcu-devel-5.1.20-5.el9.x86_64.rpm cd16cc7d7c22ca65d1357d692e8af1ef6348f461d047321544e2da024f17185b RLBA-2022:3626 new packages: php-pecl-rrd Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for php-pecl-rrd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms php-pecl-rrd-2.0.3-3.el9.x86_64.rpm f9091f3ae0609f1e7187ff1a078cf5f227ee086ec8dcece21f8a82911018ad7c RLBA-2022:3627 new packages: php-pecl-zip Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for php-pecl-zip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms php-pecl-zip-1.19.2-6.el9.x86_64.rpm df4f29fd82b9bd90758f162ea8e642374b48d63ee10d0fcd5f9868ac2d14b70f RLBA-2022:3630 new packages: pixman Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pixman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pixman-0.40.0-5.el9.i686.rpm 636feeb25f0b8a27b9fdadf67374e2a6e4a44b262de5d9746586706f0611cfc2 pixman-0.40.0-5.el9.x86_64.rpm 6d3812d5e6841c69ff695feff0ac2bbd8e04287d822e71f1ae865925e8a2a33d pixman-devel-0.40.0-5.el9.i686.rpm 4772f0a9f1da57817ce4cc209dec5a882b1e4af2ab084ec5aa3f8313017129b7 pixman-devel-0.40.0-5.el9.x86_64.rpm 1a058e78bfb2eb09d0666e6c55f5b81d81d011eb2589d7110fb674e90094c9da RLBA-2022:3632 new packages: plexus-cipher Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plexus-cipher. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms plexus-cipher-1.7-26.el9.noarch.rpm 616df0e391dc7da441c78842ad3e3807574d400cf9c68abcbd93871e76e6db13 RLBA-2022:3633 new packages: plexus-classworlds Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plexus-classworlds. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms plexus-classworlds-2.6.0-10.el9.noarch.rpm 8c6a69374e6ea7b2ce0c6d15b99b774999f91ff89294e3420fa2022b2b0d83b6 RLBA-2022:3634 new packages: plexus-containers Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plexus-containers. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms plexus-containers-component-annotations-2.1.0-9.el9.noarch.rpm f5edcaf7dab261db1805329b8c412eda7df5ba79914b8d22cab525456c99f4dd RLBA-2022:3635 new packages: plexus-interpolation Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plexus-interpolation. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms plexus-interpolation-1.26-10.el9.noarch.rpm 018c48c1263bfc572932fdca5b4536e92f3676e27e5bd58d89cdf57547612f7a RLBA-2022:3636 new packages: plexus-sec-dispatcher Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plexus-sec-dispatcher. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms plexus-sec-dispatcher-1.4-36.el9.noarch.rpm 45707c479b62265612634c7a5716e1d17e4647ffdf8c4893e2707dc441bf49f9 RLBA-2022:3637 new packages: plexus-utils Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plexus-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms plexus-utils-3.3.0-9.el9.noarch.rpm 15fbe0eed0c8e02cbc48f98ed0ac2e7f52ed1d34913d65673a9916ea9bac726f RLBA-2022:3640 new packages: pmix Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pmix. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pmix-3.2.3-3.el9.i686.rpm 672bb9d43dcecd1346da1a847ed5e2c62fb2e2431edf67c856687fe5fa07d155 pmix-3.2.3-3.el9.x86_64.rpm 4838715128aaa803720759c84f246995741b53d300274f93b2d0e2391f25ac26 pmix-devel-3.2.3-3.el9.i686.rpm b1c55fd9467b5e4ea2e01b4caa6c1e9eacdd4376f997e45995a391ef9a0f8ed2 pmix-devel-3.2.3-3.el9.x86_64.rpm e53f0f34f5e04dcee5f8dddce347ff4f4e97aaf6240940cb350e3c714549ca1c pmix-pmi-3.2.3-3.el9.i686.rpm 67729116f4f549fd23e4ef0f74f2d3252c75c0d8aeaef6998bad2d5b71efde56 pmix-pmi-3.2.3-3.el9.x86_64.rpm aefe9bee17cf196fec6c88a12df756e9fa9d0eb415dd788d7f78ab6ac5253d99 pmix-tools-3.2.3-3.el9.x86_64.rpm 7610d7645fbb82aa8fe9c952878e2eda871098e923ac10559e9d3209799d0bf9 RLBA-2022:3643 new packages: poppler-data Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for poppler-data. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms poppler-data-0.4.9-9.el9.noarch.rpm da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057 RLBA-2022:3648 new packages: powertop Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for powertop. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms powertop-2.14-2.el9.x86_64.rpm 4d30ae5c8bc4470fc7069117aaba0f11df9bd53cdada5dc970564d74437664f3 RLBA-2022:3652 new packages: pulseaudio Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pulseaudio. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pulseaudio-15.0-2.el9.x86_64.rpm 4fcb2ea115d1bf762816c6c9ece5bb8151919bc362478de8c5cef3339ac5b166 pulseaudio-libs-15.0-2.el9.i686.rpm c906baf77d790e020887ac615f1001e00ff6b666199f48d33997f7de2fae4de8 pulseaudio-libs-15.0-2.el9.x86_64.rpm b0c38349e1ac517c131c9eabfb9f952692684126775305b9a73ead98ae1acfba pulseaudio-libs-devel-15.0-2.el9.i686.rpm 33baf79c08bfdfa9b05d5fbc305d1cf1d78ee99f0767b8900bfd828a45b50c37 pulseaudio-libs-devel-15.0-2.el9.x86_64.rpm a397f9a40a63c13c7f4fa1189336dc69749b40894536488f32b7dac28b436a94 pulseaudio-libs-glib2-15.0-2.el9.i686.rpm c4f864cd17022f536b4341edd36c27c6437643925dec374c61f0c7308c6cf1e5 pulseaudio-libs-glib2-15.0-2.el9.x86_64.rpm 1fd0991cb4406ab257063eeacc7696a3fd7b15bc29316c06336b7c94ad1f1f53 pulseaudio-module-bluetooth-15.0-2.el9.x86_64.rpm 2497e669925a422aa77c7f760534c13ed7d3a738c45c9cc8420630c8bf9bd730 pulseaudio-module-x11-15.0-2.el9.x86_64.rpm f0099ef154190278449846d518c0b20091ae2132ab2edd599bcdd9600d88081b pulseaudio-utils-15.0-2.el9.x86_64.rpm b5d640aa277bf74a70502e54a78cb4d2c41312afb99a2d2850749e39e35610cb RLBA-2022:3665 new packages: python-dbus-client-gen Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-dbus-client-gen. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-dbus-client-gen-0.5-5.el9.noarch.rpm d52a6e36a9b35e64331b2d4fcb4fecee6f895e902f7cfa13eb25dfc056b4f6df RLBA-2022:3666 new packages: python-dbus-python-client-gen Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-dbus-python-client-gen. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-dbus-python-client-gen-0.8-5.el9.noarch.rpm f5f0b742933f67fd3e4dc51c3fc5248ae1b5e3450dde59ba186664a9bc975a1b RLBA-2022:3667 new packages: python-dbus-signature-pyparsing Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-dbus-signature-pyparsing. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-dbus-signature-pyparsing-0.04-5.el9.noarch.rpm ca759b2fb44772121318add34db4c0804e758c9f6ffad6e088fd8d85b292d208 RLBA-2022:3671 new packages: python-into-dbus-python Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-into-dbus-python. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-into-dbus-python-0.08-5.el9.noarch.rpm c0b5e0fec847c477fb6f8ef331f62e5c85a1fd007fc8cc6ee7c3ffc0b7d49bca RLBA-2022:3672 new packages: python-jinja2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-jinja2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-jinja2-2.11.3-4.el9.noarch.rpm 450c6930ad5829b425311e920b37abba521e0f64d180e68066af948c5f710ab3 RLBA-2022:3677 new packages: python-justbases Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-justbases. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-justbases-0.15-6.el9.noarch.rpm 9275d665532b3c455ab276d3157808c66f32123ede49b83aac8de3fa1d2ce4fd RLBA-2022:3678 new packages: python-justbytes Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-justbytes. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-justbytes-0.15-6.el9.noarch.rpm a0b50a65a668bf1b7eb3737e7d0108172014cff7df90842ec624733488e451b3 RLBA-2022:3679 new packages: python-jwcrypto Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-jwcrypto. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-jwcrypto-0.8-4.el9.noarch.rpm 55b1e29f417d1017bcb86509e0dd1c664d2b8f74d79a3d8f3f20a7c2b3befeb7 RLBA-2022:3680 new packages: python-kdcproxy Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-kdcproxy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-kdcproxy-1.0.0-7.el9.noarch.rpm ae0c7ddbda09ea266548730867fa43e9aee6bf59586222a6fdbee374a4a18dd8 RLBA-2022:3683 new packages: python-mako Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-mako. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-mako-1.1.4-5.el9.noarch.rpm 49c288329b2eb5f5f3016f6fe5a58c4a96e87d84477171da4522e4f109428d15 RLBA-2022:3686 new packages: python-netaddr Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-netaddr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-netaddr-0.8.0-5.el9.noarch.rpm 7423fe191e035fa4e1b31498be0674f9a7d261e45b6b54fe179507b841b29736 RLBA-2022:3689 new packages: python-oauthlib Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-oauthlib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-oauthlib-3.1.1-2.el9.noarch.rpm 8cf1ffa50e304f71ba8a90c318b4276a16c2a9a63140be486992adf1726c5063 RLBA-2022:3706 new packages: python-simpleline Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-simpleline. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-simpleline-1.8-3.el9.noarch.rpm 019b7e28659ecd08a5fa4299dc3a0d859f8f1c782143cd054e77760c5d2c812c RLBA-2022:3709 new packages: pytz Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pytz. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pytz-2021.1-4.el9.noarch.rpm 3e14e3479cb226537cf886aa771e3f9c1866ab0354d92efb51d087705e3f2c15 RLBA-2022:3716 new packages: qt5-doc Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-doc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-doc-5.15.1-4.el9.noarch.rpm 4feaf02bcf6e6f128fb1f348767403a1d02607a52ed5f00a013e9c047d9cb4c5 qt5-qtcharts-doc-5.15.1-4.el9.noarch.rpm bfd2d4a3c7566a0dc12ac27a57deceaf124df50a8b727ecae31753a2a26ffc0f qt5-qtdatavis3d-doc-5.15.1-4.el9.noarch.rpm aca48e9612e54489881068b658b6c38afded94e8d0af986a9ab82a3d9b51e782 qt5-qtgamepad-doc-5.15.1-4.el9.noarch.rpm 2226a26e06995d918ed14e688066128ec1aa212bf5f08d71a9d2a204f7992db9 qt5-qtpurchasing-doc-5.15.1-4.el9.noarch.rpm 1021211698e24d59d6ef7548688e53a214e3f644d08929177541b69455659e96 qt5-qtremoteobjects-doc-5.15.1-4.el9.noarch.rpm 2f73a86ecbc6e36e01097ff825b2e8735a6498eb634a3cf00819ed49427d0825 qt5-qtscxml-doc-5.15.1-4.el9.noarch.rpm 2e463d3f298d6773bea70e3fb0fe1e4e5fc69cd77fd95422d0e04f130155a961 qt5-qtspeech-doc-5.15.1-4.el9.noarch.rpm b3d1b1bc94bd620f97892ac158e350f98ce7fa33995ec002c1506db826417dcd qt5-qtvirtualkeyboard-doc-5.15.1-4.el9.noarch.rpm b7851a730e1afb405ea1e4854fe0203cb4790d9604078cfaa80724b54a8a084d qt5-qtwebview-doc-5.15.1-4.el9.noarch.rpm d5bb9d1e4c79089567f5af3d40cbc28a1d8715b2b54ec60ad5c69b464cc21d79 RLBA-2022:3732 new packages: radvd Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for radvd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms radvd-2.19-4.el9.x86_64.rpm da7091258f09fc71cabb6d7b8473d5315233f396af6746809d3755e164a92857 RLBA-2022:3738 new packages: regexp Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for regexp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms regexp-1.5-37.el9.noarch.rpm 49554c0c181463be34e862e47b84246e690df6ab43b4474571a57e80a5ce56af RLBA-2022:3744 new packages: rshim Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rshim. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rshim-2.0.5-2.el9.x86_64.rpm 1676d0db451a2e697c9cf1c49ed2a0f50ee785bdf5ad6cf46401d049dfb7cb47 RLBA-2022:3745 new packages: rtkit Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rtkit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rtkit-0.11-28.el9.x86_64.rpm c1f75d252c80b24dc5f7dc34c558698c88684b987ad5ae7411f7908555770e65 RLBA-2022:3771 new packages: sgpio Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sgpio. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sgpio-1.2.0.10-30.el9.x86_64.rpm 4aca7fe7ce15adec65d1ed4ff9f6a231fd7743c71409a5d12037af07aad1ffad RLBA-2022:3779 new packages: sisu Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sisu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sisu-0.3.4-9.el9.noarch.rpm 4ea28b4be16fb4fb26529434820a0827f39e5f82e5ccae248eb60d4a9705cdc1 RLBA-2022:3780 new packages: slf4j Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for slf4j. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jcl-over-slf4j-1.7.30-12.el9.noarch.rpm f582f4c2af30eb5376da09c58113b308ab52c5e5817db1d3da940c5639ed9484 slf4j-1.7.30-12.el9.noarch.rpm d58d7801d7898ba2b512a359d8a6b7be33015014e0b7be6110ad9465739e275c slf4j-jdk14-1.7.30-12.el9.noarch.rpm 5dcd5497b279f1f933497b4b7fd4f3ecae088299ee5ab9f7dcf579046869b55c RLBA-2022:3783 new packages: socat Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for socat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms socat-1.7.4.1-5.el9.x86_64.rpm ab551ed42075c017fb3979ef53cdd9c1c9098be96f6f298e904ffafdd3dfaaa1 RLBA-2022:3784 new packages: softhsm Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for softhsm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms softhsm-2.6.1-7.el9.2.x86_64.rpm fe82b9bf43fa64862d0304be1746218403e3b8ecf7c3dd54e237e3324ab8188a RLBA-2022:3788 new packages: source-highlight Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for source-highlight. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms source-highlight-3.1.9-11.el9.i686.rpm 8afdf7d2653bd8c72883d712fbed91e06ffaded7f96116a346e4253ee483e1c2 source-highlight-3.1.9-11.el9.x86_64.rpm 8619f82da1a29154e604f210149ab8c29dc4ae530b634fa1e041bc9d029921b6 RLBA-2022:3804 new packages: targetcli Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for targetcli. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms targetcli-2.1.53-7.el9.noarch.rpm b42866fd04e52979638aa1f51a369b563446b50ab4dbf821d0ed2850b9c3648f RLBA-2022:3805 new packages: tbb Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tbb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-tbb-2020.3-8.el9.x86_64.rpm 612fbc16c0f54c12a3b340edd867ba58b85dc85ae23226f068805a578922b76f tbb-2020.3-8.el9.i686.rpm 4e16671eabfebb11ad01a2b7c57a91734a952cabf1b1b6383e6af18bce3a9937 tbb-2020.3-8.el9.x86_64.rpm 1b1c4ff9fce70dbfe9a88ade638ee91d2c62192c2d79dd80c35e88cff9049ed8 tbb-devel-2020.3-8.el9.i686.rpm 2d3da020036f0a5e84bf20058d3b73b999043a2873f90e2e119035445bbd4aa2 tbb-devel-2020.3-8.el9.x86_64.rpm 98c2222d584cdbdea1bb0fe2453130da93fdeb21ab7273a6859c02596a352e70 tbb-doc-2020.3-8.el9.x86_64.rpm 297c1c1175278b45b9885f185ccec242ba193d9f49cd71974f0d5a6b2cc1c082 RLBA-2022:3806 new packages: tcpdump Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tcpdump. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tcpdump-4.99.0-6.el9.x86_64.rpm b3d3db0980ae4df8252c244c939d7e38bd45c518ddeb140c8814c20ad409a99b RLBA-2022:3818 new packages: tpm2-abrmd Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tpm2-abrmd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tpm2-abrmd-2.4.0-3.el9.i686.rpm 104352d629646cd27a24709ccad36c71a172815c233a8d6db238ec9e60bd4cac tpm2-abrmd-2.4.0-3.el9.x86_64.rpm 6d484992c071bc0fd7b5f7a34bf0a1686292f17ed7aee332b3ac59ed066bc6bb RLBA-2022:3819 new packages: tpm2-abrmd-selinux Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tpm2-abrmd-selinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tpm2-abrmd-selinux-2.3.1-6.el9.noarch.rpm e57c39c511676bae27d50e167f9cc4ce62423305cebc754cf365d234fbed009d RLBA-2022:3821 new packages: tracer Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tracer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-tracer-0.7.5-4.el9.noarch.rpm fdb78da65e9b324014ef29839028562946e6dc64014de42f74fbf00c54983e22 tracer-common-0.7.5-4.el9.noarch.rpm 969fec274b7ef0a2efaf1c63f3aa563a86e2052f95d8d21a97b632260270c925 RLBA-2022:3822 new packages: tracker-miners Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tracker-miners. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tracker-miners-3.1.2-1.el9.x86_64.rpm 15096e6f9ce8824811f2be8fe15e9fb583b2cbac478920361033682fa95bf2b1 RLBA-2022:3828 new packages: univocity-parsers Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for univocity-parsers. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms univocity-parsers-2.9.1-5.el9.noarch.rpm 63486718d9ccf8c0abec530eabad75f003c619bb1337c4cc025f42cbf9757dd4 RLBA-2022:3837 new packages: virt-top Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-top. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virt-top-1.0.9-21.el9.x86_64.rpm 2207ecd308260f7c90476e89b237fdeba5ed74b03498e80d59f11da413ebc717 RLBA-2022:3839 new packages: volume_key Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for volume_key. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-volume_key-0.3.12-15.el9.x86_64.rpm 6d7d8df897eab3b6b585533b22411d486e8e222a9f2fdb5b6013f56e1601558e volume_key-0.3.12-15.el9.x86_64.rpm 3ea811e885fd3605d2a7375e13cda87371a6fad479acf447303142b63fad4383 volume_key-libs-0.3.12-15.el9.i686.rpm f2df8943c829869284187429ff877ef46c1e96875a322b2426f55da17ae3799f volume_key-libs-0.3.12-15.el9.x86_64.rpm af73662f47ac8ac947921451a9852f47083ca565ac724e5eaef01703479e7dde RLBA-2022:3842 new packages: wayland Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libwayland-client-1.19.0-4.el9.i686.rpm 10da5e36c6a85e0bea11d6ac9b765e52a2126c717546ad3ccface9aeb584b8f3 libwayland-client-1.19.0-4.el9.x86_64.rpm 4c1718061503d972dd4ed0938ff4ed2d098779a323b6b122b026539411f988fc libwayland-cursor-1.19.0-4.el9.i686.rpm f7e9de7c807f69385cf6ddafe81640c400c9696a4e148fe826278a049375b9c6 libwayland-cursor-1.19.0-4.el9.x86_64.rpm b6db085e0d17a50846d4b754ac2f0d4d45253458e48c76d7150dd64eb0ec3c84 libwayland-egl-1.19.0-4.el9.i686.rpm 765027814218d8f3a5dc27f432e465322376f53c182495383980537613cdc342 libwayland-egl-1.19.0-4.el9.x86_64.rpm ddc80ce52d2a663a8ae7746caa0bf0d945d8fface6c768b151d715b495f8067c libwayland-server-1.19.0-4.el9.i686.rpm 6e660150d7bf0d41f72190b16a105c882a088888beb278f341c04c50087c0792 libwayland-server-1.19.0-4.el9.x86_64.rpm c0ee5e7824dff3ce76be1814f896a29fdc2736105e771d36571acc00c8755a2f wayland-devel-1.19.0-4.el9.i686.rpm c9dce228490cd1b126fff95982373a92badeded83119395c223d9e154bcc21f9 wayland-devel-1.19.0-4.el9.x86_64.rpm dd2df486776c681755529d13af199429304257886a3dd0abf477edd26d4b52d7 RLBA-2022:3846 new packages: webrtc-audio-processing Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for webrtc-audio-processing. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms webrtc-audio-processing-0.3.1-8.el9.i686.rpm f0a2f60c037f99b9f4a327ce927263ffb95e4babf5ae5ee63d7d9aed2472d953 webrtc-audio-processing-0.3.1-8.el9.x86_64.rpm 252da90e9f9cfa879cd6b43b6d94006e484989e1d1bb29f25782e53c7d1b6458 RLBA-2022:3851 new packages: wsmancli Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wsmancli. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms wsmancli-2.6.0-15.el9.x86_64.rpm 716a53907bbdc80e5ea2af2dfd1487a5514b71aaf0239884f7e0b5b42bd58ab0 RLBA-2022:3852 new packages: xalan-j2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xalan-j2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xalan-j2-2.7.2-10.el9.noarch.rpm 96237e4d04c6e60d326da30769034bf757e509354a571c05d45f66ba3b36fe99 RLBA-2022:3855 new packages: xcb-util-image Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xcb-util-image. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xcb-util-image-0.4.0-19.el9.i686.rpm 212668c0e7b6fcade0eb2adc928e6bb4c14a0713142d9439d983451b48d5677b xcb-util-image-0.4.0-19.el9.x86_64.rpm 25604daacebd1f6e0502d5c9807d0e96d2bfe18f34245654d559e0c9209b9f43 RLBA-2023:2522 gnutls bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnutls. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnutls-c++-3.7.6-20.el9_2.i686.rpm c6acf7b5d13150d3a4b4a8efc9cc147866a444986d794011225bc80eee364207 gnutls-c++-3.7.6-20.el9_2.x86_64.rpm d841d90b0f2dd159e5b713bd6ac5ba231b51f8197de99592b9240ad0f0e26d8d gnutls-dane-3.7.6-20.el9_2.i686.rpm 4633e19ec7bcab63d49f3dafcaed7c92c9634309ebe7db59043d09f4dbd1c280 gnutls-dane-3.7.6-20.el9_2.x86_64.rpm f9f5a889f61529b908f5b6435dd8a475db2074fbe8e62ae5fd0f22bec4567b48 gnutls-devel-3.7.6-20.el9_2.i686.rpm 903238a033bb7394cf7bb41c01b85922675c7f61836db44ca64a0aedbd958a16 gnutls-devel-3.7.6-20.el9_2.x86_64.rpm 2c571de05c31ca87814628c613e75029fc13fa3d3d53b3d222cc86c05f3b9ee7 gnutls-utils-3.7.6-20.el9_2.x86_64.rpm 62839cf565b209b58df56130b8116008cfcb3d728b12121d71faaf8d5fc1f298 RLBA-2022:3857 new packages: xcb-util-renderutil Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xcb-util-renderutil. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xcb-util-renderutil-0.3.9-20.el9.i686.rpm c5b78153bc5a0e11cefdf1c789a0fc96839d3b385245b1ae44da3cb786022a0e xcb-util-renderutil-0.3.9-20.el9.x86_64.rpm 56dfdc833cd2e53cb1f31972ccaea38810c124c6a5ea99fc00a7f24b54d1e187 RLBA-2022:3862 new packages: xerces-j2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xerces-j2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xerces-j2-2.12.1-6.el9.noarch.rpm 9912d7a3d0d9ed74f3ab29f236ba4be91b398cdbf5404335c6d3f6f3c8035b42 RLBA-2022:3867 new packages: xml-commons-apis Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xml-commons-apis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xml-commons-apis-1.4.01-36.el9.noarch.rpm 69fd151623173d92fe13f9c81341c17c63c9c9bb790b39875194018ff2d34bd6 RLBA-2022:3868 new packages: xml-commons-resolver Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xml-commons-resolver. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xml-commons-resolver-1.2-36.el9.noarch.rpm 3376229b156ac137e3fdcc11786e961b602ecd64c02711ab7200bdfa5b420231 RLBA-2022:3869 new packages: xmlsec1 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xmlsec1. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xmlsec1-1.2.29-9.el9.i686.rpm 4e9685a302690dbdc6b57b46d51606ffae53ca62913a46567be2c1377ff03e13 xmlsec1-1.2.29-9.el9.x86_64.rpm ed359cb1064bc282048f64807e663451ab90a7889397046b7c0f4073addb6f2a xmlsec1-nss-1.2.29-9.el9.i686.rpm 1ef78b843b2a6c7c68e58b779084f96ac0d37e41211aacf9fe6c604f5c108f00 xmlsec1-nss-1.2.29-9.el9.x86_64.rpm 04ac02ee0c92dcfc7b874aba876a0c3a399112738b4cad3ec1180248fed1b7f2 xmlsec1-openssl-1.2.29-9.el9.i686.rpm acf490edbf994c753f9c42ce32c02342c9db9d844d7ade70815c1b78cf89b7a3 xmlsec1-openssl-1.2.29-9.el9.x86_64.rpm 435bab72ad769eb537ef105f65c170c7ee79ff70cdca9cbd1d0b7c508ce86679 RLBA-2022:3872 new packages: xorg-x11-drv-libinput Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xorg-x11-drv-libinput. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-drv-libinput-1.0.1-3.el9.x86_64.rpm 252b9e40118afa28a3aa656ba49b4d4b12b779d8157bf197f972961049a6bb2a RLBA-2022:3874 new packages: xorg-x11-proto-devel Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xorg-x11-proto-devel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-proto-devel-2021.4-2.el9.noarch.rpm e56a232af57e20bdbd4162651917e116c8da4597fc25035aedaaa7cf6e721c59 RLBA-2022:3882 new packages: xz-java Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xz-java. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xz-java-1.8-14.el9.noarch.rpm dbcf68720ed7133daf5db12c3c8f1efc1601bfd337ead77297c70aaf25a999d0 RLBA-2022:3883 new packages: yelp Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for yelp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms yelp-40.3-2.el9.x86_64.rpm e5ba9b0bb5f9d48b88be39e35811908daf2dd823e652d926ee8ab9235c3a7db2 yelp-libs-40.3-2.el9.i686.rpm 59189b36defd21cb4552570c7febdbe994282635eaed98fdad4e15c99131aaa3 yelp-libs-40.3-2.el9.x86_64.rpm 53b2396f3745a5f3e9321574d4753db9b9f6d78f42ecb648309741408acc4b27 RLBA-2022:3885 new packages: yelp-xsl Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for yelp-xsl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms yelp-xsl-40.2-1.el9.noarch.rpm 377dd62e39485f2ef7064baf2074f9a5bec76a84df8969ad22bf77632b964665 RLBA-2022:3908 new packages: python-pip Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-pip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pip-21.2.3-6.el9.noarch.rpm 3e404af67d56c37dcb4e519a6e5e8c7c08a5234d5a184503690f3f021f7f05b9 RLBA-2022:3928 new packages: libssh Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libssh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libssh-devel-0.9.6-3.el9.i686.rpm 1d795800662081cceade0a562111d27ef5ef4348e159b424ee76a23686150ab2 libssh-devel-0.9.6-3.el9.x86_64.rpm 70d5b1c223ec3b36545177bfaf43922ca75013cefefc07e8e3130ec62a8e6a8f RLBA-2022:3931 new packages: glib2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for glib2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms glib2-devel-2.68.4-5.el9.i686.rpm 63928a4f52f3b6ea0df47b1f026cf43cdcaf8167e41e2034adb9bad1b7c85413 glib2-devel-2.68.4-5.el9.x86_64.rpm c6cbd7a6cff049d075f0212b821db23b2094b5cbc796d74ac7fb9613e0e66b9c glib2-doc-2.68.4-5.el9.noarch.rpm b37e357f080d497842142df3397395a863828be611181985cb3c20011e59359d glib2-tests-2.68.4-5.el9.x86_64.rpm 84fc4ebde3e071c9b762faa1f6ace122578ba8f74a967dfa301f885da3a50cac RLEA-2022:3950 new packages: RDMA stack Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mpitests, ucx, rdma-core, mstflint, libvma, libpsm2, fabtests, openmpi, perftest, eth-tools, mpich, libfabric. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mpich-3.4.2-1.el9.x86_64.rpm b60d94fd74a6bfe91e1a3a74170774e25945ebdf6ea828cc05117222047245a4 mpich-autoload-3.4.2-1.el9.x86_64.rpm 51d692478cc61a31eba09cb88730260fb6ba81a1ea721aad1ae57cc870873025 mpich-devel-3.4.2-1.el9.i686.rpm fd870cbc4bc676b47a37e9893db9d4579b0f321c8baa83f994fa0471df204404 mpich-devel-3.4.2-1.el9.x86_64.rpm d023ba5cb9206c515345e5595a0373befad066e56b068ffd2864ac0fb8b122ab mpich-doc-3.4.2-1.el9.noarch.rpm b025053e55946fdf789176649ee4f331793a620c640fbda8cff4a54fe76548ec mpitests-mpich-5.8-1.el9.x86_64.rpm 4f31eb15208ffcccb18e1bfb312bf0f6b40285c39ed349eb16220ed8b9e3d4b9 mpitests-mvapich2-5.8-1.el9.x86_64.rpm 0b7f8502ce42b151752d23622306ed591c20b7982cf783fb341c9c62e0313fc0 mpitests-mvapich2-psm2-5.8-1.el9.x86_64.rpm c1907a192e9447972df78a7c356dc4c28ceb7890bcd7cd1fa7c5b3e3a58100be mpitests-openmpi-5.8-1.el9.x86_64.rpm c6847c7723b2dea3f956be8723efb77538c3189122b57b1130ffbfb35c1fda43 openmpi-4.1.1-5.el9.i686.rpm 180d5296f48865d9f1f85c10bdf1acd0c4976ec4888b0a6a42133309c5f4b8d9 openmpi-4.1.1-5.el9.x86_64.rpm 6d98dfc5deb5cdee88d704a6ba526b854fbb08c8253b117891590046d19286dd openmpi-devel-4.1.1-5.el9.i686.rpm 79905bf68d0439027ee7f581be90e82acb356671d3bb67af53c0cba2c73d82a3 openmpi-devel-4.1.1-5.el9.x86_64.rpm 9ca324456cdae9bd9fa14940ff9c90fd240bb689fea648a543090b1244ce6603 openmpi-java-4.1.1-5.el9.x86_64.rpm df37f53ba819a9037b8dbf5b8658df1be40086b2a8b5dcf25d1f908dda26a4d4 RLEA-2022:3986 new packages: ipset Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipset. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ipset-service-7.11-6.el9.noarch.rpm 57b994484586d4f7196380cb86cb83a15f562fc48b4bef594fd32f153c0a15e8 RLBA-2022:3987 new packages: libdb Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libdb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libdb-devel-5.3.28-53.el9.i686.rpm 5f1be48c4284e2191519e592eede060a44f4b1b141dc687ffd09cfb8770bd648 libdb-devel-5.3.28-53.el9.x86_64.rpm db690e17ebc3759381360d8e8c1c9939f09e57c48de61e50d8fa401720c4fe11 libdb-utils-5.3.28-53.el9.x86_64.rpm 9f3362e0ba9fe4940301e3950c8228305b25def103d583002921190c3a341d34 RLBA-2022:3992 new packages: c-ares Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for c-ares. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms c-ares-devel-1.17.1-5.el9.i686.rpm c1204b9ec075bef1acaaef12df761bc9cb64ff7293f92adfbb54ab9b05a67759 c-ares-devel-1.17.1-5.el9.x86_64.rpm 707bd78d129e9754ece7b04e353c7b37bb0428686fec8b745783f9dd203e146f RLBA-2022:4020 new packages: numactl Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for numactl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms numactl-devel-2.0.14-8.el9.i686.rpm 82b2294bfa9c891e341eafcc64028e6bb22ae315041d816293aa93b0f190709b numactl-devel-2.0.14-8.el9.x86_64.rpm f955c12565a56bdf727c801c92351732c53860f92dbdad7dc04b629881e874b0 RLBA-2022:4022 new packages: xfsprogs Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xfsprogs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xfsprogs-devel-5.14.2-1.el9.i686.rpm 64c38dbb4e436a4a68322cadb9d49a8e8bffd7f79b6c09a6cdf3d29cd900501c xfsprogs-devel-5.14.2-1.el9.x86_64.rpm e1a92c9d69daaf2e8de548f72856b1da6e3e54e932d57cd3121fba43361c0ddb xfsprogs-xfs_scrub-5.14.2-1.el9.x86_64.rpm 9a47df0519b1965a11a5b787de963332bb478f126370d928a3116c00e03ce22f RLBA-2022:4030 new packages: libreport Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libreport. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libreport-2.15.2-6.el9.rocky.0.2.i686.rpm c38686e3614b77ed2922ae4fca255249e8af48e219a756c1715064dc7ca9b5d9 libreport-2.15.2-6.el9.rocky.0.2.x86_64.rpm 022488dbe01df2f8d818b9a856bf245a2e6a6f334b53edd16c6211db69a50ca9 libreport-anaconda-2.15.2-6.el9.rocky.0.2.x86_64.rpm 690c68b193d87653fc8af880cfbe9137a8ba1773e3300db8879ebaf9b259ebf6 libreport-cli-2.15.2-6.el9.rocky.0.2.x86_64.rpm 8bfa81ef801e4cbfb1f019b2ea2351428af897c7b4f5d69a6831f757520d4911 libreport-gtk-2.15.2-6.el9.rocky.0.2.i686.rpm 6d091d1edf3c38036bc967ec69a3d8fe432e118f6d16d8befedafb70a07d0b8d libreport-gtk-2.15.2-6.el9.rocky.0.2.x86_64.rpm 0eb7dc3ae9c2fde8716247315f7903eeb4fa8af0b658eb23a340c9df0421ed4e libreport-plugin-bugzilla-2.15.2-6.el9.rocky.0.2.x86_64.rpm 37eea7b13a977bdbef9a903abe53892c0aa882d4dafe55d06208711a8ccd8337 libreport-plugin-reportuploader-2.15.2-6.el9.rocky.0.2.x86_64.rpm 2cb6d5a3a3719d6b8e8dd58ae4f991e56304e778f9d921ea1fef76e7cdc7bc7f libreport-web-2.15.2-6.el9.rocky.0.2.i686.rpm 88f3d650ed1881a24edb2313b929940f660e92ec91b63cf682bb50fd98fbfa6d libreport-web-2.15.2-6.el9.rocky.0.2.x86_64.rpm afec7d83f71054ff5e2df4c9d51d1305e4f110afa5965335b0c871aea358fa75 python3-libreport-2.15.2-6.el9.rocky.0.2.x86_64.rpm 605271935faca31cbab931dcd876d8ea33c222d3dedfd0a6ccd8894d871313f0 RLBA-2022:4032 new packages: p11-kit Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for p11-kit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms p11-kit-devel-0.24.1-2.el9.i686.rpm 062f26d1babfa7d408d710a82b4881e0961dc1d7d12e441b7f65b83a1ba10909 p11-kit-devel-0.24.1-2.el9.x86_64.rpm 30ca13a104f0a8b67dee566d82ec08ae344bcabb87d9354a9ec144ed01badd5c p11-kit-server-0.24.1-2.el9.x86_64.rpm a39969b4096f36e87f25280b985eb7c8d6819a20a3cac497dea6aca0ce1c8162 p11-kit-trust-0.24.1-2.el9.i686.rpm 2b80808eee9b0299c721b172e4a91a7852969da69e9269eaf1e2292a1acc691c p11-kit-trust-0.24.1-2.el9.x86_64.rpm f3323fd8f94b5590ce6b8a191db48315eee46e1f4c5b1902b1c0b14982dc4b34 RLBA-2022:4033 new packages: kbd Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for kbd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms kbd-legacy-2.4.0-8.el9.noarch.rpm 2bc13a805f8c4145d6693e0481a7313e1ae346ecb627e09e72430bc6021222c2 RLBA-2022:4039 new packages: polkit Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for polkit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms polkit-devel-0.117-10.el9_0.i686.rpm 383b75374020d5c8bf6f080911a5faa2532dfa9bb6c81d633947ae1a8e566f14 polkit-devel-0.117-10.el9_0.x86_64.rpm d3dc2e8d81b8586d2d4b68ca95d73ed3fad8c01239572f8d121eca84f4a7f5d8 polkit-docs-0.117-10.el9_0.noarch.rpm 3a5c83e3d08befb5d41a078ee28c777881f4067f6e85264a307e1c4b44e21aee RLBA-2022:4040 new packages: libcap Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libcap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libcap-devel-2.48-8.el9.i686.rpm 0a075cc82b171e68fe5d5b1584f63c57ba7e3dca91e7e31ee0c93e3b51ca0ef7 libcap-devel-2.48-8.el9.x86_64.rpm 5d066c25c05f9075e7c763954866165e46f0a239cc0f1016a083b407ef28ee68 RLBA-2022:4049 new packages: cyrus-sasl Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cyrus-sasl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cyrus-sasl-2.1.27-20.el9.i686.rpm eedec6699b4a87940eb27e13cf5bca837b15e073b0788829a856a2331e678a0c cyrus-sasl-devel-2.1.27-20.el9.i686.rpm 10c3248b56b1ac3d38db1e3bd17cd9a2d16aeae2a8e82588261d47b84fb185a8 cyrus-sasl-devel-2.1.27-20.el9.x86_64.rpm 5a8440c999fb6e405a29785458fa646f1902d2a8545c8d61bb9b14370f9f2a2b cyrus-sasl-gs2-2.1.27-20.el9.i686.rpm 49dea261834af58a68b3e82430eb93190d7826b03eae92ecb24a8957adde0ae7 cyrus-sasl-gs2-2.1.27-20.el9.x86_64.rpm 5f238d01f48a594277543e887f9c1c301730bbe880e8c6fccf8819ab2111313b cyrus-sasl-ldap-2.1.27-20.el9.i686.rpm b746d31320349dcd467205e1fa2e98ddf62d3235200593c017d9bf3c15ffdf3f cyrus-sasl-ldap-2.1.27-20.el9.x86_64.rpm 06a011c6de8eb68bd9ce70060ebf6c8b388b79502f37ff2e9696b7d24e32ed81 cyrus-sasl-ntlm-2.1.27-20.el9.x86_64.rpm dd155c50d07d3819f4f061efd58857df832baf536278bcb5d737f96e86b8213d cyrus-sasl-md5-2.1.27-20.el9.i686.rpm 25e561bc616df3ffe123b17f76c5973a66a284eab37eeb9ba471b29345bdc9eb cyrus-sasl-md5-2.1.27-20.el9.x86_64.rpm 42bd81a06a4719ab244d9950cfc767fcd94e9470fa69db24eb682d2426b671eb cyrus-sasl-ntlm-2.1.27-20.el9.i686.rpm cdc34e8611c29037c1fb7a9262a7474dadada8a483155d2a1617b16f45e02b8f cyrus-sasl-sql-2.1.27-20.el9.i686.rpm aa6268bb36578bfe503bb4a3c1a99afbfef50df55800ddb8c9c869f8e82cdc8c cyrus-sasl-sql-2.1.27-20.el9.x86_64.rpm 37c941278aa99eaeb440d6d331c1b0c2168487c7a8bc440c61ea31948324480e RLBA-2022:4050 new packages: efivar Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for efivar. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms efivar-38-2.el9.x86_64.rpm 2e839c03faaca01ee8835b836fce605fbae26898df180335e1b4a4a841182676 RLBA-2022:4052 new packages: zstd Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for zstd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libzstd-devel-1.5.1-2.el9.i686.rpm b33c2948b4410afbce53f17cd91e31e6c19b02aa55e56d18e7aa1cca152c0c68 libzstd-devel-1.5.1-2.el9.x86_64.rpm 34e5189a8b7d9dee4bf217254d8f76e0ace425f917779a1e976440f58269ddef RLBA-2022:4058 new packages: python-requests Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-requests. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-requests+security-2.25.1-6.el9.noarch.rpm d172bfe1816a15e4e766bc21e11422dea8fc1cd29810cb61b69697aec377d4cd python3-requests+socks-2.25.1-6.el9.noarch.rpm d505149056986611de68458a3b88b7261e75366ce76f6d88333eb1e884ba205c RLBA-2022:4061 new packages: cifs-utils Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cifs-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pam_cifscreds-6.14-1.el9.x86_64.rpm 210199b9ba33f606b7b83f22408c9813e883d2662aee9026eb4bb767fad82eea RLBA-2022:4067 new packages: fuse3 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fuse3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fuse3-3.10.2-5.el9.0.1.x86_64.rpm 3a71de05e60717315f24b150c0f6110a34e781771d49e4dd28495c5e72ad01ce fuse3-devel-3.10.2-5.el9.0.1.i686.rpm 75b39dc6f49580c98027542016b56b56103dc825297ed6a05dfb35c26de42d32 fuse3-devel-3.10.2-5.el9.0.1.x86_64.rpm e4ab36efc623607abb7ee5457daecf8666e85ef8c3c0b8d2261e4bbc5b5d1e45 fuse3-libs-3.10.2-5.el9.0.1.i686.rpm c794e0bd6042e9f70a44c2ba068c0974f7553be73309f5ea49fa9258f063343e fuse3-libs-3.10.2-5.el9.0.1.x86_64.rpm 695ab0f604f02ed2b9a8bd0245cf0a9ea80f8d1bb01f6b88bd17498662d10c30 RLBA-2023:2558 libselinux bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libselinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libselinux-devel-3.5-1.el9.i686.rpm c3e4abc755fe6820500ccc1902fa934683eaae7f85216db7f9b37e27bec17b49 libselinux-devel-3.5-1.el9.x86_64.rpm 845392300eaea3fd7380494764d97a12be77fa17842ebeaad8eff83c2f98bb8d libselinux-ruby-3.5-1.el9.x86_64.rpm 642c6ab8d17417fd7217b2acb6b921742861d366fcc0d49069baffa1cbae835a python3-libselinux-3.5-1.el9.x86_64.rpm b6771999c7f2e696e99ed26a0afffaf90053516789200a987eff014d47cee91d RLBA-2022:4076 new packages: usermode Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for usermode. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms usermode-gtk-1.114-4.el9.x86_64.rpm 65a1b5743d0412834136835eb400eebcc8db9b380a657cc9fdabb9740928777e RLBA-2022:4084 new packages: acl Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for acl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libacl-devel-2.3.1-3.el9.i686.rpm 853fed957a66ff600ceda2e04d9e2e5bcc539b3189846f11eb468e732658bca0 libacl-devel-2.3.1-3.el9.x86_64.rpm c946708c4375c1971de4b99a21a768b528af9abd7ee3e808dd2911299f1baf49 RLBA-2022:4091 new packages: avahi Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for avahi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms avahi-glib-0.8-12.el9.i686.rpm 0e7084f12873a09279f6e8978c0e69e8a9583eb3d628a89aa420ef6b6772c207 avahi-glib-0.8-12.el9.x86_64.rpm 05a41794edc799618f3be6cfc4892fa4e49a011dfce6840a36a87509456dc1fa RLBA-2022:4097 new packages: brotli Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for brotli. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms brotli-1.0.9-6.el9.i686.rpm 6e07d1422b30b1bf21d45b46c7fdb313bdf5088e4e11193c80f372f371eebec4 brotli-1.0.9-6.el9.x86_64.rpm d147c8d7be3e36ccb810e32fc65829b174fca7ed258352ab4136b2118d383e54 brotli-devel-1.0.9-6.el9.i686.rpm 45f31796c96e13733d804d74770ffce33bbd94389a6389657f941494520c330d brotli-devel-1.0.9-6.el9.x86_64.rpm f1aa9ca48d6d54da1c06dbceec119e7a13a990b50da380d78f3ecc3136b323f8 python3-brotli-1.0.9-6.el9.x86_64.rpm 5ee5dcf967aed040f2c5236b51f6b6e745e1e8a3feeeb8436ffd312196d092cb RLBA-2022:4099 new packages: bzip2 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bzip2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bzip2-devel-1.0.8-8.el9.i686.rpm 48702379ff945dab1188b0d3571018925bc89c78ff5598b543f110f2f755a33c bzip2-devel-1.0.8-8.el9.x86_64.rpm 3986a67c447cae27f863c6982fdb511ad003975e958cd56b6606edb3608e3210 RLBA-2022:4101 new packages: chkconfig Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for chkconfig. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ntsysv-1.20-2.el9.x86_64.rpm a074b13ec70d70e0afb4bb5f82ce010dd957ed3348c7110442f2b072a027b868 RLBA-2023:2564 sudo bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sudo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sudo-python-plugin-1.9.5p2-9.el9.x86_64.rpm d6f58b9924913d1d2a849c1e459cd4514162d3a981cece1861e721eaca48d80f RLBA-2022:4126 new packages: gettext Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gettext. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gettext-common-devel-0.21-7.el9.noarch.rpm c0f131aa3b848f5b6997b52659f94c124cfc1971d94b12d287e4b316b619ef06 gettext-devel-0.21-7.el9.i686.rpm f9508b155bfd75c0ed9e9d409daae562261f4309940ddaae3f1aad93f1f4c430 gettext-devel-0.21-7.el9.x86_64.rpm 5505ea0617e9abcad1f8ffb4c00ea3098fcec16315715de8584d77a5431f4966 RLBA-2022:4127 new packages: gmp Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gmp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gmp-c++-6.2.0-10.el9.i686.rpm e1c5e6c893e286d3b9cc7ebfc18169bd9e74e5a8f46c7cde5416eddac5bf0cee gmp-c++-6.2.0-10.el9.x86_64.rpm 9b8a1315442ba1b544bc2a522d43fd44771a4471956f3520c3be6ba3467cf6aa gmp-devel-6.2.0-10.el9.i686.rpm 307e7e607e4cb0fe422f6dc740ad2c4d583e3cd9efac121613e4f879e92ce7d6 gmp-devel-6.2.0-10.el9.x86_64.rpm 088450bd84c84d133c5439b35f9d4df30a0971b620d958e34d930a46b86d3d3d RLBA-2022:4130 new packages: gsettings-desktop-schemas Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gsettings-desktop-schemas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gsettings-desktop-schemas-40.0-4.el9.i686.rpm 0adb071be44cbc290e730c64f75067b46a09d9b6aeb4c9bd6665ac64cde75d7d gsettings-desktop-schemas-devel-40.0-4.el9.i686.rpm d38e472b89c1deefa03c4cad33329d179e7d406994409b21bf173c680ca13d44 gsettings-desktop-schemas-devel-40.0-4.el9.x86_64.rpm 1e80da98893bba3557998dba42a1334536cbd97751d4ac14eb07b4519a7cb508 RLBA-2022:4147 new packages: keyutils Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for keyutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms keyutils-libs-devel-1.6.1-4.el9.i686.rpm 723f7cb475df87a9cfe09348ea1961fe1c90b3889f41e50aff94eed25610e5ee keyutils-libs-devel-1.6.1-4.el9.x86_64.rpm c2a9a022d38a29484dadbc6411c41804b3be6e66e32f8edb6be96b96d2d50269 RLBA-2022:4156 new packages: libedit Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libedit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libedit-devel-3.1-37.20210216cvs.el9.i686.rpm 257c4f1afd26c21969543104abf45593a58242d5d1cde3a2dfeefc9c962692bf libedit-devel-3.1-37.20210216cvs.el9.x86_64.rpm 969c06e17148cffc6b4602a8ce31d44b48b2dc9f6c495453e47e607f15b4e944 RLBA-2022:4158 new packages: libevent Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libevent. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libevent-devel-2.1.12-6.el9.i686.rpm 529e60f7c26e4470b471750b8dd92368e10112701bc66c48d02dec0665d4a31d libevent-devel-2.1.12-6.el9.x86_64.rpm 29d0135870149906f72062952fb84ab97423c7eaa1c3ef7aeaa4d3599d790086 libevent-doc-2.1.12-6.el9.noarch.rpm b5e85ca5c20132b4aa8e354a6ae80f154b66e468a4617de0872d398a557320bc RLBA-2022:4159 new packages: libffi Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libffi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libffi-devel-3.4.2-7.el9.i686.rpm 408bc68d34b8006ef407f80afd76c082700b7d720172ca3de9d6eb13e69c5300 libffi-devel-3.4.2-7.el9.x86_64.rpm 34334e854639f104a07a7a46dc93ce0a5bf69fafa3e329f3899f0c75350f1733 RLBA-2022:4174 new packages: libpciaccess Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libpciaccess. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libpciaccess-devel-0.16-6.el9.i686.rpm aa1f440707f64a57e452df3f8a6dcaf8c4dbb139bb18352d1e842a4c273cb82a libpciaccess-devel-0.16-6.el9.x86_64.rpm 94bdaccdafebf95c387ff75fc945a0cb88594a0de94670ed56287b8e6f0d43c6 RLBA-2022:4203 new packages: lua Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lua. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lua-5.4.2-4.el9_0.3.x86_64.rpm 9b9247dd77c68e135da37e03d53c011f8d879f369a45bb7cbd275a51c6f97824 RLBA-2022:4217 new packages: mtr Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mtr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mtr-gtk-0.94-4.el9.x86_64.rpm 439085e0873cdba8da6b235e194bf2dd689d45ca3f4bf11038bae6654afb4435 RLBA-2022:4219 new packages: ncurses Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ncurses. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ncurses-c++-libs-6.2-8.20210508.el9.i686.rpm 0365dc00649bb26a79b07e87798ab4a1abcc03e2bccdda968fe72636cd98063a ncurses-c++-libs-6.2-8.20210508.el9.x86_64.rpm 8112f05b88f021cd8f3dfe78cfebcf186afc31189630cbb40d695e8d4562d863 ncurses-devel-6.2-8.20210508.el9.i686.rpm bdc0e90483a60d93dd057c675825e7059d1450255f085429a9cbf570550a9d95 ncurses-devel-6.2-8.20210508.el9.x86_64.rpm 63e3cd6be1a424be25b5e871404d52c7d605cfea919336661bb77fc6f32ba8e0 ncurses-term-6.2-8.20210508.el9.noarch.rpm 217c19dc88977c1f773fee0eaff42a6c2052770b2136f2490f3415e670a400af RLBA-2022:4234 new packages: pciutils Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pciutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pciutils-3.7.0-5.el9.i686.rpm 8b5c556ea438ff458082e94a36087fd5c232df06e7a20e01aaed4bcb6c03b6b3 pciutils-devel-3.7.0-5.el9.i686.rpm 624fe3d13ff71f01e6ad67c3e6efa32a83f94080ed0915eda1d7ec85e14d0561 pciutils-devel-3.7.0-5.el9.x86_64.rpm 8f8189aa3dbbf3b7586dfe1ff3202cbbeb8c20cea379107f273148c4a792385e RLBA-2022:4235 new packages: pcre Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pcre. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pcre-cpp-8.44-3.el9.3.i686.rpm f70d9908607890bc0f12af3adba36d84b65acde59f50f9b548c78b13715f5084 pcre-cpp-8.44-3.el9.3.x86_64.rpm c12408f0e43550f4e640ece977e1b763dcfbf7c90448ab916f4ea5b7e3540544 pcre-devel-8.44-3.el9.3.i686.rpm 070b5b27f5cd306f98e99ce0b25c57f36ed85588b1cbb1d4c8bd3627802ccb62 pcre-devel-8.44-3.el9.3.x86_64.rpm 011952dc9f39d8731f4ca1fcaa804b61f1c4616dc0fcd36c9fbc713974c224d5 pcre-utf16-8.44-3.el9.3.i686.rpm 5e11193a141f4b8c3989f0cc10ae2ced4c718785d71039211f268cb5ffcff9f7 pcre-utf16-8.44-3.el9.3.x86_64.rpm fe2e4389e7a6080148b183b067df833a44a134f942c8e4dc16d2220da7a0d636 pcre-utf32-8.44-3.el9.3.i686.rpm 9c1760f39ed6c5914e02fca8a27d4597c3add8bc2285d78aac8f4804fc3f8d2f pcre-utf32-8.44-3.el9.3.x86_64.rpm 1c711ec504e06c279911e0afa4893a904e77876ec7dff6bbfa40afed6045b6b4 RLBA-2022:4237 new packages: pkgconf Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pkgconf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pkgconf-1.7.3-9.el9.i686.rpm 5671e332e50ec388f06236f69271439d116f6966660a78139c45ef2f36900ac1 RLBA-2022:4258 new packages: quota Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for quota. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms quota-doc-4.06-6.el9.noarch.rpm de1ef75b66431c1e60095a048f68565d0fe05cf7fc669793e624a1fd82760688 quota-nld-4.06-6.el9.x86_64.rpm 06edf0df42f576f1b6c85b70cbed0fcf4d2eafa3654b7b8adbc0707bd2d91321 quota-rpc-4.06-6.el9.x86_64.rpm 7ea1d96674070491506802db9cec44ca05b96ebc77ee7bf69ebb58ec4d06f769 quota-warnquota-4.06-6.el9.x86_64.rpm 6d1c1a505c3b6f34978d0f863ea8f2e5745baca1b0c041fd5c4f4261a3b1179e RLBA-2022:4271 new packages: sudo Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sudo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sudo-python-plugin-1.9.5p2-7.el9_1.1.x86_64.rpm 3c51c1e16d0fb0f70feb41a7bea3b9e142e87aca3aca6e552e75befd4761280a RLEA-2022:4570 new packages: libreoffice:flatpak Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for zaf, hyphen-uk, libpagemaker, hyphen-ca, hunspell-et, hyphen-eu, hyphen-ga, libvisio, raptor2, hunspell-ta, mythes-nl, hunspell-lt, hunspell-sk, ongres-scram, hunspell-hu, libshout, hunspell-nso, poppler, hunspell-nl, hunspell-hi, openjpeg2, libabw, hunspell-es, hunspell-sv, hyphen-sv, hyphen-te, google-carlito-fonts, hunspell-br, hunspell-ml, hyphen-pl, hunspell-pl, hyphen-el, hyphen-ru, hunspell-bg, hyphen-es, mythes-ro, hyphen-as, libloader, libmspub, dconf, mythes-en, libreoffice-voikko, hunspell-de, hunspell-id, hunspell-eu, libexttextcat, hyphen-da, pentaho-libxml, redland, hunspell-kn, libcmis, libepubgen, libodfgen, hunspell-fr, hunspell-th, hunspell-zu, xmlsec1, libnumbertext, hyphen-gu, libreoffice, hyphen-nl, hyphen-ro, libfontenc, librevenge, libwpg, hyphen-it, mythes-it, libmwaw, ttmkfdir, postgresql-jdbc, hunspell-sr, hunspell-ga, hunspell-ro, openoffice-lv, lksctp-tools, mythes-sk, mythes-cs, hyphen-cy, libformula, liblayout, clucene, hunspell-hr, mythes-ru, hunspell-gl, hyphen-ta, mythes-da, hunspell-tn, libqxp, lpsolve, hunspell-gu, mythes-pt, mythes-sl, libetonyek, hyphen-lt, google-noto-fonts, hunspell-ar, neon, librtas, hyphen-sk, hunspell-cy, boost, hunspell-ko, hunspell-si, flute, hunspell-pt, hyphen-fa, libzmf, hunspell-nr, hunspell-pa, hunspell-ve, mythes-ca, sac, hunspell-it, hyphen-bg, gstreamer1-plugins-good, openoffice.org-dict-cs_CZ, hyphen-gl, hyphen-hu, taglib, bitmap-fonts, libwps, hyphen-de, libbase, hunspell-af, hunspell-or, mythes-ga, xorg-x11-fonts, hunspell-no, hunspell-kk, libvoikko, mythes-sv, hunspell-el, hyphen-id, hunspell-da, libwpd, hunspell-ss, hunspell-ts, hyphen-bn, hyphen-sl, libeot, mythes-fr, hunspell-te, mythes-pl, pentaho-reporting-flow-engine, mythes-de, mythes-es, hunspell-as, hunspell-fa, hyphen, hunspell-uk, mythes-el, hyphen-hi, mythes-hu, hyphen-or, hyphen-mr, hunspell-xh, hyphen-pa, libserializer, poppler-data, hunspell-mr, hspell, hunspell-st, hunspell-ru, libfreehand, hunspell-ca, hyphen-fr, hunspell-bn, gstreamer1-plugins-base, twolame, libcdr, Box2D, liborcus, hyphen-ml, hunspell-sl, javapackages-tools, librepository, libstaroffice, libfonts, v4l-utils, rasqal, voikko-fi, hyphen-kn, mythes-uk, mythes-bg, hyphen-pt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bitmap-fangsongti-fonts-0.3-40.el9.noarch.rpm 4ae7407557f356b5385e5af30828d696db176922a084bfcd18e82ddd557ddbad Box2D-2.4.1-7.el9.x86_64.rpm 20c2c7567463b52ba373066175fe68758a0b52bf969b3a5c5de9769be3bfa567 clucene-contribs-lib-2.3.3.4-42.20130812.e8e3d20git.el9.x86_64.rpm 37e66e38042fd0b394f138de56a3e601c8d2aa6e8c198b333eff53a52f7c6836 clucene-core-2.3.3.4-42.20130812.e8e3d20git.el9.x86_64.rpm cbeb94c40b03f61dc2454880bb52a07aa80a7cd3eeaa0bbf9371c0b05aaf164c dconf-0.40.0-6.el9.x86_64.rpm 094e218a547ef05f2b38e7ce685a39242def2065a7a44fdd4cd7455326d5b02f flute-1.3.0-27.OOo31.el9.noarch.rpm 59c9fdbad28e29822220d1b939e5e080b36388122db1abc90e6161ee07b2c308 google-carlito-fonts-1.103-0.18.20130920.el9.noarch.rpm e34d9dd16bdd38557fbca87d54c755ad862c1920db64b6dff3e83e035d4c51a4 gstreamer1-plugins-base-1.18.4-5.el9.x86_64.rpm 0cfca79f1e2f645681fd396585570e003502a50b8b783af8f501b76699f351d4 gstreamer1-plugins-base-devel-1.18.4-5.el9.x86_64.rpm d1eeefab4b42ffc1b66e58aa2841c9c45909747de79bd382860187eeb3aaf457 gstreamer1-plugins-good-1.18.4-5.el9.x86_64.rpm ac3ed569780c6d98d0af08cc74f11869ea2dc680268783022a3abbf3c803ecd1 gstreamer1-plugins-good-gtk-1.18.4-5.el9.x86_64.rpm 1cc4571c2a3b86f158b82740ff72fa84a2bb58da4244001aeefc2eabb4265c13 hunspell-af-0.20080825-24.el9.noarch.rpm af7dcb9279eb657670463349b40ea3b4b0f38b37227be83969240e261ecc3c9c hunspell-ar-3.5-15.el9.noarch.rpm c15960b12fec79e8389ca45119d9183c76498b4a8d274a99a6eeace91d77b6b0 hunspell-as-1.0.3-25.el9.noarch.rpm 72263ade0a0c7b301bd424e68097f464dc7ce44d911655f51889098dac134a48 hunspell-bg-4.3-22.el9.noarch.rpm 3a15fbc8c9f64f7339cc3ee55fc7427363875e788a60c68bce0f03cbabdc8793 hunspell-bn-1.0.0-17.el9.noarch.rpm 7919e3e0e4547ce1365e81da9a737f2a4c6378b4035a7db4519e2c45b0c1955e hunspell-br-0.15-9.el9.noarch.rpm ce559316f2f4a86a0d2191714d6b912f1d5bb4b45d0a9d8899dab36cc81fb2f3 hunspell-ca-2.3-19.el9.noarch.rpm 98d95c4b2476bea9913ebcc3e06826b728f29b2f6244e3027fba3965664d5d2d hunspell-cs-20080822-16.el9.noarch.rpm d41708944d1a017f9ca6924391d132ea91d50640acb15b9fa5141e7eb69aa784 hunspell-cy-0.20040425-26.el9.noarch.rpm 6c531de94e6d5fa0790909aeaedc448daab984abbbb09e589a7795217c829469 hunspell-da-1.7.42-17.el9.noarch.rpm 396e20ab93f5fe8eeccab6dcf8345c8548c028ab5d2831afcc190a3e7080749d hunspell-de-0.20161207-9.el9.noarch.rpm 3868429078d7fe50289f72571b03ddcc2eaa422b5e40271044981d23443c8495 hunspell-el-0.9-9.el9.noarch.rpm 3076e800013bace8d0a9346c67cddbf3333d39b1b71b3c4ee1eaff8b1a594395 hunspell-es-2.3-10.el9.noarch.rpm 0760232ced5b31bb2e44a25ad31bfd6a711b42b858d9ba56cca4755dda577713 hunspell-es-AR-2.3-10.el9.noarch.rpm 257a2e6ec47c0f2378c76c458c5f49e3978de7a45a52331999477da62160a0b2 hunspell-es-BO-2.3-10.el9.noarch.rpm ed301b9b815ed4d864689dbad90cec92c8ca0f81b74ced48ff70af49537fb9de hunspell-es-CL-2.3-10.el9.noarch.rpm 715b7cd2d9235425b3971bbb3af70d44dab18663b94b3d12471aca2433527ffb hunspell-es-CO-2.3-10.el9.noarch.rpm 1a62b6934fa105551fcd3f917553387bccf4f0eaa1df1051e8b8ed29d265d446 hunspell-es-CR-2.3-10.el9.noarch.rpm 1bd60ff4a833ceb27639b534b26ae8dbe17788e85be419de07c4d7aa5e2d29a4 hunspell-es-CU-2.3-10.el9.noarch.rpm 3e8679bc7b08cfd496642e90894126348900f893023ecd7a1d348d724756efb5 hunspell-es-DO-2.3-10.el9.noarch.rpm 8192d50c5d4e2db6a7948958bb757df1d30f37dde9bd33e80854c8b0bcd8c310 hunspell-es-EC-2.3-10.el9.noarch.rpm 0fd4781d3ba30a7759cae30ac147b2258075501238e90e2d3bb7b5c62c4de7a5 hunspell-es-ES-2.3-10.el9.noarch.rpm 0b4a26169f7dc8b4d50d06a756462e55b0fcecc9192eb1689d53fb32232bf1f4 hunspell-es-GT-2.3-10.el9.noarch.rpm 5e88c0c8c1b6027c6485fafb7788edc8c438c25306b10ed470e1e6ab44dba19d hunspell-es-HN-2.3-10.el9.noarch.rpm c4bab3b11653280c0f6fbf65abcb503312459f1e458d43dbb1c82d464a834a81 hunspell-es-MX-2.3-10.el9.noarch.rpm 6f093964b5137a1c7fdb59c477e5ec21b9b9f5c09229d63614cd7340aa85aae0 hunspell-es-NI-2.3-10.el9.noarch.rpm 76752ffbbc15eb125119c68a1f20aa4a70955c3cea00f4d7512ce57174bb2ae6 hunspell-es-PA-2.3-10.el9.noarch.rpm 64ecb188342e5155e4729361dbaa49d21053666409f4986daa25217ed8ec5e68 hunspell-es-PE-2.3-10.el9.noarch.rpm 1c3ab8e9f6e491e20a769fc8e8a49a7fdc99b818aff48c0baa69d3113a9d539c hunspell-es-PR-2.3-10.el9.noarch.rpm ccfdeee701dba25a21de3724e3032d1e0783022f989cfdc46129790cd1560a3d hunspell-es-PY-2.3-10.el9.noarch.rpm b0ce1ed36a3698c194e7746ce9f63a28ddc567ca5bdb0534a1b0faacc56376c0 hunspell-es-SV-2.3-10.el9.noarch.rpm 6ade64caff032d0eb89ad742c7461294e896efb248d9ffa6a28b5bdbb46fe5fd hunspell-es-US-2.3-10.el9.noarch.rpm 128788fdb272458b3d9a734ea84fee2f8cd75b4326ae823133a924872efb4550 hunspell-es-UY-2.3-10.el9.noarch.rpm a327c807df21c1f359e0ea02e780d15b01950a88f72c868bbc96f06443877d73 hunspell-es-VE-2.3-10.el9.noarch.rpm d8acb85c18d29950045e3b13c21f3d612bed9b37211d356ee88da9f7251f5df8 hunspell-et-0.20030606-27.el9.noarch.rpm 801dc5859e9074f24ffcf9361ffbb9a343de8aaeb6b941ae5250792a1c617d90 hunspell-eu-5.1-4.el9.noarch.rpm 537810243aedb23383d8cadc964b7c7fcd72f88d72bcace49d73facd02d35f38 hunspell-fa-0.20070116-26.el9.noarch.rpm 4b17d2bf290009dc2651a87af6e440a762b198b0dedbfad56539ac3cd7742c1c hunspell-fr-6.2-9.el9.noarch.rpm c83e8350b9ac8cf35b100592338bb441215b49db34e3739e9f7418f8fc484496 hunspell-ga-5.0-10.el9.noarch.rpm 5be98da184a0d5f7463620fdc48f275b9a11aa59f699cf52b71499c3296eab73 hunspell-gl-0.20080515-24.el9.noarch.rpm 21385c28644e09b9f1b988a0a565195174cc7489517e97df7772b4cee3034a28 hunspell-gu-1.0.0-17.el9.noarch.rpm 66791ef5b1e8054336d039076ac9a3f714903c7e0231aa5c46e1a698b2c3c154 hunspell-he-1.4-15.el9.x86_64.rpm 8407294c0e91c482f161fbea14a168bbde348d617cfae897f8c8aeb10990be45 hunspell-hi-1.0.0-17.el9.noarch.rpm bbe3af1a286af37d59561f1f03001ad5f359bd07db908e3bd602ae9e8be6e507 hunspell-hr-0.20040608-25.el9.noarch.rpm 63e6b0f4d1394a853a30b8a50f798f0107e55e6ae4dff52320b510d03551d275 hunspell-hu-1.6.1-21.el9.noarch.rpm ffdabdb86ae03e1c2cdfd5e60c64ca68febbfc13f1d982524f8f4d3d4b5505ca hunspell-id-0.20040812-24.el9.noarch.rpm 436c963c279db77baf9a3b7d529b087bc354bd19eeb7117bcf29f7b0f12dd6e7 hunspell-it-2.4-0.25.20070901.el9.noarch.rpm c2c6cdfcb06e0a6f6d9ad6d8ca4a36eaef4e98a6a4f6db1d8608f926af91729f hunspell-kk-1.1-22.el9.noarch.rpm c8e36e644f2d0690bf78513d9af250ec15817960750af10f4c3a111172ab5417 hunspell-kn-1.0.3-24.el9.noarch.rpm 57d6234d4cbcd74b7725bddeab73c4d414040d7de88b212d45c8f17ebefc63ab hunspell-ko-0.7.0-12.el9.noarch.rpm 70faf561e7467b6589b3be806f869c80fbcb61d00a7c8dbd7394ca4f81a5b412 hunspell-lt-1.2.1-26.el9.noarch.rpm 1f992ba7c33a41e8b136e7964ff2a1c18bbba394e238ba75e48a67c743eec8e5 hunspell-lv-1.0.0-15.el9.noarch.rpm f3d6d94df4dac45f622d3c966d5af9e0217456f2b2c8e05b48d1ad2880faec3f hunspell-ml-0.1-26.el9.noarch.rpm 775e1d9566a7928b5dfdea5f854ff223b22a6bfa24ab9c68457b7e9a269b76ff hunspell-mr-1.0.0-17.el9.noarch.rpm 91e43704bff637b14797f3c1adb66df99318113f9ee4cf8b766c1440e5435650 hunspell-nb-2.0.10-15.el9.noarch.rpm 2172ae96a7371ed0f4f70603e4c56b39ff761209cc9ab00fc9eeb5cc8d3e27ae hunspell-nl-2.20.19-5.el9.noarch.rpm e6869ff09e5e5219072e8aa217f280380862a6f89ea936b7f8c1a987e49f5ba7 hunspell-nn-2.0.10-15.el9.noarch.rpm b54e6dfd49f9df5559fbc3af350e4410015f820c326b6d636782f293b4819b30 hunspell-nr-0.20091030-22.el9.noarch.rpm 1038bc6662efaade4134554b1579614fab069cc0e1730e2b7d7d3205a423cf16 hunspell-nso-0.20091201-22.el9.noarch.rpm bd1152ee53cf8ed52605fa56905b12308e20aeb1ae5f0f3ab378212782f5c005 hunspell-or-1.0.0-17.el9.noarch.rpm a38165a2386bd2f9cb392ca5a0b410977e90902015a2e7912f83c36535e7066f hunspell-pa-1.0.0-17.el9.noarch.rpm a98cb01fc3d30ccd8e78e289c4526400b4fcd3efc5c5f358ce9e3cdd7eb5739b hunspell-pl-0.20180707-9.el9.noarch.rpm bc400a0bf222a99aa3297ba0f18a9c9697d1811916616f96edb07d79d2035aa3 hunspell-pt-0.20130125-18.el9.noarch.rpm 80cfcc04f8e4e95303a9887fabaffd365c4c864c9b4f39911d80f4851d94303b hunspell-ro-3.3.7-20.el9.noarch.rpm cdd1459edbf3447ed4442551008bf5aea77215b8df0ffc7ae3994104d6db2d3f hunspell-ru-0.99g5-21.el9.noarch.rpm 8e545ae7f0e19bf0a9a386d044cbd70d3aafb6336e3e5f6f0c1aa263a32848d4 hunspell-si-0.2.1-24.el9.noarch.rpm 1a8689915dc74bd2bb0305c2eafd2892c87494377fbccf3134009bb255b21783 hunspell-sk-0.20110228-20.el9.noarch.rpm 0841e6ab8f8907c39eeabc2f88c7da880d7792740b96d9ead7affacbb6356c71 hunspell-sl-0.20070127-26.el9.noarch.rpm 29fcc4716afed0b4efe5871114a02a719a4e42f062a7111c3267338b960e5dbd hunspell-sr-0.20130330-18.el9.noarch.rpm 1b403338e5436aafbeb10f2663e257a19f90c7844cd13ee8bf0e53e56d3b944e hunspell-ss-0.20091030-22.el9.noarch.rpm f4c7181df5b44144d7ae64b17527e7cf42196142ac7519e5ce398ba8df886c06 hunspell-st-0.20091030-22.el9.noarch.rpm 19548e95cda12bb65731563f4be75eda8f84456fc134a3b2517d08bdd6b28858 hunspell-sv-2.28-16.el9.noarch.rpm e7f48bfc0132e31e5337627f5b64058e808caf01a6be9a8a5175123b314a45fe hunspell-ta-1.0.0-17.el9.noarch.rpm 328b2b5e3c63ec175211a64d66d0b99e4dc02740b52390824f2391ab9222d764 hunspell-te-1.0.0-17.el9.noarch.rpm f0ac26cb0263a69b0b26843b2b0a42c18effdd21a7914e07f20326cd4e005e69 hunspell-th-0.20061212-25.el9.noarch.rpm 400c2759807cbf44b3860376228e18dde3a0d501789aed1ab26d77d706fcad38 hunspell-tn-0.20150904-9.el9.noarch.rpm 34ea7e4b24944f0b4d598c516d9eddfd69aa6ad480733e19ae4a30e2bdd4e5b8 hunspell-ts-0.20110323.1-9.el9.noarch.rpm d35829ad487b4eac19dc344d228188950f20eeec945e550ba91b1c39704777c3 hunspell-uk-1.8.0-9.el9.noarch.rpm 48ebdd08db0310e6e71b43a923951924bc2d7196db356acb9fe65d46ff6c2a4f hunspell-ve-0.20091030-22.el9.noarch.rpm 98701f04fffc38c9a201f8a47fbc71810efb2c454e343ee767e42817d2f13852 hunspell-xh-0.20091030-22.el9.noarch.rpm f527b57afbdf884019be433e8592a38ad374c05dfa7b5097a0724480e91ebacf hunspell-zu-0.20100126-24.el9.noarch.rpm c77e76514bd739ba436edce86a014452d931b2223066e8e5a9935318e801f2dc hyphen-2.8.8-17.el9.x86_64.rpm 6cb90d376202fd7320adda6e032ea9d8f900ef65433dffa9d980f9f294d27994 hyphen-af-0-0.25.20080714svn.el9.noarch.rpm 6c88fb59051144f284b63b65d7c8d9be5b3405e160bf4cdaeb716bf85aae076c hyphen-as-0.7.0-19.el9.noarch.rpm 62cf079957b5135ee90a4c9573acabdacaec1e2784c22d025b7a6698befb2cf7 hyphen-bg-4.3-21.el9.noarch.rpm d101484f69e2b466e0d6237ca6237e0837aa2454b253ebdb0b2b9587797a3a67 hyphen-bn-0.7.0-19.el9.noarch.rpm ffc8d82bf95544ca99c587138c8af4b3c62d7fd71bd0b72ad45a12575129e6ed hyphen-ca-0.9.3-22.el9.noarch.rpm 6d328a0daf3c16d463e75b5c815a25ba16493b84786c6012f366202203ac1f5b hyphen-cs-20080822-16.el9.noarch.rpm 18e74f8c7742f486e921075fcaf9772f0abc57e082098684ae14a25ee6c45c4a hyphen-cy-0.20110620-20.el9.noarch.rpm 21bf50a658aaa7975168d4a0edb16aed89ffe7eded40434cb34475536fd9fcd0 hyphen-da-0.20070903-25.el9.noarch.rpm 3d3a86c41a500360bda82d581eb9640590e25df3419c91b719abf0ff336693d6 hyphen-de-0.20060120-27.el9.noarch.rpm 215a93827a6bb69ecdfd22beb1a513ae0444b1266691fd28211340d20f811d66 hyphen-devel-2.8.8-17.el9.x86_64.rpm c17a95d076bab6e7a42d660aa11679d8e3caba56b1f61e30a3c8cdb10002037d hyphen-el-0.20051018-25.el9.noarch.rpm ac5bb01aa535b95fb216c49ea10f209b58ca30dcf7233472471a6d699ae149e5 hyphen-en-2.8.8-17.el9.noarch.rpm 17a995b6190aeec475f05d7c9a1ad8512c0b450e435a5ec08840d9f6ca68fb49 hyphen-es-2.3-11.el9.noarch.rpm 1ffbac7e70c52e287d4f60beaa89c2b284893f439941bb4a1da9da2aa2807218 hyphen-et-0.20030606-27.el9.noarch.rpm 4325c1a539e7e82ff05d84d68271e9ca4baf3c90dc52792fed7df3130bc6f7ab hyphen-eu-0.20190406-2.el9.noarch.rpm cd8765d7f97a436591f57ae1fa0ac91a562f73fd761adc5062d17d77eb1712d2 hyphen-fa-0.20130404-17.el9.noarch.rpm 974717a2c4f7e7e2bdc24dfc29bd17dd569144dd44b66278b50d30140715bd24 hyphen-fr-3.0-10.el9.noarch.rpm ac33fb2dd1a8b222f7a511160cc0139adf9862d0c6fbdc397457839ab1592b28 hyphen-ga-0.20040220-24.el9.noarch.rpm e56de1b805f46356167e20878cb32084de34d63760b19281111c33f4caaf92bc hyphen-gl-0.99-23.el9.noarch.rpm 7bc701138af824d56e020088c6f6bdc75548b9f14a0572c3f350a81ccb62f0b1 hyphen-gu-0.7.0-19.el9.noarch.rpm 1bc2cdb0750477339128373c1246dd84fb02ac1c87b47afef9fa9275788289b6 hyphen-hi-0.7.0-19.el9.noarch.rpm 531a17aeca603762b2dfde1cefac03fd3444ff8eb79afdb1d560d9ed0a2cc0c5 hyphen-hr-0.20040608-25.el9.noarch.rpm c78ef8203dd18c0ac880333ce116dc4d00592ae804296b4d97c819c013d8971f hyphen-hu-0.20090612-27.el9.noarch.rpm 4f2cf2692cfc9a2a53ab5d45c22e970ed04a119e63a41efd753e68ea13e6a68b hyphen-id-0.20040812-24.el9.noarch.rpm a55d67d93e7e7d64fbc4d9f359600066fef32c43aa70febb779ddc5f3318eda6 hyphen-it-0.20071127-26.el9.noarch.rpm 201ff6ca698b106fe4cb50e825acc24567fe9105bfe2a92784453bcd5196bea9 hyphen-kn-0.7.0-19.el9.noarch.rpm 084b8760980882d1780075366043d08f7e922c801564a1c3ebe07fbcab775e41 hyphen-lt-0.20100531-21.el9.noarch.rpm 2744f8f183abcd3227053b4878cbe0676388f74f15b9a4bb85392ab11fa279e3 hyphen-lv-1.0.0-15.el9.noarch.rpm 3c34d9af57666c4ad894d05eb4ef5021ace04a2607118dd6aaa6952dacc230aa hyphen-ml-0.7.0-19.el9.noarch.rpm 963a83ede6f616e2d1985d8366c8cf0ced0fc6ddf36cc5bb677d9d8586784038 hyphen-mr-0.7.0-19.el9.noarch.rpm 99a1b4a2f635544b9447c4beaa98257527530766b6b6b990a72ce253830b81d0 hyphen-nb-2.0.10-15.el9.noarch.rpm fbe3e04919e2ee3ea3f42a7dea719aeb3bf8026aeba06e8cdedc3cc12034c7a5 hyphen-nl-0.20050617-26.el9.noarch.rpm 4499d532218c3702bc2e119eb3da7a1f3e9e0324e4c88baa6a83d1537b45c77f hyphen-nn-2.0.10-15.el9.noarch.rpm 1fe4fda800adceff35879924988261a57aa6b916d7c1b358e0f6350ddb19ce55 hyphen-or-0.7.0-20.el9.noarch.rpm 8632afe78a2efc13f0c2e3585f4b3671ea514ed853a1b88da583e27109baa06d hyphen-pa-0.7.0-19.el9.noarch.rpm 15e29b82211531f54e490664670e32420acff89dfc2902fff6282d4eb890fb91 hyphen-pl-0.20060726-25.el9.noarch.rpm d5ab3912e231d33a6cb3dcb7ca4242710e2c72029bbd291887f04d0f848774ef hyphen-pt-0.20021021-25.el9.noarch.rpm 0ac82d6ef8216b0575a528af2b11fc0ea2fd96c09b7eb21a874212a53aa0ac5a hyphen-ro-3.3.6-21.el9.noarch.rpm d125d81fd64d0977b0cc96339b1aa3430a7f56644015b5c5628caa069904da9e hyphen-ru-0.20200325-4.el9.noarch.rpm ca015661a72ec25fafba7a4a801c2ef988ba66868f9e9a15478b471ff70b53c6 hyphen-sk-0.20031227-26.el9.noarch.rpm 7ad75d0eb40e087c88ca7735595e02d57904038c17c581bfdcf954d6afb95b34 hyphen-sl-0.20070127-24.el9.noarch.rpm 9ab05103489e198bbf15cf1888cac9f7e750477b1c459a0dd085e05a3f7bdc9a hyphen-sr-0.20130330-18.el9.noarch.rpm 441daaa2ee64b65e43be240b7dc01ec85405df6dd0b2547a3ccb9950b783fd43 hyphen-sv-1.00.1-26.el9.noarch.rpm ccee5e947354f4e54b7681587e9cb7e088ddd0fc6814b7ebae5fc5ed350dce94 hyphen-ta-0.7.0-19.el9.noarch.rpm 2e7ab3efb63bf43757c4aebad1e44d28d7fc4bbe847b79c67981a3662113ee66 hyphen-te-0.7.0-19.el9.noarch.rpm 78e15edeeebf566301b079a7292c2ce93302b1f8d70563f064e76a14092437df hyphen-uk-0.20030903-24.el9.noarch.rpm c841818cec08e45f535d80f23b2f7928abdfec0529677cc576bc125a7c7108e7 hyphen-zu-0-0.25.20080714svn.el9.noarch.rpm 04593c213f283fd3d9eeafb3b8188d5e8e7779b666f25995725e0d8b09db6603 javapackages-filesystem-6.0.0-3.el9.noarch.rpm b42cd1429b4d01f1482fa6fce44e41f5f923219d2fcb09634bd99a1792884dd3 javapackages-tools-6.0.0-3.el9.noarch.rpm bc51f441311b63d60154d6b4daeb1ef129e10fafb492b32d3d89a11bb8ae4181 libabw-0.1.3-7.el9.x86_64.rpm 57ee1c7d2209a6ed69e7b8196e7df228c9805436917fe4480f3f46ea3a2f9f09 libbase-1.1.3-31.el9.noarch.rpm 0225704812b678d00df8da81d77ce6ff25a1cf0e799fbd916fd7f7ec42d11738 libcdr-0.1.7-3.el9.x86_64.rpm 416924ab98608142d48f2fa1419c381d0a4f89c2dc919f37d8a626b522df1b22 libcmis-0.5.2-12.el9.x86_64.rpm a6b97b46b708d2825f553174a46a58efcac80d3e4e9caa4932b7886640079d76 libepubgen-0.1.1-9.el9.x86_64.rpm cfe6a5d4ecfd8c5f52699b6e0ee511e1c7a4db628023e071a8cc87dd22592398 libetonyek-0.1.10-2.el9.x86_64.rpm a9b4305a91b87a1066d00b510f1e641ed76b68d1ddda910c642bb98164c70806 libexttextcat-3.4.5-11.el9.x86_64.rpm 693ef204855a8d31de431211afa6bf3cb4441bdd8d1c6d777d2e3dd608a37245 libfontenc-1.1.3-17.el9.x86_64.rpm 867e2805940f8a3da79fe085ad65dddc3e9968e72f14f076e74c99f28220fe23 libfonts-1.1.3-35.el9.noarch.rpm 6e124b2be12e37786be97347be39a2af623f06237a6a5477ee5a5513f8439081 libformula-1.1.3-32.el9.noarch.rpm bf2ff8277aac84b55ee41db28007025d3c9491860851482ab42dbe756fb38d2b libfreehand-0.1.2-11.el9.x86_64.rpm 443605b03574cad4a615b9c95c88901bd451aa06a13e3838e1ebac4063e04f8d liblayout-0.2.10-25.el9.noarch.rpm 15a5b9aa841da39c3db0215e1eafbc96f1ab24526638e59701b517601aebd291 libloader-1.1.3-32.el9.noarch.rpm 76524a1f91210728fb061e86cebb4b95bca3063c0a97bc4188be5acd2093e3d1 libmspub-0.1.4-17.el9.x86_64.rpm 134288d178b1e75b10b85104e8828cbc727016cb80a9fda010422bf2e044020e libmwaw-0.3.21-1.el9.x86_64.rpm 5939af1d81da64af8587a0e79ffa3b7c79935f2373647dd5956af6b02b519927 libnumbertext-1.0.6-4.el9.x86_64.rpm ba28df9771f3622f4f9eec2c4f397f8e862bedbc34388a1ab006c1b2c79cdaab libodfgen-0.1.8-4.el9.x86_64.rpm 0cc47f1ee1e533ca38bcd5f51db67bd791e39cb530af99852cc3c83a5cc7d1f2 liborcus-0.16.1-8.el9.x86_64.rpm 8daf0d9feaa92edd658508bb16676c0cb733a2d94ede0363130673f5a9fd5bec libpagemaker-0.0.4-13.el9.x86_64.rpm aeadc4e3b241564a62acde116c4cf14ce7e80d5752d337a207f5897836768542 libqxp-0.0.2-11.el9.x86_64.rpm 68ae4d4a89a86d8679f2388a0ca353ff4ec4eebc5e5491a0b1a02f322f201f71 libreoffice-voikko-5.0-10.el9.x86_64.rpm d261cdaa6ac0b1308f2829d5b26c1e286efdb22f8c9a559741e7904cb9cc1fb0 librepository-1.1.3-31.el9.noarch.rpm 7187010217667b14cfa997a68c8d100488244d0151ca83605bcf818c312a4378 librevenge-0.0.4-22.el9.x86_64.rpm 08c936b4b644599ddd86781dc40a6930b18b4919bb0c51c545e56255d25f0007 libserializer-1.1.2-30.el9.noarch.rpm d41c4d826423e13e5242ce523db763d6aef5473ea4d9509b3dabd61dfd9e6d68 libshout-2.4.3-7.el9.x86_64.rpm 4cb1908352b9551a3cb8bcbf0b8fea7806b13730b8320e7dd309022ec3c7d435 libstaroffice-0.0.7-5.el9.x86_64.rpm bc04a4b48d76aea5692f435f541f7d1cbbf92079eeb19dbbeafcfa514de1f783 libv4l-1.20.0-5.el9.x86_64.rpm 959bb071066f041fb801689c1208fe86acaa15fe42d2c15baa157513661ddff3 libvisio-0.1.7-9.el9.x86_64.rpm ebb3d15d8aea355322c45482cc8307b2a08a85bc84a0583e50901a59baebd324 libvoikko-4.3-7.el9.x86_64.rpm 700324de19f57e33d55d6d2659d33801e54dad624a05522216858a452c207e8a libwpd-0.10.3-10.el9.x86_64.rpm 4eb1d2801cfacee5e40c761087f00bd5b4836ca6c9d829f3dc70c52f93c16215 libwpg-0.3.3-8.el9.x86_64.rpm e5d38146349f3d2b9a82ae52f94acc190015a6dc1f3fa3b215711eb8860ad562 libwps-0.4.12-4.el9.x86_64.rpm 62282f3726ad1ce6c96e48e56f1715e785851fcca66a0a938304b63c73f2cff0 libzmf-0.0.2-18.el9.x86_64.rpm fad9a7c80d5216744838f59a4910ee3f9f7425e946079d4477deb161cb02911b lpsolve-5.5.2.0-28.el9.x86_64.rpm 8cebb5cad8dd51f2b52b1c11ad7d722205d5320889e977806a488fa40976809b mythes-bg-4.3-21.el9.noarch.rpm 1adbe54a0c7eb1202cbb26ba7c51ca751d13830ad03908055dca4b9685d106bb mythes-ca-1.5.0-24.el9.noarch.rpm ad28f615e6adb8f6b301fdd332c96174a4be0c2833e3278ac3cd92219f0a869b mythes-cs-0.20070926-27.el9.noarch.rpm c6857f4b2dd2106cec80af9c9f8205dd48cefb7d2cb288fc21365b2de07f118e mythes-da-0.20100629.15.16-22.el9.noarch.rpm 2b954be891c353a68857af3e2e799e4093d47c081142c9765c872d8c835ca233 mythes-de-0.20210302-3.el9.noarch.rpm 56c95a157a56bddd5099247a488cd48a79681cb802f850bad40b3114a4182298 mythes-el-0.20070412-27.el9.noarch.rpm a275fdae229940ad7d9edfc038006084f3b9821950927a23924553fef0bd2393 mythes-en-3.0-33.el9.noarch.rpm cf77df328ac9fde5a66bb392d0368e3614f98348add60f25bfa147cc56c68b83 mythes-es-2.3-10.el9.noarch.rpm 5558683bcb22d8d4dad872c1d676f773431ca0cb9638e3555c8f62a4fa6321b2 mythes-fr-2.3-19.el9.noarch.rpm c680189f706dc2eb7191c64120c4efee318fa736c2540cf9718b0d6283c150eb mythes-ga-0.20071001-27.el9.noarch.rpm ce8a140f4df5889d91d2922bb42b4d3fb1dbd79d6ddd8846b806353311d84ff3 mythes-hu-0.20101019-23.el9.noarch.rpm 95a297935550661cbd50f82ff687520b1d365dc5789655e09f44c58d93e6a967 mythes-it-2.0.9l-26.el9.noarch.rpm c77c1ebc7f6cdd800035b1113c9a6b9aa8df6d6811ed0eddf8b962ab11b943f6 mythes-lv-1.0.0-15.el9.noarch.rpm 38a287d0f9ed600a88cbb8ffb914587a482ab5a304c68f8554f43d765b624264 mythes-nb-2.0.10-15.el9.noarch.rpm e2702784a62eb29ea53cf451234a5436df578795cf0dda910ec787eed0c85c1a mythes-nl-0.20130131-17.el9.noarch.rpm 1f74bf8d1b717c0d1f382202310399c2076d2657e95777c9709eaba627cb8121 mythes-nn-2.0.10-15.el9.noarch.rpm 17428513a908da123fc9f47d6e991a8be825d45c0dda2bad710f3dec165aa523 mythes-pl-1.5-28.el9.noarch.rpm ecc49e8e0fad3e5bbf3d7969c0cbbdfce69d9eb8e3cf121a4d8ac1b9209903d2 mythes-pt-0.20060817-27.el9.noarch.rpm 1f838022bcfe9f5ac68afecdd1a7777512ce152a64c55dd3cce528e21ce23c36 mythes-ro-3.3-22.el9.noarch.rpm b4918cf04157679ab5a4129bc36231376656f94cdf6f0f5b8eb203fa98d3dba7 mythes-ru-0.20070613-25.el9.noarch.rpm 9f6e5aae4f13117e8936deee04145ab323a4421a82069313d206bd4eaf7e28a3 mythes-sk-0.20130130-19.el9.noarch.rpm 03582afed4713463c6d2376e7da2c6070854138e336c8e4defffaee187f7ceed mythes-sl-0.20130130-19.el9.noarch.rpm 620a3a3435471659887e87a057a13b791a686072bd3560243e493069368a9f3d mythes-sv-1.3-21.el9.noarch.rpm 9fc5085b06b63737af2f1e2c65ca3f0be775e6e4f9c3655c0c904ae71c2248b3 mythes-uk-1.6.5-22.el9.noarch.rpm bc1c8989fb30dd6edfe73708ad38e53ffdc92277ac3f4106b8aa99502c65b34d neon-0.31.2-11.el9.x86_64.rpm 30f1a44690c5c485d0e538647112dca795b6ff5212d509910169d99ca31fb7ed ongres-scram-1.0.0~beta.2-15.el9.noarch.rpm 67117ccb0bef7edf510d7dc808554ead8151a0a74e6f433e124c7c39e4c21580 ongres-scram-client-1.0.0~beta.2-15.el9.noarch.rpm ef4f44fc7846ce0792b62325340cfbaa205fb08577a0fac07a23c63fdba45dc9 pentaho-libxml-1.1.3-30.el9.noarch.rpm d5bd66a21381dea955a3d4ed04f1a50d6945581cbadc22bb57c40b9169e21de4 pentaho-reporting-flow-engine-0.9.4-24.el9.noarch.rpm 561a49e72bc60b08310c457fb4285791957b91e446a6a135c2347e82e0420776 poppler-data-0.4.9-9.el9.noarch.rpm da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057 python3-libvoikko-4.3-7.el9.noarch.rpm 73a5975f925a7844c3d769d5fafcd88fc87267861a44178c5166e14c72b3632f raptor2-2.0.15-30.el9.x86_64.rpm e2efc340bbaffff080b1e749f8b0f407eccb103d7e18cc22b2410fc1a1276a8e rasqal-0.9.33-18.el9.x86_64.rpm da2b7d16720df33c04b45a638d3018d7378b38180d54b2940ca18ebf70e66b2f redland-1.0.17-29.el9.x86_64.rpm 487ebda1111a329b243ad96fd478700d8bd3aeaa1486997fd492be2e18d3b18d sac-1.3-37.el9.noarch.rpm 4dbe6a598a31f30cbe55f370a717c1c92e865c76608caabccf29652b5d61863e taglib-1.12-6.el9.x86_64.rpm cc2facc9d62682050fc6dafa0c10912ff8c946341e998149af446987e4a28f10 ttmkfdir-3.0.9-65.el9.x86_64.rpm 6cfb418a09a8d4be9d36182e6117dbde8da7544b531bdad0290ef554556979a6 twolame-0.3.13-19.el9.x86_64.rpm cb8a7422139ee89be5d6fe58dfcc4930990d10ec32de90d3067ab9eafbd49d3f voikko-fi-2.4-5.el9.noarch.rpm e02465f34a865a3c3c199ed15da8830664ac53d8994a6c25a9fb69e3462ebc36 twolame-libs-0.3.13-19.el9.x86_64.rpm d8f30c0bc45e7e2f226df3074305465bec7100acbe2f41cb2eb282af70e2e4c0 xmlsec1-1.2.29-9.el9.x86_64.rpm ed359cb1064bc282048f64807e663451ab90a7889397046b7c0f4073addb6f2a xmlsec1-nss-1.2.29-9.el9.x86_64.rpm 04ac02ee0c92dcfc7b874aba876a0c3a399112738b4cad3ec1180248fed1b7f2 xmlsec1-openssl-1.2.29-9.el9.x86_64.rpm 435bab72ad769eb537ef105f65c170c7ee79ff70cdca9cbd1d0b7c508ce86679 xorg-x11-fonts-100dpi-7.5-33.el9.noarch.rpm 99925527ec7b481b08966060808f65b47cbf2a211afb57c48e0b987e01b74dcd xorg-x11-fonts-75dpi-7.5-33.el9.noarch.rpm 8805fc822c80faba4831bd9fc84d04d34c6ff77d20a6e4add64627930d49772f xorg-x11-fonts-cyrillic-7.5-33.el9.noarch.rpm 3e4d48cce916e54a9308f4afa0002bc077d02b7f1f7d75bdf5f5507904d2b5f2 xorg-x11-fonts-ethiopic-7.5-33.el9.noarch.rpm 6d00592365ff90dac1a9f72113f806fbef033e8dc4aaea2cece3043556059001 xorg-x11-fonts-ISO8859-1-100dpi-7.5-33.el9.noarch.rpm 09a1fc3beb00e4bf154022161406ae6ce446531e8236aed29d0f4c5cbc894b90 xorg-x11-fonts-ISO8859-14-100dpi-7.5-33.el9.noarch.rpm d50ed20df11b76b01a18be51e19378f8d44853f72ce256b1b54e6dc7326b8445 xorg-x11-fonts-ISO8859-14-75dpi-7.5-33.el9.noarch.rpm 431c953352383d87fa4fb14353e8f42ffadabe3c921c72b9f34779746fda4fb6 xorg-x11-fonts-ISO8859-15-100dpi-7.5-33.el9.noarch.rpm 6b333fba8868f7b955eacff7f5047a95e1b28eb728be821777d1a87c5446fd3b xorg-x11-fonts-ISO8859-15-75dpi-7.5-33.el9.noarch.rpm 6d6e1c7d4be02c7cf72b5372e4516101547e20965d8d2cebce99bc04b7139039 xorg-x11-fonts-ISO8859-1-75dpi-7.5-33.el9.noarch.rpm f8aef16693ea659a69d132019f065c8718703e976b44135bdbe6af5224f9663c xorg-x11-fonts-ISO8859-2-100dpi-7.5-33.el9.noarch.rpm e486dab4bd974a7c068967e05d231ebe77e52d8ae41ec004bd77488d2619f00d xorg-x11-fonts-ISO8859-2-75dpi-7.5-33.el9.noarch.rpm 0adedee390a6e84a8e3290c9284751d9155e43752eb10d27ffcae67be632b434 xorg-x11-fonts-ISO8859-9-100dpi-7.5-33.el9.noarch.rpm 51202ece3457e9accbb09b5acbc4718ecac5457c5382b093062033e6cabd56b4 xorg-x11-fonts-ISO8859-9-75dpi-7.5-33.el9.noarch.rpm 982115d80a7c4bc223fafd92c8e758dcc9f0c6cdf0897e02896f1c021179e669 xorg-x11-fonts-misc-7.5-33.el9.noarch.rpm f3f5ff63add1ff98c1e90033eb06a626073009b0a21047289d555ce1ad2cef7d xorg-x11-fonts-Type1-7.5-33.el9.noarch.rpm a16cf0e08f8d384c264fc6ea074e652961c69123df0ec9dd49a2a1e2541a67ec RLBA-2022:4571 new packages: inkscape-flatpak module Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsigc++20, gc, poppler, inkscape, poppler-data, python-scour, libwpd, librevenge, libwpg, pangomm, python-lxml, potrace, gtkmm30, double-conversion, gtkspell3, python-appdirs, numpy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms double-conversion-3.1.5-6.el9.x86_64.rpm 1530845af7fb79dcd217cd440af0f7017e60db6ec27148c18393f2b55737f977 gc-8.0.4-7.el9.x86_64.rpm d2f44792623901e691ae83365e6971d818e2d11d4fd773c80128d55bfa05225d gtkmm30-3.24.5-1.el9.x86_64.rpm 2c453a3ec8c3362afce41a5f7bf5819f86ab12a22c676c91448ca42cdfddeb0a inkscape-1.1.1-6.el9.x86_64.rpm f41239ddc8f7f0a3e4a1dc9563b5fc9ec6e6d0ae16a91cec9b2fec6548af1171 inkscape-docs-1.1.1-6.el9.x86_64.rpm 084003d83120ff0d437fad39f647183c0d49935e745e62263fb6bc77f32f21b4 inkscape-view-1.1.1-6.el9.x86_64.rpm 75da2f2ddf354ec333f2bdba96df00a9f5de052b5fc914a5ca9453a9546900a4 librevenge-0.0.4-22.el9.x86_64.rpm 08c936b4b644599ddd86781dc40a6930b18b4919bb0c51c545e56255d25f0007 libsigc++20-2.10.7-2.el9.x86_64.rpm 7c7327a10e3efd22b91835e0565427fbf1f60939224196aa1b4273ed5befe8eb libwpd-0.10.3-10.el9.x86_64.rpm 4eb1d2801cfacee5e40c761087f00bd5b4836ca6c9d829f3dc70c52f93c16215 libwpg-0.3.3-8.el9.x86_64.rpm e5d38146349f3d2b9a82ae52f94acc190015a6dc1f3fa3b215711eb8860ad562 pangomm-2.46.1-1.el9.x86_64.rpm 4e3f00c9fb7171f1c7ff417fba8a8e3e75363197dfa62fb2b95696a328528376 poppler-data-0.4.9-9.el9.noarch.rpm da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057 potrace-1.16-7.el9.x86_64.rpm 85c1600915d76fbfee10e31f44d7881c98ed480637cc103965f7f9466274b802 python3-appdirs-1.4.4-4.el9.noarch.rpm 0d5da656f5ea1bf0a6e0a1b1b636f33a9a417fcbd8211d6fd64ede4593690102 python3-numpy-1.20.1-5.el9.x86_64.rpm 634f138213b0f5acf5fb6a5ad9635278bce15867c9afe8af749c1b99f333665d python3-numpy-f2py-1.20.1-5.el9.x86_64.rpm 939dacdf39c4f56847d34891617126d916a6b02175ca9bba7f8d6aee970a5dd6 python3-scour-0.38.1-5.el9.noarch.rpm 442f8d590848134a589e19234b3f071ac534757bc59260991e63c2df279c0b3b RLBA-2022:4572 new packages: firefox:flatpak Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dbus-glib-0.110-13.el9.x86_64.rpm bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071 dbus-glib-devel-0.110-13.el9.x86_64.rpm 78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756 libsbc-1.4-9.el9.x86_64.rpm b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd mozilla-filesystem-1.9-30.el9.x86_64.rpm 725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742 sbc-1.4-9.el9.x86_64.rpm 94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1 RLBA-2022:4573 new packages: thunderbird:flatpak Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dbus-glib-0.110-13.el9.x86_64.rpm bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071 dbus-glib-devel-0.110-13.el9.x86_64.rpm 78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756 libsbc-1.4-9.el9.x86_64.rpm b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd mozilla-filesystem-1.9-30.el9.x86_64.rpm 725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742 sbc-1.4-9.el9.x86_64.rpm 94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1 RLBA-2022:4579 net-snmp bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for net-snmp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Bug Fix(es) and Enhancement(s): * snmp within the container doesn't work well (BZ#2075537) rocky-linux-9-x86-64-appstream-rpms net-snmp-5.9.1-7.el9_0.1.x86_64.rpm 45c7fdf8bf7ac6873f0836dd4b5b9359ad1426f8e0b7c2dc50db7b4b24c5e77c net-snmp-agent-libs-5.9.1-7.el9_0.1.i686.rpm 34386bc8151023ac08fed088cae847fbcdf6c225b30a0be60ecc837cd66ff27d net-snmp-agent-libs-5.9.1-7.el9_0.1.x86_64.rpm 5c34051105cfeadcc20cd1b0ee7a657ad7964a91a7d4d6e4bb023aacce2a7173 net-snmp-devel-5.9.1-7.el9_0.1.i686.rpm e9b29003e4aa7b52ebf51da7323935394bd2d3c96ac4d1bc8109e59ae0eefe4a net-snmp-devel-5.9.1-7.el9_0.1.x86_64.rpm 68cbf14158d98027adc73958b26b40b5e19d4e11d077c8822baf6a0f5c984462 net-snmp-libs-5.9.1-7.el9_0.1.i686.rpm 112c41409b7cfd1bd61ed78e827fe263dd12b507c97126b6be17478ddd96a32b net-snmp-libs-5.9.1-7.el9_0.1.x86_64.rpm 30715b3db6c7797ede2f3014db8a4b367d64ff5176173d6fd752b2dae9351d0c net-snmp-perl-5.9.1-7.el9_0.1.x86_64.rpm da1af97bfa7c44f028e4b574657a69d62143d9fecc996c76911ff79bf7d98b99 net-snmp-utils-5.9.1-7.el9_0.1.x86_64.rpm 63c6fec11b84ca7b9bc0dc713db458663a9f44fd91f6b12dfe4581fc4fc66d1a python3-net-snmp-5.9.1-7.el9_0.1.x86_64.rpm 0f91007d6139d5d60efabc69cfa31f1b78b9f5188ec70235502c5609524ac0b5 RLBA-2022:4580 sscg bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sscg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sscg utility helps to create more secure "self-signed" certificates. These certificates are generated to create a CA certificate that can be safely imported into a client machine to trust the service certificate without the need to set up a full PKI environment and expose the machine to a risk of false signatures from the service certificate. Bug Fix(es) and Enhancement(s): * --subject-alt-name IP:127.0.0.1/255.255.255.255 causes "ERROR: Cannot allocate memory" (BZ#2075546) rocky-linux-9-x86-64-appstream-rpms sscg-3.0.0-5.el9.x86_64.rpm ce4a3a03d7c5c9445cc07c4df208eccbbfdafe08cccd2fd0c01a3b6b84150e7c RLSA-2022:4771 Important: postgresql security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for postgresql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). The following packages have been upgraded to a later upstream version: postgresql (13.7). Security Fix(es): * postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms postgresql-13.7-1.el9_0.x86_64.rpm cc8c60ee1801752b701ac7b8ccfcefbfc7d556cf531c70d1b5cbef8fb6a9cf7e postgresql-contrib-13.7-1.el9_0.x86_64.rpm 5da2535f20a24e3aa76cd23d139722af277440d92ab16266fc0a1e1cfa3c0086 postgresql-plperl-13.7-1.el9_0.x86_64.rpm 66f4a43340e555b56624a754a47f83b968d6025e56c513abe18acae3997a1fbf postgresql-plpython3-13.7-1.el9_0.x86_64.rpm d13138960d9a5b1063f1d74655037d1a0fc3cf15b2dad83cb8b857205bcf8465 postgresql-pltcl-13.7-1.el9_0.x86_64.rpm a6a5d9d7647f5a0f2ddb2d476adbc0f15dab9be5fb207b7363d8237b47710d50 postgresql-private-libs-13.7-1.el9_0.x86_64.rpm 31ef0736ba0c5d7049117680753c6d4c5a49890680a61a7c6650cb16421bfaf7 postgresql-server-13.7-1.el9_0.x86_64.rpm 282c46ff5e02769a6cfecd69db0f25bc8c999b9559f4780091f1c52c7f619491 postgresql-upgrade-13.7-1.el9_0.x86_64.rpm ea4e6ef1216bc8c55ad4d8ff40e544458f559496f6c8eab28006619e8ef8b3c8 RLBA-2023:0973 scap-security-guide bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scap-security-guide. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es) and Enhancement(s): * audit_rules_usergroup_modification_shadow don't remediate existing audit rule (BZ#2169441) * Rebase SSG to the latest upstream version in Rocky Linux 9.2 (BZ#2169443) * [SCAP] PCI-DSS Rsyslog log files related rules fails for Rsyslog 8 RainerScript syntax (BZ#2169445) rocky-linux-9-x86-64-appstream-rpms scap-security-guide-0.1.66-1.el9_1.rocky.0.1.noarch.rpm 0192f846a671af536e035e8f528a8c6e73f15499b9b9f31cd771725a2908bbc3 scap-security-guide-doc-0.1.66-1.el9_1.rocky.0.1.noarch.rpm 0dfbfa1c875e964115e043502af0a65eead70d1e1028e10a0dd8d32367ef134f RLSA-2022:4899 Important: compat-openssl11 security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for compat-openssl11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. compat-openssl11 provides the legacy 1.1 version of OpenSSL for use with older binaries. Security Fix(es): * openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * compat-openssl11 breaks in FIPS (BZ#2091968) rocky-linux-9-x86-64-appstream-rpms compat-openssl11-1.1.1k-4.el9_0.i686.rpm c0b8d921fc2ca35ae55d999ff21db099bc2810230f856ab8cc7d6ed2c98fdb6c compat-openssl11-1.1.1k-4.el9_0.x86_64.rpm 3929a00e792a462066fa54dfa79e84500fa5e2f1569605c89e73471e88514850 RLBA-2023:0325 clang bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for clang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The clang package provides a C language family front-end for LLVM. * clang-14.0.6 should apply llvm#55560 patch (BZ#2151465) rocky-linux-9-x86-64-appstream-rpms clang-14.0.6-4.el9_1.i686.rpm 8eba4df98174f745f6609cb722f0590d1a7cd7e0d39ed0fa5a8a80086776d882 clang-14.0.6-4.el9_1.x86_64.rpm f36118e67a7feaea64fc1977c5286f9bd9c49c2f9baeaacfffc30943ff182986 clang-analyzer-14.0.6-4.el9_1.noarch.rpm fa04f0b3c73a390908dece4f904882cb893aabd7211c06d4d24511ed120902ab clang-devel-14.0.6-4.el9_1.i686.rpm 973dbe66dff2fb39a64852680240b77a6d9c3daafd49b47473f8102af531f751 clang-devel-14.0.6-4.el9_1.x86_64.rpm 69560aad07b2bd1ddb6366a36eb92ce6524b0ac70e75611753c48841f0c7a1a3 clang-libs-14.0.6-4.el9_1.i686.rpm a57dd2ca09cf463f30fe7f2d79a0a7c101eafffbbd4159a7fd3869a0f610c205 clang-libs-14.0.6-4.el9_1.x86_64.rpm 88863b42716650a1d80893b21fd72d04488683b1615b596a75ee9af554220840 clang-resource-filesystem-14.0.6-4.el9_1.i686.rpm d00ea8bcd430edb790769c74acc60b224cd99e93f103b7f50fba5ab53844c833 clang-resource-filesystem-14.0.6-4.el9_1.x86_64.rpm 30c6333584909896912d705678d57cbfddeb7411949fcdf8ed8802ff8c447cbd clang-tools-extra-14.0.6-4.el9_1.i686.rpm 3e3a4c17cb4fccc7fd430e3d693a36e845e6f29031e761b4f72bf02063b2b856 clang-tools-extra-14.0.6-4.el9_1.x86_64.rpm 428ec537d10d90c7b8347117c2990007e656bf756dafd3140ef1c92cb5b312d6 git-clang-format-14.0.6-4.el9_1.x86_64.rpm 118a7606099845f5a2643f02dbdb65d0d1318fb7571d38aced27b023dc819155 python3-clang-14.0.6-4.el9_1.x86_64.rpm 1dae356b6af4f400077686e3cbd6ef64d1af0b805f045c68d5171bdacd6f8675 RLSA-2022:5257 Moderate: libinput security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libinput. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libinput is a library that handles input devices for display servers and other applications that need to directly deal with input devices. Security Fix(es): * libinput: format string vulnerability may lead to privilege escalation (CVE-2022-1215) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libinput-1.19.3-2.el9_0.i686.rpm e9d68adfae00cf791a9ed850ff4ad2e501ae96ed69ac9cc25df32c435d050c33 libinput-1.19.3-2.el9_0.x86_64.rpm 7a98c935e19a670d1c6d2463b419d3bf4e57fcf7bd13e74eaaac91feff0877ef libinput-utils-1.19.3-2.el9_0.x86_64.rpm 57d33785e1d06dd26e6b42a6efa99b0fb5d7977a14bcf8ece045c4c938aca0ad RLBA-2022:5260 fence-agents bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Bug Fix(es) and Enhancement(s): * fence_apc, fence_ilo_moonshot, fence_lpar: missing "import logging" (Rocky Linux9) (BZ#2086839) rocky-linux-9-x86-64-appstream-rpms ha-openstack-support-4.10.0-20.el9_0.2.x86_64.rpm af708364b7df2d800fab4b61528473a2858ca6846275f463d82c76b3077f6e22 RLBA-2023:2580 setools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for setools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms setools-4.4.1-1.el9.x86_64.rpm e988ecf8de30e6b6991a597c61e8ac7871f4c5975c864ff0a09d75cd98001f65 setools-console-analyses-4.4.1-1.el9.x86_64.rpm ed18df75cc4f173cf78effc9d5ff6dcaf89ffb4397d10a223cc9ce681d8abe21 setools-gui-4.4.1-1.el9.x86_64.rpm 3665323f74947f92df1eac33ad5dcaa62354711a5fb204e3f925415579a7c233 RLBA-2023:2586 ipset bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipset. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ipset-service-7.11-8.el9.noarch.rpm 0deae91c87bd6dbbeb32e3c99d50671e940034daf74c4d29f369b5344d73461b RLBA-2022:2502 new packages: bind Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bind-9.16.23-11.el9.x86_64.rpm a8d1296d08517d516e670123500ed9c4c8a2107b223c863308b56e6ed379e191 bind-chroot-9.16.23-11.el9.x86_64.rpm e6ef7ef18d69f5974d9cf33bc5b819dc11c528d6c7e3ef4d9c8a599648dce99c bind-dnssec-doc-9.16.23-11.el9.noarch.rpm a5f226a1a4a2c9c3f51e41f04d0d66781e389aca7694b69ae5bdc2286e6b3f0f bind-dnssec-utils-9.16.23-11.el9.x86_64.rpm a9ba37f7fede188be363ecda1321107f933e713bfde057f2f8a8475db7f09d3c bind-libs-9.16.23-11.el9.x86_64.rpm 591e9117f9c44a5069315ab1bdaeabf97b74944894395782727ec0d5141d2bce bind-license-9.16.23-11.el9.noarch.rpm fc991dde107e33d0627e78b03fe21fc928e4acbf2321e7a895f273f8f9bc18f3 bind-utils-9.16.23-11.el9.x86_64.rpm 287585889b2403ae676416563165ba0f2304ca267f3f80db8c2abc3768f92345 python3-bind-9.16.23-11.el9.noarch.rpm e688f8107e5e1dda75532d0499479704716333b226dd895b49f3dfbe6bb34509 RLSA-2023:0321 Moderate: nodejs and nodejs-nodemon security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for nodejs-nodemon, nodejs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (16.18.1), nodejs-nodemon (2.0.20). Security Fix(es): * minimist: prototype pollution (CVE-2021-44906) * nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517) * nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256) * nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * nodejs: Packaged version of undici does not fit with declared version. [Rocky Linux-9] (BZ#2151627) rocky-linux-9-x86-64-appstream-rpms nodejs-16.18.1-3.el9_1.x86_64.rpm 8e40a1e5726e070f2ea790a236b95accfca59e54703b5e716a2ab12f16a97c4c nodejs-docs-16.18.1-3.el9_1.noarch.rpm d6319a6ae834b80fcf596aed6094622aab94d6b0e7e7995e60a4261deb029364 nodejs-full-i18n-16.18.1-3.el9_1.x86_64.rpm 5a203ad1ced984685b7ee5fd47259d108e8eb6aa740965f7fd625f5572f1cc95 nodejs-libs-16.18.1-3.el9_1.i686.rpm 35cddf28e9bde5789411fa0dc5831aef22e6367518ec036893541210974d4a0b nodejs-libs-16.18.1-3.el9_1.x86_64.rpm d853ae9511853003c54ea8427be23ed8af9af3a6463a906bf55ddf32b04eb2af nodejs-nodemon-2.0.20-2.el9_1.noarch.rpm 86352f40a608e15555df09437aaf424b124c12a6d495528f03b68dd8a2548268 npm-8.19.2-1.16.18.1.3.el9_1.x86_64.rpm 4e618cf28a7d0dc1dca3786f748dd07ffa11763ef718429dd23b7a998dca0150 RLBA-2023:2223 anaconda bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for anaconda. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms anaconda-34.25.2.10-1.el9_2.rocky.0.3.x86_64.rpm 54c9d7f9fe1b481e76221bd21386f2829c50aa4a6c60af4be9a14a8451435b1e anaconda-core-34.25.2.10-1.el9_2.rocky.0.3.x86_64.rpm dbeacba732218426047f6c6cc076b307afa0331c4a2b5cb72eb34890b060f4a2 anaconda-dracut-34.25.2.10-1.el9_2.rocky.0.3.x86_64.rpm 8144d8e56e0b7bc781d68fe28c905985bc4514cdd0422bcbc6c4a93ca02bc14d anaconda-gui-34.25.2.10-1.el9_2.rocky.0.3.x86_64.rpm d634642ab61b3e4ab1f7ee7235e55bcb4e327819172978925d37c9fbd73f2174 anaconda-install-env-deps-34.25.2.10-1.el9_2.rocky.0.3.x86_64.rpm 8e4d14f4601e5e1bb2708eb72b8a8b0028cb7150915c9d4a33c5807e95783216 anaconda-install-img-deps-34.25.2.10-1.el9_2.rocky.0.3.x86_64.rpm 8797d8750a8696ffb6d7ad2231e4554bedbbfe6673286564e0ce8ecbf2b04954 anaconda-tui-34.25.2.10-1.el9_2.rocky.0.3.x86_64.rpm e36166e60626a5a3fd573b9b1c7e42ec08ace4b50e70dd7cf5c0c923e807c632 anaconda-widgets-34.25.2.10-1.el9_2.rocky.0.3.i686.rpm 4ec773b37f06b8a5087f7bc56b4b207c53b0a0f5cc8776b48fcc1f964f85098e anaconda-widgets-34.25.2.10-1.el9_2.rocky.0.3.x86_64.rpm 91d72a13fbd49e27c007b923b75c8e1adc90f47e662fc43dac64f2ebc1857954 RLBA-2022:5954 fuse-overlayfs bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fuse-overlayfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fuse-overlayfs package provides an overlayfs FUSE implementation, which can be used in rootless containers. With FUSE, it is possible to implement a fully functional file system in a user-space program. Bug Fix(es) and Enhancement(s): * Regular rebuild for 9.0.0.2 (QR) - fuse-overlayfs (BZ#2111736) rocky-linux-9-x86-64-appstream-rpms fuse-overlayfs-1.9-1.el9.x86_64.rpm a1fd525022c9dd098f6fd4a6f8b0992a1703a09edc150e860b2f68b88ce89898 RLSA-2022:5942 Moderate: vim security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for vim. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Out-of-bounds Write (CVE-2022-1785) * vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897) * vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms vim-common-8.2.2637-16.el9_0.3.x86_64.rpm 7d4461f0835fddfd186a1dc3af5aaf720131b7bc26a8a6395ec5bb3148a505ef vim-enhanced-8.2.2637-16.el9_0.3.x86_64.rpm 1665fda895581e95e7e6e359620ce6628755b6395b6ce2f3bf33950d7392a47b vim-X11-8.2.2637-16.el9_0.3.x86_64.rpm 01d684593325fb01a5fdb634b9a22e17b91f20b56a62d1e12c7f407a2f6d97bb RLBA-2022:5961 slirp4netns bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for slirp4netns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The slirp4netns package provides slirp for network namespaces. Bug Fix(es) and Enhancement(s): * Regular rebuild for 9.0.0.2 (QR) - slirp4netns (BZ#2111627) rocky-linux-9-x86-64-appstream-rpms slirp4netns-1.2.0-2.el9.x86_64.rpm e3cacad672f5369a5f1a759d15a5e5e3fc8b511d51d3f720276a8a01ec867a06 RLBA-2022:5962 yajl bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for yajl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C, and a small validating JSON generator. * Regular rebuild for 9.0.0.2 (QR) - yajl (BZ#2111628) rocky-linux-9-x86-64-appstream-rpms yajl-2.1.0-21.el9.i686.rpm 586f257769f8fdaa8dc113a960fa9d4e4f6fdefd8b8464e48d9527d035b23661 yajl-2.1.0-21.el9.x86_64.rpm 98abfa321a3c820e0f4bc94b62a1f2eea9f1c9392593adfb0d947d92972ed0de RLBA-2022:5967 firefox:flatpak bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list These packages will be released only via the firefox Flatpak container - they will not pushed to any public yum repository, but rather to a special Hidden compose. (Doing this keeps signing and other operations consistent with the main Rocky Linux packages.) rocky-linux-9-x86-64-appstream-rpms dbus-glib-0.110-13.el9.x86_64.rpm bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071 dbus-glib-devel-0.110-13.el9.x86_64.rpm 78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756 libsbc-1.4-9.el9.x86_64.rpm b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd mozilla-filesystem-1.9-30.el9.x86_64.rpm 725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742 sbc-1.4-9.el9.x86_64.rpm 94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1 RLBA-2022:5968 thunderbird:flatpak bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list These packages will be released only via the thunderbird Flatpak container - they will not pushed to any public yum repository, but rather to a special Hidden compose. (Doing this keeps signing and other operations consistent with the main Rocky Linux packages.) rocky-linux-9-x86-64-appstream-rpms dbus-glib-0.110-13.el9.x86_64.rpm bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071 dbus-glib-devel-0.110-13.el9.x86_64.rpm 78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756 libsbc-1.4-9.el9.x86_64.rpm b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd mozilla-filesystem-1.9-30.el9.x86_64.rpm 725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742 sbc-1.4-9.el9.x86_64.rpm 94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1 RLBA-2022:7331 firefox:flatpak bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list These packages will be released only via the firefox Flatpak container - they will not pushed to any public yum repository, but rather to a special Hidden compose. (Doing this keeps signing and other operations consistent with the main Rocky Linux packages.) rocky-linux-9-x86-64-appstream-rpms dbus-glib-0.110-13.el9.x86_64.rpm bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071 dbus-glib-devel-0.110-13.el9.x86_64.rpm 78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756 libsbc-1.4-9.el9.x86_64.rpm b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd mozilla-filesystem-1.9-30.el9.x86_64.rpm 725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742 sbc-1.4-9.el9.x86_64.rpm 94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1 RLBA-2023:0322 gcc-toolset-12-gcc bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-12-gcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GCC Toolset 12 is a compiler toolset that provides recent versions of development tools. It is available as an Application Stream packaged a Software Collection. The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix: * __builtin_cpu_is ("sapphirerapids") failed on SPR with GTS12.0 DTS12.0 (BZ#2150126) For more information about usage, see GCC Toolset 12 linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-12-gcc-12.1.1-3.5.el9_1.x86_64.rpm 240efc5a8025b87626742043e76698c71c8d557ab3d90b53ad4556b43a9d58fa gcc-toolset-12-gcc-c++-12.1.1-3.5.el9_1.x86_64.rpm 1a80c27435ade70a9ca5c40552d10ccd0e9ad1944d34ebc1ba46269ccfc87add gcc-toolset-12-gcc-gfortran-12.1.1-3.5.el9_1.x86_64.rpm d719147f46b476876370ff592f070da4047a918ee1a1452784232cf547409976 gcc-toolset-12-gcc-plugin-devel-12.1.1-3.5.el9_1.i686.rpm af13c32de778dc1500167468653a770c3032b711a7670cd6b6dc2159493247fa gcc-toolset-12-gcc-plugin-devel-12.1.1-3.5.el9_1.x86_64.rpm 9f8dbab10ee10dfa615c7b2b2349e920e365749453dd70911f44a16ddf24089b gcc-toolset-12-libasan-devel-12.1.1-3.5.el9_1.i686.rpm 6f7a496efb4531cdd75098b5f21bf421b8696447d5804b52521a11394dd12c0e gcc-toolset-12-libasan-devel-12.1.1-3.5.el9_1.x86_64.rpm 93390bd75e7c6e47b2b6e6122e49f56aa236a27430ec4e92128e5f17a87a2006 gcc-toolset-12-libatomic-devel-12.1.1-3.5.el9_1.i686.rpm 59dd583a17f5d048a74a171b1c4545b0e92a74456da8334dae472720141f72ee gcc-toolset-12-libatomic-devel-12.1.1-3.5.el9_1.x86_64.rpm cf13a09a1fa3169270bb33f4bbeaeec0dd02b9e4ca3ad32dfcd16143dfaa8ddd gcc-toolset-12-libgccjit-12.1.1-3.5.el9_1.i686.rpm 97497f16c61c2cfd94d595c2199c541c17460ee7fa3b7fb81d7881fecdc109cb gcc-toolset-12-libgccjit-12.1.1-3.5.el9_1.x86_64.rpm 7ba04d8a5238045823d787f7507c0a123028a3f54c33882cdb9310700a98134e gcc-toolset-12-libgccjit-devel-12.1.1-3.5.el9_1.i686.rpm 12c0a4baab41ac4c4b11ac31e5c6e005325ed9922e3e46a15acd5035bcc23786 gcc-toolset-12-libgccjit-devel-12.1.1-3.5.el9_1.x86_64.rpm 1ff00473daa6e4f0a37310f2302a8127d7d417ec838532979575c5639efe813b gcc-toolset-12-libgccjit-docs-12.1.1-3.5.el9_1.x86_64.rpm 5a771f1288df8704b9cc4abeeb5ccf22015be5eea36107d2aa6798184954f313 gcc-toolset-12-libitm-devel-12.1.1-3.5.el9_1.i686.rpm 270bcc360bb3b7d05cf0b9ffbb0571b31b992284a03a3b07a89d3d1519cda726 gcc-toolset-12-libitm-devel-12.1.1-3.5.el9_1.x86_64.rpm 149f3ad358e1eb9b9e43287874126ad78b96c8c0ee899d6a313bd1d86f8437db gcc-toolset-12-liblsan-devel-12.1.1-3.5.el9_1.x86_64.rpm c7978a37ca2221cbbdbedeed9f821772729a9471c25c9d934b76582954528ddf gcc-toolset-12-libquadmath-devel-12.1.1-3.5.el9_1.i686.rpm 6356bb093c428d07bc814af97e5e7973a1eb37c9f8d210c225d67a4dc5b99074 gcc-toolset-12-libquadmath-devel-12.1.1-3.5.el9_1.x86_64.rpm 283393df3b22539274f84a2014338766765c1c77b06e804b294745ee2fb2d27d gcc-toolset-12-libstdc++-devel-12.1.1-3.5.el9_1.i686.rpm 6947ce493f2988d670b510f89e0fe2e43e45e6af2f93bd0f8062fe8537a3120e gcc-toolset-12-libstdc++-devel-12.1.1-3.5.el9_1.x86_64.rpm fdd56b5704bbd3c13e7da63f4dc39b6f081723c2d177f29b333170713a41efdc gcc-toolset-12-libstdc++-docs-12.1.1-3.5.el9_1.x86_64.rpm a27c7d679d000a5acdc02f08f5f458bca40568e76db18b8081d1d1e3a0284681 gcc-toolset-12-libtsan-devel-12.1.1-3.5.el9_1.x86_64.rpm 6621d3cea19023bda8217c6f4881239670403b281b86a721bc27c61f06b18975 gcc-toolset-12-libubsan-devel-12.1.1-3.5.el9_1.i686.rpm 81911962c9e6d7407e37f20aced2a135a9752075b2758dd142f95526e2872330 gcc-toolset-12-libubsan-devel-12.1.1-3.5.el9_1.x86_64.rpm db7369156d1f065b33516700abadb33de2dcf875bc32a8c03094441f4cbde19e gcc-toolset-12-offload-nvptx-12.1.1-3.5.el9_1.x86_64.rpm c4ea1a97774d72640ee84a193dda1b3e2029e40c194af956e5606a038c94608c libasan8-12.1.1-3.5.el9_1.i686.rpm da5b7989e81fe30070d98be5b1e19b02be3b6812b2ec8c3ac75be70ed88bc096 libasan8-12.1.1-3.5.el9_1.x86_64.rpm 986560f05c7c7f60e1ced423242db9ba823a48d04c921972990163959c586f2d libtsan2-12.1.1-3.5.el9_1.x86_64.rpm 2c929494b1239a6a114a8f9a789a20ea41f6f1d4c79dbdcb2c5c925cd90b3a40 RLBA-2022:6130 gnome-kiosk bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-kiosk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME Kiosk provides a desktop environment suitable for fixed purpose or single application deployments like wall displays and point-of-sale systems. This update provides a new subpackage, gnome-kiosk-script-session, to aid in deployment of kiosk sessions using gnome-kiosk (#2119427). rocky-linux-9-x86-64-appstream-rpms gnome-kiosk-40.0-4.el9_0.1.0.1.x86_64.rpm 3b5fe97407268d86c0090601c0f86ce2e2ca4a6b8268fa0985430145e1e13948 gnome-kiosk-script-session-40.0-4.el9_0.1.0.1.noarch.rpm 2ed3016d9661c036a75165d23a3d4164041fb59fa2e6ed9f43e7a85b789a4ee1 gnome-kiosk-search-appliance-40.0-4.el9_0.1.0.1.noarch.rpm ba70cb9a4ebad087da5bb73caec55285a90b1aa39c012192e11f06e8b915ab28 RLBA-2022:7332 thunderbird:flatpak bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list These packages will be released only via the thunderbird Flatpak container - they will not pushed to any public yum repository, but rather to a special Hidden compose. (Doing this keeps signing and other operations consistent with the main Rocky Linux packages.) rocky-linux-9-x86-64-appstream-rpms dbus-glib-0.110-13.el9.x86_64.rpm bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071 dbus-glib-devel-0.110-13.el9.x86_64.rpm 78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756 libsbc-1.4-9.el9.x86_64.rpm b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd mozilla-filesystem-1.9-30.el9.x86_64.rpm 725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742 sbc-1.4-9.el9.x86_64.rpm 94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1 RLBA-2023:0326 gnome-shell bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-shell. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME Shell acts as a compositing manager for the desktop, and displays both application windows and other objects. It provides core interface functions like switching windows, launching applications, and notifications. It takes advantage of the capabilities of modern graphics hardware and introduces innovative user interface concepts. Bug Fix(es) and Enhancement(s): * per window screensharing does not work with xdg-desktop-portal-gnome installed (BZ#2144743) rocky-linux-9-x86-64-appstream-rpms gnome-shell-40.10-4.el9_1.x86_64.rpm 1b00dfdff75fec87bd09dabf3ec6cfde1df275347bcbafd6d337dd1a8c4a9680 RLBA-2022:6412 thunderbird:flatpak bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list These packages will be released only via the thunderbird Flatpak container - they will not pushed to any public yum repository, but rather to a special Hidden compose. (Doing this keeps signing and other operations consistent with the main Rocky Linux packages.) rocky-linux-9-x86-64-appstream-rpms dbus-glib-0.110-13.el9.x86_64.rpm bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071 dbus-glib-devel-0.110-13.el9.x86_64.rpm 78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756 libsbc-1.4-9.el9.x86_64.rpm b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd mozilla-filesystem-1.9-30.el9.x86_64.rpm 725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742 sbc-1.4-9.el9.x86_64.rpm 94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1 RLBA-2022:6413 firefox:flatpak bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list These packages will be released only via the firefox Flatpak container - they will not pushed to any public yum repository, but rather to a special Hidden compose. (Doing this keeps signing and other operations consistent with the main Rocky Linux packages.) rocky-linux-9-x86-64-appstream-rpms dbus-glib-0.110-13.el9.x86_64.rpm bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071 dbus-glib-devel-0.110-13.el9.x86_64.rpm 78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756 libsbc-1.4-9.el9.x86_64.rpm b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd mozilla-filesystem-1.9-30.el9.x86_64.rpm 725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742 sbc-1.4-9.el9.x86_64.rpm 94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1 RLSA-2022:6585 Moderate: ruby security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for ruby. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: ruby (3.0.4). (BZ#2109428) Security Fix(es): * Ruby: Double free in Regexp compilation (CVE-2022-28738) * Ruby: Buffer overrun in String-to-Float conversion (CVE-2022-28739) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms ruby-3.0.4-160.el9_0.i686.rpm 309bf5ce4950e616142bb32a937c55fe01e9cb03b9bb90664515d61e467f74bd ruby-3.0.4-160.el9_0.x86_64.rpm c004947f654a9e14bfeb4bbbc8dc995a5d2aa02bf0b7df2b10e3b928c5a99cda ruby-default-gems-3.0.4-160.el9_0.noarch.rpm 417fbed7251159f0c663d144e00efda40a10ed58e82fb15348675603e5d3f76e ruby-devel-3.0.4-160.el9_0.i686.rpm 5a82c5ee3063dd7cfbf7295bbd009e1313723710f41e584eb0e77218d26ec13f ruby-devel-3.0.4-160.el9_0.x86_64.rpm d0aca8f7fbf058dd93ca5abd6a3480d698059debed59de5e67c314903bfb02b1 rubygem-bigdecimal-3.0.0-160.el9_0.x86_64.rpm 312bf6ec219a724f2322c862f94a70fceb30fff2c5f909a8a775ebde38910e6b rubygem-bundler-2.2.33-160.el9_0.noarch.rpm 961b326e76e4d965a937c69699ea3c746822a7f78ef4fcbceb82e8377194078d rubygem-io-console-0.5.7-160.el9_0.x86_64.rpm 0012db91bed5ed85a142852865b46b5665ac04bebe7e9353cde93ea50dbb4615 rubygem-irb-1.3.5-160.el9_0.noarch.rpm b382b053e851e49aa1a8940882982ccde6e67ac6e658ed584d808dd3519e6a0e rubygem-json-2.5.1-160.el9_0.x86_64.rpm af2d66b886802a445b7d9e55df02e1d25e1ffcc3bab5b7453ececf83347e6195 rubygem-minitest-5.14.2-160.el9_0.noarch.rpm 9edc861cdbc1c57d0084f7cb0ec96b525d4a68ce38154f77dc87c9838f8a7014 rubygem-power_assert-1.2.0-160.el9_0.noarch.rpm 0c07d363626565436743174ff2662f3579fedaf8047b39773c47bab2b29350cb rubygem-psych-3.3.2-160.el9_0.x86_64.rpm e0352cd0060859774db7dee8dac70d26c45513b6ddd759f27d7780a7fa396a56 rubygem-rake-13.0.3-160.el9_0.noarch.rpm ead12b3501cd16da88627055dea6f2527c7a73b7fd7f608fd1a8f608cca2cf5a rubygem-rbs-1.4.0-160.el9_0.noarch.rpm 751fd61ca2d202eaf1e53f8f362ccd81696b30c71f62c0fc63b136d32d157c0f rubygem-rdoc-6.3.3-160.el9_0.noarch.rpm cb911a8b5a58673e057994ff8a0231e9b98560f7b8ba7fa6166f78a0051a4226 rubygem-rexml-3.2.5-160.el9_0.noarch.rpm 155b434f4d5caf04d27176b14492f93da49c7bb212ba11169a9ebe4acde4ec99 rubygem-rss-0.2.9-160.el9_0.noarch.rpm e669e336ccd53007907207d2996a90207e20d27b6d03dc9021ac30d1c5b732b9 rubygems-3.2.33-160.el9_0.noarch.rpm 6ab3fd3762a955392e8ae03e3b24931a40a9af1bae49feeac465fe2388926505 rubygems-devel-3.2.33-160.el9_0.noarch.rpm a1ff8e3c133a6a59e1b3b0662178daf34654f28d8ad2030d82c9ba1f07181629 rubygem-test-unit-3.3.7-160.el9_0.noarch.rpm ce9678bd8941dc0da4ce6aa93f3a1d71dc7c807f0fd2b050e8558afa7491091a rubygem-typeprof-0.15.2-160.el9_0.noarch.rpm de1ce9f8adda61375fa95fa9afbc770753793462652f973e9abb4e9f0bb26e1b ruby-libs-3.0.4-160.el9_0.i686.rpm fc75dc05a7b4a3a83be134513e716395c68e0324a0b4301812cac32d4a6cadeb ruby-libs-3.0.4-160.el9_0.x86_64.rpm e8ba2cfcb7fd136051a9833ef1ea15d6db43d8449af9d71e14ffbd315297bb14 RLBA-2022:6588 python-ldap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-ldap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-ldap packages provide an object-oriented API for working with LDAP within Python programs. It allows access to LDAP directory servers by using the OpenLDAP 2.x libraries, and contains modules for other LDAP-related tasks (including processing LDIF, LDAPURLs, LDAPv3 schema, etc.). Bug Fix(es) and Enhancement(s): * python-ldap FTBFS in Rocky Linux-9.1 (BZ#2121547) rocky-linux-9-x86-64-appstream-rpms python3-ldap-3.3.1-9.el9.x86_64.rpm ef62df4cbc90c0b91f31d6fdd84c43bacc46109bc5e5a7867d49c178be3ae58e RLSA-2022:6590 Moderate: mysql security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mysql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. The following packages have been upgraded to a later upstream version: mysql (8.0.30). (BZ#2122589) Security Fix(es): * mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21412, CVE-2022-21414, CVE-2022-21435, CVE-2022-21436, CVE-2022-21437, CVE-2022-21438, CVE-2022-21440, CVE-2022-21452, CVE-2022-21459, CVE-2022-21462, CVE-2022-21478, CVE-2022-21479) * mysql: Server: DML unspecified vulnerability (CPU Apr 2022) (CVE-2022-21413) * mysql: Server: Replication unspecified vulnerability (CPU Apr 2022) (CVE-2022-21415) * mysql: InnoDB multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21417, CVE-2022-21418, CVE-2022-21451, CVE-2022-21423) * mysql: Server: DDL multiple unspecified vulnerabilities (CPU Apr 2022) (CVE-2022-21425, CVE-2022-21444) * mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) (CVE-2022-21427) * mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21454) * mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Jul 2022) (CVE-2022-21455) * mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Apr 2022) (CVE-2022-21457) * mysql: Server: Logging unspecified vulnerability (CPU Apr 2022) (CVE-2022-21460) * mysql: Server: Optimizer multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21509, CVE-2022-21525, CVE-2022-21526, CVE-2022-21527, CVE-2022-21528, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553, CVE-2022-21556, CVE-2022-21569) * mysql: Server: Options unspecified vulnerability (CPU Jul 2022) (CVE-2022-21515) * mysql: InnoDB multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21517, CVE-2022-21537, CVE-2022-21539) * mysql: Server: Stored Procedure multiple unspecified vulnerabilities (CPU Jul 2022) (CVE-2022-21522, CVE-2022-21534) * mysql: Server: Federated unspecified vulnerability (CPU Jul 2022) (CVE-2022-21547) * mysql: Server: Security: Encryption unspecified vulnerability (CPU Jul 2022) (CVE-2022-21538) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Default logrotate set to wrong log file (BZ#2122592) rocky-linux-9-x86-64-appstream-rpms mysql-8.0.30-3.el9_0.x86_64.rpm 788dbc7c20a543535495e7932dd6ef3903bfa80bbd01d121708d28de5f8e77db mysql-common-8.0.30-3.el9_0.x86_64.rpm dbcf38131e3e767e49a6fa62a2e05acad826349edd20bf9964a55b947095a188 mysql-errmsg-8.0.30-3.el9_0.x86_64.rpm dc7607b13722bf8d3668ed1eb65bfb756cfb555766b2d02d36c7621828b76327 mysql-server-8.0.30-3.el9_0.x86_64.rpm 1cefbd31947ab359487aaafda25b0b4a0cccbee5e27de0c7260203e409d6553f RLSA-2023:0328 Moderate: go-toolset and golang security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for golang, go-toolset. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. The golang packages provide the Go programming language compiler. Security Fix(es): * golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879) * golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880) * golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Internal linking fails on ppc64le (BZ#2144547) * crypto testcases fail on golang on s390x [Rocky Linux-9] (BZ#2149311) rocky-linux-9-x86-64-appstream-rpms golang-1.18.9-1.el9_1.x86_64.rpm 6f1ba51758bafae29919d5ca43693df2f84d0fd266e122e330b1496b554f2395 golang-bin-1.18.9-1.el9_1.x86_64.rpm 7b5f19bb9e0406fe1b27411378ef45607a5ed9c59027023c142fb70c6a5365a6 golang-docs-1.18.9-1.el9_1.noarch.rpm aa0c932ef3c6d3984c4c82f412c4f37703fc9d2fe174c44f524dbf91e47a5ea6 golang-misc-1.18.9-1.el9_1.noarch.rpm d791de42d6bf6b8abc153eaf48d80f3107e1046ee5a887b12e77943f1f6490f4 golang-race-1.18.9-1.el9_1.x86_64.rpm 65b61adafe0229d5eb8b05648ccfae2b709fdcb17c1cc6ba2e3c269a4c620270 golang-src-1.18.9-1.el9_1.noarch.rpm 2e5a41097be4f9aac06f6e1d67e7a0a7372112eed25706bd67c6997c8e75ab75 golang-tests-1.18.9-1.el9_1.noarch.rpm d73463aa9e5471ee48f4bdcd535ee935c65d187bc914c60d3a6f4fecb9cc1a92 go-toolset-1.18.9-1.el9_1.x86_64.rpm 714f154107cb5613974a98ddf6b5e6d479e7de4b007c93534a1fe8a01cf6a998 RLEA-2022:6596 nss bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Bug Fix(es) and Enhancement(s): * Rebase NSS to 3.79 for Firefox 103 ESR. (BZ#2093488) * certmonger startup very slow using default NSS sqlite database backend. (BZ#2097896) * Allow signature verification using RSA keys <2k in FIPS mode. (BZ#2099438) * Need to be able to run self-tests at will programmatically. (BZ#2100504) rocky-linux-9-x86-64-appstream-rpms nspr-4.34.0-14.el9_0.i686.rpm da9a89afde13756e2fa42ea0bab3d093c22fd9876a5893ca31e650a89752968f nspr-4.34.0-14.el9_0.x86_64.rpm 420eb3521b65392eacfb871ce838bdbcd7abddf16d2dc2a58ee7c0f5625cc7e1 nspr-devel-4.34.0-14.el9_0.i686.rpm ab80e1ad5cc669d533630ccc383a8294f32e8b7382bdd2216956507df5e3bd56 nspr-devel-4.34.0-14.el9_0.x86_64.rpm 0862ab05808dc63064d54c1ac060738ba6ae1a42aab030a3394c6c446a2e59f0 nss-3.79.0-14.el9_0.i686.rpm d27ffdd27430c64542d96b1e610fad5a80606714473c1296820b2893d79ec859 nss-3.79.0-14.el9_0.x86_64.rpm 42b04cc7a7a1662a4cca25b21d38d8f04af1f488c1ef262a21a292c7990da641 nss-devel-3.79.0-14.el9_0.i686.rpm 2d2b1d4fdacac3ab446ad6f697a6f07af9fdd34d183473c3130800557330d657 nss-devel-3.79.0-14.el9_0.x86_64.rpm c282fc485cc583b6f7a13a40a705cf25dca020537e7a1deac53e6e586cdfabbf nss-softokn-3.79.0-14.el9_0.i686.rpm aa791bfe4d33fd711224c9937218618259d4b12afbb49e3a1a4811c0d429b026 nss-softokn-3.79.0-14.el9_0.x86_64.rpm af7e726fe13bbca4eb826fc16ceb0b50c909576189debce00e0f19fcab4e9df8 nss-softokn-devel-3.79.0-14.el9_0.i686.rpm 167888c9b121cd46ad5ced0979b360c5e9d97d36db22bfa51a923e683b86a131 nss-softokn-devel-3.79.0-14.el9_0.x86_64.rpm 7d2ff5aaea4a655c266cc2c1343969ce359f44f915ba202106a8c59d2a7dffcb nss-softokn-freebl-3.79.0-14.el9_0.i686.rpm 8b9f5be29178cc90e75964f81aebdad4deaa1ceb5c05f83cf24a153022afa505 nss-softokn-freebl-3.79.0-14.el9_0.x86_64.rpm 212cb24c631dc01e03305890dca92b8191e9eb6f04348d0b9ec8eb478e1e7631 nss-softokn-freebl-devel-3.79.0-14.el9_0.i686.rpm f0741edde112e0b5e8f2a6fe18cef30030b6bd9830834fedd4ffd894b542f48e nss-softokn-freebl-devel-3.79.0-14.el9_0.x86_64.rpm 82ea250fb6baf67918f68f5f6474d3016575d16ed65730445c168f3a2f37886f nss-sysinit-3.79.0-14.el9_0.x86_64.rpm d5a216dd6c8ae27508ea36d8a4142cf63af6662e317f9d7eeb4b00add59c0219 nss-tools-3.79.0-14.el9_0.x86_64.rpm 3b7f30ae8e303cf072ad131464b75a65ba4045164a97da6e8d18010ba8b63082 nss-util-3.79.0-14.el9_0.i686.rpm b0c1d68163c1901e770c938a9639cc8e5e4990866b1850035265113e8d00fb3b nss-util-3.79.0-14.el9_0.x86_64.rpm 55720d07d5ed6e98d0951dbcf84f44f01ca6e95c15b11397740f0062eece0f49 nss-util-devel-3.79.0-14.el9_0.i686.rpm 822b6ac4779997da2dd9bc48dc57c80b4e4c889bc055b3fd31ff9d06dd1c62d2 nss-util-devel-3.79.0-14.el9_0.x86_64.rpm e5f5b4b8d99f7bc9c67dedec95bbe6e91868698e7a46b58043e5ae55793f6168 RLSA-2022:6602 Moderate: gnupg2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gnupg2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with OpenPGP and S/MIME standards. Security Fix(es): * gpg: Signature spoofing via status line injection (CVE-2022-34903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gnupg2-smime-2.3.3-2.el9_0.x86_64.rpm 6c2ad44232aff2fd30ac354ee071d5b4f6a0c2b1c307d6f7531d5cf60b59488d RLBA-2023:2279 plymouth bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plymouth. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms plymouth-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 60dbaddf05cbfa0ea7454339f4e11c6ede27efa758db231d0cf7917416bf8d99 plymouth-core-libs-0.9.5-6.20210331git1ea1020.el9.i686.rpm cf76cdc500d5622c265524c60363c798315cc24547325e4ec21ec81184fce148 plymouth-core-libs-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm b31c29de013473c4dc49683554d2de8fe7e9e6d676f8a469490edfc00954fcbd plymouth-graphics-libs-0.9.5-6.20210331git1ea1020.el9.i686.rpm a1794ab4c94d933a24a2d7e6954d5ea36592b5914a33f2d4765b32bd4983fcf9 plymouth-graphics-libs-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 1d1fcf50e92d223ea3cbb8a7ef58d681213a6dd607a21b5d5c52d0fc2c71f0ad plymouth-plugin-fade-throbber-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 9a1694bf6496a7b7f140b1d7fdf903bb5223eb9f4817b763e40b3a06b416fa5d plymouth-plugin-label-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 0e89c1a4bebd7705113beff5625823d29260567c973d651e43d0b783ab3360f3 plymouth-plugin-script-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 1e57f496e07feee5f77bd781029fcec5a2681682b458474be17a3f759a9890c0 plymouth-plugin-space-flares-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 62b6d1b69d4338134acb1ebcd27f265528fa76298c941073de454f19361295ed plymouth-plugin-two-step-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 87d20a83b210dd1eebfefa22871eaec804397edd393184fb928b8460678df1f5 plymouth-scripts-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 62c529b96b0a2f1a0581a9c71cab7f1b18a6cac41634e82abecfae432dc4c89e plymouth-system-theme-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 8664eda6ab102023f8b02c4bf9162e47ec66580b7dee997943038598f5a9619e plymouth-theme-charge-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm ce653d1f6ac5c514034a05dafc89d5683b724a15ebf63ff60b7c2540134c620c plymouth-theme-fade-in-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm f9364fae1c106304fb0004744aa0a0e4777240764a66528d1236d8a00882c119 plymouth-theme-script-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 687b1df162135ccda37f9176984eb70dba956c86bdb8d4311d058933ba18230d plymouth-theme-solar-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 94cf695347a057e071205c5f6f7d849698797b44b8b8dd58721915ec7c126ad8 plymouth-theme-spinfinity-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 0b00b3806c17881ad627144a066b12fbc22fbd92c1d3d8f0198cddc6ef09ab6a plymouth-theme-spinner-0.9.5-6.20210331git1ea1020.el9.x86_64.rpm 4391e018054cd5a4811ae8fc188a810cdd4c64f531c8d4a141b80a00c8d67768 RLSA-2022:6634 Moderate: webkit2gtk3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. The following packages have been upgraded to a later upstream version: webkit2gtk3 (2.36.7). Security Fix(es): * webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.36.7-1.el9_1.1.i686.rpm d66140c17b00905d7cc3e1bb1b8accd1a2ff6984dfcc13b4edb71c4feb88a360 webkit2gtk3-2.36.7-1.el9_1.1.x86_64.rpm f0337b6a542d8490b4055085a410002b97816f77a6848b1ee9ab6ca4936d2795 webkit2gtk3-devel-2.36.7-1.el9_1.1.i686.rpm ee61e1f6f58f8c423729f54d04ea7b077010e16f95c94be74708dfe31c9ba439 webkit2gtk3-devel-2.36.7-1.el9_1.1.x86_64.rpm b5ad594ef098744c9206721575a3951f51267b1e0a9e7da04eee2e53717b0496 webkit2gtk3-jsc-2.36.7-1.el9_1.1.i686.rpm 43015e9befacaf0c15a755cb23e5a9427067cc7a8d358a7dc37330327cc7d6f3 webkit2gtk3-jsc-2.36.7-1.el9_1.1.x86_64.rpm 543eaaa8d15ca0dd684eacb50159cf7d311144f917bbfcfd1be4102f2e7c551b webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.i686.rpm 671374d9f7638dc5fb4917123a9496d1049f933fcebcfb1c7965d8279bae25a5 webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.x86_64.rpm 29d7357c4930ac980b264beee3330b528533ecc49c1e116a366c1e88aba703ca RLSA-2022:6854 Moderate: gnutls and nettle security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for nettle, gnutls. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space. The following packages have been upgraded to a later upstream version: gnutls (3.7.6), nettle (3.8). Security Fix(es): * gnutls: Double free during gnutls_pkcs7_verify. (CVE-2022-2509) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [IBM 9.1] [P10] POWER10 performance enhancements for cryptography: nettle - incremental work (BZ#2102589) * Allow enabling KTLS in Rocky Linux 9.1 (BZ#2108532) * DES-CBC bag is decryptable under FIPS (BZ#2115314) * allow signature verification using RSA keys <2k in FIPS mode (BZ#2119770) rocky-linux-9-x86-64-appstream-rpms gnutls-c++-3.7.6-12.el9_0.i686.rpm be2526de8a8d4dd9ef21fe9a0f597381ec69cbb4bdcd917557438d9ae247ddcb gnutls-c++-3.7.6-12.el9_0.x86_64.rpm 20febbb38ae61d697aea273ac9baa8261b6eb46864b4b53fb4aee219a5ffba02 gnutls-dane-3.7.6-12.el9_0.i686.rpm 7e9d81eb16299cd33aa1b9de62daad01bc082a340ebfda1e918bf5b132e0e698 gnutls-dane-3.7.6-12.el9_0.x86_64.rpm e4c0731b14a134974401231f4cd3fab1e00c24f12d2f064a6628516251d6e4c3 gnutls-devel-3.7.6-12.el9_0.i686.rpm 487808612cad7e1e8b1b6eb266ecd51b420ca68bb4767696a56288ac0914b4ff gnutls-devel-3.7.6-12.el9_0.x86_64.rpm daac6aeb6128870c69a74de09b7a0f23dbd02407ea7d65325c6db71e166081da gnutls-utils-3.7.6-12.el9_0.x86_64.rpm c7de211ad2bec144ed339b83adcd348605e1033b29a5e9319358ee1bfc8206f8 nettle-devel-3.8-3.el9_0.i686.rpm eee07fdf3036775d9f707a2b06b78086ae7b1ca88e0ce236f3ef4ad09753f9bc nettle-devel-3.8-3.el9_0.x86_64.rpm 34fa515f4fa8325e6facd6cfd0c3bd96fcfc3445c7e50b6011548360a902d52f RLBA-2023:0327 virtio-win bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virtio-win. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The virtio-win package provides paravirtualized network drivers for most Microsoft Windows operating systems. Paravirtualized drivers are virtualization-aware drivers used by fully virtualized guests running on Rocky Linux. Fully virtualized guests using the paravirtualized drivers gain significantly better I/O performance than fully virtualized guests running without the drivers. Bug Fix(es) and Enhancement(s): * virtio-win RPM for Rocky Linux-9.1.0.z (BZ#2145213) rocky-linux-9-x86-64-appstream-rpms virtio-win-1.9.32-0.el9_1.noarch.rpm 363a92bc7ea8ad76656a70bd2cc464c99509947d7d75bbbe626c56c0df7915e1 RLBA-2023:0329 swtpm bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for swtpm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The swtpm package provides TPM emulator built on libtpms providing TPM functionality for QEMU VMs. Bug Fix(es) and Enhancement(s): * Test for available issuercert before creating CA (BZ#2152916) rocky-linux-9-x86-64-appstream-rpms swtpm-0.7.0-4.20211109gitb79fd91.el9_1.x86_64.rpm 2849b631119b92256d7f8569bb95bb0c47eeacdbdf482a4aa20b9965fcdd762d swtpm-libs-0.7.0-4.20211109gitb79fd91.el9_1.x86_64.rpm 108535362c53294c2d71305a0b1959062bca7b83b47a37af41623688e7a1eebb swtpm-tools-0.7.0-4.20211109gitb79fd91.el9_1.x86_64.rpm e553873ecb50aad9bf8b8c2a4d234443b3bc67c5731cfe7a2d4fe1ea26e31195 RLBA-2023:2352 nmap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nmap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nmap-7.91-12.el9.x86_64.rpm cd1cdb3c688544b13929ab38db8553ad587d8831ac1a28550d937750bfed5049 nmap-ncat-7.91-12.el9.x86_64.rpm 348a404c3c9a8cdb742c64f928ed3b7136cc306dfc93c5e2df689b31eea082d2 RLBA-2023:2372 perl bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-5.32.1-480.el9.x86_64.rpm 94a5d236293420446362349755f170b5b53febb4950d2efbc99fccc9335f793e perl-Attribute-Handlers-1.01-480.el9.noarch.rpm d1f4a9c2d5f81921a9ffe0b13b7034e90af712362513b86888291ea806b61f76 perl-AutoLoader-5.74-480.el9.noarch.rpm 7347b9759e1c2a384111e48c02a6353bbcf9667e8e0133e2148594350b32a340 perl-AutoSplit-5.74-480.el9.noarch.rpm 7f6b6224eb1c384402fdc319838891a9d9245ba9431ec79b21f7b13215653b8a perl-autouse-1.11-480.el9.noarch.rpm efc1be61589a9c0d48c8934bbfb869d5e5dd2039bde7cec6f5a350e5ec9d33d9 perl-B-1.80-480.el9.x86_64.rpm 99faed8b5d89f73650d47848919af1c6a6b799942ddfbd5472f0fe65bc1285b9 perl-base-2.27-480.el9.noarch.rpm 3b53f8a351745d9bf4de41c0f0d0ef43bd194e2bc7c6972e7d6d8172c2340bf0 perl-Benchmark-1.23-480.el9.noarch.rpm de810ce6c52ead3159ebf243a798475596c7a023802997765179df57255113b4 perl-blib-1.07-480.el9.noarch.rpm ddb7e5ed5541955149aee9cf3cb057c5053b375fe7b6e98f32f8c7b8a63b3908 perl-Class-Struct-0.66-480.el9.noarch.rpm c8a3bff8d7e21f49abea233942748f9ae7ec658d3cdb49820af3a76f85733883 perl-Config-Extensions-0.03-480.el9.noarch.rpm 2d5e95a24dd1322458c4c5f07fd431ea82ff8285fc0bbdd78f5b71eeb76fd100 perl-DBM_Filter-0.06-480.el9.noarch.rpm c4af9a314ce43e1bbb106cab69fe02fdc16fdb9f2f6e9bdc802406184f6dc0d8 perl-debugger-1.56-480.el9.noarch.rpm 49f4de633bb3467b162b02295bc516abaaeabe82cb424dde1f3a1ae1fa19b7a4 perl-deprecate-0.04-480.el9.noarch.rpm 8ba53da836073c2cc8e3bacd5b5a19b37ab59517c3cd8631d848b82e125f3578 perl-devel-5.32.1-480.el9.i686.rpm 041d9cecbad5e31cadd15eacca9dc5781c6b3bb62ff83d19b5d8cd9fc3148329 perl-devel-5.32.1-480.el9.x86_64.rpm 7324e2180003d31f54b440b08fdc696254cd95c931bf74789a46b4b6a50b37de perl-Devel-Peek-1.28-480.el9.x86_64.rpm 0ccb88be268732e148307f52693b5f873e9828d1b1308def53fdcba5e42ab49f perl-Devel-SelfStubber-1.06-480.el9.noarch.rpm 66b416b0ce956f65660b841127d003ddfeaf996ec6cee1cf93d42de1b74d8144 perl-diagnostics-1.37-480.el9.noarch.rpm c57f1156d07d3621ee67535c0dde41e163a6efa8957f62d078463f4065ce69a8 perl-DirHandle-1.05-480.el9.noarch.rpm cfb9547d1e62831d3d3c88b5433ba100482c55f3989f106c634e6ac87ba8ae12 perl-doc-5.32.1-480.el9.noarch.rpm b6c4a329edf55fcb6bd099d649ea6ddc62087cdcc36894faa17a1b0bdac1e30b perl-Dumpvalue-2.27-480.el9.noarch.rpm 1dc13897ca380a1a320c71b6aea94420cf1f9d5e36a8ecfc31a99fe6a5964147 perl-DynaLoader-1.47-480.el9.x86_64.rpm 1d6ee829a9e2e595aff4a219bbf59f8749bff522fbc36fcafbcf78f0a1ec6a02 perl-encoding-warnings-0.13-480.el9.noarch.rpm e36ab1bc106b2e074ca40f63eee52ff2858e2afdce8d043f5f1a0d669759b3f0 perl-English-1.11-480.el9.noarch.rpm 2362f0eb50c750cf5797565ce9d4be5cbbfa2d26908e5d58d3a17b66295d72ca perl-Errno-1.30-480.el9.x86_64.rpm 700022aa75d2d106fdee3df39f20557293ded1a952ae95a13bbddab6791319c9 perl-ExtUtils-Constant-0.25-480.el9.noarch.rpm 2e009264bf2f2514b133d43ff7f61773d767c485b22d05edd165300a82afb8f8 perl-ExtUtils-Embed-1.35-480.el9.noarch.rpm 5cde3cdbd81515a40fb3f1f0da4466d179b6ffef498d6cc42eb5244fef0b0ab1 perl-ExtUtils-Miniperl-1.09-480.el9.noarch.rpm 83039ae58b9530150eee8b631aedafb8d29513b5e991d57ccd9467b5060bd15d perl-Fcntl-1.13-480.el9.x86_64.rpm bae8250bbcd49755f1eaf1207175e99dfee0da5468f678f12ec6171b256147a0 perl-fields-2.27-480.el9.noarch.rpm 76cac5d12ac373bea045887fa3ffeec90753595b0a3e33a82096de9a91b80c27 perl-File-Basename-2.85-480.el9.noarch.rpm c12cd8a1f9cdb36167ec18052570c262d638f7beae75a9baa1a11000a4363d6d perl-FileCache-1.10-480.el9.noarch.rpm 714db3471f7ef030379f128ed30ee69bddb551aab2ef42dad651953e0ed9a404 perl-File-Compare-1.100.600-480.el9.noarch.rpm 9a357dd4eb0aef091a7060c94e917660569f60316e33c134615aa33b100a882e perl-File-Copy-2.34-480.el9.noarch.rpm 6bc5e35791b393071048c82f95096e4ea9c73c981f5613bb1cf48a13a67dcf04 perl-File-DosGlob-1.12-480.el9.x86_64.rpm 68d932cb5b96380b0ac5b4e4ef127a113b1a8fc298fe92518261b8f9f366d0d5 perl-File-Find-1.37-480.el9.noarch.rpm ac1befaf722fa0f28eeac1b7f0a65ec3a25df05e3c649a38127104c6c865c6cf perl-FileHandle-2.03-480.el9.noarch.rpm bfbe39be10d6956483eca796999057bdc5b1350590984f26268c9d4587521400 perl-File-stat-1.09-480.el9.noarch.rpm 19ab7ad87b1e2b552bdafdca83bb3dc7b94aa03da510349c3de9856393546050 perl-filetest-1.03-480.el9.noarch.rpm 45bc8a4e2124248b83295143d4c1deada0ef5fecd9cf6445631ceb6ddb3014e9 perl-FindBin-1.51-480.el9.noarch.rpm 5cd48fc587dc0881f727b4d2fe1d81baf069332896330a4937688340c9980719 perl-GDBM_File-1.18-480.el9.x86_64.rpm da0b9036d895c3286ed4859ab4b41c922dd7b4432864cf652fa163aa86291ae2 perl-Getopt-Std-1.12-480.el9.noarch.rpm 2a38cf27519b015671e635b22f87b9dd57f7b1144575de404e94edf1faf90356 perl-Hash-Util-0.23-480.el9.x86_64.rpm 55d6e171c1eafb2f10c1f84d90677227376a8db733b1641adc550c38bf70dcde perl-Hash-Util-FieldHash-1.20-480.el9.x86_64.rpm 65a0370c439ff3c896279b90a4a3df4ca56db29280490c5b40c905ce4b743144 perl-I18N-Collate-1.02-480.el9.noarch.rpm d9925a9c1638b4a2f88db3a848a93151770e3f3d69d6df6df405cceebec0be86 perl-I18N-Langinfo-0.19-480.el9.x86_64.rpm 52c0093b2fec90a165921f58fa1ff729bcc9471833d801bfd90465ba0852580a perl-I18N-LangTags-0.44-480.el9.noarch.rpm 994759ee44724e33d06a843246ba901d3e73246683a2fe174403315e838ebf85 perl-if-0.60.800-480.el9.noarch.rpm 6ba860cd8b6b5868409c588a3590d7ccc74320cada5697965c580fbba911474c perl-interpreter-5.32.1-480.el9.x86_64.rpm 48be4441392b922d8e4b210709c89125580fd29c0939b87121343b6d92570e35 perl-IO-1.43-480.el9.x86_64.rpm d152d311217849d6b2935e8ced8bb088233fb2ee66d536124ef76ac245eb4577 perl-IPC-Open3-1.21-480.el9.noarch.rpm 3a17a9eeeda5c65b615e2f9b589437e3afb150ce2efd253be48018d28075095c perl-less-0.03-480.el9.noarch.rpm 269725c12a49e4059547ac130326ae181f30f0dc5b1881a5f2b9c3e8f50ebd55 perl-lib-0.65-480.el9.x86_64.rpm 698231b31fac26e9dc45a5f562be19e1ba65af3da44ae896638e0d9e526f8817 perl-libnetcfg-5.32.1-480.el9.noarch.rpm 04d62cffeeadd167a0954f59b007545cffee2d289e002eabb5d718ac10b57007 perl-libs-5.32.1-480.el9.i686.rpm 22fe6d75ad5bef03f8c21f2454302ab59f393fd2d24d33752e8346226a44ebb4 perl-libs-5.32.1-480.el9.x86_64.rpm f4005cd076b4775f6c53001ee16cf9bc845a9591d1eed8b2446e5af96a22a7a3 perl-locale-1.09-480.el9.noarch.rpm 03e50df7e763237c3b748bc2fcd5a936ceb8006eaecdc1165dce2e6caf543a53 perl-Locale-Maketext-Simple-0.21-480.el9.noarch.rpm 30fe47a550a53f8daaa34a84048ee69258253d14945e1f602afb5fbe679d6f95 perl-macros-5.32.1-480.el9.noarch.rpm 0dab660a3812292c63b707790a66095fbcea7b9d3d5fbd0ce283e6b99899b311 perl-Math-Complex-1.59-480.el9.noarch.rpm a6b7733f8e9d56a23440cb475b9a38d2794ce1c0713ffba51ded261d1d28fbec perl-Memoize-1.03-480.el9.noarch.rpm 5bc240f7b37d6b3f64c6001d5512d2f0ac15b341d68cad001e6c5622a0132fb5 perl-meta-notation-5.32.1-480.el9.noarch.rpm 70778f015f2c9ca8401c3cf9de1308bda3775bc5ee6635450d186f90472f719d perl-Module-Loaded-0.08-480.el9.noarch.rpm 2bb8172777e705adae838cf965ed6d84d2896c3baab11c6273d95f49eebc6235 perl-mro-1.23-480.el9.x86_64.rpm 0eca17afcc5d58777af3e5f47e5470782589281c1de499ce54ef7a0fb4fe15df perl-NDBM_File-1.15-480.el9.x86_64.rpm 8c647acb7333df3c4d9e0ba02f2db231dcc0d38a875372bc859adbd283b366d0 perl-Net-1.02-480.el9.noarch.rpm b3ef3a983682cecfc5fb5e89b1097cee5db138e4698c7996e16eff11c33c5389 perl-NEXT-0.67-480.el9.noarch.rpm 577634a9d6f9a93b855a6b2b686b92fe984b88d24de89c9997d537b0fc7395d9 perl-ODBM_File-1.16-480.el9.x86_64.rpm bfe7784b17ac72818aa768b4767656c7b7a5d9a7a5465d59874caef27157aedb perl-Opcode-1.48-480.el9.x86_64.rpm 47cb0310d5d7e950e6d3b44a3107402c5c2c81b7a210eb1b3e270a704526e93f perl-open-1.12-480.el9.noarch.rpm 36474f1abf3287f04125fcb1a0eb3860142065743d5809dd18da4cc2e388469f perl-overload-1.31-480.el9.noarch.rpm 86e81019a9d34e5b442c644d646867a3486f03588dcb0909b7741b2d7be45504 perl-overloading-0.02-480.el9.noarch.rpm 1533cfd300c111eab1eb788403ac1990dda59f72b29843794fb39f7d63c1e5b8 perl-ph-5.32.1-480.el9.x86_64.rpm 51c726f911259c0273e2736755b8c54db1b0577b605e744f1c8bb5d2954cf5cf perl-Pod-Functions-1.13-480.el9.noarch.rpm 650cb07e6ab665545b996c570034b99dc6493c594e732c0a77ba7f56294aab84 perl-Pod-Html-1.25-480.el9.noarch.rpm 34feafe912987f3687cfeddab3a36cbaa63d41872a809dbf3a2014b7638a14b0 perl-POSIX-1.94-480.el9.x86_64.rpm f6636b41662d8fb5658a12a1e5e4bc4819f6b4dabd20cc19124532e0f48ec813 perl-Safe-2.41-480.el9.noarch.rpm 37ab81439bbcd02ba3668ee5b05addc74163112b97af268363d3856e5c3af2d1 perl-Search-Dict-1.07-480.el9.noarch.rpm fe604f03dc4b678f1ebc3041e6dea92bd2cab31fe73be961b4c52526c304ecb3 perl-SelectSaver-1.02-480.el9.noarch.rpm 76330165d2749c19db9c50204f24c0e676b58ec59eed8171b2a99509d2ec3733 perl-SelfLoader-1.26-480.el9.noarch.rpm 897df9a3b29558541e34aef84cf33b9e8a1839dd9474dc29d53343ad4b580834 perl-sigtrap-1.09-480.el9.noarch.rpm 7ca83ca840589fbb713ef26f6440ef1a2fff1d95dae4c06d62b0c9e8bf544f55 perl-sort-2.04-480.el9.noarch.rpm 2fc28ba6de294a466d75af54df9390092cf8112a8c27734dd64d94b45b819c1f perl-subs-1.03-480.el9.noarch.rpm aa0b2cd1144aee6b2909a5bbaad3cdc52581f53ace67228168f9652c3257bc05 perl-Symbol-1.08-480.el9.noarch.rpm 1474d70a0119a9dfc0ecdba989ae0449a1f2175b236f24cdaff55eca0602b955 perl-Sys-Hostname-1.23-480.el9.x86_64.rpm 8f051a17381e4304803d21d743e19611a1f4476b190b3ad941eb2ba33331bd3c perl-Term-Complete-1.403-480.el9.noarch.rpm 90e82576af4e7c7cf9eabb5ecfca6323131404b918822c7d774fd0a6778de364 perl-Term-ReadLine-1.17-480.el9.noarch.rpm 9fcc7beffb95adc50d1e4b9ec52f10d34828450a7858b11a81791a1008739303 perl-Test-1.31-480.el9.noarch.rpm 92bf645d7c09a0083bcf162db4fdc97470958d41d0d4db12fae2b89325553ac0 perl-Text-Abbrev-1.02-480.el9.noarch.rpm 5a18b8dbf9e189bbc8aadaf6444ded909e0b97f771eefee8e283a08c0d01d374 perl-Thread-3.05-480.el9.noarch.rpm 57ee527cfa6d0317f5ab553e50762b31df032891e6c5971880b5db09fdc30020 perl-Thread-Semaphore-2.13-480.el9.noarch.rpm 774433a8ba97eca77787d1f7292c669dafebde90646a5bdbcf7f7231f704d4e9 perl-Tie-4.6-480.el9.noarch.rpm 61361c44ea1a84fe370915342f777ea94343eac073847c5e00988e3040387f02 perl-Tie-File-1.06-480.el9.noarch.rpm bada1de8ef1a1d1a104f6a7bb401fca6fb4fd2c71d8d37c019227d5df68f3884 perl-Tie-Memoize-1.1-480.el9.noarch.rpm 8c6b6caae23015662428c588244d95914176ade8d53a67512ccfd0a87b5fda36 perl-Time-1.03-480.el9.noarch.rpm a7e63bea9f76ce41cb4d67eca3ebe54530013aa8f98a65a255fbb4cc3d3b9fe6 perl-Time-Piece-1.3401-480.el9.x86_64.rpm 1699a12a17765347ac90fbebc002a93993368fe44cbaa6036074c4d4b563d0aa perl-Unicode-UCD-0.75-480.el9.noarch.rpm 776cc367d35603c62d44d8b3d70d34358c3315a0fafffa9a5ae20b350c75c643 perl-User-pwent-1.03-480.el9.noarch.rpm e3e51d13355900c4bfe483fd125fe769ecadb0ac717edddfaa09b90e86e3fb13 perl-utils-5.32.1-480.el9.noarch.rpm d261c14a4610551a868464d3416bbf3cf6b2616495382cda1c8693a79d80b67b perl-vars-1.05-480.el9.noarch.rpm 6a89349944d7969aa8ca1ac6f87384cc74ab605ccaf4379455804ff5e901cf69 perl-vmsish-1.04-480.el9.noarch.rpm 885e0a4817490c030b470515c1aef8490175a013eec37c11ef5e2ac110bcdadc RLSA-2022:7288 Important: openssl security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for openssl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full strength general purpose cryptography library. Security Fix(es): * OpenSSL: X.509 Email Address Buffer Overflow (CVE-2022-3602) * OpenSSL: X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms openssl-devel-3.0.1-43.el9_0.i686.rpm f2a45c3be46c5ac7666a6004342896721819b8f20d3239802077cb5cf70fb7ae openssl-devel-3.0.1-43.el9_0.x86_64.rpm 6ff4696b84a705c8c76c8c93d868e6180698f2172e122f8858643eb9bdfcdf05 openssl-perl-3.0.1-43.el9_0.x86_64.rpm fb2e1e3a0b4d9a8ccbfb0adb016373ba874a0095a58f2a887f0fd5ad1dceecaf RLBA-2022:7324 libgcrypt bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libgcrypt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libgcrypt library provides general-purpose implementations of various cryptographic algorithms. Bug Fix(es) and Enhancement(s): * FIPS: getrandom & non-deterministic RSA keygen & missing lengths check for KDF, HMAC & change RSA encryption/decryption to explicit FIPS indicators. (BZ#2131208) * fips: libgcrypt SHA-3 miscomputes digests on buffers >= 4 GiB (BZ#2131209) * FIPS RSA pairwise consistency test fails for gcry_pk_genkey() with RSA if (test-parms(e ...)(p ...)(q ...)) are specified (BZ#2131210) rocky-linux-9-x86-64-appstream-rpms libgcrypt-devel-1.10.0-8.el9_0.i686.rpm ecc286cd10d6ff315cb6ca7301b3f62c9ca24018f2dc9cae1868db3c65a24be6 libgcrypt-devel-1.10.0-8.el9_0.x86_64.rpm 9c83b3811d0a7ef15ca3f62714ae2790991f2b32d2c31e4f849c464ed854238e RLSA-2022:7326 Important: pki-core security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pki-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms pki-acme-11.0.6-2.el9_0.noarch.rpm fcda9a6c19e5f6ca8ee019f4e8ec264a36fab59931ae706f3ef3fea0bda64bbc pki-base-11.0.6-2.el9_0.noarch.rpm 88c574b2baa4f46d6283f5bd7ae1eb81d57033394a8514080174ed70a0381c07 pki-base-java-11.0.6-2.el9_0.noarch.rpm 3564101e10ab4a5ab4dc345a2717cfc52c698702ad44a63e3c8d891607ab83ab pki-ca-11.0.6-2.el9_0.noarch.rpm a3f74d79a6d637b13ce500f51727065c7da0f45b96e3ac78ece75d843e833d91 pki-kra-11.0.6-2.el9_0.noarch.rpm 48a8fc5e0e19c1ad1f04ebbc818032017a96088a9452619e6c4442c9bbe3adc3 pki-server-11.0.6-2.el9_0.noarch.rpm 74aeee726a1c470265240e92a3d1622e22c817d98f20ded8f2ffa75f228858a7 pki-symkey-11.0.6-2.el9_0.x86_64.rpm d1e36f6c07621d3aaa452c5295383b9bb713097150bc0fea429230ea2e53c631 pki-tools-11.0.6-2.el9_0.x86_64.rpm dbb384087b8766b36940e35287fc5972b02465c15c64c4b84ad52f25f00adf3b python3-pki-11.0.6-2.el9_0.noarch.rpm c1fcc173399228caceac8fd8851e53334dd3c584969b306645ef7c3156421f55 RLSA-2022:7329 Moderate: lua security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for lua. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language. Security Fix(es): * lua: heap buffer overflow in luaG_errormsg() in ldebug.c due to uncontrolled recursion in error handling (CVE-2022-33099) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms lua-5.4.2-4.el9_0.3.x86_64.rpm 9b9247dd77c68e135da37e03d53c011f8d879f369a45bb7cbd275a51c6f97824 RLSA-2023:1407 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.9.0. Security Fix(es): * Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751) * Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176) * Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752) * Mozilla: Invalid downcast in Worklets (CVE-2023-28162) * Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation (CVE-2023-28164) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-102.9.0-1.el9_1.x86_64.rpm 1f3fd730d156e1782c4881dc6ebf771c8c27ce06069b6afd2d664e9f1f192ec2 RLSA-2023:1368 Important: nss security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for nss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix(es): * nss: Arbitrary memory write via PKCS 12 (CVE-2023-0767) Bug Fix(es): * In FIPS mode, nss should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator. (BZ#2177434) * Need to update FIPS review comments into NSS Rocky Linux-9. (BZ#2177875) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms nspr-4.34.0-17.el9_1.i686.rpm 3e9cbba181ad2f7851caf1546c40c1e90da92ff5753a515b9a36ed9c50271116 nspr-4.34.0-17.el9_1.x86_64.rpm de99df7d4caff58c4a5288adec6cb39e344ff7599777243dedd7944bb7678179 nspr-devel-4.34.0-17.el9_1.i686.rpm 5259f678aca5e60a1522f3361a0dd04d0433ce972091c53bf9b469cb4a2edcb5 nspr-devel-4.34.0-17.el9_1.x86_64.rpm 1d8231b3421fe93c06c1bed961436931428ee04e155c2d8d5b93cb52986bb026 nss-3.79.0-17.el9_1.i686.rpm fd7eeb200eeb7d906c53faf440a79dd5f73fa40b8845586d39302b13364ce640 nss-3.79.0-17.el9_1.x86_64.rpm 7b71cb9e5bb118de415b45986dd1d7fee4ded9e05653147112e3c349668dc543 nss-devel-3.79.0-17.el9_1.i686.rpm 4e3f1de7a8664b38f3bdc009918a6111e17b27eee998818d554fbae98fdced2b nss-devel-3.79.0-17.el9_1.x86_64.rpm 22585267843d5a07a194725198d1c4d04759326b7e54f1d3ec78aafdfae35830 nss-softokn-3.79.0-17.el9_1.i686.rpm 768f66fe3edeaebab823395b374ec926b3c91830364835c888c3ac6a98ac0fe5 nss-softokn-3.79.0-17.el9_1.x86_64.rpm 472379214f891f44b0111bfd7ce68824eb70796a4743711ec9a50bee68d3d94d nss-softokn-devel-3.79.0-17.el9_1.i686.rpm 80fef195b0643b7bbf8abbac3f3df61e7a25705c99ab13c7fcc8308d47d4d3e6 nss-softokn-devel-3.79.0-17.el9_1.x86_64.rpm 3f423695fa16882d7101e75f0b686aafdf34135dd7134d1778ed8fbdeb44f19a nss-softokn-freebl-3.79.0-17.el9_1.i686.rpm 189f7dde4c240821e354cc63ddbcf63dd2ca349e92c6a2428d03676e2cbbb58e nss-softokn-freebl-3.79.0-17.el9_1.x86_64.rpm d58d9ec4eb8a0bb425263efb128678ad7af4161d346815c4b40fe729aa4fe423 nss-softokn-freebl-devel-3.79.0-17.el9_1.i686.rpm 1706c6b5afecc85da98350a9b5804cc56db41ef0fe358fd4243465dd40f0cb5f nss-softokn-freebl-devel-3.79.0-17.el9_1.x86_64.rpm a53071f1e5757630c72111fd81ef098ee6e441b6672daf758232cc3c25c74713 nss-sysinit-3.79.0-17.el9_1.x86_64.rpm c4801d54126d031e7a12f4f39b6b328fafccc30809e2a590b4ffdebba88567ae nss-tools-3.79.0-17.el9_1.x86_64.rpm c39002379894982a792562e20a3b3625710137eca8216d4df16ca56cfa611102 nss-util-3.79.0-17.el9_1.i686.rpm d09fddb012a23d2b60e0be3e248fa32cfcaa9914455ab5962910d6df965d350b nss-util-3.79.0-17.el9_1.x86_64.rpm ce543f74dba29482790816ca43ff1d308e89d08a9246b89c76bc88e19fd19769 nss-util-devel-3.79.0-17.el9_1.i686.rpm 75681e8cf6222147dd5caa834ed9a0384010609fbaa5e6f8e700686a866e7a0b nss-util-devel-3.79.0-17.el9_1.x86_64.rpm b8f2ffecbdf0243d731845b6f9542cf155a457ce69efce04d171d79e724d1b93 RLSA-2023:4030 Critical: grafana security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Critical An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * grafana: account takeover possible when using Azure AD OAuth (CVE-2023-3128) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-9.0.9-3.el9_2.x86_64.rpm 198cc24bc72bbc55e6ebdfdfb464c74ee584a58f7f8dadbc580245844db21621 RLBA-2022:7942 crun bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crun. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms crun-1.5-1.el9.x86_64.rpm 0ea5faf2a6000901348226bf0c7b43fd150adced7d926288b0651a4e520ba87f RLBA-2022:2856 new packages: gnome-menus Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-menus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-menus-3.36.0-8.el9.0.1.i686.rpm 7989199ccaed9e11a494bdcdcaa38d0706125f316f12aa7373594d8551722f7d gnome-menus-3.36.0-8.el9.0.1.x86_64.rpm 6b88244d31330181f3a10b06acbac9a32d12d37d31cfdad2baaa8ce3bba38063 RLBA-2022:7943 container-selinux bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for container-selinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms container-selinux-2.189.0-1.el9.noarch.rpm 6c3c4f04523edcab98dc30ca91ddacde4f6cac160e2976b2bc770c5d889c45b2 RLBA-2022:7944 libnbd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnbd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libnbd-1.12.6-1.el9.i686.rpm 122eb066879f8beea62fbfce2a4e6c01491ac1779e57831c7e2c39f292e89200 libnbd-1.12.6-1.el9.x86_64.rpm c797f3a57fb7311e0e60838282b8ebcc8d91e4a0c8015c522c95ea21aaecee0a libnbd-bash-completion-1.12.6-1.el9.noarch.rpm 1c36a11283ecff43fc6ae7ff9784647bed914d387f2ae062a6e198c5241c2677 nbdfuse-1.12.6-1.el9.x86_64.rpm 3984f4dd265d0c20033bc5ccce8b0e1711a0639315ff3ebd670c8d6981a8cdcf python3-libnbd-1.12.6-1.el9.x86_64.rpm 4b820903a0f067db41ab286e51d3f11fa9fc543040615fa7527188af6bf62557 RLBA-2022:7946 sscg bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sscg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sscg-3.0.0-5.el9.x86_64.rpm ce4a3a03d7c5c9445cc07c4df208eccbbfdafe08cccd2fd0c01a3b6b84150e7c RLBA-2022:3565 new packages: perl-Sys-MemInfo Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Sys-MemInfo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Sys-MemInfo-0.99-18.el9.0.1.x86_64.rpm 81c5b24e72d8dfb697055cc2147b97d187b6e4275c2dae71f414a5f3b3f0fe0f RLBA-2022:7949 containernetworking-plugins bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for containernetworking-plugins. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms containernetworking-plugins-1.1.1-3.el9.x86_64.rpm c4a89113a22f34a6a8d057715d35ad681486f6b5314581ba2856413b6616ea3b RLSA-2022:7950 Low: Image Builder security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for cockpit-composer, weldr-client. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Image Builder is a service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Security Fix(es): * golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-composer-41-1.el9.noarch.rpm 474c2786d84f9c5daf859f72cb567fec479412067bbc9898bf3ee8276480ff5a weldr-client-35.5-4.el9.x86_64.rpm add90ad088fdda8b3b19781acdb9f44051795499628f402375e2205ccb860706 osbuild-65-1.el9.rocky.0.1.noarch.rpm 6ad1d9ff002d476db570ed5e98103ab4758452b2cff6c1ce14f18a70d1e42d87 osbuild-luks2-65-1.el9.rocky.0.1.noarch.rpm f67ba9bb1798347438c4840a2b944f3ffddbc5737db9e942a6ca6492fc3ff0b2 osbuild-lvm2-65-1.el9.rocky.0.1.noarch.rpm 49726b7817a3b9b36ea3b0a39d60e4a7b2dd124db5f5f0f3807620961ad28635 osbuild-ostree-65-1.el9.rocky.0.1.noarch.rpm 7df336df7aa3c26a37e756623668835996c0c2b4e1f98b71fea3f4112d9e7510 osbuild-selinux-65-1.el9.rocky.0.1.noarch.rpm f7edd2e04c61e103932e4541a833adab4e5c0f7eeadc2aaa6978305510ea16d2 python3-osbuild-65-1.el9.rocky.0.1.noarch.rpm 04f0065dd32a7e525a96d11c40dae06fcfc32ede99e94e3486018f994c6af550 RLBA-2022:7951 pipewire bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pipewire. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pipewire-0.3.47-2.el9.i686.rpm 5959f4c9795565db471cb48285baa8cedb1523edb0a49a85fc24e5e0f9fdf932 pipewire-0.3.47-2.el9.x86_64.rpm 3de3a83596a47b935d33bdc0bd66090295b02239b0cb1bea4cccf3958d3f6df8 pipewire-alsa-0.3.47-2.el9.i686.rpm 306f3e302d86f97336fc3ce58c941c65156c20afc2df2053945494a6dea290ca pipewire-alsa-0.3.47-2.el9.x86_64.rpm fe6b1e032263d0d7c4aaaec9eeb4913b24d03794de30f40bf88e6d2d8e443f47 pipewire-devel-0.3.47-2.el9.i686.rpm 803c0900add1cc0bdf16964d4d42a74ca9bfe1db88ba897741640618b4a30768 pipewire-devel-0.3.47-2.el9.x86_64.rpm 1b80dbba8c30cde1f574587f158a11c50815b699cbb59ec19d25b6ae34d4c781 pipewire-gstreamer-0.3.47-2.el9.i686.rpm 176368d405004d1be22432a1fdd2c7856c6ac42c82d4d41646f91189c4ea16c5 pipewire-gstreamer-0.3.47-2.el9.x86_64.rpm 07019486ea9968f3fcfa2436370b1065673c510f872285a5d6363cab5d9e0160 pipewire-jack-audio-connection-kit-0.3.47-2.el9.i686.rpm 92c3f5ab981bc430c21102c2ff04f0dba8e8f06a3b17b899768ba6eb6b804e82 pipewire-jack-audio-connection-kit-0.3.47-2.el9.x86_64.rpm aa7ea3528e16a8af6aabf7b4f300548ba25eb56c4a0ca82a9d22603e2eed029f pipewire-jack-audio-connection-kit-devel-0.3.47-2.el9.i686.rpm a501d458ae5a43c3c1c1c5a40f98cbf7d74e20b31928b158dadba80ad838ad0c pipewire-jack-audio-connection-kit-devel-0.3.47-2.el9.x86_64.rpm 6bc6089139b156c5afa64891e6395fbf7a4d84fbb835569093ea6908e699b43c pipewire-libs-0.3.47-2.el9.i686.rpm 6dff526d939f72cc31545a2d83142787f555fcb7f29805160d2b16d19e7fca5a pipewire-libs-0.3.47-2.el9.x86_64.rpm 0c2d96713249488829737d7107396fdc566f87031931ed105623bcadd44cbcef pipewire-pulseaudio-0.3.47-2.el9.x86_64.rpm 7415b8fde19ea9bb78959a7fcc30e945f07bbd05643a56efe60138c7a86ab00f pipewire-utils-0.3.47-2.el9.x86_64.rpm 01de374851cb6f1989858bfba16cf220b38141da9da1e4cf9c4d54e4bdba65ee RLBA-2022:7952 flatpak bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for flatpak. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms flatpak-1.12.7-2.el9.x86_64.rpm 8bb0cec4c0557901023742c40ef0c2759e31a3948c2d8fbb7d2c78c6076c6fb1 flatpak-libs-1.12.7-2.el9.i686.rpm 400a47774e5bf05e13cb57bf8ec25c5a96c3860ff3e0f94c8c830c0997539353 flatpak-libs-1.12.7-2.el9.x86_64.rpm ffb35c77faa2108d5bd36da28cd094205828a09b7f97f5ec87cacf4f8575cc3f flatpak-selinux-1.12.7-2.el9.noarch.rpm d11d7884a5d313ba78025a47abe3920c5cdcbcddc4bf365e08e9c3e7617ee7f2 flatpak-session-helper-1.12.7-2.el9.x86_64.rpm 6223689d6c0a575b81f0403baa9b9714967776c8147d31bafc77e68590ea13dc RLBA-2022:7953 gdm bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gdm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gdm-40.1-17.el9_1.i686.rpm b38472c3b3eb6bb6ad967af81a07fdef83cf67f0ecf84d790a3ebdaf303e99db gdm-40.1-17.el9_1.x86_64.rpm f34bcddc04f3539adf9b14e6e1239bb4b35711f40cf947aea5d18201d7f9d7aa RLBA-2022:7957 annobin bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for annobin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms annobin-10.73-3.el9.x86_64.rpm 3cc711ca325a622647f5641213e27f63e6e609d007d85527e2f6b754d8a46cec annobin-annocheck-10.73-3.el9.i686.rpm 765f28aa449fba12f62ac603258f6cff2e672830a46bfb87d7cb25262ce40549 annobin-annocheck-10.73-3.el9.x86_64.rpm 120f83ad85a941dd7a759c33b694e1e21d635391ff2ebacc6de126bd0549c863 RLSA-2022:7958 Low: libguestfs security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for libguestfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libguestfs packages contain a library used for accessing and modifying virtual machine disk images. Security Fix(es): * libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libguestfs-1.48.4-2.el9.x86_64.rpm cfd2ef2d65a48b3201767956428cbd561570ff669f152d9c354dfb155a94a6fd libguestfs-appliance-1.48.4-2.el9.x86_64.rpm a70c590028d24e9401c4e11e3634acddc6822c87b1019bb3c481a3a8264d10d4 libguestfs-bash-completion-1.48.4-2.el9.noarch.rpm 4578ac679f0112fa5798334cefc33a451d75da55fd2dcb6f8201c66189ce8e7c libguestfs-inspect-icons-1.48.4-2.el9.noarch.rpm 5167b905bf41ef5abf03a3abbe0781f3ad3c4f38e0d1876133c7999b08d71a92 libguestfs-rescue-1.48.4-2.el9.x86_64.rpm a3da0a51d3b5a995a5f5e0aa7a65898adb85e7d805ffd6ef77f0d5806edcc34b libguestfs-rsync-1.48.4-2.el9.x86_64.rpm f832543b432b73bdb35ab22d1ece09a89a5b2206cc31261a3511d525247f1d4a libguestfs-xfs-1.48.4-2.el9.x86_64.rpm 74282153a9ee4a9bc84a0cfa74f6833a6fb199a02e6a3a220198791ddda6b142 perl-Sys-Guestfs-1.48.4-2.el9.x86_64.rpm c0b945a6d130b6c9741281b743bbf243be334ad979665a70b5e43a797956b8c6 python3-libguestfs-1.48.4-2.el9.x86_64.rpm 46b91d0e55025b5a5180f562054196062120daf4e85cc08ede2d01b38baeaddd RLSA-2022:7959 Low: guestfs-tools security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for guestfs-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list guestfs-tools is a set of tools that can be used to make batch configuration changes to guests, get disk used/free statistics, perform backups and guest clones, change registry/UUID/hostname info, build guests from scratch, and much more. Security Fix(es): * libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms guestfs-tools-1.48.2-5.el9.x86_64.rpm 43125f0af7eddbbfc8fe79e1dd74605c9e2e16fa451c3f83c4c5b01f3bdf0215 virt-win-reg-1.48.2-5.el9.noarch.rpm 88c5a14bb96d2d8863e0fa1342183a23a3c19cc2151fc4fc9656eca0929ab1aa RLEA-2022:7960 rust-afterburn bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-afterburn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms afterburn-5.3.0-1.el9.x86_64.rpm 9450a95a5ef1412c2fc0415624b6a3b554d56d020955aa3aea853e779827d6c2 afterburn-dracut-5.3.0-1.el9.x86_64.rpm c3e08c4dc232f2cbcfb8d2d6102baea10d8cedd42633e54f7853e01618763987 RLBA-2022:7962 rust-ssh-key-dir bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-ssh-key-dir. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ssh-key-dir-0.1.3-2.el9.x86_64.rpm 21e8becf78429865faefecff1e0ff2dfc16c6a05789c61374af718ae7b0d1294 RLBA-2022:7961 oci-seccomp-bpf-hook bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for oci-seccomp-bpf-hook. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms oci-seccomp-bpf-hook-1.2.6-1.el9.x86_64.rpm e633b1dc42acb852d02782bed060c19a2fd367c3a03a5fbcd3214668e640232f RLBA-2022:7965 supermin bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for supermin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms supermin-5.2.1-8.el9.x86_64.rpm 1833a757880cc8920424f21e4105b0c1d75c6d151bb00083ac144ff04336b4a0 RLBA-2022:7966 gnome-software bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-software. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-software-41.5-1.el9.x86_64.rpm 6ea4cbcb15ba48825049ea7b5acef5c2e3ebb06eadeba4ce6662e495fc727c49 RLSA-2022:7967 Moderate: qemu-kvm security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for qemu-kvm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. The following packages have been upgraded to a later upstream version: qemu-kvm (7.0.0). (BZ#2064757) Security Fix(es): * QEMU: hcd-ehci: DMA reentrancy issue leads to use-after-free (CVE-2021-3750) * QEMU: fdc: heap buffer overflow in DMA read data transfers (CVE-2021-3507) * QEMU: intel-hda: segmentation fault due to stack overflow (CVE-2021-3611) * QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.c (CVE-2021-4158) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qemu-guest-agent-7.0.0-13.el9.x86_64.rpm ae8eae1fd9f64728104f48f0e4416dc49dfa2ac17fc194af2eaf81dc8ea2447b qemu-img-7.0.0-13.el9.x86_64.rpm 6d74ce57e187a7bfe20d01279b8f18599683438a024d00b276fffb66ea107f22 qemu-kvm-7.0.0-13.el9.x86_64.rpm 769ac5fcb981ff9cf793e296cf5a2591f4699745c264c56efdb1f1dc07eec631 qemu-kvm-audio-pa-7.0.0-13.el9.x86_64.rpm cd36b49796d4871de044aec91c818699ea3f71f5dc2f7be4deac7da41826a89e qemu-kvm-block-curl-7.0.0-13.el9.x86_64.rpm a8c94ce651a4db543fe6113bc9ea8897e846e65ea80442e29df18f40b09bc701 qemu-kvm-block-rbd-7.0.0-13.el9.x86_64.rpm 8b9a4e1e042ca0fefe7c6a5491ada6cbc9a91976dc019f9c8cec3991abd2cfcd qemu-kvm-common-7.0.0-13.el9.x86_64.rpm b7bd4bd0e67fe8d5afb0e0db069a17488ad3f1c0ac403e9da03d38f4c28c5934 qemu-kvm-core-7.0.0-13.el9.x86_64.rpm 6c96fd75832b4325949d3f0890c8ba000fd291af73216da21582bd8a2dab0db3 qemu-kvm-device-display-virtio-gpu-7.0.0-13.el9.x86_64.rpm b16a922353b458e40feeac46fd2743b07f40d0c35a5fb0cbaa9805239b7d8896 qemu-kvm-device-display-virtio-gpu-gl-7.0.0-13.el9.x86_64.rpm 1594ac4b90996a6898ab67af40d79d4e51efff88b1f0921fc9d307d5e4ec1d32 qemu-kvm-device-display-virtio-gpu-pci-7.0.0-13.el9.x86_64.rpm 00b0f28b9ed6b13a1a06cc44669412978b8baa7ee8820a117db03369f0da2a8b qemu-kvm-device-display-virtio-gpu-pci-gl-7.0.0-13.el9.x86_64.rpm eb8158e5858494e042534672ab46a906c700e491aab165049ca54b3533f6f41a qemu-kvm-device-display-virtio-vga-7.0.0-13.el9.x86_64.rpm 5e42fa9b8848829e66928d2cfe0fa6a0b6aefc986a2628a7f900551da3d546b5 qemu-kvm-device-display-virtio-vga-gl-7.0.0-13.el9.x86_64.rpm 3ad05a2749d817b07e23c6436b26511c0aad4836b65785bfe18072b6111c0c47 qemu-kvm-device-usb-host-7.0.0-13.el9.x86_64.rpm 0c1fd80c6b94a4fbfadd3016fed6c5d7b8ad26a14b9098f20f3a5541a8c6b4bc qemu-kvm-device-usb-redirect-7.0.0-13.el9.x86_64.rpm 8388ac531d466e6ca3143bca349190c46646908cfb2c039088e1055a142db402 qemu-kvm-docs-7.0.0-13.el9.x86_64.rpm 0b2cf3ff399ee5450c11f6e143b26f11e8b6c92dabcb8db132da70f6bc1d43e4 qemu-kvm-tools-7.0.0-13.el9.x86_64.rpm d4e8d8895b3eb2f633f3f2f487e4e93d8b2e49eedaba4f496803d06a1d301680 qemu-kvm-ui-egl-headless-7.0.0-13.el9.x86_64.rpm a0bd84ee2c3ac9515cde434338c7cba0266f47963d173b054c9173468bfd0af7 qemu-kvm-ui-opengl-7.0.0-13.el9.x86_64.rpm e5783e862bf56476dbb1664cdc7e3fe4ac3899e877ea2a88401d44fa42118632 qemu-pr-helper-7.0.0-13.el9.x86_64.rpm f97b900fa1d36cef59b9be4f6cacc04ba07a5f78f2835bdbca22d80878b1f8bf RLSA-2022:7968 Low: virt-v2v security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for virt-v2v. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The virt-v2v package provides a tool for converting virtual machines to use the KVM (Kernel-based Virtual Machine) hypervisor or Rocky Enterprise Software Foundation Enterprise Virtualization. The tool modifies both the virtual machine image and its associated libvirt metadata. Also, virt-v2v can configure a guest to use VirtIO drivers if possible. Security Fix(es): * libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virt-v2v-2.0.7-6.el9.x86_64.rpm 08a2d7a5a74a2e43f533a66c11482e55a90cc8184432b7486498957f417387d1 virt-v2v-bash-completion-2.0.7-6.el9.noarch.rpm ba18e3f6854602e1a110e30ea2b77c8bd3e79722e273ed81a7a42224de0448a0 RLBA-2022:7969 network-manager-applet bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for network-manager-applet. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms network-manager-applet-1.26.0-1.el9.x86_64.rpm 9758c6b37599c2643a321624dd5d7ef0c08c566b012236e12bb0746f08160e52 nm-connection-editor-1.26.0-1.el9.x86_64.rpm f715218d2eb47f1a7605281cb2c2d2b39e102d32a30be1f5a3c03cf647d2b977 RLSA-2022:7970 Moderate: protobuf security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for protobuf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data. Security Fix(es): * protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference (CVE-2021-22570) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms protobuf-3.14.0-13.el9.i686.rpm e9555809ecf853e7f344596d414137146d51f8578a8e984d1690bf2f9cc52943 protobuf-3.14.0-13.el9.x86_64.rpm e67d8801918a3200aeaeb3beb7a5a56124ef13c3e5b2f514b33d026ce2ff016e protobuf-lite-3.14.0-13.el9.i686.rpm 9359605b00acfa9ad58f46976a6fdca7ffe34eacf3bfb911566c5dc822af2020 protobuf-lite-3.14.0-13.el9.x86_64.rpm 21ff481d8f5d8bd08c9a6d192af40c06d7bd923d21a95220c4ed9f46abfd61a7 python3-protobuf-3.14.0-13.el9.noarch.rpm 169c2dc33df72dfd0d6563e4b7b4a811349da6e243fc89f1a0e4eb8ac9c1761f RLEA-2022:7971 edk2 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for edk2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms edk2-ovmf-20220526git16779ede2d36-3.el9.noarch.rpm 95ca4bef0aef31d8963e2ca7f7f5cd9e7ca0ace9da0facaee38c5a5d4edc0136 RLBA-2022:7973 tftp bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tftp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tftp-5.2-37.el9.x86_64.rpm 70193c0aeb7f62e4007c05722102348d224aa4ab01bbdabf93e2096459eac8ad tftp-server-5.2-37.el9.x86_64.rpm f252a9225c85a7165bf4d87722058db1e285ff45abf1b17f2b38401d5ea14927 RLBA-2022:7974 cockpit-podman bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-podman-53-1.el9.noarch.rpm 13a9c4072ab45ff677e013557e7409d54057ffda5cd4816661379ecd5eca5224 RLBA-2022:7975 pesign bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pesign. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pesign-115-4.el9.rocky.2.x86_64.rpm f58a827f01ec2de0fdaef956a6ec4a2434028f22b26e4c963f2df1898e0e754e RLBA-2022:7977 anaconda bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for anaconda. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms anaconda-34.25.1.14-1.el9.rocky.0.3.x86_64.rpm 99b32e80363e1b4fbe9b91e29cee253f0fe2ba256565937f8c4f501089316d5a anaconda-core-34.25.1.14-1.el9.rocky.0.3.x86_64.rpm 615e02d7e64b2d55e3dc1a5fa5cca598cfba5ddf27bf730ae803df518a653aea anaconda-dracut-34.25.1.14-1.el9.rocky.0.3.x86_64.rpm e47b708e1074dfb5aa25922b88596c2d1e123664022f5047631bb4bb99b0daaf anaconda-gui-34.25.1.14-1.el9.rocky.0.3.x86_64.rpm 2b7eb7f19a8b9c91e843b2c3c4f53da68b4456d704aa1a7b15eff7fab29f78bc anaconda-install-env-deps-34.25.1.14-1.el9.rocky.0.3.x86_64.rpm 9cb5df84d09c1ea4df72e679bb259c829fb36b25b2ed13fe1a10bbf565857354 anaconda-install-img-deps-34.25.1.14-1.el9.rocky.0.3.x86_64.rpm 25b52d9354bd0eb8a2f09d769dbd8d5b6647dcea6024d95809c57ef3624ebe8b anaconda-tui-34.25.1.14-1.el9.rocky.0.3.x86_64.rpm 1583115806140f78358772f3b3a5c19f3b288febb8229745de7a1daca3467b49 anaconda-widgets-34.25.1.14-1.el9.rocky.0.3.i686.rpm 7bece75c388f61a9562bad90c37c6aad6b06d4446cfb8c7c39ff4a1f14237acf anaconda-widgets-34.25.1.14-1.el9.rocky.0.3.x86_64.rpm 86435a5f2c484770637d2f6ce92f11001b2be5d681a069f3392536ed1e5f25c7 RLSA-2022:7978 Moderate: gimp security and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gimp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GIMP (GNU Image Manipulation Program) is an image composition and editing program. GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo. Security Fix(es): * gimp: buffer overflow through a crafted XCF file (CVE-2022-30067) * gimp: unhandled exception via a crafted XCF file may lead to DoS (CVE-2022-32990) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gimp-2.99.8-3.el9.x86_64.rpm f3aff4bd98554c12cf0cabdd92a007577f5311fe1e77abe30254611e2862f2d4 gimp-libs-2.99.8-3.el9.i686.rpm dd6a34ceaf8bf8233df1c8bff59d079a0f04187d4c8d5e1835537858c680b305 gimp-libs-2.99.8-3.el9.x86_64.rpm 2cbd3376d21c0f03c5711e3b1935f167c71ebc9950c6350b0b45ad52dc9c5691 RLBA-2022:7981 fence-agents bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fence-agents-common-4.10.0-30.el9_1.1.noarch.rpm 5d6d0e5288bb4819931c80f67c6d82c53d0239200e500fef0c55d3ef0a14e55a fence-agents-compute-4.10.0-30.el9_1.1.x86_64.rpm 987cdfdcb4cf9924bb79f8450816d0d9d9c64a16e68b9ee9216aa28b2e504140 fence-agents-ibm-powervs-4.10.0-30.el9_1.1.noarch.rpm e11a479ddc95d9e0b96b91503c26cf1c926debbbee5de99806f2c87a646f4381 fence-agents-ibm-vpc-4.10.0-30.el9_1.1.noarch.rpm 5799c0043df987e445448a5f44a9a080ab8dc9fa7d2e1f18764138932001e69e fence-agents-kubevirt-4.10.0-30.el9_1.1.x86_64.rpm 81f39692a3915637682b3c922fab5f48cf18c63836b45a075a16d72196cf9871 fence-agents-virsh-4.10.0-30.el9_1.1.noarch.rpm 8ee652646647df883c5a6a87e14bdca664b779635ff7595ac866d0f89f89d3f8 fence-virt-4.10.0-30.el9_1.1.x86_64.rpm ad8079229d80d22fa0b8a61057b51407ad042735f9265cbee09e8c01d2b02744 fence-virtd-4.10.0-30.el9_1.1.x86_64.rpm d38c221fad37130c267cb2e09f09e54c7a1661d8f391298aa667b988f94416f7 fence-virtd-cpg-4.10.0-30.el9_1.1.x86_64.rpm 7311bd308b7fce7626e1f1efceb4a2ebe51142076cf4d47af3b383af25d612a8 fence-virtd-libvirt-4.10.0-30.el9_1.1.x86_64.rpm 7c7a047976567520da46e488d7770e91a655a19440cc4afce78756c6125c7571 fence-virtd-multicast-4.10.0-30.el9_1.1.x86_64.rpm cb792c9a484d9d15cf5973d6a91e80650cb25bd23d2769ed7eb8852605304c6d fence-virtd-serial-4.10.0-30.el9_1.1.x86_64.rpm d4c34e220f40da921730f096c90d89a975509b4d566b16599c7bee32dbc69aa2 fence-virtd-tcp-4.10.0-30.el9_1.1.x86_64.rpm 641685476e28e6708dc334ca1aaf3a92ad48ce39ce395796d44e85e77b7bf30a RLEA-2022:7983 ostree bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ostree-2022.5-1.el9.i686.rpm 23a185b07b0cc39438e7b90bbcce197cefa9f7d1cb3acf46c179a557721dfa7c ostree-2022.5-1.el9.x86_64.rpm 6af184ec89b61e57aab331e065d125e27d15acefbbeb79275ade48b7d26b48ca ostree-grub2-2022.5-1.el9.x86_64.rpm 270c8f82d1dc25fe3fa7c2d256e93e9108043a42ef698b2d593426f78330f23e ostree-libs-2022.5-1.el9.i686.rpm d41157f436cb396a2e666626b3de7701482976c82050e467b872222b5ff6402a ostree-libs-2022.5-1.el9.x86_64.rpm 01fb60886745eceaf7b7237d433a21a1d7312c974e7528554dbb1ffdadaad3fc RLBA-2022:7985 nautilus bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nautilus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nautilus-40.2-9.el9_1.x86_64.rpm 68f100394a0abffb6fe435a883e058819296100462791326d145e2af6a5517a0 nautilus-extensions-40.2-9.el9_1.i686.rpm cb08308623d73ddd9255af3b246d61151841419bde6e0ab3b74f81ca1e0bbec3 nautilus-extensions-40.2-9.el9_1.x86_64.rpm 58433a3da1876b7dccc20c8b5a2e4ccc80f9de76e92a68bcfd1d95f777486a77 RLBA-2022:7986 tigervnc bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tigervnc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tigervnc-1.12.0-4.el9.x86_64.rpm 182ab6ca165b159ce2796b9565599de6b13e3cc79081c6a0dae9f831aa87f1a9 tigervnc-icons-1.12.0-4.el9.noarch.rpm ca9181ccf07ac109be00b9053c585edb8c1f84f1f06d98997b107f0ef6cc1f33 tigervnc-license-1.12.0-4.el9.noarch.rpm b769de1827560d1dbbd0a3fe8e89203c7b31d3ab144abaec805893ed46d47861 tigervnc-selinux-1.12.0-4.el9.noarch.rpm 893a9b43cc3230801d4f1f55d529917e7b997d06eb54b1b90f658316f3869aae tigervnc-server-1.12.0-4.el9.x86_64.rpm ca5bee1853ad7e2abfa0a8fa4e6b1e20cc813175974e6a6ca90eaa342cab7288 tigervnc-server-minimal-1.12.0-4.el9.x86_64.rpm a208cbd8ed486d9e407cd09467cf065664d7fed4e2ebe2f2847391f61d4f6426 tigervnc-server-module-1.12.0-4.el9.x86_64.rpm 25495f0cbdfff59690ff8a53d2b51c097ae10dc6d92057e7693d2faa5144c227 RLBA-2022:7987 rasdaemon bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rasdaemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rasdaemon-0.6.7-8.el9.x86_64.rpm 32375a5ce17e90a934d889f052b6c1294bfd78da519898e0c8ab4627ca716256 RLBA-2022:7989 pcp bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pcp-5.3.7-7.el9.x86_64.rpm 42c7ae3551f33490eff0c258a8193f1eb80c7d379ed1d39161f1edc491c9c605 pcp-conf-5.3.7-7.el9.x86_64.rpm e9016b737e17f17fbe2f8991384386ff856f4d5c937c363409680cc9925c1c02 pcp-devel-5.3.7-7.el9.i686.rpm dc79ad982545d20f9ad3648cfb5d49d7dff813abf4c1668ac85b60806d249875 pcp-devel-5.3.7-7.el9.x86_64.rpm a082d6c06a136e71dfb0b35d25044c912eee9ce63096df514fcc0c5f11e4b501 pcp-doc-5.3.7-7.el9.noarch.rpm 5db779ce5ef2d98e35ad64464124313ffaf6f04420df97037c49e3a4b2b92e46 pcp-export-pcp2elasticsearch-5.3.7-7.el9.x86_64.rpm aa522bc890efa9732cb74f10d94904bce1e3c1d3cf9ab263a4b81df0a664ba0f pcp-export-pcp2graphite-5.3.7-7.el9.x86_64.rpm cac0b1fa8b3151399918c806e04573780485f84bbdb9977ec422e95e3a70487d pcp-export-pcp2influxdb-5.3.7-7.el9.x86_64.rpm 72aad23fe4110efbb0ba4f2582cde2457a10263caf426efc65e54e592a28f56a pcp-export-pcp2json-5.3.7-7.el9.x86_64.rpm 4b225f54354e84579278b5785e618995010137521a6896cf14894609a6045137 pcp-export-pcp2spark-5.3.7-7.el9.x86_64.rpm f5698a76cb6c7fccec67e1ab2352721971d3d2473d804e2830e27761e052e3af pcp-export-pcp2xml-5.3.7-7.el9.x86_64.rpm 682e12aca0d2b46448e3df4c1e6358cc723804d15a13b170f8fff6eede7505a9 pcp-export-pcp2zabbix-5.3.7-7.el9.x86_64.rpm c78d0f70e58a491e7d3613bd00cde14e714fd59bd7c59ec0da15f4d1c50c4472 pcp-export-zabbix-agent-5.3.7-7.el9.x86_64.rpm 9a45973f9fc00176c05e07378246f4ab87d37cae4500cdd71a240d91195ce59b pcp-gui-5.3.7-7.el9.x86_64.rpm 5a0f60cae705fd1268bb0a43b4ba03185109cea2e0eb1b44572f62aee162a6e5 pcp-import-collectl2pcp-5.3.7-7.el9.x86_64.rpm f02b019c0f28fcdc7f273137c0e47eb44bf8507bb8e5d43c22453f61b18b866d pcp-import-ganglia2pcp-5.3.7-7.el9.x86_64.rpm abde6658e2660a76d45f932f958012b0571a67906553ebf1d1c898c60fdca2c8 pcp-import-iostat2pcp-5.3.7-7.el9.x86_64.rpm de0b64fddb4fcdb61e58900d78983de6d417bcc818da95f1b566ae42ab97d8bf pcp-import-mrtg2pcp-5.3.7-7.el9.x86_64.rpm 5b537b517e63de8c03ed8e4b37dda109384450c265a59b9f32c3499a45eccb8f pcp-import-sar2pcp-5.3.7-7.el9.x86_64.rpm da6ad333590ea6dc381c4841f5992fc314c5955d4ec75e4965cf50f954796453 pcp-libs-5.3.7-7.el9.i686.rpm 54fde7606567b5f49aa2b9e271cc4d145cb21aafb32f60b776c19595bfdb7e29 pcp-libs-5.3.7-7.el9.x86_64.rpm 34a1d3e5f1356fa62a3436fe010724617a03b120e458628527c15cef0dcba418 pcp-libs-devel-5.3.7-7.el9.i686.rpm b483c2d71c735b0ec55e9504a5d20eb719828bd7eec9503b70acb4e9099d5e78 pcp-libs-devel-5.3.7-7.el9.x86_64.rpm f4b9fabc38ee97430dd013352cb0e0ebec3b8bb5edc730f46c7f9ef56b11c352 pcp-pmda-activemq-5.3.7-7.el9.x86_64.rpm 4bbef93c6c2b40fc2fc0b0ee36848c9e18b2fd68847214756226184ba1798566 pcp-pmda-apache-5.3.7-7.el9.x86_64.rpm b03b3247bb4c3eb77edfac387eb560284f2a74f54980b7c05b2cfa4b6042b290 pcp-pmda-bash-5.3.7-7.el9.x86_64.rpm fb66155466d72090e60e4683c84b9d61caf9c76ef503dff68b7d246aac781d7e pcp-pmda-bcc-5.3.7-7.el9.x86_64.rpm 41d392dfbf168a54fce27fec31c87a8eff56815f382c8c5344448ba2262176d2 pcp-pmda-bind2-5.3.7-7.el9.x86_64.rpm 4c953afd3f76a25ad4d214466dd79e4d525564aa531a8b8f08d76558105544eb pcp-pmda-bonding-5.3.7-7.el9.x86_64.rpm 1c627f18331985d5f23d114a015cdd40d2f813aa143612ff6992585d406a302a pcp-pmda-bpf-5.3.7-7.el9.x86_64.rpm a84dfe1b5c922b44a797d6bb731218319da912ccd5332759e16b4a809d55097e pcp-pmda-bpftrace-5.3.7-7.el9.x86_64.rpm 57cc1675145353df62461dd0d6bdd14c462c8b50026ea1433f5176898909e1af pcp-pmda-cifs-5.3.7-7.el9.x86_64.rpm dde128247f14a5288a3fc6c873f3f31be82a37e79b222c7a3a9c5f950dd2de7a pcp-pmda-cisco-5.3.7-7.el9.x86_64.rpm 5742ac46b4f348f481fe3b202b3f9e229b3d0fd0cc8db54aae8f655bac8d305f pcp-pmda-dbping-5.3.7-7.el9.x86_64.rpm 4c7cd746fcfb119b081d93ccca6ea65b9bce5902887704ba8b2f5fb590233ff2 pcp-pmda-denki-5.3.7-7.el9.x86_64.rpm adf637dbee92bb4e3a9e11c6f69ffa00612b9a847f588fc11fecf6b63a0d1419 pcp-pmda-dm-5.3.7-7.el9.x86_64.rpm 37f6c1c57c3cd334334eddd63963bda8e4a05fe33feeb2d8022b83785c24fe83 pcp-pmda-docker-5.3.7-7.el9.x86_64.rpm 98fae90773d5c95738f93f488b59a9f581f23865d1f9f3b39b59b7ec02eb54b2 pcp-pmda-ds389-5.3.7-7.el9.x86_64.rpm 228a7585e65a43b81d486403fed67d479a33b38b522de6b955e6b0f209ec1fc1 pcp-pmda-ds389log-5.3.7-7.el9.x86_64.rpm cabb7fad64bd080771fccf90c8bf0439d3b866ad5dee7871357a29bda1cd864d pcp-pmda-elasticsearch-5.3.7-7.el9.x86_64.rpm 52fa7b9d64f669ebbe26249a4f94082e70ce8b20b2e953a89aa7e103fec024ac pcp-pmda-gfs2-5.3.7-7.el9.x86_64.rpm 05294fee0e5961cfef88e0ebce763a6e36de2fd50d3520fca84d0ef821a10cdb pcp-pmda-gluster-5.3.7-7.el9.x86_64.rpm 43cfb084bb796d355d9dd50ebbd8348e5e944e66b70eaef312558a2789c0272a pcp-pmda-gpfs-5.3.7-7.el9.x86_64.rpm 5d0701250f27f51b5b1a3d9dc4d9c4008e4531fc08488254bc8d8a17695f2908 pcp-pmda-gpsd-5.3.7-7.el9.x86_64.rpm 9bebaadb58a36ee744554affbc871fe732f53309e74a98a8e9bec417eeb64eac pcp-pmda-hacluster-5.3.7-7.el9.x86_64.rpm e210dfa911b6ac36e2408e02e2cb4c04d69552f92a3bf091455f0da3a8316b3e pcp-pmda-haproxy-5.3.7-7.el9.x86_64.rpm 1f1cc9af51bb8bf34b117b25c16af463acaea93452210739ed392c31273db801 pcp-pmda-infiniband-5.3.7-7.el9.x86_64.rpm 21b94c8fdaea67e011fd82d529255f962752c196686c56e2b6a829925aec5c6c pcp-pmda-json-5.3.7-7.el9.x86_64.rpm abef33a2fcd03338092f9d220da7c7a1478a7785f57a1d02e27ccff4e0d40dbf pcp-pmda-libvirt-5.3.7-7.el9.x86_64.rpm d14ec3ac6467cb5a91059d1d546858b5df1029b581bc87472d07031440b8b55a pcp-pmda-lio-5.3.7-7.el9.x86_64.rpm 8b2ed271e688b08e5af7fd8a5cc3cb0425322177d928431c4cd03b05c7cb712b pcp-pmda-lmsensors-5.3.7-7.el9.x86_64.rpm 9ed0241edf77ec428ea178f0b932d34b948223a734938e6d7392da82d889295a pcp-pmda-logger-5.3.7-7.el9.x86_64.rpm 72b28e997f68d21ec8b53e1c921de0f29eff7e3268464036c2531ec6262442ba pcp-pmda-lustre-5.3.7-7.el9.x86_64.rpm 2c9db8b81fc86683ab72c93f8e1feb1bb5939a255912c24b2b7a2844c03fb5ed pcp-pmda-lustrecomm-5.3.7-7.el9.x86_64.rpm 06522306cef6bf9523ec1f3a002f005289a0479b9bcf9abce2a6598c09c02e80 pcp-pmda-mailq-5.3.7-7.el9.x86_64.rpm 6aa0293807d678d4c55beed8718bdbd01cfa8d1cc1e9150953984a55f97aadde pcp-pmda-memcache-5.3.7-7.el9.x86_64.rpm d18a97a2df05dce8f1623dec762563e419fc41ceed78e86265b22ba319ff4d63 pcp-pmda-mic-5.3.7-7.el9.x86_64.rpm 5867752aa9ccf90042b215f749778e1d15f3d27ef1de30fc48b4aff3a936bb16 pcp-pmda-mongodb-5.3.7-7.el9.x86_64.rpm 61a50bbb5a9ce626987f133037714cf924e1a0413a050e395dee0be8cb8ef90b pcp-pmda-mounts-5.3.7-7.el9.x86_64.rpm 4b1c8938fb54f5edfd6110b60c9d2368cb5dd31e7f1942d1453fc10cf67c3ba8 pcp-pmda-mssql-5.3.7-7.el9.x86_64.rpm 31bc2461c2d0700d7f9f1dc66694c730cff2b2194ec048f8195f316c1930a21b pcp-pmda-mysql-5.3.7-7.el9.x86_64.rpm 35607851f9a062b09b880519d614f595cdd330e76f4f46e0a13d33031bc378e1 pcp-pmda-named-5.3.7-7.el9.x86_64.rpm a4278d65ce8d2dd56bd5abe9737030e99b337ab3e450bc0e09e63830d57908be pcp-pmda-netcheck-5.3.7-7.el9.x86_64.rpm a1e478a0f38d4695557d0bf426e7b00d4b1cdc5e04a562db4c142c8f08ae5ad8 pcp-pmda-netfilter-5.3.7-7.el9.x86_64.rpm 5fd8a881bae8f91d1744248da0acfa188104593f2db29e9c65776270706a4185 pcp-pmda-news-5.3.7-7.el9.x86_64.rpm 8b6e8bad526e20fbd3072c6010d2e4d84b477dc3fa9521988995537487a18a65 pcp-pmda-nfsclient-5.3.7-7.el9.x86_64.rpm e8c9dbdaece222ad4da075696307fd22b51ee0cd5d5664357c750c3f82d807a5 pcp-pmda-nginx-5.3.7-7.el9.x86_64.rpm 0eb49c26dfab8923569871ad57b099d39e6673176eb59cb2ee74950a3c90f6be pcp-pmda-nvidia-gpu-5.3.7-7.el9.x86_64.rpm 4334f9e143a09b85ba8c7f072f70fd648edc365d6e0cf0caa4855745da6a9bd5 pcp-pmda-openmetrics-5.3.7-7.el9.x86_64.rpm 14eec24865c9e25fe8ac172a574424c1a560fdf063f2bb3489a89703e421843b pcp-pmda-openvswitch-5.3.7-7.el9.x86_64.rpm 3781a368424c297193b82eef7296ed0c8de55fee90db1dc2170d648d0cdc02a3 pcp-pmda-oracle-5.3.7-7.el9.x86_64.rpm 2530b18c4b291e59961544ad48690a4965bfd371cdb70e82db686939e542c580 pcp-pmda-pdns-5.3.7-7.el9.x86_64.rpm b35a174148194b05358bed97a7e33ad17a0116f0fa89ee313ff6a919095f88df pcp-pmda-perfevent-5.3.7-7.el9.x86_64.rpm 590b75c0827f04d00905b3af2924dd343811b406734eb97ec1dc584080559be9 pcp-pmda-podman-5.3.7-7.el9.x86_64.rpm eb3b571a8f15bdf39113162423104db459987586c8b89e3d54529a062cd74c88 pcp-pmda-postfix-5.3.7-7.el9.x86_64.rpm d7f20e2d7d62bd711e81080c93bed522011a3e13b8e5b492092a67380b3a1074 pcp-pmda-postgresql-5.3.7-7.el9.x86_64.rpm c5b16753080b48d492acfa47d27503fe87a7a94be230b56e4071989eb6f91b1a pcp-pmda-rabbitmq-5.3.7-7.el9.x86_64.rpm 8ca2186d184c8fcd760ab74b28b1a34eca850e295903a6faaa3bec9b3f63f0b2 pcp-pmda-redis-5.3.7-7.el9.x86_64.rpm d773636bb7a5fe1068d2dfa7634384385cb041c99cb5d1f6ee63830f517353f2 pcp-pmda-roomtemp-5.3.7-7.el9.x86_64.rpm 55b2b6c81f3044fdfccc86fc2460ef5b0b244a24a815c304ad50169ac2faf255 pcp-pmda-rsyslog-5.3.7-7.el9.x86_64.rpm cde07c14e58bd770a197f3bab7d2b33e345eb50f98cf542251dcef2e58fa6b6b pcp-pmda-samba-5.3.7-7.el9.x86_64.rpm b0978f929f0d3990e122f8ee616288e636e277fd6bc91ce8bc55708defb4ec87 pcp-pmda-sendmail-5.3.7-7.el9.x86_64.rpm 2b29cbd51a37d94a055fd6d2bdad2e87036c1790cb5f1ce2d382dbb9226f3796 pcp-pmda-shping-5.3.7-7.el9.x86_64.rpm 26a6fde9e14da01a7518c8985734ef2d62a036e8f1778e342d270b731fc06894 pcp-pmda-slurm-5.3.7-7.el9.x86_64.rpm 89b01297e1282f839e2474ce3cd23258794a0488659bb0922ae37158a02dffa7 pcp-pmda-smart-5.3.7-7.el9.x86_64.rpm d0ba0b074b73adad835e0da94323ab0795615510ab5b15476a7624c67af087ab pcp-pmda-snmp-5.3.7-7.el9.x86_64.rpm 001c6decb65cc8d6ce3b02138535ae4ae222d33ab4437b9914502316acc106e7 pcp-pmda-sockets-5.3.7-7.el9.x86_64.rpm ca288c63854d507e9afcecfa170b21675f4bb4b94c6ddd7a02eb1a4c83186878 pcp-pmda-statsd-5.3.7-7.el9.x86_64.rpm 9c0f836537990feb9710bfa9922fd44f4f2408ee3be5ba75425cbb6262f0db87 pcp-pmda-summary-5.3.7-7.el9.x86_64.rpm 19c3e196a4856cb630769c6ca158b85445ee6c5a158b5b7958698689d32cd970 pcp-pmda-systemd-5.3.7-7.el9.x86_64.rpm a1940210f1c33cbc024a332bb250cdec065fb05602e2d07c86a373afd9a0d583 pcp-pmda-trace-5.3.7-7.el9.x86_64.rpm 4ca5091c96f436eb8e93e85bb3ec4f9cbe7c244e2baea575ddf80e59c7951398 pcp-pmda-unbound-5.3.7-7.el9.x86_64.rpm 1f6e254d7b901d5db7dbd499669168efeac5f976b3dfc3d3c8fd0f484b00ba26 pcp-pmda-weblog-5.3.7-7.el9.x86_64.rpm 830cb130a43bddbfa80015bb4985188b989717eed59174b06b941609cea102c1 pcp-pmda-zimbra-5.3.7-7.el9.x86_64.rpm c113cee5590adba9bea06c5754159ceb602207c1a24278f6cc036ea191795658 pcp-pmda-zswap-5.3.7-7.el9.x86_64.rpm 1af9801db336d77669a3506bba1b36dbf62184f19c5c1d996aaab7cde94a039a pcp-selinux-5.3.7-7.el9.x86_64.rpm e9d759a3d5da0a75e040fc841213fc826a889e4f6fd663c4316a3a90f53dc467 pcp-system-tools-5.3.7-7.el9.x86_64.rpm 41d82d8e3392f4ce1da2f16f42ec49a827b42a053e1eff7f365c74e8089e9f35 pcp-testsuite-5.3.7-7.el9.i686.rpm 39cc6c1f585f0d1e917fa8c397cc31c513c30190403b4851adbe544f2075b972 pcp-testsuite-5.3.7-7.el9.x86_64.rpm 5fa2d6191d6ed868d28d74be131afc1ffcee67e553586d77eb57fa1c35d8358e pcp-zeroconf-5.3.7-7.el9.x86_64.rpm f4bf46c644cefdb5512b26f53056a83848533a9250cd384d923bc1bfa6ac6263 perl-PCP-LogImport-5.3.7-7.el9.x86_64.rpm 44fc146b3e583e4dcce189e41cd1da843ca78a136cf3f4053589ea0cb7270732 perl-PCP-LogSummary-5.3.7-7.el9.x86_64.rpm 175b0dd1ea7ed33e0ddef249423c8aed9c9bf5c2dbce73025c69eea4ba3eed89 perl-PCP-MMV-5.3.7-7.el9.x86_64.rpm 25e5691d2bf8c645341fb321d2e5c5f45298bd5b031ec06dc0daacc07e29b900 perl-PCP-PMDA-5.3.7-7.el9.x86_64.rpm f7cedcf1efc5378cd5ed05a24752556c3c096b8c7b75a9fab77205050d20723f python3-pcp-5.3.7-7.el9.x86_64.rpm 74a1b9cccba3dcecee9cf3d6d636421ab2b2e4e08a64596dd9cc78792d974507 RLBA-2022:7994 evolution bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for evolution. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms evolution-3.40.4-6.el9.x86_64.rpm 63f59c74ffcec300bfff30b8d56d8e2cabbdefda98c2cf49ff0883c09ee45239 evolution-bogofilter-3.40.4-6.el9.x86_64.rpm 4b5cd6d9b38014aa1847327c49f3c3981642b9e797fa35e13fe9340db2053a1c evolution-help-3.40.4-6.el9.noarch.rpm 7b67cb16b5f085601d654b537b388c090423d90cc851be33dd74e9c195dc4294 evolution-langpacks-3.40.4-6.el9.noarch.rpm 80c1b3448aa997afb16b8696746bc14839c5fc1efb6e013bd0fa268612993c70 evolution-pst-3.40.4-6.el9.x86_64.rpm 222f8d9d65f0cc6d8f027f7788f319a0f1cff29e0833dde131b26fc8cc260867 evolution-spamassassin-3.40.4-6.el9.x86_64.rpm cd38dec19299bf8b08eea4c871daa3e405986576bc8315d5a62a4e4a86516152 RLBA-2022:7995 evolution-data-server bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for evolution-data-server. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms evolution-data-server-3.40.4-6.el9.i686.rpm da397784c3524325a57ea5bff13a1ba86dfc00ea09c006fca62b68421aa984bb evolution-data-server-3.40.4-6.el9.x86_64.rpm 6b3e20586e0fb36fd380503dd439750e032ee433daaca2c611fd6e4f3f4f254a evolution-data-server-devel-3.40.4-6.el9.i686.rpm e88b5d32a1e761af9658c4bc2af305f2a0da87a490438d73a72de6c65fbc24c2 evolution-data-server-devel-3.40.4-6.el9.x86_64.rpm 03c607ee947a55264a69525b9aa1aec64dad06d8325e1234eb32dbd9d972448e evolution-data-server-doc-3.40.4-6.el9.noarch.rpm 93ab2ed7576d23b294b1db56171dae650df9b660b2c8bce44a0e6da2e1df184d evolution-data-server-langpacks-3.40.4-6.el9.noarch.rpm db81a56031c693d5d1cd9b7e6fd4d88addb685a57aeed735c95724468034dd57 evolution-data-server-perl-3.40.4-6.el9.x86_64.rpm d871f020d8ced243917204a0012c9e90032614fa5f18eec8b24d7ed85a783ab7 evolution-data-server-tests-3.40.4-6.el9.i686.rpm f404ad56a2bf7d94822c3620c05115579628b21c20feb677f748e184cb6a9107 evolution-data-server-tests-3.40.4-6.el9.x86_64.rpm 499c75494c55be70cc7ba94d6963b0a5175e2ededa6123277e4d717ea46d4546 RLBA-2022:7997 xdg-desktop-portal bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdg-desktop-portal. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xdg-desktop-portal-1.12.4-1.el9.x86_64.rpm 5b69bca006861baa18cb3a5e35394012d0ed0b49e18441b4246aecb476684716 RLEA-2022:7999 xdg-desktop-portal-gnome bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdg-desktop-portal-gnome. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xdg-desktop-portal-gnome-41.2-1.el9.x86_64.rpm 7bb9428acc9ef87979050d06e4e975e053a17ccd38d5656039909c20d6be90d5 RLBA-2022:8000 wayland-protocols bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wayland-protocols. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms wayland-protocols-devel-1.25-1.el9.noarch.rpm 3a912fcd7eaa246e88b4bae743895e34228b4dac59c387b671e4994708954b4b RLBA-2022:8049 qt5-qtdoc bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtdoc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtdoc-5.15.3-2.el9.noarch.rpm 6d290aad6edc176a63157b18af2af8239e9bb304c7ea8ac01f8296e0bac0be7d RLSA-2022:8003 Low: libvirt security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. The following packages have been upgraded to a later upstream version: libvirt (8.5.0). (BZ#2060313) Security Fix(es): * libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service (CVE-2022-0897) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libvirt-8.5.0-7.3.el9_1.x86_64.rpm c708779a396e230d2c5b07e0bfe51cd01f49ccbd4c83869d8073d60d6370dd64 libvirt-client-8.5.0-7.3.el9_1.x86_64.rpm 7e78e4b314f9391dae14046061f56a0877ba5d2fa8fc6c80e50ef539c8cb8643 libvirt-daemon-8.5.0-7.3.el9_1.x86_64.rpm 48b52a90c97c6b7ad233f63d5e89b6e755018153285734c21f78660409585d1a libvirt-daemon-config-network-8.5.0-7.3.el9_1.x86_64.rpm ea06d4aa7466a860568cd37e88f867968d093a0323d9f4d47a57c2bbeb18c91e libvirt-daemon-config-nwfilter-8.5.0-7.3.el9_1.x86_64.rpm 420ff2d0519c7e21815e4beb165018e69bbdc52f3bf3c93b961e9873a55eecae libvirt-daemon-driver-interface-8.5.0-7.3.el9_1.x86_64.rpm 7e3a7d4ecf369c032a337355427483db927474305d71c1815f888aa28197a218 libvirt-daemon-driver-network-8.5.0-7.3.el9_1.x86_64.rpm 3ed76de2a5b5b77ace56a63991e4b9f57579d0419976dadd00cece896e6be893 libvirt-daemon-driver-nodedev-8.5.0-7.3.el9_1.x86_64.rpm ca05c2a76e07f5ff4647ce9db4ad488a0d4f02a7047be7d15618e969a6a1961b libvirt-daemon-driver-nwfilter-8.5.0-7.3.el9_1.x86_64.rpm 792d48eae60612d2edef25f085c8d1508d110d575b40c3c4a1631ca7177d4b1e libvirt-daemon-driver-qemu-8.5.0-7.3.el9_1.x86_64.rpm b0f28d516b0edc48b0b922dfafa3eb67df028ef014c04e355f31e80aba6005da libvirt-daemon-driver-secret-8.5.0-7.3.el9_1.x86_64.rpm de5bb1b4844f9ff342ccc76b99404624c2d77209c7c4de29253080dcc85c6ef5 libvirt-daemon-driver-storage-8.5.0-7.3.el9_1.x86_64.rpm 11d28b80a7e3f9d171f9d48637e61241c66003ae24366dbe34328c0595e37b7c libvirt-daemon-driver-storage-core-8.5.0-7.3.el9_1.x86_64.rpm 37d0168e2a00cf5e6928bb0a5bfda4b762fc83455f8d60dd9ee459a0cfc95167 libvirt-daemon-driver-storage-disk-8.5.0-7.3.el9_1.x86_64.rpm 24e8e44a9eae16af22f0a4612baaba359e4df0efa8197bba24b03ce0ad2072bd libvirt-daemon-driver-storage-iscsi-8.5.0-7.3.el9_1.x86_64.rpm 4019867e2bdd85da3b6fd73d8649fa476875224fae7f21d06c84af2778797e5d libvirt-daemon-driver-storage-logical-8.5.0-7.3.el9_1.x86_64.rpm ac268085630e07135f22f6d3224469f1b1fed919758eb843017c3356e41e153a libvirt-daemon-driver-storage-mpath-8.5.0-7.3.el9_1.x86_64.rpm 43a2dd82596de9414d0e7ada2acaaa89d864a20c5b42623b322ec4b86b0890ec libvirt-daemon-driver-storage-rbd-8.5.0-7.3.el9_1.x86_64.rpm eb0ac684f2d54aa112510c00b04ba8fca6043aabc83f5b6d3052b5659e701037 libvirt-daemon-driver-storage-scsi-8.5.0-7.3.el9_1.x86_64.rpm 92c62e1ff027648c615425c0b1969373bba89fdc99e4c6a95d84be5e1a806c15 libvirt-daemon-kvm-8.5.0-7.3.el9_1.x86_64.rpm baaf46cf94b070312b786a26aa1f21c16d1e17e7a6a7bf6217b7a0cad0cb3bf5 libvirt-libs-8.5.0-7.3.el9_1.x86_64.rpm 676aee21a6ccef29385ddeb6118c7e29c2ca4250acf8ea9af15905ad3ea44e0b libvirt-nss-8.5.0-7.3.el9_1.x86_64.rpm d829f341c6a3e196c3b05e1cee3af14c96f9fd387883a4d76f5afc45af0ccae4 RLBA-2022:8004 rpm-ostree bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rpm-ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rpm-ostree-2022.12-2.el9.x86_64.rpm ae5615f173f2691dedd7a531190010fab535795e4826e07ea634408bd674f74d rpm-ostree-libs-2022.12-2.el9.i686.rpm fba0f7fb3e5742b38d46e02902cad74e2345c925276fb9eb28ebe08593710066 rpm-ostree-libs-2022.12-2.el9.x86_64.rpm a222c74f2e68887a97bcaa5c2ef20221cf6c33f4e5d4eb8aa832b14ed773b665 RLBA-2022:8006 gjs bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gjs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gjs-1.68.6-1.el9.i686.rpm dd220454af47dd472627be699a5f9f0711444405489578c30cba9e3a2ea07187 gjs-1.68.6-1.el9.x86_64.rpm 29a9d4662db1efd9c5be705bf931d7f946e03fed1584b9fb557c97d7a6fff768 RLBA-2022:8007 libvirt-python bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt-python. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-libvirt-8.5.0-2.el9.x86_64.rpm 1de6fbb9601b277c40d0f46d0266b9a337c3998a0b1414a66ad0307df6c2bd0a RLEA-2022:8009 jss bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms idm-jss-5.2.1-1.el9.x86_64.rpm fa737b0c3ee90e6463989b7c235f2d7686c124895d4219180779dbaa08d2acda RLEA-2022:8010 ldapjdk bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ldapjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms idm-ldapjdk-5.2.0-1.el9.noarch.rpm 004262e302baeb622832e882808b98d3c848e00240ef81f026b2898869ffcb65 RLBA-2022:8013 gnome-shell-extensions bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-shell-extensions. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-classic-session-40.7-2.el9.noarch.rpm 990688f4cd3ff5235e13e912e874979c0c8300349cace7518e113b50f8aa1c50 gnome-shell-extension-apps-menu-40.7-2.el9.noarch.rpm 7c0e3186f3d07c4bb540babbb87f256aaf03d6f25ea13edc4cc9066183b8ba2b gnome-shell-extension-auto-move-windows-40.7-2.el9.noarch.rpm 31fdf452708625689e5d08e4537babaff88caca0c6158577ea6db9a76f2acd39 gnome-shell-extension-classification-banner-40.7-2.el9.noarch.rpm a2f0cf98bba752734277ca3308b792826ddc9313a744fa7cf704e1f78eb7ba53 gnome-shell-extension-common-40.7-2.el9.noarch.rpm be9e5b0e1d57ec9b6d3c4ea137c35aac1a44775343f002e5b2ac976ff258352b gnome-shell-extension-dash-to-dock-40.7-2.el9.noarch.rpm 39ae3b3b5656e4ba3d334ef195a39859e694fd88c7af85f6d171da4871719416 gnome-shell-extension-desktop-icons-40.7-2.el9.noarch.rpm d2ad825b121db10ea0aa6f90ab6575ebfdb00d544cedbad607ce9db78258185c gnome-shell-extension-drive-menu-40.7-2.el9.noarch.rpm c296a856ae2e48020422446f5c53f48222acff8558e039f16d0e5e5b56bd74f5 gnome-shell-extension-gesture-inhibitor-40.7-2.el9.noarch.rpm c67a680f9d3d7e32dd89a77bfd461b4381508ed9ac5de66c0014533f543fc1a0 gnome-shell-extension-heads-up-display-40.7-2.el9.noarch.rpm 9b511d1bb34b86a24f4b29b883c0a28638df3d62c3a10a8c1bdbb792a3e30e32 gnome-shell-extension-launch-new-instance-40.7-2.el9.noarch.rpm 6e5852626a9790ff7dcdc4b0a3b3d60035dd9cfe33163bab47de94a1988cf784 gnome-shell-extension-native-window-placement-40.7-2.el9.noarch.rpm 4133f12d27d29ca4a710a02a32fb1842c0073b523d55c4b45fe4b79f43984002 gnome-shell-extension-panel-favorites-40.7-2.el9.noarch.rpm 6568cb2f57eac309e030247d64cba70a29eec5a3e7bbc2515d2d7dca73105ca8 gnome-shell-extension-places-menu-40.7-2.el9.noarch.rpm 9c9e347ab95fa105d9e351f044e4e1fb523442448f51b7f3aaacf9f3a7136768 gnome-shell-extension-screenshot-window-sizer-40.7-2.el9.noarch.rpm 219c59ac1826555af1bddfab311ca1573bd495aa086c7088aa11517dc12d3220 gnome-shell-extension-systemMonitor-40.7-2.el9.noarch.rpm fecb8109d2537434f831abc6271a254c61c3b8e730fdd70aa36be5a0101bf68f gnome-shell-extension-top-icons-40.7-2.el9.noarch.rpm 8a611b952ad4c5d1bbd96a6e718c70500b1a0c8638b89ebf1839ba6582c7bd5c gnome-shell-extension-updates-dialog-40.7-2.el9.noarch.rpm 1d6a8f997ed44d3839171b0e706ee6432b480ff0f583a562061c7aa5afa00754 gnome-shell-extension-user-theme-40.7-2.el9.noarch.rpm 4f063f27dd2b89ffe4eaadb73f5da88e8c0f6f48b22897fba15569cc756e9304 gnome-shell-extension-window-list-40.7-2.el9.noarch.rpm b4f80345761ce454a1194a905ca297d60dfb748a5e72b8b29ef7044614ccf0b5 gnome-shell-extension-windowsNavigator-40.7-2.el9.noarch.rpm 84c94bf7776727e12861f5a4968f1534de22bc0e2c81920b6a9868d7dbd5d0de gnome-shell-extension-workspace-indicator-40.7-2.el9.noarch.rpm cf96dbfe2991f2df9514f79e16b72e3cd414381f12c7588eee91824dd5abf6c3 RLEA-2022:8014 tomcatjss bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tomcatjss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms idm-tomcatjss-8.2.0-1.el9.noarch.rpm a94f3c18e8f044139c200e0517b93d550cb16fa5593b638d1977eaa492b6ed2e RLBA-2022:8015 python-cryptography bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-cryptography. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-cryptography-36.0.1-2.el9.x86_64.rpm 0325bc0114d7326f9207d2b890e937897d416fc9acb97a86ed5d6810f7628f29 RLBA-2022:8017 augeas bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for augeas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms augeas-1.13.0-2.el9.x86_64.rpm b4f129cb03300710d2139134f285a7b613c7cb9fd9f61bea7603dac8fa2cfecf augeas-libs-1.13.0-2.el9.i686.rpm e04e9fd643a881f9df23e36bfbc2c3959b483fdfdcb6fc2bc6472e738cdfe5f4 augeas-libs-1.13.0-2.el9.x86_64.rpm 0d0f8cdc9e961fde1577a5203f71db7640da59869a62a5de4fd7bb667d6f0bb0 RLBA-2022:8018 lorax bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lorax. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lorax-34.9.20-1.el9.x86_64.rpm 4ecceef5f5ad62773431607fc2b6bfd98a73f6ce034713cb27c0122873e8cd80 lorax-docs-34.9.20-1.el9.x86_64.rpm 5d3987367ad06e214c622623da6cc7d07d50610e3c528c12ad18a1f90b67c67c lorax-lmc-novirt-34.9.20-1.el9.x86_64.rpm 6f442aa7d619189764745a14f34cc1edc75ae3d36a727afbf6c9987d4fef3438 lorax-lmc-virt-34.9.20-1.el9.x86_64.rpm 8052d9c1d15b08e15099dcddf6556eb33e5da60e7196a1bee2bca1fd76719e62 lorax-templates-generic-34.9.20-1.el9.x86_64.rpm be8e3393384c5db7ec2b02283d794e65a85b98e727b63d61b0c91bf783491d3c RLBA-2022:8019 lorax-templates-Rocky Linux bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lorax-templates-rhel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lorax-templates-rhel-9.0-35.el9.rocky.0.1.noarch.rpm 21755032c1358c5b4158aab1b33f69170abc3e2cef712750649bebc9a1a340c6 RLBA-2022:8020 oscap-anaconda-addon bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for oscap-anaconda-addon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms oscap-anaconda-addon-2.0.0-12.el9.noarch.rpm fd5384db0a2d285cbe5457a291934c462543e5b5172b913b897b0146c66c4b6b RLBA-2022:8021 qgnomeplatform bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qgnomeplatform. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qgnomeplatform-0.8.4-2.el9.i686.rpm 4b5b117d2558715ef1d18cd425555747f227bb6c0b5c0cffaa55da510eb9343c qgnomeplatform-0.8.4-2.el9.x86_64.rpm 1246fc28de4856095b22cc825f3c427e45744bec87f4f476a44cbbf3a4b48454 RLSA-2022:8022 Moderate: qt5 security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for qt5. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Qt5 libraries packages provide Qt 5, version 5 of the Qt cross-platform application framework. Security Fix(es): * qt: QProcess could execute a binary from the current working directory when not found in the PATH (CVE-2022-25255) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-5.15.3-1.el9.noarch.rpm c39fef040a43baa7e9026cbaed0724adfca06ee9e078171bab817f2972228030 qt5-rpm-macros-5.15.3-1.el9.noarch.rpm f8a3d9cbc578d0da895f387154042bbf35e1cdba5a5dbc9e4e3e6182238e0ded qt5-srpm-macros-5.15.3-1.el9.noarch.rpm 39f47b9331907f8d26120e199684c714acbebc81b6dfe415769ba7ab0788a101 RLBA-2022:8023 qt5-doc bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-doc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qt3d-doc-5.15.3-1.el9.noarch.rpm b3556a302b304d46009f826c3e777f883dd1c1d246bfbc40f8b4cf00933bfd88 qt5-qtbase-doc-5.15.3-1.el9.noarch.rpm 94bd19050ca31afabd3c51c00026bae4db3ef3cf63f4bb9e4114949f85620629 qt5-qtconnectivity-doc-5.15.3-1.el9.noarch.rpm 214766b39b53ff4929a366bb5ed5e66d08a40f3ecc31289fb08eef80935dc4d5 qt5-qtdeclarative-doc-5.15.3-1.el9.noarch.rpm 8612bc82903f03f0e08202e059d26e57a2a4430a9fc09a82d640fd9250263e1e qt5-qtgraphicaleffects-doc-5.15.3-1.el9.noarch.rpm f261e70dc417f210e2293383cbbf5c16fe45f1d4a85cf4d10b10b99f0a86188e qt5-qtimageformats-doc-5.15.3-1.el9.noarch.rpm 1e5f07f2a6f31415bd8ac4f00405981281af382cdd38e62dc8ba50259cde84cc qt5-qtlocation-doc-5.15.3-1.el9.noarch.rpm 7286513229bf8a719eb643aa18390ec213529e97d77ddef11b10548085a6617b qt5-qtmultimedia-doc-5.15.3-1.el9.noarch.rpm eede390598ba9bdf93cadbe225445a7a6563296d79c9fa2fa6a4a0475a68564d qt5-qtquickcontrols2-doc-5.15.3-1.el9.noarch.rpm 4405bf5cbd416e20f62fcf3933fa61d65dcdb80be01271182da1b75be0740434 qt5-qtquickcontrols-doc-5.15.3-1.el9.noarch.rpm 8c4d8b70b8ea468e3e76a85e452ce6fd4e8a6d6e3e6c44123b8f74380fdd6a17 qt5-qtscript-doc-5.15.3-1.el9.noarch.rpm 24da9173a89b9d98974721de74512d52c337803979235cceb26a6eabfcdfc65c qt5-qtsensors-doc-5.15.3-1.el9.noarch.rpm e4438bd2b520ee39ab0fca910bc11026aaf58e286cd692dcfc38758801c70c58 qt5-qtserialbus-doc-5.15.3-1.el9.noarch.rpm cd780a3244d4d7af5ee419ca2bc5f63b71f9574351b067bbc19b5d1b6949bbf5 qt5-qtserialport-doc-5.15.3-1.el9.noarch.rpm e66e4e5aac0c9f3e211059639b9e33c836f2f2455cca9a0ca5fb621e8fda73a8 qt5-qtsvg-doc-5.15.3-1.el9.noarch.rpm 777be179df1b2df52be9f2af4ca13b3b9b5716dff86c78989329c5d41bf00fe1 qt5-qttools-doc-5.15.3-1.el9.noarch.rpm 62944d7e3ab4f532874d7d57fd24652ad4fb56671a259927046ad3d9e2d43b5f qt5-qtwayland-doc-5.15.3-1.el9.noarch.rpm 1a0968b443a1a9aebf097abce7ef5e005d5717750f0ae172c361e6adf73e2a55 qt5-qtwebchannel-doc-5.15.3-1.el9.noarch.rpm dec17c9313743e1df8d735f98f1a650ef7c58b01f525e487c60817717311f4c6 qt5-qtwebsockets-doc-5.15.3-1.el9.noarch.rpm 4607214d0a2cfa5feb6272fe5bc6d5e4d4d25469ccdf70e37040d71ed3f57721 qt5-qtx11extras-doc-5.15.3-1.el9.noarch.rpm 5c5c8e9c9f404346e918cb31cb50ab4992438417c46e765621b1340aa74fd708 qt5-qtxmlpatterns-doc-5.15.3-1.el9.noarch.rpm 566c57cd2ef171b82b9740f540e5a5137c4350f485dbbbb88bb1e8986b6e166d RLBA-2022:8024 qt5-qt3d bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qt3d. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qt3d-5.15.3-1.el9.i686.rpm 73f2c3d3dc90c691fcbadc6dcee936236658f76e2cc4e931c3d57b4ec4564ec8 qt5-qt3d-5.15.3-1.el9.x86_64.rpm 509dc82dd85b25568e73e83dd7a21f8a387941596fd67b02a9b23c5dde1ec027 qt5-qt3d-devel-5.15.3-1.el9.i686.rpm 5c7aae2b8d242c6ce7c6ed3bf099df9e8bbae6957b8c5811aa0837d0a1f0134a qt5-qt3d-devel-5.15.3-1.el9.x86_64.rpm a462a937a3279fe2e58c81f864cdceebf5a48f1817d1958b35f9770b1b037e8f qt5-qt3d-examples-5.15.3-1.el9.x86_64.rpm c08342b8e1022e85d022d883ba22c0369cd90ae4f23c354e0d67ab112413edbd RLBA-2022:8025 qt5-qtbase bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtbase. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtbase-5.15.3-1.el9.i686.rpm d870f29a05093ed8c7c7168764544825a8cf7f13d2919562d58f8cbad9436779 qt5-qtbase-5.15.3-1.el9.x86_64.rpm bb0fa3dfdee57234132e94100751f1eecaf49741d0c888d939232431bc0a62bf qt5-qtbase-common-5.15.3-1.el9.noarch.rpm b7f8a1a2a84ca826a32f0c4b0772286ca8c9e931d1970dd970395f51bab931d9 qt5-qtbase-devel-5.15.3-1.el9.i686.rpm e92f1f4a8b2f852fff5f4e5e12fb887085a369414a819737a40fcf0301bf1665 qt5-qtbase-devel-5.15.3-1.el9.x86_64.rpm e51a6701c2b36a570bfeb52daecbea8de971ed485ad3004688d9cb4ba919a5f1 qt5-qtbase-examples-5.15.3-1.el9.i686.rpm 5994fce320d8aea8b4aa3df77511354ec89535b44ece55aa768e0d65fa851aed qt5-qtbase-examples-5.15.3-1.el9.x86_64.rpm a0392c36f7299563c5f04917b0bd9acbad38e4120fa0ecaebb5098116c8e3390 qt5-qtbase-gui-5.15.3-1.el9.i686.rpm 4a63702a587cab5171a78f86c7fd3a40a06ef0df9f0da899d76f7690c3ca7b50 qt5-qtbase-gui-5.15.3-1.el9.x86_64.rpm 5908f0a313cb4000864e3b30922409260a3271dd2dc414b04dabc092967d70db qt5-qtbase-mysql-5.15.3-1.el9.i686.rpm 9500798c4759ce8b2400247b60461628ccc9e2e0acb50b7507733f33a44d2a76 qt5-qtbase-mysql-5.15.3-1.el9.x86_64.rpm f16c6c98aa1d650160abe9986341987d4b3da1c2164b6a6cb7c8fa39585683a4 qt5-qtbase-odbc-5.15.3-1.el9.i686.rpm 4632476c41904d7582abdb3c6a09154e777c0f5b71dadcdd137191b62f9b867a qt5-qtbase-odbc-5.15.3-1.el9.x86_64.rpm 5ecd8a3d00eea40cbb49657eba959c960176272b7beace5d613463168ae9143e qt5-qtbase-postgresql-5.15.3-1.el9.i686.rpm fa6fcd520934daba8ec1bcb6ecc542e050d2cb5d58859b069e8e11550177cd32 qt5-qtbase-postgresql-5.15.3-1.el9.x86_64.rpm 866dc2f8be3abcfd1294f18135cae22857b1af4419df02384619ef06c84c262f qt5-qtbase-private-devel-5.15.3-1.el9.i686.rpm b5d2231f8b8f58ade0985ddae4946cdaa7fe29a052759bd175616a5f0fe7777a qt5-qtbase-private-devel-5.15.3-1.el9.x86_64.rpm 100b0bd9fa60b02e7b2b55b9dda0a02b098893947db85eaa465928b5b990c1f4 RLBA-2022:8027 qt5-qtconnectivity bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtconnectivity. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtconnectivity-5.15.3-1.el9.i686.rpm 802d33014ce9c28bd749d975912073b4bb58632ad97580d3e99991772c9eb6ca qt5-qtconnectivity-5.15.3-1.el9.x86_64.rpm a0930c3c2d3a2b41ea9112eee8ec4002cac16fc057e5e53772b0b5d07cd0a8ce qt5-qtconnectivity-devel-5.15.3-1.el9.i686.rpm 5378f8591d76c4507ed0829e75049b122032aa86d236d654c3a1878e234c81b7 qt5-qtconnectivity-devel-5.15.3-1.el9.x86_64.rpm 3d44cc227506c139d8e27381ef18954ce8d6e6f0b0d65552ac4edcbc385072b1 qt5-qtconnectivity-examples-5.15.3-1.el9.x86_64.rpm 7d7640995e81b5bbd9f8d83436453343a53577acbdcae41519d73ad52ff81277 RLBA-2022:8026 qt5-qtdeclarative bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtdeclarative. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtdeclarative-5.15.3-1.el9.i686.rpm eb1b60ba00b0832b4a9567a96b227d771a429a099d1b2757f9b028b5f6eaac89 qt5-qtdeclarative-5.15.3-1.el9.x86_64.rpm 6dd6ce59530a550de5bd2186fe46ab6daaba08fce3c4475614b949082268ad87 qt5-qtdeclarative-devel-5.15.3-1.el9.i686.rpm 0b142fcc6d6d9aa1e551956c6b5e14baedf83de57513d97d53c3d766e8fd3acd qt5-qtdeclarative-devel-5.15.3-1.el9.x86_64.rpm b7951169e6fcf052b205e9e84045b90d703d06f3e7fd84d9f86628b45d37c049 qt5-qtdeclarative-examples-5.15.3-1.el9.x86_64.rpm 1c8beee52a729d2996d74f62cd44b1d7312b9a06a653c1d220c241107a5f25d2 RLBA-2022:8028 qt5-qtxmlpatterns bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtxmlpatterns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtxmlpatterns-5.15.3-1.el9.i686.rpm c30dfc9a81f24e0be4c6b2acbfa346fda7105a100a0f75b44539d10e52b6f075 qt5-qtxmlpatterns-5.15.3-1.el9.x86_64.rpm ea3c416df8543440ff746107e514adcd71628b12148b863a7c427c9c5dc3e35b qt5-qtxmlpatterns-devel-5.15.3-1.el9.i686.rpm 73314e2a180a4ade9e68ff7ff765537b4e1e3af389132a3035ed76254b4f9172 qt5-qtxmlpatterns-devel-5.15.3-1.el9.x86_64.rpm 8bdf6d8e57944c2072a59c2e7ba7e8f734af7bb389c43eac63d5d1e9d007a350 qt5-qtxmlpatterns-examples-5.15.3-1.el9.x86_64.rpm 967e8e49735edd25c06924bde88f9e157d562d5124a40272e3957a7cb8c0a917 RLBA-2022:8029 qt5-qtx11extras bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtx11extras. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtx11extras-5.15.3-1.el9.i686.rpm 99bfd791eeb20bc40bf626052627419364c42098573a0ede3335852327f394f4 qt5-qtx11extras-5.15.3-1.el9.x86_64.rpm e2c070f89f2dff6c2033b0751cf3495d68f8d1a5638226d25381bdd1e2056ab8 qt5-qtx11extras-devel-5.15.3-1.el9.i686.rpm 33b7d98b71e9cd760a6468e86f1167eaaaf69ce4cd1605bb38a6807be769717a qt5-qtx11extras-devel-5.15.3-1.el9.x86_64.rpm ff47959fb8406ccafbd90ef3c1d8fb7ac1664bb594d9400f24b0bebaed662ee3 RLBA-2022:8031 qt5-qtmultimedia bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtmultimedia. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtmultimedia-5.15.3-1.el9.i686.rpm 8ead89fa7e809b49928ee94edad863e46f69641a6457aedd547a806c511cd4b1 qt5-qtmultimedia-5.15.3-1.el9.x86_64.rpm a51f5a6a20d4bfc52373a82a8af53743dd6990efd8e2d85fcd8a5c41f3fdf74a qt5-qtmultimedia-devel-5.15.3-1.el9.i686.rpm ea1611e7b73a55f98dd0fa22aee18098190676097d11b1dae38152259a775ad3 qt5-qtmultimedia-devel-5.15.3-1.el9.x86_64.rpm de2897579df9ecfcc25ffd7460056b0b4944064bcf1e4a5241996f43fea1db37 qt5-qtmultimedia-examples-5.15.3-1.el9.x86_64.rpm 6b5deaf459bfce9084b34be6c124c29003d1c6bb163175c77b4d6b6395090178 RLBA-2022:8030 qt5-qtlocation bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtlocation. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtlocation-5.15.3-1.el9.i686.rpm fcf0341c49c46bb6682fb67e5ff66f404ea694dfe414fb1dcb6dd70d80f0a548 qt5-qtlocation-5.15.3-1.el9.x86_64.rpm 0992ea8582c426f36d91cca6fcfbfc8517c8048030d50aab63da582db42b980d qt5-qtlocation-devel-5.15.3-1.el9.i686.rpm 14da2dcfb69517e8dc1b25947eeea0060b8d4d2825d7f9c41ac0e2bef42121fb qt5-qtlocation-devel-5.15.3-1.el9.x86_64.rpm 7db45d25b1f5a502166107db19044445c82f01913b10a13594cc89cfa4234505 qt5-qtlocation-examples-5.15.3-1.el9.x86_64.rpm ff2bd0e522f802d2e4fb63e13800c61259774d772fff9095c923b69bac5e8010 RLBA-2022:8032 qt5-qtwayland bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtwayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtwayland-5.15.3-1.el9.i686.rpm fc418493920ac8536961c1049384f2013b5758a7dc0a3d6866012bff63b52dab qt5-qtwayland-5.15.3-1.el9.x86_64.rpm 2a87ff164ee68e58b70d0b7755d10c3b8a5b71d3f07c868f3e842e4bdd0efa6c qt5-qtwayland-devel-5.15.3-1.el9.i686.rpm 75fae79d0bec1b0fa9b0f96893478fb1f85824dcd73a67be1bfa1dda352fc509 qt5-qtwayland-devel-5.15.3-1.el9.x86_64.rpm 2b0218953b97e573c37f266143289354a36bf5e7c4cac8e39f4fb76f923a0126 qt5-qtwayland-examples-5.15.3-1.el9.x86_64.rpm c44da717e73949605bc8a56e2fc838a2e46ebca777abc25433c469ffdf0736a4 RLBA-2022:8033 qt5-qtgraphicaleffects bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtgraphicaleffects. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtgraphicaleffects-5.15.3-1.el9.i686.rpm c424ebb4f814332c03f764f7c5cddbc5af0b71f48d77554effc4027c1d6564d5 qt5-qtgraphicaleffects-5.15.3-1.el9.x86_64.rpm 9dc4742fe2e7958a04dd2eb9f9b348ac41d9609acbdfe32dc71a57398d6652f0 RLBA-2022:8034 qt5-qtimageformats bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtimageformats. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtimageformats-5.15.3-1.el9.i686.rpm 4f440f90cf53d95161f4d57fb9d425eeef99ccd78a41b90a3bc50bb653c52b94 qt5-qtimageformats-5.15.3-1.el9.x86_64.rpm 4a7cdde976e920f4a72ece1abddfafaaf16be9ef0e95f1d2ce03a4eacf2d3b06 RLBA-2022:8035 qt5-qtquickcontrols bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtquickcontrols. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtquickcontrols-5.15.3-1.el9.i686.rpm bc6aaa6d1a6dac31b0bafeaa38e54fe6023b522b04c3552b633cf6f740d3aaf5 qt5-qtquickcontrols-5.15.3-1.el9.x86_64.rpm b213558e5f718bd4b84d36ad38f52159cacc48be8531fd0892bb22999eb60b7e qt5-qtquickcontrols-examples-5.15.3-1.el9.x86_64.rpm 1f62280eeeeec3599a5224c308153b489886ddb55d341a75b309281f6c2a4cc6 RLBA-2022:8036 qt5-qtquickcontrols2 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtquickcontrols2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtquickcontrols2-5.15.3-1.el9.i686.rpm afa65c8f568351d7b4faf854518cfeb7e79cdc3388f779295730f2d0338ab233 qt5-qtquickcontrols2-5.15.3-1.el9.x86_64.rpm 048cca133b6f77dae2356d81d4c5c000cebae8e8109ef5c75566b55d68907118 qt5-qtquickcontrols2-devel-5.15.3-1.el9.i686.rpm f0ae49ff8e43b17ef1af7d97990b58fa356da15ffa70d49849b75aaf398f19dd qt5-qtquickcontrols2-devel-5.15.3-1.el9.x86_64.rpm b491d4b0e3699e80b4a1d71478effc9b934dbd2bc1d18dcc2cda33e2df6b6668 qt5-qtquickcontrols2-examples-5.15.3-1.el9.x86_64.rpm f213bc3014329dca545d29831885733645745afd45c6df2a5059c70b995c244b RLBA-2022:8037 qt5-qtscript bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtscript. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtscript-5.15.3-1.el9.i686.rpm 70e07def441f391b6cdf45bfb223f4ec8c3c6a019a72b35382c38033ffa4f62c qt5-qtscript-5.15.3-1.el9.x86_64.rpm 9d3331da578e2e2d94efe9d259bae346536e8fdd1946d9788529a25a32d8285a qt5-qtscript-devel-5.15.3-1.el9.i686.rpm b90cf3b4fd9242fdbd61588247059a9ed3a736004c77fa0d1b6ba0303d2d697c qt5-qtscript-devel-5.15.3-1.el9.x86_64.rpm f5dacf6a3dd9ed5d1823e3ae5a9ce58161f304ead63fca34a990e51ca66c92e0 qt5-qtscript-examples-5.15.3-1.el9.x86_64.rpm f7e0ce9cc4d5fe41995a0d9c35c0e10f51ffb51ba2728b84c75560ac2727ae24 RLBA-2022:8038 qt5-qtsensors bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtsensors. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtsensors-5.15.3-1.el9.i686.rpm fec7bcc97b071712ea8608052327f64a221801a17edab539c67855d09d59b6d1 qt5-qtsensors-5.15.3-1.el9.x86_64.rpm 75cf4e933a8d6be5165e3da4b2480b833c9d4887be3c424fe08ff4df9f322713 qt5-qtsensors-devel-5.15.3-1.el9.i686.rpm c2dd2a8fe839e5566298f142041bac2e6d72e6d0b5729e6526a891b676ea3a71 qt5-qtsensors-devel-5.15.3-1.el9.x86_64.rpm cd77feb2ccfb3a8bebd4fab49e197f979817568c76cf2498eef57858c41fca5e qt5-qtsensors-examples-5.15.3-1.el9.x86_64.rpm 710aa63f77c126e307f7f3d55c73550b7fd3686c0afc64c2c22ec13df5025ca7 RLBA-2022:8039 qt5-qtserialbus bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtserialbus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtserialbus-5.15.3-1.el9.i686.rpm 2e107888b7d7ab9df53f65a5ee8a1ffb70f6a88a462b25f1dde7f44d81017a90 qt5-qtserialbus-5.15.3-1.el9.x86_64.rpm a23331485282bd406861aaaa1437b745f6fe757743b5436aff9787c3d92cd907 qt5-qtserialbus-devel-5.15.3-1.el9.i686.rpm 6364950724b0e8c004f59dd8ecdeae33608fc249228db615534b316707a28df2 qt5-qtserialbus-devel-5.15.3-1.el9.x86_64.rpm 16948d8b448a124db092e472736ab7dfca97b6181c5d85da63de8c7edcd18cf9 qt5-qtserialbus-examples-5.15.3-1.el9.x86_64.rpm 5510d5999ac960337d1c3fd0a3a4b6bc3af5700a1e7861bbb1a47b336667be2f RLBA-2022:8040 qt5-qtwebsockets bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtwebsockets. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtwebsockets-5.15.3-1.el9.i686.rpm 70ce8fe626acfd069e873bb2fd773cc0d7e9107797789916dd3a9707d58d728c qt5-qtwebsockets-5.15.3-1.el9.x86_64.rpm 2755afef17a300b86b577919e2963ce715e99f37b98736c264bdb06714b64af4 qt5-qtwebsockets-devel-5.15.3-1.el9.i686.rpm 338417363bdf761d176b18793a99fa07dd258d17957c08ee56f0c8745cf1332a qt5-qtwebsockets-devel-5.15.3-1.el9.x86_64.rpm 65fb5e314775f4aceeab0000b77148b1addfd613c21930c338c4d4cf63b21b27 qt5-qtwebsockets-examples-5.15.3-1.el9.x86_64.rpm 9c38fde54d0aef1cd800f21b717564fdb07e16e2aa045809f604640cb4b26b16 RLBA-2022:8041 qt5-qtserialport bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtserialport. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtserialport-5.15.3-1.el9.i686.rpm 68aa0cf70713a2b5ed2ac651e42b2afcfa5a06182619ba5347ebc537cb7697e6 qt5-qtserialport-5.15.3-1.el9.x86_64.rpm e99511468f32805b64e15e1f57eeb2ba3bb53ce67847fd5bb2626373cce52da1 qt5-qtserialport-devel-5.15.3-1.el9.i686.rpm 7ab175be1de666cf53669b14aad77e60153111d9c9bed29ee3fdd69f0dfe1dff qt5-qtserialport-devel-5.15.3-1.el9.x86_64.rpm 1c258517fead6071ed07875ddfb23ccfec98d4c4929063a0baf4ee60a7daea34 qt5-qtserialport-examples-5.15.3-1.el9.x86_64.rpm a721aea2a8cdbc75d1d452b31ddf6ff5d3e6e6f737d2dba3f2e34e6f495bd379 RLBA-2022:8042 qt5-qtwebchannel bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtwebchannel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtwebchannel-5.15.3-1.el9.i686.rpm 8b414744cfea9a4f93c168dd88643eb3724942f730764d2ec2b882fcb68142dd qt5-qtwebchannel-5.15.3-1.el9.x86_64.rpm c6d5f79f34bcaa8209af09c06f053af85872ecdae783eeaef158aa117eebb0ae qt5-qtwebchannel-devel-5.15.3-1.el9.i686.rpm 72c0cce5754facc935f8b5a85a8d9ad0a329877e7f3451fff49a9fd7e49f702c qt5-qtwebchannel-devel-5.15.3-1.el9.x86_64.rpm 7e8fc33cf0ea0e1ebc875eef89af3bbebe3867062e89246e99dfb55175437ffd qt5-qtwebchannel-examples-5.15.3-1.el9.x86_64.rpm 97b3c4abbe2e2b4c7727306b6265e41d1b6e6366f49a82fce6ebe85ca01629c6 RLBA-2022:8043 qt5-qtsvg bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qtsvg. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qtsvg-5.15.3-1.el9.i686.rpm 642e25610d94d7796c2c491f93c4ee75d712d0cdcb0d771d6ec3de0a73e9cbf9 qt5-qtsvg-5.15.3-1.el9.x86_64.rpm c927686c41ba6c9a559dc66224b41f5548a060c414ea52c31962c64c5182c44d qt5-qtsvg-devel-5.15.3-1.el9.i686.rpm c85fdb3a7b4854aafb867f9525dc479bd8b606adff0cf7296fbcbf0e8355fd4a qt5-qtsvg-devel-5.15.3-1.el9.x86_64.rpm b3a133846e56ffebd0d677348832c0e64babb4ef95a91e11b74b336b70308f5e qt5-qtsvg-examples-5.15.3-1.el9.x86_64.rpm f38f5352627464dd94971c60eae433b3fe312d1e3b2900326a341315012914e7 RLBA-2022:8044 qt5-qttranslations bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qttranslations. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-qttranslations-5.15.3-1.el9.noarch.rpm cc91c751c585b26969d7ab213b11a7a686d7b0e2d6db4e683c8d46930582e42a RLBA-2022:8045 qt5-qttools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qttools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-designer-5.15.3-3.el9.x86_64.rpm 4ce01af679692e6bf5c8a4f5bf1f01d31cc519d5e03b05cd82d007c297a2fc4d qt5-assistant-5.15.3-3.el9.x86_64.rpm efa0a9290ba1cd94ce039ca3c9e38c41aa5801b63d53b5f3351435de31c6a446 qt5-doctools-5.15.3-3.el9.x86_64.rpm b18c9d827231b7f26fe911a28a64624155c554835c7b236c886396c365de0240 qt5-linguist-5.15.3-3.el9.x86_64.rpm 7369c677b9233e2605e927e0a021e73291f84b469f64ac254c0863f3b99be445 qt5-qdbusviewer-5.15.3-3.el9.x86_64.rpm 2f1fa20c14d089548f6b15361b4c84c24598ca368134f6d22411a8b97d83c3ea qt5-qttools-5.15.3-3.el9.x86_64.rpm 69a251ae573fbbf055d2660e5d844372cc7949f4165b5045a1f96be2925e4e18 qt5-qttools-common-5.15.3-3.el9.noarch.rpm 2bdeadd79971b6b43faf3833ad88e1d70de58b4629d1546be737a0062589b9bd qt5-qttools-devel-5.15.3-3.el9.i686.rpm 029b4722ab1d41375311542e23dcab6644d027add865a59845c758122b578ae3 qt5-qttools-devel-5.15.3-3.el9.x86_64.rpm 57f8f0039a1d0054df5097a72f775a7bc7d0602ed3565c307d00ed7b94d20f99 qt5-qttools-examples-5.15.3-3.el9.i686.rpm b8da8c4a3f1d1d43e67538f3015b0e9db2727e0d9bd9b06b7d6f8084e1fd2477 qt5-qttools-examples-5.15.3-3.el9.x86_64.rpm 985e2934632db4172bfd86a0396104ea9c8bf2b22ab38adbe7b27ec5049e6524 qt5-qttools-libs-designer-5.15.3-3.el9.i686.rpm b3db65cb59fd7e658166a262095de2c0ee2e910f4da8f13089ee9ead79ad25bc qt5-qttools-libs-designer-5.15.3-3.el9.x86_64.rpm 40dcc5639acbc53b1fcde54dc6da5f709839bb3d8bdbf7dca377ae43298f43b2 qt5-qttools-libs-designercomponents-5.15.3-3.el9.i686.rpm 93ef3eb0fbe32f8cf6fd04455e6a4d5e5e7480e300ca47e168fe142652f6432b qt5-qttools-libs-designercomponents-5.15.3-3.el9.x86_64.rpm 9fa09ddfcce3ff237858a0ed367cdd85eae34e1b30bfa4097f4429b4444899f2 qt5-qttools-libs-help-5.15.3-3.el9.i686.rpm 2a7be6e1b47035585fd161827a9ac405459bd305167119a18eb2363c6d4ffaa0 qt5-qttools-libs-help-5.15.3-3.el9.x86_64.rpm 86fa29f515c37c411a9646e37f1dd763dcac3883cf394a17942cdffdfef5db52 RLBA-2022:8046 sip bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-wx-siplib-4.19.25-1.el9.x86_64.rpm ce9c05e384c0cad52c5a77a3c768edb51076b51cee0ee3bca4a2d17e64a503ff RLBA-2022:8047 python-qt5 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-qt5. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-qt5-5.15.6-1.el9.x86_64.rpm 4ae49a2b238fdf09946943c50eb5c0c2d7e0e44acaad5c776884545fde5e5d0b python3-qt5-base-5.15.6-1.el9.i686.rpm 00e814a9f223b2094f2e846650d30a36dd75f12785d0639166796658e609e002 python3-qt5-base-5.15.6-1.el9.x86_64.rpm 6c05805ae2171175a4f2f85c0d279fa6c887d6f5b039b461c3331114d70f729f python-qt5-rpm-macros-5.15.6-1.el9.noarch.rpm 9c5c4f828db0187ab8a3f4c4e0bb11af7a80db9b05acfdbcf1d9d8d9b256b216 RLBA-2022:8048 adwaita-qt bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for adwaita-qt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms adwaita-qt5-1.4.1-3.el9.i686.rpm 6b85dee08df8da9fb8a69af4c48441bccd4303bfd34d4048030d59819c21987a adwaita-qt5-1.4.1-3.el9.x86_64.rpm 58b091e84bf8f2c7c9c1d012b15c73859f74cb311333fa67a9566afb69e00ba9 libadwaita-qt5-1.4.1-3.el9.i686.rpm 3c6efd06c64f9090af17987a3963514b7d0c4fb68a0d73eab44ce384637f36ed libadwaita-qt5-1.4.1-3.el9.x86_64.rpm 988445336d33692368b2b23aa7f77376ae10d9341f6231b4717b9f14dc56db6b RLBA-2022:8051 seabios bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for seabios. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms seabios-1.16.0-4.el9.x86_64.rpm 8c5595150761c8d1bf01c988f84147b5d17159841e99a88a6b95a9763d706377 seabios-bin-1.16.0-4.el9.noarch.rpm 1bd39c37ea4d9094a080a9179c96f9099f797bb68b5793b876ef45d61133ccdd seavgabios-bin-1.16.0-4.el9.noarch.rpm 2f35435b9344232b0508ac951f592516c65e6bb67b31d2399f52d097ba5c0e1c RLBA-2022:8052 cscope bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cscope. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cscope-15.9-15.el9.x86_64.rpm 60a446e57d5a28ebdf9b7cabfe723c238ee6891e9a3855f63af16a64f5cf725a RLEA-2022:8053 pki-core bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pki-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms idm-pki-acme-11.2.1-1.el9.noarch.rpm 79d51c4e69efe1ec548ee8b00a42e64d8d7263758024f9ae15af8b9a11ac2086 idm-pki-base-11.2.1-1.el9.noarch.rpm 69cc6fd71502b65119229b2af34f072299f558597dfb0924a50f1f06ba9aa198 idm-pki-ca-11.2.1-1.el9.noarch.rpm b9e8fd5a994b7751f6b57eb9bbf7ebf9809428ed2a092f248d203c1bee73eafe idm-pki-java-11.2.1-1.el9.noarch.rpm 1dbe1c88a6f900d4cacc1fc2e9dbf97a965928d2c80a5c40fcc78dfb384eab3a idm-pki-kra-11.2.1-1.el9.noarch.rpm 914c0fc70d8f715f56653b0142b0f99f0fd0dbb83ad3ea4f9c63e1ac7d848e13 idm-pki-server-11.2.1-1.el9.noarch.rpm ce0891a211529ac8837b85431fe6e574376c53bd86bc1178a433fc977e5363c9 idm-pki-tools-11.2.1-1.el9.x86_64.rpm 4e4fb794ceda4b539e1fc52642ef7226e5ad3c9d6625a146992760f12f4bc51a python3-idm-pki-11.2.1-1.el9.noarch.rpm 9589aabc7b71dcbc72c2d8e6615c606ac0bf43cdce88eb145a3b4dbe7baf9774 RLSA-2022:8054 Moderate: webkit2gtk3 security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628) * webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629) * webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719) * webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.36.7-1.el9_1.1.i686.rpm d66140c17b00905d7cc3e1bb1b8accd1a2ff6984dfcc13b4edb71c4feb88a360 webkit2gtk3-2.36.7-1.el9_1.1.x86_64.rpm f0337b6a542d8490b4055085a410002b97816f77a6848b1ee9ab6ca4936d2795 webkit2gtk3-devel-2.36.7-1.el9_1.1.i686.rpm ee61e1f6f58f8c423729f54d04ea7b077010e16f95c94be74708dfe31c9ba439 webkit2gtk3-devel-2.36.7-1.el9_1.1.x86_64.rpm b5ad594ef098744c9206721575a3951f51267b1e0a9e7da04eee2e53717b0496 webkit2gtk3-jsc-2.36.7-1.el9_1.1.i686.rpm 43015e9befacaf0c15a755cb23e5a9427067cc7a8d358a7dc37330327cc7d6f3 webkit2gtk3-jsc-2.36.7-1.el9_1.1.x86_64.rpm 543eaaa8d15ca0dd684eacb50159cf7d311144f917bbfcfd1be4102f2e7c551b webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.i686.rpm 671374d9f7638dc5fb4917123a9496d1049f933fcebcfb1c7965d8279bae25a5 webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.x86_64.rpm 29d7357c4930ac980b264beee3330b528533ecc49c1e116a366c1e88aba703ca RLBA-2022:8055 virt-who bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-who. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virt-who-1.31.23-1.el9.noarch.rpm 784584efa81080071f9a7bc3d0ad45c4996f45b3f6bbc14d946f93b25ea03e1d RLSA-2022:8057 Important: grafana security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. The following packages have been upgraded to a later upstream version: grafana (7.5.15). (BZ#2055349) Security Fix(es): * sanitize-url: XSS due to improper sanitization in sanitizeUrl function (CVE-2021-23648) * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962) * grafana: Forward OAuth Identity Token can allow users to access some data sources (CVE-2022-21673) * prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698) * grafana: XSS vulnerability in data source handling (CVE-2022-21702) * grafana: CSRF vulnerability can lead to privilege escalation (CVE-2022-21703) * grafana: IDOR vulnerability can lead to information disclosure (CVE-2022-21713) * golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms grafana-7.5.15-3.el9.x86_64.rpm 48489bb532801d4939c30266186831da72e3ed7f9ff8a16847212ff292b1d0ab RLBA-2022:8059 certmonger bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for certmonger. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms certmonger-0.79.14-7.el9.x86_64.rpm 1d2d4db2e7ca5825445517d187e51e1c0c3884222a8a9735939e728551ba219b RLBA-2022:8060 mingw-filesystem bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mingw-filesystem. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mingw32-filesystem-139-1.el9.noarch.rpm 7011486c107e4902c3143bbcb63904b7f20dafff27a167b2e1be2eebf43994c8 mingw-filesystem-base-139-1.el9.noarch.rpm e649616756623966b975584c95c99d3e681e57569ff5b69910b1477dcb9f4b3a RLSA-2022:8062 Moderate: unbound security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for unbound. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. The following packages have been upgraded to a later upstream version: unbound (1.16.2). (BZ#2087120) Security Fix(es): * unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names (CVE-2022-30698) * unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names (CVE-2022-30699) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-unbound-1.16.2-2.el9.x86_64.rpm 6e358e56306b818a80f36b05ac87c1e74f0b86ddeba5eaa6a5849692ccfd9617 unbound-1.16.2-2.el9.x86_64.rpm 87e4b2205c21d1be493191351f8034d942ac07a66e2000d15f4703ef8fb7395b unbound-libs-1.16.2-2.el9.i686.rpm 3d768c57ba4a56d38962867ce8c1d22f82388b5c95f3bff67e056a224cfb86d9 unbound-libs-1.16.2-2.el9.x86_64.rpm 2b424b32311280a433c0c8a0031c40102afc0eb28ea27bdf1b2c9759861fc860 RLBA-2022:8063 libva bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libva. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libva-2.11.0-5.el9.i686.rpm f79d5b2eb791ad0c984282d72ff47c060e49112b7138257cf9828ce9bd6a18e3 libva-2.11.0-5.el9.x86_64.rpm 9b6a29b45d3e33f33d7bffe4e5575fc56cd6683a904450fc5f7ec63b690da1a5 libva-devel-2.11.0-5.el9.i686.rpm e5301e9dd57304294efb2e709fae00cb6e5d879b8eba9354a6703dbc0107a9e1 libva-devel-2.11.0-5.el9.x86_64.rpm 5bc38651a705773d154ed75ad8410f7ebaf5cfa9e3266a4fd20c58db4c2c62eb RLBA-2022:8065 sip6 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sip6. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sip6-6.5.1-1.el9.x86_64.rpm d43e145186c16cc8507db2f95beb10e4d7929f15f6fec8ec07bca7272f8b4123 RLBA-2022:8066 valgrind bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for valgrind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms valgrind-3.19.0-3.el9.i686.rpm 89e404809d28ee51579f127b5494ffcbb701630e306f2f8ab7c585d18482908e valgrind-3.19.0-3.el9.x86_64.rpm 9c444b882b8aba8893096fcc4515807646ec2e0fe67e6fb8f7a4e638fdc02b18 valgrind-devel-3.19.0-3.el9.i686.rpm 63f90bb2db08ed6304928773ebfcb2fe36a4ea81ce4363c1b37f3f706e47881b valgrind-devel-3.19.0-3.el9.x86_64.rpm 95c1a2b51d73f553ce41f7f63ecf34e72f10200a7954af2831fd6d14ee498ba5 RLSA-2022:8068 Moderate: bind security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for bind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220) * bind: DoS from specifically crafted TCP packets (CVE-2022-0396) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bind-9.16.23-5.el9_1.x86_64.rpm 86550a053b1b2ec69e703cc534c9e264cb2a9345556af643768757f1db6eee78 bind-chroot-9.16.23-5.el9_1.x86_64.rpm 2620e4ef1a59359f9ed1466e916c3283a8ed396f696ba7a3df82b2b17ce6804e bind-dnssec-doc-9.16.23-5.el9_1.noarch.rpm 5528c1e593893f2129e52054b2a5f0c2479e9e82cf699a8dfc4a3866b06bd386 bind-dnssec-utils-9.16.23-5.el9_1.x86_64.rpm 3468f1174e597136269c81a5d5a5b7f903b980447136a2c7dfd71b8ac212af4a bind-libs-9.16.23-5.el9_1.x86_64.rpm 63bd05687d7dd824cc3dc1327f1fcb351c83b243c7299d21ff16adaa523524a9 bind-license-9.16.23-5.el9_1.noarch.rpm 200eb5e4448c07184492f15a0b2380b9165609468b42d4eae0a7fff0a96ad51a bind-utils-9.16.23-5.el9_1.x86_64.rpm 892e94833846474112aaff4b2640bfe4d03bd737d2e06157ea2932c7b162205a python3-bind-9.16.23-5.el9_1.noarch.rpm 5ff82fa0977b486ce914a511698c095a498d8ede2fb67019c3f478758f852105 RLSA-2022:8067 Moderate: httpd security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. The following packages have been upgraded to a later upstream version: httpd (2.4.53). (BZ#2079939) Security Fix(es): * httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943) * httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719) * httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721) * httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377) * httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404) * httpd: mod_sed: DoS vulnerability (CVE-2022-30522) * httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813) * httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614) * httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615) * httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms httpd-2.4.53-7.el9.x86_64.rpm e262959dc5e4a257521a20ac25e1594875f554d519b8f6dd15d8a8aadde444bd httpd-core-2.4.53-7.el9.x86_64.rpm 4dad1e1872e0c2508ed4ce3364545de31cfca689ee2d30c7f856bcaeff5ebfe2 httpd-devel-2.4.53-7.el9.x86_64.rpm e7a7acef0858ec008543c34c53ced8fa995a0281c7c6055bd22cb841f47e07ab httpd-filesystem-2.4.53-7.el9.noarch.rpm aa3d1ee3ff8e4d7e5f74c869d8dfcbe1e737264d57342d30590988590a75aef0 httpd-manual-2.4.53-7.el9.noarch.rpm 39956eb02a68c53fec8ca038d7d5dbefef2f409a6003535eeef68a2a7dc3c2cc httpd-tools-2.4.53-7.el9.x86_64.rpm 7135226a4cf998c4ff758ccb062f571c32044147c15a0c1522de1676e11f6845 mod_ldap-2.4.53-7.el9.x86_64.rpm 81eda6ed3b2ccca2a1c7b5f2f0e2b4fcc540a6d6a60fc0a0692b439bf719f32e mod_lua-2.4.53-7.el9.x86_64.rpm 61880e543f2f9b4249241ff0baf4177d46bb1c832b529efa5411afe2f3d3c368 mod_proxy_html-2.4.53-7.el9.x86_64.rpm 3d8b5f95ee1f95fe0ab7e531361ac1c37d1632dca442f5e904e12ca059412072 mod_session-2.4.53-7.el9.x86_64.rpm 67cfa4c4f868e8b28415df65ea7f6e11330d5607645a86c23899a80a2b209cc2 mod_ssl-2.4.53-7.el9.x86_64.rpm 69ae6059fe9d4d89ddc913a147d414a0852a49e7368eaeb88ba4a96153735e2f RLSA-2022:8070 Moderate: dnsmasq security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for dnsmasq. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server. Security Fix(es): * dnsmasq: Heap use after free in dhcp6_no_relay (CVE-2022-0934) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dnsmasq-2.85-5.el9.x86_64.rpm b9a534d64afe5bd1bff48b859a905ac0387519dfb4a8c3447168a6a4cfc6c178 dnsmasq-utils-2.85-5.el9.x86_64.rpm 911ec6e69e2fbdb3f939b7bcef5060e1efb552b8731c3fa0cb442041b4f6719b RLBA-2022:8072 slirp4netns bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for slirp4netns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms slirp4netns-1.2.0-2.el9.x86_64.rpm e3cacad672f5369a5f1a759d15a5e5e3fc8b511d51d3f720276a8a01ec867a06 RLBA-2022:8074 ansible-pcp bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ansible-pcp-2.2.5-1.el9.noarch.rpm eb2087120965b59259b0a0892e70f5e09a6cbedbdf065fe394691f4d6a9510be RLBA-2022:8075 systemtap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for systemtap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms systemtap-4.7-2.el9.x86_64.rpm 405d28f1002c5a2de35d3b0547c3e0a6ceff090d8c9af0eefae6db9728bbb73b systemtap-client-4.7-2.el9.x86_64.rpm 1f87ef8fe12636c10e368d1617639f66c5d7ffcd9f53645bf07c80625eab0aac systemtap-devel-4.7-2.el9.i686.rpm 221f7e2b0501b51c163f18cc2343b339a7b279e7749dbdd53d956580b9d2ce6e systemtap-devel-4.7-2.el9.x86_64.rpm 1c5b07c7baa9163bc5ddb40e4fc365a4194236e87a3f8302268972fdd14fbce7 systemtap-exporter-4.7-2.el9.x86_64.rpm c16fc0dc8927db561cce7eb1bfa21cec8054b04c5d43460339cd3c2b31b386bf systemtap-initscript-4.7-2.el9.x86_64.rpm 9a14abf1afe2e1bf25c57d1be4f2453f86a3f8b1802f53e79b95c0d2a99d6d1b systemtap-runtime-4.7-2.el9.x86_64.rpm 3ac728aec765f272f1b1abf932d0d0506de74b8ead4eac159b1bdfc7b2914fa1 systemtap-runtime-java-4.7-2.el9.x86_64.rpm 295617c5388e401a2283987b6adb2f82b6bfd905a401f6d00a7af3018abdef1e systemtap-runtime-python3-4.7-2.el9.x86_64.rpm 89d269455660abdedcc282de9f592aab6644fbfcec3304554c7ae7649742f93e systemtap-runtime-virtguest-4.7-2.el9.x86_64.rpm 561e94aa6f580b6d0ed60f4030c52180ba41b3e7d3b4a9d7b8099d3d11bb06ee systemtap-runtime-virthost-4.7-2.el9.x86_64.rpm 2c0cf1daef9e1b1cf02fb944a7141470fef95c80647f2f6b63bf10f1e07beec5 systemtap-sdt-devel-4.7-2.el9.i686.rpm 87fc3bd51514c5edb1bd4aad4db399873172e89966bfa5d0bd4f2066751f94dd systemtap-sdt-devel-4.7-2.el9.x86_64.rpm 62f34478649dcd7eff655b2e75f57ece6976d9f43ce2c64a5a5eb5de685390f6 systemtap-server-4.7-2.el9.x86_64.rpm 85655b99f141a2e0cb8aaf3e596e326befcf00f2ed893e6da7ffdbb50a4cc31b RLBA-2022:8077 pki-servlet-engine bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pki-servlet-engine. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pki-servlet-4.0-api-9.0.50-1.el9.noarch.rpm 985cabdb4510b5895c66f3966f7117ff64de5eac59c82ec4e879d33cd8869268 pki-servlet-engine-9.0.50-1.el9.noarch.rpm 467b31d4a1c87a1e0a7213597955df9029460f34cba29e985f9656b7db8fdd9b RLSA-2022:8078 Moderate: flac security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for flac. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FLAC stands for Free Lossless Audio Codec. FLAC is similar to Ogg Vorbis, but lossless. The FLAC project consists of the stream format, reference encoders and decoders in library form, a command-line program to encode and decode FLAC files, and a command-line metadata editor for FLAC files. Security Fix(es): * flac: out of bound write in append_to_verify_fifo_interleaved_ of stream_encoder.c (CVE-2021-0561) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms flac-libs-1.3.3-10.el9.i686.rpm 3f2055313ca833cb0a0920ed3423656d9f9e5a12d3a72fc3e718f46e97223637 flac-libs-1.3.3-10.el9.x86_64.rpm e91cebb7bd7e48b93a95aef62a4347b35a153c1a6b2cabb260760dd2701d1192 RLBA-2022:8080 smc-tools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for smc-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms smc-tools-1.8.1-1.el9.i686.rpm 18a7feccf584ae7f666ca90ceb7daab4df1482172e3384fc11da72311ae46108 smc-tools-1.8.1-1.el9.x86_64.rpm 12226c7be26507055616a04d6e4e8ad8a1012dca1e64d9ebc4c982a3fa2e2da3 RLBA-2022:8081 open-vm-tools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for open-vm-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms open-vm-tools-12.0.5-2.el9.x86_64.rpm 848780e2e5dc46929c586f2d5ea3ed3dda6d254c436545b2d2a06fa0813db7df open-vm-tools-desktop-12.0.5-2.el9.x86_64.rpm 1984c9769452cc4646a247f81842f4bc9051df38db8b94ac961204de85df1acb open-vm-tools-salt-minion-12.0.5-2.el9.x86_64.rpm edffcb89cf7152dfd6435a51b5882a542aa4850fe4b3b34da238577e9f00611a open-vm-tools-sdmp-12.0.5-2.el9.x86_64.rpm a6217cc1b821456b9d1a6e42a2c62f5a153f0ff1735240bab5b0e7bcd0b12f2c open-vm-tools-test-12.0.5-2.el9.x86_64.rpm 04462c0466451bd9aa14693cf0b963fe2e0438000d9e00409c1d6c03d6a123bc RLBA-2022:8082 stress-ng bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stress-ng. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms stress-ng-0.14.00-2.el9.x86_64.rpm b0b8d99f545678ce08855ebf48897a63abdc0a7c1a950c0a36f6eace9f9df8ff RLBA-2022:8083 wireguard-tools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wireguard-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms wireguard-tools-1.0.20210914-2.el9.x86_64.rpm 34740923a5eec9612be07a1fa9ec295829e89323177585ce69e9b6273f1a82e4 RLBA-2022:8086 mingw-crt bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mingw-crt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mingw32-crt-10.0.0-2.1.el9.noarch.rpm 01409a9f8e5a5ab0d39636ba4b66ffa2f98c85aab9e4fde330bf81c13add37b9 RLBA-2022:8089 freeradius bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for freeradius. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms freeradius-3.0.21-34.el9.x86_64.rpm f33b09c96b838ae0d6b57ccccea9ee31c3de281a2f1cc5e9c825ef9c6583b604 freeradius-devel-3.0.21-34.el9.x86_64.rpm 066ede80cd168386aed64444f8fdb060c14766f7b0b700744d9fd1498d604608 freeradius-doc-3.0.21-34.el9.x86_64.rpm a518a7218f3d519cfda981f2d8639b88aa8c1e9b065d664f890b6e211a4f6195 freeradius-krb5-3.0.21-34.el9.x86_64.rpm a12b03a25bcfa99869a23e5ef0e8221f476dbf895e8cae7d68bef37c938e894a freeradius-ldap-3.0.21-34.el9.x86_64.rpm 7f711c3b8d8d4346e607b703501d6aa2a4716eddbe7cebdebf88d863ad91fdf3 freeradius-utils-3.0.21-34.el9.x86_64.rpm d1655a586dca9f38af9f28128ea24aed6ab3d42a02b67b0c2a7a9a2e3d47f12c python3-freeradius-3.0.21-34.el9.x86_64.rpm 1a0114086f03b8c154ceaa671e9a39e7e7cedd9d2b4689eec4c041a9a1a55980 RLSA-2022:8090 Low: runc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for runc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime. Security Fix(es): * runc: incorrect handling of inheritable capabilities (CVE-2022-29162) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms runc-1.1.4-1.el9_1.x86_64.rpm a06c71f8d70df988d7821a0999b7fdc6d426bdcd45e9e421861730a5eb97a7a3 RLBA-2022:8094 cockpit-machines bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-machines. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-machines-274-1.el9.noarch.rpm db19c762872c7249d5c0f2740bf3ca15b2f5e3eb19c4226a183740285b5f1563 RLBA-2022:8095 crash bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crash. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms crash-8.0.1-2.el9.x86_64.rpm 8f5c0dc2b2e29c9a27aa6743b86da9ea1a27764206c7901d199422f9f3c8a8c6 RLSA-2022:8096 Low: redis security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for redis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Code injection via Lua script execution environment (CVE-2022-24735) * redis: Malformed Lua script can crash Redis (CVE-2022-24736) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms redis-6.2.7-1.el9.x86_64.rpm d1e9d472152616a9ed7c5afa3a65d31eba457c8931c340270584ed7462408b48 redis-devel-6.2.7-1.el9.i686.rpm b70047765d0e43fcd6dcccd1b5327b3d7ebe428b8c60d9adc70e482eee5b3717 redis-devel-6.2.7-1.el9.x86_64.rpm ad399d9c692c02f6fa0f8b7a5c36547f1f034d34eb09ba852d9963d9d392c013 redis-doc-6.2.7-1.el9.noarch.rpm e6058967d045d58fd5abd329601d5f10d762d6c0dc19a0904a9462d9683936d4 RLBA-2022:8097 osinfo-db bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for osinfo-db. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms osinfo-db-20220727-3.el9.noarch.rpm e33c652133b496d754e93679adebd83c92b03e5522b91e17990ebc89023a8201 RLSA-2022:8098 Moderate: toolbox security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for toolbox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Toolbox is a tool for Linux operating systems, which allows the use of containerized command line environments. It is built on top of Podman and other standard container technologies from OCI. Security Fix(es): * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms toolbox-0.0.99.3-5.el9.rocky.0.1.x86_64.rpm bd913e084c6d6803a2dfd59172bbf60202a95cac6b24c656a0d27aa702a71491 toolbox-tests-0.0.99.3-5.el9.rocky.0.1.x86_64.rpm 1b612a312b05fd540aabfcc82aa8a4d1e2b8d45c753951e35d2b431a42342d97 RLBA-2022:8099 rust bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cargo-1.62.1-1.el9.x86_64.rpm 38782349338f704413a4e092b7a24f187a6c7fc42bb35792643c138ea50f0fac cargo-doc-1.62.1-1.el9.noarch.rpm f29ace2847bee75e097d591b39881d9fbcd53f574cb317470a4da5f12e538ea0 clippy-1.62.1-1.el9.x86_64.rpm f9562d268c6e0336c0cb86894ad8e2136b4d57609d555856a747dc4f6a0fe3f5 rls-1.62.1-1.el9.x86_64.rpm 383bf337aa83c2be3882ca4916aa7f260018ea2624138713bb3c918476b629d3 rust-1.62.1-1.el9.x86_64.rpm 84ce4f76cd6b848265ebf8d5d98d011354d90b130b916ff61961127298ed2857 rust-analysis-1.62.1-1.el9.x86_64.rpm 9904151cabfc58e5edb72aa6dd3b548278bf395ec555e53dc5b3aa7ed036ff39 rust-debugger-common-1.62.1-1.el9.noarch.rpm a9eff0f35e761dd1f2e022778d0d24ac2241e04eb86cac6b24cf311a719473c7 rust-doc-1.62.1-1.el9.x86_64.rpm b046f4b4f3e4fefd4d262409d1168712a1faa1948ed69640f16aee259e22cc3b rustfmt-1.62.1-1.el9.x86_64.rpm 2c9348db204164f4757f4d0fc97715d5e6002eefe0850a9e9cb7529d0a98f563 rust-gdb-1.62.1-1.el9.noarch.rpm cc76abc8fce8fcd7054e8995119b23ffc50da6757d6334403ada27a79cac0fdd rust-lldb-1.62.1-1.el9.noarch.rpm 161042401fc2d3c791a4bf9397b5adfd3b42443d29cf7b28b432efff158ca848 rust-src-1.62.1-1.el9.noarch.rpm 1c9b0616109b8184c0a320b824abc893b27be59190565cdf4a0b813d32f1cefc rust-std-static-1.62.1-1.el9.i686.rpm 521b99d969e693af20f276b79ccac7eee6d44638a5d82647b34b318a3b382181 rust-std-static-1.62.1-1.el9.x86_64.rpm 1076f6b38be8e58b10b7486b74a3eaec2900e7b79493cd62f759ab9803c36ba7 rust-std-static-wasm32-unknown-unknown-1.62.1-1.el9.noarch.rpm 7f0292daf2ab2f29566976ae970d671f506e00af5b0831dd95eabc4c3292d79a rust-std-static-wasm32-wasi-1.62.1-1.el9.noarch.rpm 901c16cf44b632b85d77ef9f442e46e7a2db448a9da6c8a6f4702a5b97d311f2 rust-toolset-1.62.1-1.el9.x86_64.rpm 6342b2348e4758473a173c06e1555123b9f007ba75405be95786f396226835bf RLBA-2022:8103 motif bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for motif. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms motif-2.3.4-26.el9.i686.rpm 11e78acc01052c7cf025e164699c831c3fdaec684c509630ff204bc8bf7d3c20 motif-2.3.4-26.el9.x86_64.rpm 1ab12debc0b035bcd79878a1248338048d226cb19e4745999397c1e7b565ced1 motif-devel-2.3.4-26.el9.i686.rpm cbdcf5582a033395dff6148a66751ef8812cb1124d20c9be3e85d205d70a16d2 motif-devel-2.3.4-26.el9.x86_64.rpm 6639a218320aa236d0647792fda7b304d1284de5d12d7c6085a93dece2196223 RLBA-2022:8104 evolution-mapi bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openchange, evolution-mapi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms evolution-mapi-3.40.1-4.el9.x86_64.rpm 14b353eb1cd9387880d41d61f5913ba2f71462e0fdbb315c7816017e57f440ec evolution-mapi-langpacks-3.40.1-4.el9.noarch.rpm 14b782e06c8d5b96445b30d289f42ce2ef98fd644ffebc67d359bbfdb2e9a013 openchange-2.3-39.el9.i686.rpm f39f00372506fd2199a28f342dd97290baf59eabccf9ad91f3ac6e2224cbb61e openchange-2.3-39.el9.x86_64.rpm 683fe2a1a19a79d433532034db48e049817a95a060d857b99c0a4ccfdefdc1cb RLBA-2022:8105 python-rtslib bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-rtslib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-rtslib-2.1.75-1.el9.noarch.rpm cb61cc1b08659c5a9e188dd3b235d68409a78a8b68d40c58cb1242e22c811bc8 target-restore-2.1.75-1.el9.noarch.rpm 1e6d0e3382703875fb33f4ddeeff009875657a38de1f53b4233e02d4794ae463 RLBA-2022:8106 power-profiles-daemon bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for power-profiles-daemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms power-profiles-daemon-0.11.1-1.el9.x86_64.rpm 8f36c23f7d5c484cd7d4c09390ac8798f05c8012cd49fccb515195ccb6c17d03 RLBA-2022:8107 mingw-qemu-ga-win bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mingw-qemu-ga-win. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qemu-ga-win-104.0.2-1.el9.noarch.rpm b1874c9c00b0123447a769f43c7fd44b9145deb80ba2945a5968b30514064181 RLBA-2022:8108 conmon bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for conmon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms conmon-2.1.4-1.el9.x86_64.rpm a6e7d8da82c0800a146f7a1f9e580cf72869dba3b4eda7540cadb2ec34065d7d RLBA-2022:8109 bcc bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bcc-0.24.0-4.el9.x86_64.rpm dc8664ff176b307bf0af1c044ac3a993c2e237e4e00992810e79b92f2fa91982 bcc-tools-0.24.0-4.el9.x86_64.rpm cb454150fae77103a7a60411471e187bdde6486e01f524716bb53c3dc17c2ffe libbpf-tools-0.24.0-4.el9.x86_64.rpm 61f948359838e0b24be6c055f6ee370d1e874a3199ad1767c85f1584a5c904cc python3-bcc-0.24.0-4.el9.noarch.rpm 03fe2ea438665ff736d127b56b81110f1ecafe948ef365cd0dcd71aa7118fc4a RLBA-2022:8110 bpftrace bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bpftrace. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bpftrace-0.13.1-1.el9.x86_64.rpm c1ffc9d5a7b2a6221dd34f1d0e2cca7b4bd1ab1399740a2eb5a323f7d4950d68 RLSA-2022:8112 Moderate: frr security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for frr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FRRouting is free software that manages TCP/IP based routing protocols. It supports BGP4, OSPFv2, OSPFv3, ISIS, RIP, RIPng, PIM, NHRP, PBR, EIGRP and BFD. The following packages have been upgraded to a later upstream version: frr (8.2.2). (BZ#2069563) Security Fix(es): * frrouting: overflow bugs in unpack_tlv_router_cap (CVE-2022-26125) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms frr-8.2.2-4.el9.x86_64.rpm 2f53bb26753db000765f8b9320cfdaca605c3727d752f40dfba5a0e55207e6bc RLBA-2022:8113 ipa-healthcheck bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipa-healthcheck. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ipa-healthcheck-0.9-9.el9.noarch.rpm 8541de466c5dd605fda1125675f85ecebce5d6051e6ff97a9724e72d89f3cab8 ipa-healthcheck-core-0.9-9.el9.noarch.rpm 98df424d011891e82f3d5f2d85df24ff35384a786569720201e644697d01dcdd RLBA-2022:8114 container-tools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for container-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms container-tools-1-12.el9.noarch.rpm 0c92d1a4b4e3662a5974da9674904d0dc487a32b266a893c947ce0e707b2f39f RLEA-2022:8115 WALinuxAgent bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for WALinuxAgent. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms WALinuxAgent-2.7.0.6-6.el9.rocky.0.noarch.rpm 501a4f5489c03ed59a40579cf6cdeed009f96611fe28bf503287e28a0236c52c WALinuxAgent-udev-2.7.0.6-6.el9.rocky.0.noarch.rpm c4660dbbb81bfc4c3451bb7e69545ca5ee0d9cc25ec35ad6e1ac44686c211d8d RLBA-2022:8116 google-noto-fonts bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for google-noto-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms google-noto-fonts-common-20201206-4.el9.noarch.rpm 31f82f2aeb2a9823a50c6bc6551c5104b27dadea6e32bc951076bad1086540fd google-noto-sans-armenian-fonts-20201206-4.el9.noarch.rpm bf7cc7abb3e5ff1c66330c4b97b11485a099a7ed0f984b656c2e1d9f01640fc7 google-noto-sans-avestan-fonts-20201206-4.el9.noarch.rpm beadf4ba113760952280a94591edd237f91a69d6f85d89c0f9dc1f7f3fd43feb google-noto-sans-bengali-fonts-20201206-4.el9.noarch.rpm 8548c74c937f3e7db8868a19b3817a2d959f97f8b5f392f6e50a5a2c959f143f google-noto-sans-bengali-ui-fonts-20201206-4.el9.noarch.rpm c0c5a2c05ff9be22b71228b70e5ab223420caf6a10d50283890cf25a29509313 google-noto-sans-brahmi-fonts-20201206-4.el9.noarch.rpm 1bf706231661c463480d958c7490aeb92203406e49f0f1aef62d11ce1fa5ebb9 google-noto-sans-carian-fonts-20201206-4.el9.noarch.rpm 113f7b00689f1340a773a05c8c808b674432162ae3a3b171bae82d63305fa3d0 google-noto-sans-cherokee-fonts-20201206-4.el9.noarch.rpm a0706e303f29c9011bb26bb2479aaa4f2e4c4c54ffd740e39620d891fe4db52d google-noto-sans-coptic-fonts-20201206-4.el9.noarch.rpm f6a9214fcb8a1c146b2c0450fcf29f9896a9a0333291cc79eca0867fb9b79da3 google-noto-sans-deseret-fonts-20201206-4.el9.noarch.rpm 9a026ff507ceb64d2d3a9ac25d56233d4247d3efde87875b5918dd9ae5745579 google-noto-sans-devanagari-fonts-20201206-4.el9.noarch.rpm 574b2de4cdd2cb267afe9d2f085a837dee2cf2b0e723eee7a10218fecf475802 google-noto-sans-devanagari-ui-fonts-20201206-4.el9.noarch.rpm b63204ccc4a1f922f186163dd990c3430d2bfd615fdcbc9a44117243f3fc28ba google-noto-sans-egyptian-hieroglyphs-fonts-20201206-4.el9.noarch.rpm d930ccdefe09fdf68bd7fad91604813b8aee1886856233e23d74a98326e5e4e8 google-noto-sans-ethiopic-fonts-20201206-4.el9.noarch.rpm bada0302bd6a0304e66ea3eb1b321ac9ba7be13afe32548536a158b7579b8b17 google-noto-sans-fonts-20201206-4.el9.noarch.rpm 28141ddd90fa91934ddebe991d8c7de1b79b465b228d3894927bb3f9c8fdd65a google-noto-sans-georgian-fonts-20201206-4.el9.noarch.rpm b02e89a7355a5ed5d43dea7a0837bb997ee618d358944852a1e3108803f5e29a google-noto-sans-glagolitic-fonts-20201206-4.el9.noarch.rpm 66e02f55d102f5b87a3395b409e8881caea66969123865ad6288e2da3e4a8f48 google-noto-sans-gujarati-fonts-20201206-4.el9.noarch.rpm 5c90e4d16a661c8b88ceec03b6f915b597f79306a9abf3ded826704d4f89f8ce google-noto-sans-gujarati-ui-fonts-20201206-4.el9.noarch.rpm 870dc502b64ffcdf87ed5c65937cb1f10838f081fec9c9632a847694e120d3d6 google-noto-sans-gurmukhi-fonts-20201206-4.el9.noarch.rpm bfaa948840d81f07d94ff446c758416a9bca0949337733cdacf99d921f224953 google-noto-sans-hebrew-fonts-20201206-4.el9.noarch.rpm a85ac39547d8cca7b82d940db30440f126a1c999dc301be7d25a18140bd8e53e google-noto-sans-imperial-aramaic-fonts-20201206-4.el9.noarch.rpm 91f25fd1085fa38df9ab8f49393d1d24949cec190b1e49a727b0ec41c886fe91 google-noto-sans-kaithi-fonts-20201206-4.el9.noarch.rpm 46eac4aaa61ae5f3582b9e110b13e255d4faeaeebedd73807b2182e4ce99e21f google-noto-sans-kannada-fonts-20201206-4.el9.noarch.rpm 1ce1fcdfb40a91bcc29b1b5b15fcea869f0e32ab7af811f675c8e9ff866fafeb google-noto-sans-kannada-ui-fonts-20201206-4.el9.noarch.rpm 019eaff18a4903434f997e788c52485c0e76576716398db962b88f8588f4a8f3 google-noto-sans-kayah-li-fonts-20201206-4.el9.noarch.rpm d34a1befd85064beec2c3e6ff6cd2420b13e690ea2b2e26c7b0b25209e41990c google-noto-sans-kharoshthi-fonts-20201206-4.el9.noarch.rpm ad52dc955821833f70569809893b70a5d08c5d148ca0b73ca1bec66029430761 google-noto-sans-khmer-fonts-20201206-4.el9.noarch.rpm 6e58eb704f774a6020f1ba8df79695249ef7cbc52945a727d4e7f55f46909899 google-noto-sans-khmer-ui-fonts-20201206-4.el9.noarch.rpm a6484d377f0775d2103a75ee0a934f592e222c769a3486dc6db0b8c968f6ef9b google-noto-sans-lao-fonts-20201206-4.el9.noarch.rpm d48231b63523c5c80b1159f09b8e0084d8cca9cb18e0e4d8d6a75bdbc8c3c12f google-noto-sans-lao-ui-fonts-20201206-4.el9.noarch.rpm bde7dd54374d1328049cbf47c79080b48dfe94dd17108c050939afaa6c49e902 google-noto-sans-lycian-fonts-20201206-4.el9.noarch.rpm f5fe0cd62bb4a7777208577c42e4760563d196beebeedb554e77d71a65d0e5ba google-noto-sans-lydian-fonts-20201206-4.el9.noarch.rpm bb409b389067457f14f046cc701c251841a77ae5850ae0f78ab675289ced69a3 google-noto-sans-malayalam-fonts-20201206-4.el9.noarch.rpm 2105588077cc6472b75e442668fb4de2754abd5aca3ba7e92fb5fe188b9e941e google-noto-sans-malayalam-ui-fonts-20201206-4.el9.noarch.rpm e9cdd00c5869ed97d6b9136c919bb981f4f7db004f330a0b9c1eb87d51046420 google-noto-sans-mono-fonts-20201206-4.el9.noarch.rpm ac836683fef5d53782443a5ca9e242e9ec485ae48997fffa3f891ccca24c686d google-noto-sans-nko-fonts-20201206-4.el9.noarch.rpm 6bbb07adb6fe9cbedafa34ba3a3042c582ac00718ee1d3e27f820cbe12b0b99f google-noto-sans-old-south-arabian-fonts-20201206-4.el9.noarch.rpm de2e844575df1e53e2c13aa185c3f3799a8db0ad8cf99e008e39a77d8a874b1e google-noto-sans-old-turkic-fonts-20201206-4.el9.noarch.rpm df238431d0ecd438aad4f381ba57069b2e5faa2294b7453f49b5b4975a18cb4d google-noto-sans-osmanya-fonts-20201206-4.el9.noarch.rpm 34edd3787a75da2090243d9163ecbe310d9a132ed6127d6d0d81327b9fc5197c google-noto-sans-phoenician-fonts-20201206-4.el9.noarch.rpm e5fc01016dcf3f9a3672682a87e1e3be36e664cc84595d0d8b24d1da81460137 google-noto-sans-shavian-fonts-20201206-4.el9.noarch.rpm 387927fc4039d9932c7e4e2bebac751de912836ea408f390df45251368b37aa3 google-noto-sans-sinhala-fonts-20201206-4.el9.noarch.rpm f52428535c691fc689838d76d648ba0d96dfbcae9d3da25ddd232875d887e46b google-noto-sans-sinhala-vf-fonts-20201206-4.el9.noarch.rpm c1755b5799336661fd4332f02a81d7756ef539144a531274f6d8603be1d9855f google-noto-sans-symbols-fonts-20201206-4.el9.noarch.rpm c0a2cb82211120d5938aea228558a2e169b501200d7398974e69f8f8208e6fdd google-noto-sans-tamil-fonts-20201206-4.el9.noarch.rpm 5383183555d32c0958c08816ebbdb80f14dde1dcbc42e7246a243c17472ffa35 google-noto-sans-tamil-ui-fonts-20201206-4.el9.noarch.rpm 46f9c3ad39d73cca39dab6a4424fa634e695bf2e75084554858059a936716730 google-noto-sans-telugu-fonts-20201206-4.el9.noarch.rpm 99608b9d004a762a3a87adb1d76394978749117dd8679ab3cc6795e43bac998b google-noto-sans-telugu-ui-fonts-20201206-4.el9.noarch.rpm 9689feb995f4ed0dfcf17dedcc4602db6eb5773b842e16b5a2c3fb66e3a5bbb7 google-noto-sans-thaana-fonts-20201206-4.el9.noarch.rpm 525ef3f0a3b32ca61f16bbfede3ae5534ee7be9242252caa44d1637ece0942da google-noto-sans-thai-fonts-20201206-4.el9.noarch.rpm b312cb23601048e390769a0a6280e82ab89cb049f978fadf0a7911111353ec51 google-noto-sans-thai-ui-fonts-20201206-4.el9.noarch.rpm 866fb229471ec7a1c1ed20997dd531128e70b86ad52f8937e17778ed980aa334 google-noto-sans-ugaritic-fonts-20201206-4.el9.noarch.rpm 0f750d1ff62e45f934fb4ce9d2262a5817e8f9d7e278f9e043f45700322dc57c google-noto-sans-vai-fonts-20201206-4.el9.noarch.rpm ee09130885ae9a3c72c5726bc267064912d6ef452d90094adc63f8067b34e9dd google-noto-serif-armenian-fonts-20201206-4.el9.noarch.rpm ead3574fab52ae6ab80ab344a149f754483a9af30130ca99d4eb0bf3ca036911 google-noto-serif-fonts-20201206-4.el9.noarch.rpm 310ef12e97fae05d5be0a96db0a1e089ce27e11c7d165c07c8f58702d205aad7 google-noto-serif-georgian-fonts-20201206-4.el9.noarch.rpm 254913c6436b77e5d3b99478e8c2507df2d62ed2a7a94a4a931ccb3225f1bd4f google-noto-serif-gurmukhi-vf-fonts-20201206-4.el9.noarch.rpm c4ac4eb3bb1c7e56f2d0ef0de5b1d67f182db840a02d6f10fc5bd6097b9ff7f2 google-noto-serif-khmer-fonts-20201206-4.el9.noarch.rpm c6af89c3a0402db2f3fcb3513ef92c301c7f261eb88c3f5aa7683a80a809a63d google-noto-serif-lao-fonts-20201206-4.el9.noarch.rpm fee731802fd1e6e904f5d052511e09bbbf99f8f904035593e79ab443dc5f5183 google-noto-serif-sinhala-vf-fonts-20201206-4.el9.noarch.rpm b29749e587ddbe93aa7b2b4ef6ee5ab58b7cca7652d2c84ace2b16d21c416f6e google-noto-serif-thai-fonts-20201206-4.el9.noarch.rpm 98d3bbbeb9d6d0ae880338747570e93be51146edea1e4452220c99539d47768b RLEA-2022:8117 Rocky Linux-system-roles bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rhel-system-roles. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rhel-system-roles-1.20.1-1.el9_1.noarch.rpm b0c48af24ed0999f52c7b92900ff4bc4c31080c55966b9e9e27b9f0e4065916d RLBA-2022:8118 libblockdev bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libblockdev. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libblockdev-2.25-14.el9.x86_64.rpm ec232ec19afc58e1830670fe3d043c1edc64b460571f01cc3ec508c945c7fd52 libblockdev-part-2.25-14.el9.x86_64.rpm 0c2406d943f71a92802b7d3403b0e3717d3459596f5b81edb5a2ce18e059da51 libblockdev-2.25-14.el9.i686.rpm 9105906eba8323f6456921e6bace978a48063fd12ac9435dd83fed48edb8829b libblockdev-crypto-2.25-14.el9.i686.rpm 45bea335a2dffd88940c1832aabdc0c333ecf8518d28b1a39c362583d47801b1 libblockdev-crypto-2.25-14.el9.x86_64.rpm de53c858b244a62438f5303b8e78fc3995be020c4d06eff5fadcf056241b33db libblockdev-dm-2.25-14.el9.i686.rpm 5e1c0b1cfcececef1e3fa5361c9b31a35f69a1c5279663f22793d71a84ef49f7 libblockdev-dm-2.25-14.el9.x86_64.rpm 9be4d629bc8b90a0650bf8c65d26d0f200f91e2d89cceff9d4c044562944915d libblockdev-fs-2.25-14.el9.i686.rpm a97b20468f86b3a2bc3f5ba69b7bb53bea69729fac0f8091c8a7dc32e1dcc615 libblockdev-fs-2.25-14.el9.x86_64.rpm 120fbf5e7c0d48ebdead9c4e197e167353c43653ecddbc523be75808f73028b5 libblockdev-kbd-2.25-14.el9.i686.rpm 16c1b7e5c50960eee5d6112ae0988450a174eb2eaa7e15749b80fbe72f0dff7e libblockdev-kbd-2.25-14.el9.x86_64.rpm c1862d8c9141a7bb6f63d31191c2d5154f8edebe8a38f77247e44224a9a2ee84 libblockdev-loop-2.25-14.el9.i686.rpm 39147b8c5bd821dd557726f00c9f44e307fa18c3f0ed01d4e8260914ac9ba5fd libblockdev-loop-2.25-14.el9.x86_64.rpm e33e7329a6d60ed8c62686fefa2355c12bce7afc2154531f7e5764f4fceba6de libblockdev-lvm-2.25-14.el9.i686.rpm a7b7fd5b521a27ddaad5954cd62deb8f7bd56e763d7127d6ed35be88631ab85e libblockdev-lvm-2.25-14.el9.x86_64.rpm 1e8fd23e0a0935d634a1b62bcb69f264c154efcc6a430abe8a5a633d76938326 libblockdev-lvm-dbus-2.25-14.el9.i686.rpm 3f90372bfab81193adfa4b778b21537b2f414e7e81dbb1410a3b19f3b119fd8c libblockdev-lvm-dbus-2.25-14.el9.x86_64.rpm 447652b82725bac308da9249850de8903e2567706e5e46813a5c631de96b55e5 libblockdev-mdraid-2.25-14.el9.i686.rpm bbd533563566864ff91055114ad72840646e70715e52bbd7d8aedd576a740af2 libblockdev-mdraid-2.25-14.el9.x86_64.rpm fbe0850dae89f3113eb994adc4f4b557e763da1922956d8ab9668e9f7a1e48d7 libblockdev-mpath-2.25-14.el9.i686.rpm cb0e266ee38e13a24ae3d1cecb41072bc5fcd6458ecfb13576ace62470e322f7 libblockdev-mpath-2.25-14.el9.x86_64.rpm b6729c29d14133a9fcd1e73b3ad863b135e2ef3fefa44b515f399e6e61855366 libblockdev-nvdimm-2.25-14.el9.i686.rpm 9d3e5ddfea4bb12db934ab22bb3d2ae24d18b0c38dd533c1769640910459b744 libblockdev-nvdimm-2.25-14.el9.x86_64.rpm a6266b0f28a65a5df598f351a20b0f062ed1953019b416c31ae6e30d01a8d535 libblockdev-part-2.25-14.el9.i686.rpm 2e7cf2c39d7d71fb40ebf2dc8964c3a87df2a02776c6769010804f6ad6d3441a libblockdev-plugins-all-2.25-14.el9.x86_64.rpm f3a7b0f27c4bd20e2574980969a69a4791c7eddb135d61c6abfb61d2326a0bdf libblockdev-swap-2.25-14.el9.i686.rpm 9d100419c7d0c547e12b51a9ef6fd5ea6d84411586a62b69833adf37bd6b6b01 libblockdev-swap-2.25-14.el9.x86_64.rpm 5f804df3e41ae229afe6b0b3af25e25801c980006a871dd68914e31c4b9902ea libblockdev-tools-2.25-14.el9.x86_64.rpm 7f8ba82e67aaccb5fb1b3a18d3ad0ed908cfae877ab39b1544d269c6959d67c7 libblockdev-utils-2.25-14.el9.i686.rpm 2ab82d85f9041d1113286af43701b509f410618f03bb010bd10724400aa556f3 libblockdev-utils-2.25-14.el9.x86_64.rpm 4848de60b57b346810e8765b660c0a0c3a14cc07073e2ad5316147b05436c8ed python3-blockdev-2.25-14.el9.x86_64.rpm 199fc9fe2d57d6e39a4aea72901ebdf3612787043e746a0d28bbc10747971ff9 RLBA-2022:8121 sushi bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sushi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sushi-3.38.1-2.el9.x86_64.rpm 8e868297c7eeacf2b674a451909193d65d5b5b8b9d6df9c0a924021a4860c791 RLBA-2022:8122 tlog bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tlog. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tlog-12.1-2.el9.i686.rpm 06d30d348e0c13aa016482a5a8141ba2df7ec8b2acf9f35118d00257aa10ea13 tlog-12.1-2.el9.x86_64.rpm 78389853dbda96807df3edfff0579e46ae14f6c1790cec57de726939d51614e0 RLBA-2022:8124 stratisd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stratisd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms stratisd-3.2.2-1.el9.x86_64.rpm f9a334e100be3ddb648cfd5cabf8b9e2609d461e328f3007609415ef325d71d6 stratisd-dracut-3.2.2-1.el9.x86_64.rpm 9c47aafb3657c38c12d5b846bfbd640c34bc3e6f520076ecdff581259ca4bcf1 RLBA-2022:8125 stratis-cli bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stratis-cli. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms stratis-cli-3.2.0-1.el9.noarch.rpm 74a53e77fed71b3c8fc85369f48a7cc4b5a1fc18812a2397a2680f9046bd294c RLSA-2022:8151 Moderate: poppler security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for poppler. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince. Security Fix(es): * poppler: A logic error in the Hints::Hints function can cause denial of service (CVE-2022-27337) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms poppler-21.01.0-13.el9.i686.rpm 28afc670a3b7e8cae388e335bd4479bd3b207fa34dd50187ea41497fcba193c7 poppler-21.01.0-13.el9.x86_64.rpm 15ddb379f068e8ca500afb38d995cfff4a3e7d1b817e49eea972794ce81556fc poppler-cpp-21.01.0-13.el9.i686.rpm a5cdeba4f828085c569b3cfc88283e28ae624a8bb3b53f39daaa6c5e08c1b7f5 poppler-cpp-21.01.0-13.el9.x86_64.rpm 054570e8f0f540fbca5b9ab189d2324eacdd0b92d451ad8a05568c59ef7215de poppler-glib-21.01.0-13.el9.i686.rpm 925299930b6c054547c5d7729b127f000d92644d068d961600d22c1e2adac187 poppler-glib-21.01.0-13.el9.x86_64.rpm b94c9ee00b74ec8654e20fba90c4d737032b68e40472594aa73098eb8ea1bb40 poppler-qt5-21.01.0-13.el9.i686.rpm f64c331de77920bcac93049337bbfc401a3aa954c944895167dde73fea7d77fd poppler-qt5-21.01.0-13.el9.x86_64.rpm ef9016a67305875d59d938f227a003e0731d31ebad1f8500d8c763b44ec8e163 poppler-utils-21.01.0-13.el9.x86_64.rpm 40f4a80e48516f8812cda92f063eca147a9598459c5b9a0e3c4c10ff0a92c27f RLSA-2022:8126 Moderate: ignition security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for ignition. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ignition is a utility used to manipulate systems during the initramfs. This includes partitioning disks, formatting partitions, writing files (regular files, systemd units, etc.), and configuring users. On first boot, Ignition reads its configuration from a source of truth (remote URL, network metadata service, hypervisor bridge, etc.) and applies the configuration. The following packages have been upgraded to a later upstream version: ignition (2.14.0). (BZ#2090647) Security Fix(es): * ignition: configs are accessible from unprivileged containers in VMs running on VMware products (CVE-2022-1706) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ignition-2.14.0-1.el9.x86_64.rpm 8ef30fc7e278f7f5f38e5b225ccd4ef69fa890b6331a071e8b83241e71fb78da RLBA-2022:8128 checkpolicy bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for checkpolicy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms checkpolicy-3.4-1.el9.x86_64.rpm 34e4359abb6d4cbd9c76833f8f0111f64f3dca9f501ef408c216407aebd43d67 RLBA-2022:8129 papi bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for papi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms papi-6.0.0-12.el9.i686.rpm 29e784eaf49749a1a01394d24e2e9b8a5ba845110e4d8a96241e45d40513f5ac papi-6.0.0-12.el9.x86_64.rpm 5101b138e97a8481b3d4e9eb3003b6e6b960f4dbc67e22ce38f257b986ba4d8d papi-devel-6.0.0-12.el9.i686.rpm 68cc829958782037044d782c0bdfa7a6dce05ec9b87bdf8566257a0dc43b402b papi-devel-6.0.0-12.el9.x86_64.rpm 8a4f834b392aa5d1fdaefb5eee0d8c6e255969065aabe32d8c9f562dede2cc0f papi-libs-6.0.0-12.el9.i686.rpm 8b21d28c3454375539d49d1b3c66913a8eb10cd4f5f14d1cdf15ca8c70712ba2 papi-libs-6.0.0-12.el9.x86_64.rpm 315b2961f0ccc8456984959c6706e2343a459043505431f24096bac88374b34a RLBA-2022:8130 criu bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for criu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms crit-3.17-4.el9.x86_64.rpm b0d3a44deb3513b89013cba7d5b3cbaa734d55de596638e3b7f4466d66b257bb criu-3.17-4.el9.x86_64.rpm bbc9c1874678879c4d403170775cbb2d1153a50d01fecda5641db0bec891b6e7 criu-libs-3.17-4.el9.x86_64.rpm a95784e8d647fef4f1c8d9bcda29077951ffb630b73551b5ba321ec5b8b77eae python3-criu-3.17-4.el9.x86_64.rpm 0a256b8135e033393cc13cdc15242292daf687617c4018d583cfad98bc131388 RLBA-2022:8131 scap-security-guide bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scap-security-guide. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms scap-security-guide-0.1.63-5.el9.rocky.1.5.noarch.rpm d25e55b0936f63aa3bc9bc9de03bda04af5646550fc368e573e58f67b389fbc5 scap-security-guide-doc-0.1.63-5.el9.rocky.1.5.noarch.rpm 6fc56d2b8816c953f3d5fda8398da171e882a39cbb263282c8fb1f4d06d0bc64 RLBA-2022:8133 cockpit-session-recording bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-session-recording. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-session-recording-12-3.el9.noarch.rpm 7b479bd1ee05980da17af1e7c5ad0d90e7bd9bdb3ff0cad492650dd3e8b27585 RLBA-2022:8135 python-pyqt5-sip bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-pyqt5-sip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-pyqt5-sip-12.9.1-1.el9.x86_64.rpm 9f11d936058f880263df80c6f230ae9bc35dd7864d35d85d345e2bb04ece580a RLBA-2022:8136 squid bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for squid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms squid-5.5-3.el9_1.x86_64.rpm 9e5017077840cbcb4c1d7c190f30c33c432bf81ba609a38ddaa2d2ef28804d16 RLBA-2022:8137 gcc-toolset-12 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-12-12.0-5.el9.x86_64.rpm 069ffd5abc88929cdcb296b732d20a33dd8e42d72c5b4b9550f41391015da11d gcc-toolset-12-build-12.0-5.el9.x86_64.rpm baa40298b58f78796dbd03ac4c9c44bb5b2ed865b24762bae5d54b6398e53fe9 gcc-toolset-12-runtime-12.0-5.el9.x86_64.rpm e78d7b7ee0ac92420bbb966606deb3a5c33c96ef226aa77176cf5c93988eefb5 RLBA-2022:8138 pykickstart bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pykickstart. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pykickstart-3.32.8-1.el9.noarch.rpm f22736e2ed9afa86dac65c3f47c80a53698fb007e4a1a87a68edbc920d074312 python3-kickstart-3.32.8-1.el9.noarch.rpm 93ba5604ca07622511f8e406eed91469a4cd8856f88630c705f6038c27a862b4 RLBA-2022:8140 gvfs bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gvfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gvfs-1.48.1-4.el9.x86_64.rpm 1247ffc4409c42fb000d646fa303e26cfb311e5f46885bdea6d9dd46905cd029 gvfs-client-1.48.1-4.el9.i686.rpm a585589031764f10c19cd9020f930eefb68e23b7a50e87515ccaabe75f9ec61b gvfs-client-1.48.1-4.el9.x86_64.rpm 95dda415b751b9ad4ee25f1efd61444f4a281df25c6108f33c7e7308c44aecb3 gvfs-devel-1.48.1-4.el9.i686.rpm 2f564278a1e1b2f62fe9e05dea688f66c9b30d8fb6c4bd5db7a1c43862738b90 gvfs-devel-1.48.1-4.el9.x86_64.rpm 0d05239397aa8c74eb8613db193d5312fc3475befe89c42f0ebc2613a15ee4d9 gvfs-fuse-1.48.1-4.el9.x86_64.rpm 2a897cc17aed2261fc25c6a66fa48e2c806fa29c8d286dcab02073e6bde72f6e gvfs-goa-1.48.1-4.el9.x86_64.rpm a290d3acce55bbf330bf170ed85067eb1b02ab1a64fe119a86774d47ad875ee8 gvfs-gphoto2-1.48.1-4.el9.x86_64.rpm 0072263d41a2f7067d8dec84e92aebf27557e99077fc5d6120619e2feec8507d gvfs-mtp-1.48.1-4.el9.x86_64.rpm bdc9873cdedcdb46bd0b1fda3839149fe06d248614a9ccda92cbc3e689ff2710 gvfs-smb-1.48.1-4.el9.x86_64.rpm 3434aa9e33cd2c9a5de89fc8aa6f4081aa7e371083ebcbbd2e3ca47191a82d3b RLBA-2023:0332 zlib bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for zlib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. Bug Fix: * Rocky Linux9.0 - zlib: inflate() does not update strm.adler if DFLTCC is used (BZ#2135745) rocky-linux-9-x86-64-appstream-rpms zlib-devel-1.2.11-35.el9_1.i686.rpm b1c1674d907c001384daf05c9fe0eff545249472c3049f19e96c247be0aad0cd zlib-devel-1.2.11-35.el9_1.x86_64.rpm dc6518b2fc127ed37aaf8e32b09159dd9db328d9de7166bb2f8f24ca602f9b97 RLBA-2022:8141 libtpms bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libtpms. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libtpms-0.9.1-2.20211126git1ff6fe1f43.el9.i686.rpm a979efc2ea3ceec51f355bf7889d557caa05c34112ef59f45b7d545665878664 libtpms-0.9.1-2.20211126git1ff6fe1f43.el9.x86_64.rpm aece19397d1e86c41c2b834d567ee1f8086faf19378e89bcaf369132f395fa2e RLBA-2022:8142 yara bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for yara. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms yara-4.2.3-1.el9.i686.rpm ab4f91581e61679f0306e4a662849f559e0d6aad16d4aeb96eb07cbe1e3bb49f yara-4.2.3-1.el9.x86_64.rpm e35e26f6a439fa0de4cb34724af02d7563a5d2188bb6ae2c7d198f9f806b2d15 RLBA-2022:8146 gcc-toolset-12-binutils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-12-binutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-12-binutils-2.38-16.el9.x86_64.rpm dad63b1fce07b6f45004195896293f3dc072847a7836a112ea720a6227c91cdb gcc-toolset-12-binutils-devel-2.38-16.el9.i686.rpm 969219ccbce2e5fc63373317f9a777203e952f35ae4c3dffc29c62e545ee18c7 gcc-toolset-12-binutils-devel-2.38-16.el9.x86_64.rpm 9078b696d1d3d8024b50a9816adeaf150cda8e65f72eae811bbef016580c1c52 gcc-toolset-12-binutils-gold-2.38-16.el9.x86_64.rpm e30ee2c6c0c98c44047c9934dd6fc277770305f9b17c7266ef99933a62012d7a RLBA-2022:8147 gcc-toolset-12-annobin bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-12-annobin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-12-annobin-annocheck-10.76-2.el9.x86_64.rpm c79f7f178d84ca99e5b5a24105b76ff39d2a3b7297fa05d3a70d00830d84080b gcc-toolset-12-annobin-docs-10.76-2.el9.noarch.rpm 1f0f658f506bd3469cc46a9181062f2b21570ffe3391e17a0fd9596819991184 gcc-toolset-12-annobin-plugin-gcc-10.76-2.el9.x86_64.rpm 2f9d1b9c82d9cdc082d6d925da7c3d335daed50ca581db620e2f7feba0e89538 RLBA-2022:8149 redhat-rpm-config bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for redhat-rpm-config. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms redhat-rpm-config-196-1.el9.noarch.rpm 24aecb7465b5b95d3857e62a0e412878350eac4678ba73cf14323c312b74d295 RLBA-2022:8150 go-toolset bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for delve. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms delve-1.8.3-1.el9.x86_64.rpm edf8ce12472e36dfc8992607b69e5b3855c7b421279e5c9680c23f87da1e8579 RLBA-2022:8154 ansible-collection-microsoft-sql bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-collection-microsoft-sql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ansible-collection-microsoft-sql-1.2.4-1.el9.noarch.rpm 2f46e364529f6e0b54f48653d84ae555935302cbf8564474954e441ab851ba05 RLBA-2022:8155 nginx bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nginx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nginx-1.20.1-13.el9.x86_64.rpm 6b99ae591ad364a5543ef1ba624ccc4013688b1d1691f9fa42f147a2a4a395d3 nginx-all-modules-1.20.1-13.el9.noarch.rpm a598f868f09baf5b1b6be644242975747e698ec66fac18741b1d76bed4d98ebb nginx-core-1.20.1-13.el9.x86_64.rpm d9427bd641fff3b6f4dcf42be7166090749c9cd51c226d400ad4ca9fc2aa1ddc nginx-filesystem-1.20.1-13.el9.noarch.rpm 0ac0934c29f718f4605e79e87d9948ce844e08c9f3d1698fc2df23ce812ec668 nginx-mod-http-image-filter-1.20.1-13.el9.x86_64.rpm e52687f8d3778d99507cacd3f5f64c6e28571806c02b4965b1e1648f2c177050 nginx-mod-http-perl-1.20.1-13.el9.x86_64.rpm 98941845b5b0a092c125c347d9fb803402d350f9ee37dc4eee2170b0c7bf1368 nginx-mod-http-xslt-filter-1.20.1-13.el9.x86_64.rpm ab64d591f7c7a36f575b7571f1cf6ae23b8b3a904dce3480ce7a89e9b685af01 nginx-mod-mail-1.20.1-13.el9.x86_64.rpm 5cf54cfdb84b31b1fd161aea6d2cedfe79deef76f6892df5c8c35336088ad606 nginx-mod-stream-1.20.1-13.el9.x86_64.rpm 31e58cfe59c7366cec72fc5f38d85f2dd7cea5a830f785b6c23b42cb8356d516 RLEA-2022:8157 libdrm and mesa bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libdrm, mesa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mesa-dri-drivers-22.1.5-2.el9.x86_64.rpm 3ef571cb74688e6739894b4214ae070fbf464ab934fab148886e4329f2886ee8 libdrm-2.4.111-1.el9.i686.rpm 7f872affa17a92f0f35bedb7fe908049ca8446a2783ac0195400412f1ae45391 libdrm-2.4.111-1.el9.x86_64.rpm 9f0231776c4a5b9cb98417530227df7b87fb32423746d6080dc6df4d7b780cbb libdrm-devel-2.4.111-1.el9.i686.rpm 492d9af6a953bc4046cd9a1e46dc3c2325573d2090fb02e6850578c4087bf926 libdrm-devel-2.4.111-1.el9.x86_64.rpm 8eaf1ec77ceac5c29010a05674aca47433b99954f8fa4c12270522c865a08acf mesa-dri-drivers-22.1.5-2.el9.i686.rpm 49e0644b9fdf2a83b67563cad899f4269669a6b4b374919c9003c68fccfb2089 mesa-filesystem-22.1.5-2.el9.i686.rpm 6716361d661e98aa6d21dd404434c25ceed468d9caba872eff16a2d453b63881 mesa-filesystem-22.1.5-2.el9.x86_64.rpm a447cad78cfaf8f8c5026f5617bd8f08e7a4698c5b30ffbacc99bd782bb70053 mesa-libEGL-22.1.5-2.el9.i686.rpm a710056806c6f698789f9aacd66fc4f9e828e7f0f0e4eff5b39d3b31fdf52163 mesa-libEGL-22.1.5-2.el9.x86_64.rpm 410bc351f74f81a504a50df75db17bb11eb55c0a2adbdd947c4b88c638565199 mesa-libEGL-devel-22.1.5-2.el9.i686.rpm 2e480c3ee9e66fec8d81b96e0fd1a265ba64f6c51b2dc004a0f3d9de5c70ee77 mesa-libEGL-devel-22.1.5-2.el9.x86_64.rpm b6a737bc98c4c68c6b8bd319328971e73a0747ce2cf32bcd0a692a90e29d9da5 mesa-libgbm-22.1.5-2.el9.i686.rpm 57f2a04c5af1f2fc37434327463e0a1c1ab676eb084055d738d7396825427229 mesa-libgbm-22.1.5-2.el9.x86_64.rpm 6f8546d7d4137b19cc530b9f50873004a6d9eba926b8e0f3752c11716c8126d6 mesa-libGL-22.1.5-2.el9.i686.rpm bb5db03f778474f650894f0aa906483d3b1a10e19094426ef2f6d210f72c4c9b mesa-libGL-22.1.5-2.el9.x86_64.rpm 0df365db3d3492e491293faf4c1eaace63aa65355213b370eb2760f2962b3e5f mesa-libglapi-22.1.5-2.el9.i686.rpm e8c37970035bd4c12e7c63e983250208a57f70e950ae8eb7b766e8e7e193d501 mesa-libglapi-22.1.5-2.el9.x86_64.rpm 7a62d3da4bd2aa45df8d9a30b528f3bf45e70b6c26e5bdafcea34f352c45a1fd mesa-libGL-devel-22.1.5-2.el9.i686.rpm e74db749455a6e774944de2670cff2999fe50b79300e46bacdfae7e922f5686e mesa-libGL-devel-22.1.5-2.el9.x86_64.rpm ea395d297e633ab23a305ec0893ba6ac20654aed45d64957ee535c7e0d3d8a3d mesa-libxatracker-22.1.5-2.el9.i686.rpm 640de554b947a3971ad64c674fb92d1f30fba23ea93780136cd1003acaa81f5a mesa-libxatracker-22.1.5-2.el9.x86_64.rpm 5db4e60e53b5be0a232549b650b923c22648df305541121dccafc7218f117ec2 mesa-vulkan-drivers-22.1.5-2.el9.i686.rpm e90c3365d079d18f56838649ecbc9818c79dc72f8fed6c7a6d40771af50e7dbc mesa-vulkan-drivers-22.1.5-2.el9.x86_64.rpm 351b33e09ee4b52778ce7de94950fe1791e7ddac3a20b8c7730cd3476ead94bd RLBA-2022:8158 sdl12-compat bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sdl12-compat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sdl12-compat-1.2.52-1.el9.i686.rpm 21e2d4045b6984c87679e4a97cbaadd0808cb86933d454b31d7fbe94658e779c sdl12-compat-1.2.52-1.el9.x86_64.rpm b155c876f6cbc1653cd85021dbf0722adb4b367888ed68eb748845d1e1ef4dd8 RLBA-2022:8159 lynx bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lynx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lynx-2.8.9-19.el9.x86_64.rpm fb311eadc81278144d71ffe7c2b6779c26a250ec999733ba92347a049bd66334 RLBA-2022:8160 freerdp bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for freerdp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms freerdp-2.4.1-3.el9.x86_64.rpm b324ad279b70861510278673ecc3dd75335ff66d9e4b87ae0f2c342c7c0df909 freerdp-libs-2.4.1-3.el9.i686.rpm b6e677381d4f8ed46b90e69e00c1273d36e4c060f1dd1b933a8eaa07d50fba15 freerdp-libs-2.4.1-3.el9.x86_64.rpm 525944e88aa24c6be8527e5c4a42891891c92d8be22914d3a559802cb56c8a1e libwinpr-2.4.1-3.el9.i686.rpm 3cd552f55a0178915dc69854f1567143ed3072fa860ab16d5853f5b0999b4b99 libwinpr-2.4.1-3.el9.x86_64.rpm 2ac6eac99b061ad260da0104b576120e563d2cb4d318e58fdd1546d3694fb05c RLBA-2022:8161 gnome-control-center bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-control-center. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-control-center-40.0-27.el9.x86_64.rpm e6d2f9afdc86938336580a8a11667134723aa12b690592df76302b875abefd70 gnome-control-center-filesystem-40.0-27.el9.noarch.rpm 684127af116dfec70a98c98fe216d90da936316866bf2bfd795e4098b4ef4b4c RLSA-2022:8162 Moderate: 389-ds-base security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for 389-ds-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. The following packages have been upgraded to a later upstream version: 389-ds-base (2.1.3). (BZ#2061801) Security Fix(es): * 389-ds-base: sending crafted message could result in DoS (CVE-2022-0918) * 389-ds-base: SIGSEGV in sync_repl (CVE-2022-2850) * 389-ds-base: expired password was still allowed to access the database (CVE-2022-0996) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms 389-ds-base-2.1.3-4.el9_1.x86_64.rpm 3b4cc6473ff5ac1392e616ec97e9443b1453e7d32e91fef6cdb0682be4956c36 389-ds-base-libs-2.1.3-4.el9_1.x86_64.rpm 2efe69bf5068be4b868b036e6e7a3871592b770688e24fa61604599fb37fe1a9 python3-lib389-2.1.3-4.el9_1.noarch.rpm 1e7a92e3e3888fc691fffb710723fb26275825319b3d2ef0384e4f7bc845e100 RLBA-2022:8163 libtimezonemap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libtimezonemap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libtimezonemap-0.4.5.1-12.el9.i686.rpm 6d538f6356694cad5f6f2784db14aacf6ac5e7a96c353595ca46515ffe61e453 libtimezonemap-0.4.5.1-12.el9.x86_64.rpm f446a32d9f121b709415f9b778394b9e20d012904bc7c24b9d07850e878652ec RLBA-2022:8165 python-blivet bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-blivet. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms blivet-data-3.4.0-16.el9.noarch.rpm 7ff48531205fa1ed8871f8d3ecbcb92c1042d5b9b52359ff6ff5681facce8c53 python3-blivet-3.4.0-16.el9.noarch.rpm ea90e4e4cbf5338eb3e0ebecca93b1ca19ccc0bea135f8f3f3c16243d87cb77d RLBA-2022:8166 virtiofsd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virtiofsd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virtiofsd-1.4.0-1.el9.x86_64.rpm 839830a0aeab4fa39ff627035b9f64caace968d28315d8e0448fa91a52397377 RLBA-2022:8167 gdb bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gdb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gdb-10.2-10.el9.x86_64.rpm bbe23d5fde66a4ae7ed4073caa1fbbac83dbf32e19d36a4de2948fd66da10c78 gdb-doc-10.2-10.el9.noarch.rpm 41b24e6cdf8edadef09a42d3a17ae7a05e5b6dbc2c74765df0508ba9ca308905 gdb-gdbserver-10.2-10.el9.x86_64.rpm e6650f0730a69bf0f8eef55e199c0e0c4466a959d4b694126e270db3058e9908 gdb-headless-10.2-10.el9.x86_64.rpm c0f6fd4349b441d40e3bcfb5326d92c53fe9ac1a23c0b475cd33b1c53e081fd6 gdb-minimal-10.2-10.el9.x86_64.rpm 47adb160ce09d6a5880286d9c8214c67592ca30a55b6978b6646cd60c4f5ba34 RLBA-2022:8168 fuse-overlayfs bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fuse-overlayfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fuse-overlayfs-1.9-1.el9.x86_64.rpm a1fd525022c9dd098f6fd4a6f8b0992a1703a09edc150e860b2f68b88ce89898 RLBA-2022:8170 nispor bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nispor. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nispor-1.2.7-1.el9.i686.rpm 86c6609c0df5b810c31d1d7ec2e3b2f7b79bd5da863cbe91627555aa115e0006 nispor-1.2.7-1.el9.x86_64.rpm 14e8f0d959bc0ad63c533714dacffc442f9fbebc225e77a8aeeb899c341ceead python3-nispor-1.2.7-1.el9.noarch.rpm 55727a20d5fabb52be4f132f88fbf337d3da937f1eb0bf51111db5b6c1e48e47 RLBA-2022:8171 sevctl bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sevctl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sevctl-0.3.0-4.el9.x86_64.rpm 5be0222bb330bfc1206c076084079f4c4d08bfa548c085c58f1fe85bf8fe27cc RLBA-2022:8176 ldns bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ldns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ldns-1.7.1-11.el9.i686.rpm 502a935d5f630df45cfbfee0055f4e6dff4156c1d3ba9fea1088dfc41acaa9ca ldns-1.7.1-11.el9.x86_64.rpm 8ef8279cc9755ac5947e0c5c72df6d420f52082879f9bf75a75d51daa3174674 RLEA-2022:8177 alsa-sof-firmware bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-sof-firmware. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms alsa-sof-firmware-2.1.1-1.el9.noarch.rpm 11a8722a5699bc1eeca7991f10288cf0194e5ea3773aef2b6b883df0e4a13ffe RLBA-2022:8178 xxhash bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xxhash. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xxhash-0.8.1-3.el9.x86_64.rpm a1a93b88a208341014a07b4e227ee8f63ad38f3cadd995530d28717de18630d1 xxhash-libs-0.8.1-3.el9.i686.rpm 46faf9996ebe875735141af9e7a412d2a3b8406b34a205d241b5fed38b01706d xxhash-libs-0.8.1-3.el9.x86_64.rpm 7e3de1027fe3d3c0934ecfe927698b1f46cff9d0a2f8a9758ecf613b507f9a37 RLEA-2022:8179 alsa-lib bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-lib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms alsa-lib-1.2.7.2-1.el9.i686.rpm d8fb25ab92198ce8ad68938302056d3deee83da4848f85b7ec03b031d123e920 alsa-lib-1.2.7.2-1.el9.x86_64.rpm 84fdb9af40258397997eecb1f6a46000f03f1c6346787ba5b36517bc1111787a alsa-lib-devel-1.2.7.2-1.el9.i686.rpm ba6a5d9318e52f6115a401970e5479ba43367d1717756238e4cb017cf188e847 alsa-lib-devel-1.2.7.2-1.el9.x86_64.rpm 13dd2b2d59e669ffc48a2a7bbea625dcd9b56a0c0e1b81595917aa10c52c77b2 alsa-ucm-1.2.7.2-1.el9.noarch.rpm 58414314f567dfa4dfc60b2b53ae84ebb83992ae6734b1c7a839b9a0569419fe RLEA-2022:8180 alsa-utils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms alsa-utils-1.2.7-1.el9.x86_64.rpm 1f6a516704a614ecbdf92042a997d18b08b032573c92866fead27b5bae4e5824 RLBA-2022:8182 realtime-tests bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for realtime-tests. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms realtime-tests-2.4-2.el9.x86_64.rpm 43c85b357874fc2b8a1827532d9e6f0e2870d5aa0f47c1a0b21936cc0995c3d6 RLBA-2022:8186 virt-manager bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-manager. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virt-install-4.0.0-1.el9.noarch.rpm fb4f09ec90f2f618ede3147eaa90a1f36a6aa8ddd204f5985ea7f8fc71aa843a virt-manager-4.0.0-1.el9.noarch.rpm ff6c887968e9d6e214da67be056bdf88c608a7fbab6794531920ed2d23c7bd51 virt-manager-common-4.0.0-1.el9.noarch.rpm a9a7fd82033f1e5cbe4f5e44aacdbdb8f26ec9f3f2ac3496826880cbac1739c3 RLBA-2022:8188 python-sqlalchemy bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-sqlalchemy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-sqlalchemy-1.4.37-3.el9.x86_64.rpm 2cb693b84aced02b07c585c597c0f6074d5c0c6a1fb32a15bf9bcbd793f14e25 RLBA-2022:8190 keylime-agent-rust bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for keylime-agent-rust. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms keylime-agent-rust-0.1.0-1.el9.x86_64.rpm 9edbae77d20ff689c11cfa6441d3588817fb7d62a418a8e19b36cef7f10aacc4 RLBA-2022:8192 python-greenlet bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-greenlet. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-greenlet-1.1.2-3.el9.x86_64.rpm 5fa6ab3ce220807cb8cca69b5bb33253ad1b8b21b37e02c9187935216edade4e RLBA-2022:8193 python-tornado bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-tornado. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-tornado-6.1.0-8.el9.x86_64.rpm 18dbaf8ed09764fbc045d958d8fd57e8cc8593138aab06c60126b59fdf8b95c6 RLBA-2022:8195 egl-wayland bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for egl-wayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms egl-wayland-1.1.9-2.el9.i686.rpm 4887ea358804b0cbbccfaeab0e0153e2fb61faffac53d58ef075653b39376067 egl-wayland-1.1.9-2.el9.x86_64.rpm 9ccf61e337a05f188a658e7fee97db3a5ce2cc8e42ca78894a4c0cb496c7fe81 RLSA-2023:0333 Moderate: curl security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for curl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: POST following PUT confusion (CVE-2022-32221) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libcurl-devel-7.76.1-19.el9_1.1.i686.rpm 7ad05dc436af09c7642094ec4ad4eb00e84f3473b51d0bba0f55dbd7d76d1d33 libcurl-devel-7.76.1-19.el9_1.1.x86_64.rpm aec15566a0f096caa322970eb819aceae4520f8feac9ed3ec46a649bc6d7ed00 RLSA-2022:8197 Moderate: php security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for php. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (8.0.20). (BZ#2095752) Security Fix(es): * php: Use after free due to php_filter_float() failing for ints (CVE-2021-21708) * php: Uninitialized array in pg_query_params() leading to RCE (CVE-2022-31625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms php-8.0.20-3.el9.x86_64.rpm 5e175c78aeeecb434e348603c9f64c2658149d836cf5df2ffc1e29cdabc26aa1 php-bcmath-8.0.20-3.el9.x86_64.rpm 49935fb88cc8ac6b59fc29d9ef96ca69275ec126fceea16b9197b858961203c1 php-cli-8.0.20-3.el9.x86_64.rpm 79635d8a99c88749c1cbfa795fceeb0ce6728ee062ae687cc0282c8099783a8d php-common-8.0.20-3.el9.x86_64.rpm 948160e7119d2928ba5717ec620af563e3b1f440113029200674a6496cd68caa php-dba-8.0.20-3.el9.x86_64.rpm c0c18dd3cc4a300371c3a051cecd36175b3195aa8b7bbcb04d5daacf6826571b php-dbg-8.0.20-3.el9.x86_64.rpm ddf9727ea726dd63fa0d292ea1f51eea4d8963ca30ea49f79239b90d99db23bc php-devel-8.0.20-3.el9.x86_64.rpm 339999c377ff047d9e08829588dfdf39356719ae3317d59a939abdd1a42942af php-embedded-8.0.20-3.el9.x86_64.rpm bb097d1cbabee71a01baae17f325b30168e99a59c6784a881512e26307b493f2 php-enchant-8.0.20-3.el9.x86_64.rpm 851cbd8b7f0ef7836b9e2f496d2ad8a753ef7b50011e05e6d4e8e8564e71a40d php-ffi-8.0.20-3.el9.x86_64.rpm ac7eb942d94d69fcbe2e8e9a2a343b9534fb0c76ebbc5d219d52c78ee25a16c4 php-fpm-8.0.20-3.el9.x86_64.rpm 587f05e5a414002bb464a1c5e9521d78ec805c411f253199422e277f8cc8a91c php-gd-8.0.20-3.el9.x86_64.rpm ead40131db50980be39a118cda31b55728a0b7e85e2b1cd677d646780a271f93 php-gmp-8.0.20-3.el9.x86_64.rpm 1b4836a5fcf7b25612f15fc01ba9eca4c69d78efcb45599bc958626cd74f013a php-intl-8.0.20-3.el9.x86_64.rpm 944cf829386de1b4ff5bd6adfaafc7aa3b3d144be26e2490146a649ea31eb95c php-ldap-8.0.20-3.el9.x86_64.rpm 7dc0057c96e84fd83f9f5d3e95147cf63b2e01048bfe1b2a411ebb086484b810 php-mbstring-8.0.20-3.el9.x86_64.rpm 5dad49cc5135b8d18d54e83d87edc786ad036b3a1ec22d67b9ae11d9b39dc144 php-mysqlnd-8.0.20-3.el9.x86_64.rpm be7cffe754ff1a72e35f1191c33c9908bfbff46dca3e508031f312fd48e4b78f php-odbc-8.0.20-3.el9.x86_64.rpm c092f39361c909b9881bbd5ae8538c89296badebe9aba40bd70302351df4c3fd php-opcache-8.0.20-3.el9.x86_64.rpm 58cf1c9d7d7d8a2da1c60e3036b6796f01a98071db7147883b0aac3866ee2877 php-pdo-8.0.20-3.el9.x86_64.rpm bb6081db58f55d68f78248ab8a3791942d505ecb3d36e1057dd0ab225f427e59 php-pgsql-8.0.20-3.el9.x86_64.rpm 20e544831a519ae4f1a4e53b086268faa24f9165672daa94b81c30d4a303962a php-process-8.0.20-3.el9.x86_64.rpm b8402b2ddb1a32cdf3ed00f489b7f5acae90ed3f0833157cf4cf1844e3c2959c php-snmp-8.0.20-3.el9.x86_64.rpm f3387477e3c93c21b12543ce93f2196171c8c08bd4691d24a0af988a16b8aa7d php-soap-8.0.20-3.el9.x86_64.rpm 3798a3a2ee6bcf61d7e7f4410b9fdf45872547a5345eec00d9f45dca574082c9 php-xml-8.0.20-3.el9.x86_64.rpm e5363d13ea6de9054e1e4858799473c046fee9f523f9083584bba10b6666cfd9 RLEA-2022:8198 rust-coreos-installer bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-coreos-installer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms coreos-installer-0.16.1-1.el9_1.x86_64.rpm b6a3f953b2d0b6ea51d1541108dc27603c238df01b7510d376c6b5bbf41e886a coreos-installer-bootinfra-0.16.1-1.el9_1.x86_64.rpm 0f60cb49d4897d90c9c772757a8b000825048e5b6c45a458429d3591273dc773 coreos-installer-dracut-0.16.1-1.el9_1.x86_64.rpm 77e2e821d3e2c6702cb6f4c8ff605bcc0756f8b5bd4f141d2dacf9185ee0b2aa RLBA-2022:8200 qpdf bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qpdf. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qpdf-libs-10.3.1-6.el9.i686.rpm 10bb2d031a2c79fc5d47975097d224af197d2897c7a145634f4a7fab0897dfef qpdf-libs-10.3.1-6.el9.x86_64.rpm 48a7b0df3bd69bdfe0bf1552d774fd3aefe499e7118167159fc04c9d8662f28c RLBA-2022:8205 boom-boot bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for boom-boot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms boom-boot-1.4-4.el9.noarch.rpm 36d899d5655c1d73937495a9d3373a659e7f85e112fb9ea66e44e631df4abb1c boom-boot-conf-1.4-4.el9.noarch.rpm 7f50d99086c4dcb67b946bc9f16bb26f69aea3106328106eca4efbc5b7b7df51 python3-boom-1.4-4.el9.noarch.rpm 0a86880339a0bfe308f6271fe2e50bf812e4cb56b1a591b7dae4dfe3cf187ce2 RLSA-2022:8207 Low: openjpeg2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for openjpeg2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenJPEG is an open source library for reading and writing image files in JPEG2000 format. Security Fix(es): * openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer (CVE-2022-1122) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openjpeg2-2.4.0-7.el9.i686.rpm 52aaa3e88ca62afea172e795409264945c957b26bb2fc71b0840042a8791493c openjpeg2-2.4.0-7.el9.x86_64.rpm 380ef2db96766ecee5e15cce67f91b5d73c721672930add64bd35de5da12c6a7 RLSA-2022:8208 Moderate: dovecot security and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for dovecot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. Security Fix(es): * dovecot: Privilege escalation when similar master and non-master passdbs are used (CVE-2022-30550) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dovecot-2.3.16-7.el9.x86_64.rpm bce9c48cdd6c1728b24154db2df749923d566cd5ba8af9b81020b1a8483df30a dovecot-mysql-2.3.16-7.el9.x86_64.rpm f6b6f62fb91c8bf43d28d4adef1cf0bd4b292ff0a9d153c7902046fd59dcd1b2 dovecot-pgsql-2.3.16-7.el9.x86_64.rpm 66791a014213a14247c6070f04d47115ffb492ebe04409f15675dd430460f184 dovecot-pigeonhole-2.3.16-7.el9.x86_64.rpm 260ebeb9e820d106630cf20e2729060eee2a2d53f7e03380647bfae804962b55 RLBA-2022:8209 boost bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for boost. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms boost-1.75.0-8.el9.i686.rpm 58ed8937d98085d8e48714de56d2ddbb3f1da3d127b9a18237929d72e0d0f07f boost-1.75.0-8.el9.x86_64.rpm 2b89487c09db0b35a7362567ce0ff1d5201c2506cd4bfa6566c6920d7e544d3f boost-atomic-1.75.0-8.el9.i686.rpm 42e51de336d46116cc659f9b5a58aec31a59f0477a737b741937fb52c59122cd boost-atomic-1.75.0-8.el9.x86_64.rpm 52f6c732819ebf1d53883ad641d508277547b25da358551ec816cc82114b4409 boost-chrono-1.75.0-8.el9.i686.rpm f0c2b20e2433f2d21bda9e1f7cf392926fd73cd6e114e72ed2a7aba3dc71db26 boost-chrono-1.75.0-8.el9.x86_64.rpm 784bb368e9c791972907a8c607ae01bcb36c1c84c5afc243bb5329bb67b1e75f boost-container-1.75.0-8.el9.i686.rpm 3005167606f243f2741ac6574f8377b70ed0676451ec1bdd5ea96a8d661083fa boost-container-1.75.0-8.el9.x86_64.rpm f86c65db24dcf198694a7a99c16ac64e727806ac1421a452c3557e5dfc65142b boost-context-1.75.0-8.el9.i686.rpm e727bb684649efccb51a80a283dc678e24b506bb9859c3fece10dee5ec98bf6f boost-context-1.75.0-8.el9.x86_64.rpm 5690e1e27778a78e6dc3333589a18665292a6d124af89961c79b4e95e41e8a6a boost-contract-1.75.0-8.el9.i686.rpm 907a6227e84653a535ce70ac0999a6917448bb3acc610c7662e6257fa1a0236c boost-contract-1.75.0-8.el9.x86_64.rpm 7639b3e54afb9b4f245ccfc478eaab944ba9d636d417673516571b69cce74434 boost-coroutine-1.75.0-8.el9.i686.rpm d4c0a594b6aceb68fba791ca7ac2b2a397818af78a4131fb1b52cc27d9cd6fa7 boost-coroutine-1.75.0-8.el9.x86_64.rpm 1c969e24534ab25683dd4b0da6d25c59e533fa7991662358818b593252954d75 boost-date-time-1.75.0-8.el9.i686.rpm 976c88250567f44bacdc12d5d0b1dcbe8b71974f950e77d697e255a2f9829203 boost-date-time-1.75.0-8.el9.x86_64.rpm d2690b53b36c6b20d446ec415a316f91b5bd84341041bfb2b35500d5ed46bc98 boost-devel-1.75.0-8.el9.i686.rpm 63901104228b418e873c2c4395808085ecfcdaf574f47c875445a01f09863b7e boost-devel-1.75.0-8.el9.x86_64.rpm 445ecc85b49b9558aadb335d4ea78e2cd75dede7309e777ab05396d9fe6c56cd boost-fiber-1.75.0-8.el9.i686.rpm 4617722852d77bffb2b8ba431ab8f6258816668428b8704adc3817afcbb55b52 boost-fiber-1.75.0-8.el9.x86_64.rpm c09d9b1ad94a8b5e49595c62db6ed09b624573e2028ce1501e1250da1d66b369 boost-filesystem-1.75.0-8.el9.i686.rpm 2b10603f623495ecc136ac2e9aa57f3e8c8ae400072033f324a9b41a5eda6715 boost-filesystem-1.75.0-8.el9.x86_64.rpm 9c1f68c454e382215bc975715e64a3a052a1ccd504b657ded0854516e605009d boost-graph-1.75.0-8.el9.i686.rpm 86584c945976a1ebfc2145faed1eb799808909f159013548f372485098e4a063 boost-graph-1.75.0-8.el9.x86_64.rpm 0f6030fc7c7b7da4e743cabc1b056713fae24421d4692064f4e9b2e979a2d6c5 boost-iostreams-1.75.0-8.el9.i686.rpm fbf3415c681fd8fa9a693db008b1a1734a0902dd97b2bc3aa31b4a7ef100fb46 boost-iostreams-1.75.0-8.el9.x86_64.rpm fafc9e5eaf848b17fa018b0334edd2d8669f3b8ba95d3da7a000db4fcedea585 boost-json-1.75.0-8.el9.i686.rpm 440a0a8742eb8f769c0309939e264688699453f1aaebb48ae36a0360a43b6856 boost-json-1.75.0-8.el9.x86_64.rpm 4c92f0b910932f0416f8e37c16753b9cfb52e1ffc79e00c2883f2fb7dd63810f boost-locale-1.75.0-8.el9.i686.rpm 8b1d3e963c86da485122fdb5b146ccc7e37070d4f62d682929c15d05d5917ec6 boost-locale-1.75.0-8.el9.x86_64.rpm 675fab2cef3901472d42b5fb0b2f93879a07eca1e40058728f87ab40878a2be3 boost-log-1.75.0-8.el9.i686.rpm 340e75e71e371b10ca458fdbb0dbd4e77b512390b094f22fab80ac0225fd56d9 boost-log-1.75.0-8.el9.x86_64.rpm 1fa22ae6a28b47b77f1f4ec4b461dc27077b9793dfdd85f49285c57eeabe5720 boost-math-1.75.0-8.el9.i686.rpm 76c985c84b75a9ff6fafaaa503e5631314f1aa4788a01a2d9694880110264da9 boost-math-1.75.0-8.el9.x86_64.rpm a9ef94d68c80620bfa8ff38bd2d8a5af5d7ca467220b7988f620f2153ad27161 boost-nowide-1.75.0-8.el9.i686.rpm 127d21e6569f70094c080d73bf92a8247465627f52b1fd2a36e415fb2f5a2d03 boost-nowide-1.75.0-8.el9.x86_64.rpm 85999a51192fc0651e2e96f3eac90e49c43245bf25adcbf4720b63d7d872c4e1 boost-numpy3-1.75.0-8.el9.i686.rpm fb77effe64d876c933f28a57a97e8b5297cf2d25eb36625d8f3d359d9dfde10a boost-numpy3-1.75.0-8.el9.x86_64.rpm 00786890629260f3dd4ddd5bf3550706abeea9621213c11f26ef019a2760490b boost-program-options-1.75.0-8.el9.i686.rpm 5b50ab1238f9302b21440476c9016e7e843d6b9c8b15e62eb959efd9d0bbf3f9 boost-program-options-1.75.0-8.el9.x86_64.rpm a592d4e9bc4f74c271f5168e7cf170ee43197786cc062a8c39b4fd18be32ee6e boost-python3-1.75.0-8.el9.i686.rpm 9026712d638bbc413ea75f3f1a64b84a479063d6d77292751142ead328e21e02 boost-python3-1.75.0-8.el9.x86_64.rpm 872c074bcb326cf370bdeec3c46bd3eeb96618d9813b6de4d2d291a2d57b5731 boost-random-1.75.0-8.el9.i686.rpm 6e2c5c68c6662e77385b620f1a22971786e45edb543e6270c7e98ee01d0d7c2a boost-random-1.75.0-8.el9.x86_64.rpm b89f4b4f71b504626c34f084b66d3b9a84e9c6bd793865d3c0959a83d1772098 boost-regex-1.75.0-8.el9.i686.rpm cf2feb7f87ee9bc16661ce07437ccfb538839b95d4a58150494385dba73dd53c boost-regex-1.75.0-8.el9.x86_64.rpm 7acf03c8e422065e10def6a635d20db6ddc9be09b811e7ae998b491839596d2c boost-serialization-1.75.0-8.el9.i686.rpm 452ece30edc38c5910f92aab440057f17aa1c98d001041c24e404799433bcdfe boost-serialization-1.75.0-8.el9.x86_64.rpm 73f42ce6e03d855f1e11302477c48eb6aeb38c2047e64e79ceec56e06297141f boost-stacktrace-1.75.0-8.el9.i686.rpm e1622741e30ad6da37b6e28fcdfa5807cf61bd457c0dcc30fa30c1f99ab4b9c8 boost-stacktrace-1.75.0-8.el9.x86_64.rpm 884cb497445e44aa7e79873ef67da9a82a67713565072454dff7fa47ce7d007a boost-system-1.75.0-8.el9.i686.rpm 5126686589b845b18e6763abde79b90edb2a3493aab998882e71ec8099d72441 boost-system-1.75.0-8.el9.x86_64.rpm b1674470337ca1d81bd071c4acf828f9f253c02d23f88e51f55556e9e7959b3f boost-test-1.75.0-8.el9.i686.rpm 5507b687862fc4f9a0e9c6a8fe908f88228d2b5cf5075ac041054a4e97117392 boost-test-1.75.0-8.el9.x86_64.rpm 1b15ed51d4fc5e3412a97f2f864efc708d75cbe52905fcb2e99a97f22edd0487 boost-thread-1.75.0-8.el9.i686.rpm ea34b832a8a0b9630271e0d55c19e21a0980d4cd16368d67aec52fe71e98ffd9 boost-thread-1.75.0-8.el9.x86_64.rpm 55488650633017e39e16d913b0bc65ff1444a31a0bebeaec7b327ce45eeee989 boost-timer-1.75.0-8.el9.i686.rpm e9c7e311d4f212f4c8795b1c40026a01b29601988892a5aa249e1eee68246bfc boost-timer-1.75.0-8.el9.x86_64.rpm fa0cfb1e6ce59764063b808621065b23b5acdfbfb8e5f32d3930b02b97a21162 boost-type_erasure-1.75.0-8.el9.i686.rpm a1f84e5e0168d6eda59ae34fbd41f2bd8a297638e88910987d60299293dd4c3f boost-type_erasure-1.75.0-8.el9.x86_64.rpm 736921e12d23345f446c453ae0f0d4ef808b16baa61bb19de7bd72d2bc87a383 boost-wave-1.75.0-8.el9.i686.rpm 50d039d5c439f231368fb55fafc9c75b1c75718e45bb90c582f90a919d9a95bf boost-wave-1.75.0-8.el9.x86_64.rpm 555b3380ef055a497bcc49cd44d938a0712b963a1b8c1960fb3032be5bf996ba RLBA-2022:8211 gnome-screenshot bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-screenshot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-screenshot-40.0-4.el9.x86_64.rpm a6c5e1eb1610025cd061fdfcb4ddb2b6b88e7f8c782f175d7c29a4e251154810 RLBA-2022:8212 haproxy bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for haproxy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms haproxy-2.4.17-3.el9.x86_64.rpm 78dbb113b27ff5a265a42987d46723fa2fbfe11e3d44cfce4414ed4dc6b60892 RLEA-2022:8213 nvme-stas bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nvme-stas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nvme-stas-1.1.6-3.el9.noarch.rpm 6dc35cd1f740d622bff0843c8cebc11ce55922367441363193afa60bbd78ffe0 RLBA-2022:8214 perl-Net-SSLeay bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for perl-Net-SSLeay. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-Net-SSLeay-1.92-2.el9.x86_64.rpm 357229b9af77138e17a13553f1fb066fe3701612189ea8383b98ea1e51885e75 RLBA-2022:8215 thermald bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for thermald. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms thermald-2.5-3.el9.x86_64.rpm 091823c2b1375dccf989c7beacca0228ece69bba97c2fc1433a67d623d072ab8 RLBA-2022:8216 openscap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openscap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openscap-1.3.6-4.el9.rocky.0.2.i686.rpm 5b38ad0c1ff384d6cd88d8597cb68f120509d566b60c2f66b4741a5750f7362f openscap-1.3.6-4.el9.rocky.0.2.x86_64.rpm ab8c555b76148d7ffd349fa2a4e120a5866946d20326392c4f1bfa6902b524c5 openscap-devel-1.3.6-4.el9.rocky.0.2.i686.rpm c5a1ead630c70e6ccf4831bc5b402e5c57436a4f0824e532918973e243418520 openscap-devel-1.3.6-4.el9.rocky.0.2.x86_64.rpm 54b869926c61b27d71b208aac30563e8b90b31f3eb7e9eafbf7d10fbf470ffc9 openscap-engine-sce-1.3.6-4.el9.rocky.0.2.i686.rpm 69bc52a237757caca71d2808980312efb0ee32451745fa82cd590a026e1137c9 openscap-engine-sce-1.3.6-4.el9.rocky.0.2.x86_64.rpm 50aaf2509d7de254b068ba1c3b01d572fbce6d4c8dcc3e4c72a832a6bd9d41a8 openscap-python3-1.3.6-4.el9.rocky.0.2.x86_64.rpm aab5072ea1f18ac6447421310a9f9eed71cfa58c6749f8702bb6a3a07afd6ccb openscap-scanner-1.3.6-4.el9.rocky.0.2.x86_64.rpm f6e22578df21082a4a88811ce3cafafddb22b1261a1dca68648b9d2a93f59a55 openscap-utils-1.3.6-4.el9.rocky.0.2.x86_64.rpm 3afca1f33b0eff5470c8f41a132f4e20ccbe9c30ef39c9450fdebe4dbb946b14 RLBA-2022:8217 usbredir bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for usbredir. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms usbredir-0.12.0-3.el9.i686.rpm c593686fe8502b5059088e8dc39b034d414bbaba752c6ad4507e14b76e9810d8 usbredir-0.12.0-3.el9.x86_64.rpm 57fb3b4a5be1eb45e5b172c74cb064e52bfcb0bf71bd1250be5c167c95295919 RLBA-2022:8218 gtk4 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-settings-daemon, gtk4. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-settings-daemon-40.0.1-8.el9.x86_64.rpm 800dd0da960865369db3c68aead417ff8cddf4b7c4518168ca9cfcf08284c87c gtk4-4.4.1-2.el9.i686.rpm c736a9851ff4f7730a8c3f000e36515cbe28524759958a62c7960290ea149643 gtk4-4.4.1-2.el9.x86_64.rpm d437e452d1fe83036d5eca55e35589ba02cd2ea4a8fa9e305c0f17b2dd19f97f gtk4-devel-4.4.1-2.el9.i686.rpm 6e51c38d35a50883388074014e45bbf59dc381ed20a7b8fa8b8cadcd637cc8b0 gtk4-devel-4.4.1-2.el9.x86_64.rpm caea1db5a795bca96600266cce9f98ee30323c4d63cfea681e4a8695a50365fb RLSA-2022:8219 Moderate: mutt security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mutt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mutt is a low resource, highly configurable, text-based MIME e-mail client. Mutt supports most e-mail storing formats, such as mbox and Maildir, as well as most protocols, including POP3 and IMAP. Security Fix(es): * mutt: buffer overflow in uudecoder function (CVE-2022-1328) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mutt-2.2.6-1.el9.x86_64.rpm 61d1790586762a83003766cbc478f8c89f5c926018cb6ca060c73eb5ba3d3c19 RLBA-2022:8220 linuxptp bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for linuxptp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms linuxptp-3.1.1-5.el9.x86_64.rpm 4bde8fdc5d0a442ee994505f36f09018954997ea0f29ddb126265078718317c3 RLSA-2022:8221 Moderate: xorg-x11-server security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for xorg-x11-server. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319) * xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-server-common-1.20.11-11.el9.x86_64.rpm 7d8b5f3399c42339f7c4ee7d3b889fb5083fa4f6d9c681152c59398b7f5efc4d xorg-x11-server-Xdmx-1.20.11-11.el9.x86_64.rpm 2e27abde8895d87a40cde4e7e45d4eb7cc69294658f55183e7fcfe8110ee04a7 xorg-x11-server-Xephyr-1.20.11-11.el9.x86_64.rpm ce545a7d5176f15df483c7a31b60dcd258f632b9a76f80c2c957ef0f83b6a3dc xorg-x11-server-Xnest-1.20.11-11.el9.x86_64.rpm 70473190d910f0dea1dd79af8fe1d57a02c661261bf203ce08958063ec8ba821 xorg-x11-server-Xorg-1.20.11-11.el9.x86_64.rpm 20da0d88f41ef7b6e7bb191b03fc8934a40652f190f49071afba9c66789ac777 xorg-x11-server-Xvfb-1.20.11-11.el9.x86_64.rpm 44de1961729f2d471e990643a072a56de17b01ccbfd606a1cb0212fd1b18564a RLSA-2022:8222 Moderate: xorg-x11-server-Xwayland security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for xorg-x11-server-Xwayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319) * xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-server-Xwayland-21.1.3-3.el9.x86_64.rpm 60132705c1fff9b7e772066b3c8a26d6a184b5010f979d325f21a3b42ab05290 RLBA-2022:8225 hyperv-daemons bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for hyperv-daemons. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms hyperv-daemons-0-0.40.20190303git.el9_1.1.x86_64.rpm 9ad347656af733f0c9d08193e6de68afe2f1c24128adff9fe1cfc78b21a25721 hyperv-daemons-license-0-0.40.20190303git.el9_1.1.noarch.rpm fa9059871f00dc113015c27e01e5388e9a52d1b097cd94109f4d4a4bbc886694 hypervfcopyd-0-0.40.20190303git.el9_1.1.x86_64.rpm 617d5a94fef2e4b902531feddeed690e976e40c53b42044290243a3dbfda1ca2 hypervkvpd-0-0.40.20190303git.el9_1.1.x86_64.rpm 8a55232a6b273932785b24fecb7d71713c578450117e564480c98318e426d17a hyperv-tools-0-0.40.20190303git.el9_1.1.noarch.rpm 0140116450ab5a94be5e1d93e8a9fd4694bc666bf0a2ac5c3c1f43eac4fd85c9 hypervvssd-0-0.40.20190303git.el9_1.1.x86_64.rpm 3efd684f075bee685a748ab5aee1f363a971517d20dc2d4135cde72c0b07cefe RLBA-2022:8227 rust-bootupd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-bootupd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bootupd-0.2.7-2.el9.x86_64.rpm 9a0e1470330f67e6a3a065626f9094dcf0727bc5e6d6498f4db6401041c22280 RLBA-2022:8228 virt-p2v bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-p2v. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virt-p2v-1.42.2-1.1.el9.x86_64.rpm 94d05e055f21891efb4b075a2839c8938ef316c456d708da8e39306dc3f0cec8 RLBA-2022:8229 mod_auth_mellon bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mod_auth_mellon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_auth_mellon-0.17.0-7.el9.x86_64.rpm a9fd4dde11407ef5867b6d98654736649367fe62d45d3ec71aab416f97efca6f RLBA-2022:8230 python-ldap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-ldap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-ldap-3.3.1-9.el9.x86_64.rpm ef62df4cbc90c0b91f31d6fdd84c43bacc46109bc5e5a7867d49c178be3ae58e RLBA-2022:8232 clevis bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for clevis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms clevis-18-106.el9.x86_64.rpm e58138c100a2b959897cc248f49ddd35dfc465c092f0d6d950acf64cf4be6a2a clevis-dracut-18-106.el9.x86_64.rpm d277cb71560fdb9d14b787b1837cdbf15190ec96b39083e3366cd578f86bfaaf clevis-luks-18-106.el9.x86_64.rpm 69c5b03a602fc4dd5bddcae71dcd982848efeb438c894122f2abe207aa0c89d5 clevis-systemd-18-106.el9.x86_64.rpm a75bac460450de46b7dbebec21fd0eca73b4160ede7baf868316d6873bd9adad clevis-udisks2-18-106.el9.x86_64.rpm 251831b42e94ac3d1e4679e9230493854302ead31e0bcf32b8868e6e638ed057 RLBA-2022:8236 fapolicyd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fapolicyd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fapolicyd-1.1.3-102.el9_1.7.x86_64.rpm cd924613bfa40361bd6fc83f191d0731e67b05452dfa0a8df8e70e889d5c8640 fapolicyd-selinux-1.1.3-102.el9_1.7.noarch.rpm 2aa1d2f4150492c7cebf8b4e832c5b6d4c5d019112591a5ce9754a6e0e2f3e7d RLEA-2022:8238 maven:3.8 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for apache-commons-io, atinject, jsr-305, maven-shared-utils, plexus-cipher, plexus-classworlds, guava, apache-commons-cli, plexus-containers, plexus-sec-dispatcher, httpcomponents-client, maven-resolver, apache-commons-lang3, plexus-interpolation, jakarta-annotations, sisu, httpcomponents-core, maven, cdi-api, google-guice, plexus-utils, maven-wagon, jansi, apache-commons-codec. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms__maven apache-commons-cli-1.5.0-4.module+el9.1.0+13170+43ecddfd.noarch.rpm 5f60c0f0885af2f6f950afcf45d7f1b95f5e34396261dd8ab6d7cfb442e04992 apache-commons-codec-1.15-7.module+el9.1.0+13170+43ecddfd.noarch.rpm 0220287810e4799917d4db36b17366650576949b14c8618a71dfb1a7682f5fa9 apache-commons-io-2.11.0-2.module+el9.1.0+13170+43ecddfd.noarch.rpm 93c68ec43f1b49c63479295890c398322ab939ab29ca7e14793be3e42b78dc58 apache-commons-lang3-3.12.0-7.module+el9.1.0+13170+43ecddfd.noarch.rpm 7a97cce8dfb4f34680befc4ed4ee791511f7c4809a53d7c74b6c34b1824d6f9d atinject-1.0.5-4.module+el9.1.0+13170+43ecddfd.noarch.rpm cd129e561144604ca32ec4bee7ea7aa4765f8ed2b3c36faf0e32cb1a1f5dcd49 cdi-api-2.0.2-6.module+el9.1.0+13170+43ecddfd.noarch.rpm 96dc9cd4356a07481cb5d88f756fd07ba7af7e8f36bc0d3abd8994f17dde304a google-guice-4.2.3-9.module+el9.1.0+13170+43ecddfd.noarch.rpm 85f6ee589dac7db7b3758a33e66d9c94d1724fc1ed3ff964f7d8d2b207141dba guava-31.0.1-4.module+el9.1.0+13170+43ecddfd.noarch.rpm 7053c8ec1dd10a61c90c4b7d7d61f077bab8b34805957c3db312f76553c1905e httpcomponents-client-4.5.13-5.module+el9.1.0+13170+43ecddfd.noarch.rpm 484bd383b25748ca4e080f457c6722bc4ed14cc96873ae54ab2d9eec52671e47 httpcomponents-core-4.4.13-7.module+el9.1.0+13170+43ecddfd.noarch.rpm dede20b7e3f22bf3717f8e50258bb8a3fd02b45f533970099ae70d1e90419dc0 jakarta-annotations-1.3.5-14.module+el9.1.0+13170+43ecddfd.noarch.rpm 5a30f1e02cb734a8377b4f3afd1becb24ecdce48c88b2738056880824dde2b5b jansi-2.4.0-6.module+el9.1.0+13170+43ecddfd.x86_64.rpm 5baf28a6b6225d36009e2411b8363856ea07e2e9dc78266991285c8ea48f19e7 jsr-305-3.0.2-6.module+el9.1.0+13170+43ecddfd.noarch.rpm 52ac49dedf9a4d4d34659161de396aaf24ebab5df8687728c7446ecd00eb189e maven-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm 1df931bcf111accb8fde1274956c1dadf7d44af54eb033df5982d587e56029f6 maven-lib-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm 29623a02dd4fa20b10cb5576b2fa742ffbd0ff98b9e0efce7a6c0abae6ea4aff maven-openjdk11-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm d036e0f520a266cf1a4073fd2daa0d87e2c35e8d6d2fe11559106afc9adef62f maven-openjdk17-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm 7b6af55330bbc4cba5e756870581ab86faac168eed97e186fbff68bc1346c496 maven-openjdk8-3.8.5-3.module+el9.1.0+13170+43ecddfd.noarch.rpm 25b69af66417f1e5fef95a64ad260b50cbd7c72cebfe049f66df215a587348b5 maven-resolver-1.7.3-5.module+el9.1.0+13170+43ecddfd.noarch.rpm 508ca00cd0867997130acefcce0fb3735dc2b7bf8670522630022218f070d947 maven-shared-utils-3.3.4-5.module+el9.1.0+13170+43ecddfd.noarch.rpm dcbbe98f91df73f36aa2644486cf31cea32885e4e2aef6ef6bb28fae76bf9dca maven-wagon-3.5.1-2.module+el9.1.0+13170+43ecddfd.noarch.rpm 5153d667906734b37ef6d8e212fcf7ffdd6ed1b9355e63711918b6819cb73a42 plexus-cipher-2.0-2.module+el9.1.0+13170+43ecddfd.noarch.rpm b11abf8c08095567df1496e4330aceb70a5163268b164bb28e254089db634957 plexus-classworlds-2.6.0-12.module+el9.1.0+13170+43ecddfd.noarch.rpm c6d49d6b64148f873197a3cc51a507afaf0239101e0124e4a15a531371c8795b plexus-containers-component-annotations-2.1.1-2.module+el9.1.0+13170+43ecddfd.noarch.rpm 0f3fb322eaba1f62aff06ec80bcaf501c28a2db6356cc8b6516149a0b2cc3bd7 plexus-interpolation-1.26-12.module+el9.1.0+13170+43ecddfd.noarch.rpm b820fc3d61f29e6dbca25c09dc2b656a5b12cec378d1ef3d408f474cc688328d plexus-sec-dispatcher-2.0-4.module+el9.1.0+13170+43ecddfd.noarch.rpm 72dd34d0de2d033e4ece01cb917333305955d537c452a4025aaae7a6ada50e68 plexus-utils-3.3.0-10.module+el9.1.0+13170+43ecddfd.noarch.rpm 1cd5464ba8e8aa341ee6e1dc441ccab6b0d9b8d75745f181ed91dafc9d39dd75 sisu-0.3.5-2.module+el9.1.0+13170+43ecddfd.noarch.rpm 3385b54dd2ce04419619aa06506209484c6e3aeeef9879593e1052e4428a1c87 RLBA-2022:2332 new packages: libuv Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libuv. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libuv-1.42.0-1.el9.i686.rpm 83559a7fc25392875981ad359bea9191ab1a57ee1b20326a21e960adb796aaa8 libuv-1.42.0-1.el9.x86_64.rpm f6410030faa3742c603bf6cb83a6c183af7f54931b7131899d27b84eba2a535d RLBA-2022:8239 sanlock bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sanlock. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-sanlock-3.8.4-4.el9.x86_64.rpm ae38bc1bbd31fe51b7ba7e1a80db2fb855c5c5700c6ee0d22f1eedd3d5a2e5fe sanlock-3.8.4-4.el9.x86_64.rpm 9b0ca1c638236ac6961e065db951d322d4b1d8fb3c5228232393aaa46480353e sanlock-lib-3.8.4-4.el9.i686.rpm 38a0134785f72c64785bff4356766e7fc9bbd3b66dc4c8a3c987747967965dbe sanlock-lib-3.8.4-4.el9.x86_64.rpm 1e471abe195b95065e12e268f67f373aa1b8822af93e3a1c17834a08b3a21ebb RLBA-2022:8241 oddjob bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for oddjob. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms oddjob-0.34.7-6.el9.x86_64.rpm 35ffb909d64d80a820904f8c7a75b949de40fa129a19f0906d2d1851f896a3a9 oddjob-mkhomedir-0.34.7-6.el9.x86_64.rpm e9030611829295ee108b80b4a564988ce58e2ac034ac1e7718ef82f52f638ca5 RLBA-2022:8242 cyrus-imapd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cyrus-imapd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cyrus-imapd-3.4.1-7.el9.x86_64.rpm b829eb431f81aa37245b13b5950504cf1a5b8c3a18e5099d3df46361c332bf18 cyrus-imapd-libs-3.4.1-7.el9.i686.rpm 225300109af48fca1a8628d7a1afc36af783c913a9b078e4f798649730f4ec96 cyrus-imapd-libs-3.4.1-7.el9.x86_64.rpm ab15ef771f9e0cbeebb1d24ec281f8e2ba946e1b25494dcb1e45f02bc5ea3851 cyrus-imapd-utils-3.4.1-7.el9.x86_64.rpm c4548108d8ebd50f5590118ed6f32e4f40aba5fe184e37bd406ad88a9ebe83c9 perl-Cyrus-3.4.1-7.el9.x86_64.rpm 6d059a1c4a2be5194c1dcbf35cfaeb10a6cad898b9a84cf1d5a870c0355b3a7e RLBA-2022:8244 postfix bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for postfix. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms postfix-3.5.9-19.el9.x86_64.rpm 6bd218d9106aef57f107855f817ae875519db76364c01aadde4aef80b22c9b4f postfix-cdb-3.5.9-19.el9.x86_64.rpm dfcc70fdf527193703e989a3afdb519e9ce035f4ffe5830c6a88ffc2f8962d20 postfix-ldap-3.5.9-19.el9.x86_64.rpm e60921e145ce1c01f69c46946ccd3c6c6073647df4587bf19d340ee62a1b0b8f postfix-mysql-3.5.9-19.el9.x86_64.rpm 02596c950777c16c311a104ecfd924c8d0b198e5e7a23c83b5bf5824634f39fa postfix-pcre-3.5.9-19.el9.x86_64.rpm a5faa2d06088bb997e9e8e17179f387b406330ae703766ec1b43bee21f1a9339 postfix-perl-scripts-3.5.9-19.el9.x86_64.rpm 6d90768263b252bec6168cd52955611e40d15ca4d0be492fc48fcc4ae98399d6 postfix-pgsql-3.5.9-19.el9.x86_64.rpm 518556705128c3a92afdde8f5c3630253304655f353971d8078fe431af2426cf postfix-sqlite-3.5.9-19.el9.x86_64.rpm 2a1320ae4ab3e1a1eb77db606c1169fffb2ba86cb93b0af06f1ac5d81c9f0888 RLBA-2022:8245 redhat-fonts bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for redhat-fonts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms redhat-display-fonts-4.0.3-1.el9.noarch.rpm 61aa9f5a9291c27b6ba9961c0966e69019b396dc7627f0e74478333fa3356a63 redhat-mono-fonts-4.0.3-1.el9.noarch.rpm 887119ab098677e9be1607c63ccc99a2630d507f97e883501f48c56e7a2aca80 redhat-text-fonts-4.0.3-1.el9.noarch.rpm 1b11415a8e7e42aa352258b914e0ef24d4c90a203126970b55b0f73010e28ef1 RLBA-2022:8246 rear bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rear. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rear-2.6-15.el9.x86_64.rpm 89cf013f320dede3c9b289033a5976ca6a596f5b9b0eeab2ca970d063a6d8c60 RLBA-2022:8248 xdp-tools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdp-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libxdp-1.2.6-1.el9.i686.rpm beb7c66717ac93db67e54e7d633606d9107b46fb1bcecd5d502068db3441a372 libxdp-1.2.6-1.el9.x86_64.rpm f71cd63363be4cb761b93786e0cc04e69bc828ff93c2a62a42ff038f9ed4adb9 xdp-tools-1.2.6-1.el9.x86_64.rpm 19ba61dfad9d6e56f9dab6e4e2d0756f5933e1c81a849513417158f99e779607 RLBA-2022:8247 slapi-nis bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for slapi-nis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms slapi-nis-0.60.0-2.el9.x86_64.rpm a532f162ca5ba258aa60b4216af198d7166d587d94631d5e0a3bc98294e2e54a RLSA-2022:8250 Moderate: grafana-pcp security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for grafana-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards. Security Fix(es): * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: io/fs: stack exhaustion in Glob (CVE-2022-30630) * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632) * golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635) * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms grafana-pcp-3.2.0-3.el9.x86_64.rpm 19ca12570537b8613096a4d64f92977eda66c3d9e9d2606c4e36a052d1955f53 RLBA-2022:8251 vulkan bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for shaderc, glslang, spirv-tools, vulkan-loader, vulkan-headers, vulkan-validation-layers, vulkan-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms glslang-11.9.0-3.el9.x86_64.rpm f7ecb5d314ef2fd7f0a8abc843504569029cb186e8ac4bc8c3312575401f5d5e glslc-2022.2-2.el9.x86_64.rpm db08a3be7df205ae7df359599a9610990447807f1c137d5bf0a2e34034297ee7 libshaderc-2022.2-2.el9.i686.rpm e91e1d8fce54ce7ea74c6812cd89e4123da7cbe79d1489d418a5c0af21b536ce libshaderc-2022.2-2.el9.x86_64.rpm 09092d63509dd6470f0483962952ddbbdc935f9b31ec2bc979b10d05e4899f4d spirv-tools-2022.2-3.el9.x86_64.rpm 3d3ef03de9922b424ec842c636f74507c574dc758f80b75b555febed8cac8873 spirv-tools-libs-2022.2-3.el9.i686.rpm 8856b444f1fac96b08a31eaa64d9dcaa150a2e2f104a03fd569575048ade1583 spirv-tools-libs-2022.2-3.el9.x86_64.rpm d612c378a9dae1745bb90f1380a4ed65ec8baa5b3fa556f3381f95dd93d70186 vulkan-headers-1.3.224.0-1.el9.noarch.rpm 0321defcee4c9eee209c2632f0a11b86318c7a39a4b99df98b6b77e7a356f74e vulkan-loader-1.3.224.0-2.el9.i686.rpm 184b803588c4ffd5e550936b7d9941f20f3924d4a9b91419d382ce777da872f9 vulkan-loader-1.3.224.0-2.el9.x86_64.rpm 56346c3837cc1785503fd644f2ffe318a65a8394b1e602281e46e7007eda2a24 vulkan-loader-devel-1.3.224.0-2.el9.i686.rpm e8eaaadad1878d0d83627dfa71095545700c2b626bd8b9fef69a686f53bf0c0a vulkan-loader-devel-1.3.224.0-2.el9.x86_64.rpm 0e9f444443b42bd2211c01bd760ee660b67b0f6575054040af153c8029e0859d vulkan-tools-1.3.224.0-1.el9.x86_64.rpm c329173443d3f915db9747e8053b1c048ad46be5e3a7dc3fbe220eb1b1b2b3de vulkan-validation-layers-1.3.224.0-1.el9.x86_64.rpm e02998f51dea7bc2ef836b6de8f31f240a15de5ff3833d73ad661b105ac85773 RLSA-2022:8252 Moderate: yajl security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for yajl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C, and a small validating JSON generator. Security Fix(es): * yajl: heap-based buffer overflow when handling large inputs due to an integer overflow (CVE-2022-24795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms yajl-2.1.0-21.el9.i686.rpm 586f257769f8fdaa8dc113a960fa9d4e4f6fdefd8b8464e48d9527d035b23661 yajl-2.1.0-21.el9.x86_64.rpm 98abfa321a3c820e0f4bc94b62a1f2eea9f1c9392593adfb0d947d92972ed0de RLBA-2022:8256 qatzip bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qatzip. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qatzip-1.0.9-1.el9.x86_64.rpm 1abf3eb09c7ecffb3faa71815faef5f73bacde7542ceef9f9f6f7105f6fb43e7 qatzip-libs-1.0.9-1.el9.x86_64.rpm a7c4cfbfe0794719a423cb8d123f163a43fd96bf32885d7a072f2e2814b9d733 RLBA-2022:8257 qatengine bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qatengine. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qatengine-0.6.15-2.el9.x86_64.rpm f7646fa5230220a0deafb19b09e2a2f79dc2971291531c07b740d4aec85b873f RLBA-2022:8258 qatlib bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qatlib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qatlib-22.07.0-1.el9.x86_64.rpm a9d8ca8f3f79b236220b564f1829aa638bd0fa45c43dfc0088410abf11ba41e0 RLBA-2022:8262 setroubleshoot bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for setroubleshoot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms setroubleshoot-3.3.28-4.el9.x86_64.rpm 6ad1c3a31f3fc7b6656b9bb8a2dfe4e60d42f9050d24ffb8698955e4283d1245 setroubleshoot-server-3.3.28-4.el9.x86_64.rpm aaf39fed8ad12feb3bbbee62a17f992dde7aa37692c9e5989aa086bc391b1ffe RLSA-2022:8263 Important: dpdk security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dpdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space. Security Fix(es): * dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs (CVE-2022-2132) * DPDK: out-of-bounds read/write in vhost_user_set_inflight_fd() may lead to crash (CVE-2021-3839) * dpdk: error recovery in mlx5 driver not handled properly, allowing for denial of service (CVE-2022-28199) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dpdk-21.11.2-1.el9_1.x86_64.rpm 284faae4b6d6e9c4c6e2fdde8cf55f4732a1f24999d619fe9c0ba76b22e530cc dpdk-devel-21.11.2-1.el9_1.x86_64.rpm ea5404855a7df4fd9fe04662d5b3ab9138b9d61110de5660ed836b3623d25a20 dpdk-doc-21.11.2-1.el9_1.noarch.rpm 1038ad9ebd5eb49b47bd3b94c68449f40858ee91129a50e87e734c86756aa17a dpdk-tools-21.11.2-1.el9_1.x86_64.rpm c746ae12cdbd162d7a965e232a0bd898e0d31582c9b3cf8f284563b497e0694a RLBA-2022:8265 NetworkManager bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for NetworkManager. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms NetworkManager-cloud-setup-1.40.0-1.el9.x86_64.rpm ff3907b501d448e73fbe819b4071ebe0d43b8feda0136e740142b7b9f5b475cb NetworkManager-config-connectivity-redhat-1.40.0-1.el9.noarch.rpm c07e7ff6e4063f8e3cc92f257ba9e9408b8d3b7f38e956a8c51767bde737c914 NetworkManager-dispatcher-routing-rules-1.40.0-1.el9.noarch.rpm 238a8dd3a90ef20179ce71ec7a079e27e4f8e12af91e9a036cde1afed4901264 NetworkManager-ovs-1.40.0-1.el9.x86_64.rpm 53e2032c81ad6b29223716edb24af69edfe08459ca8c1470c92b5bc2a26e4c8d NetworkManager-ppp-1.40.0-1.el9.x86_64.rpm 60bf2b15ecf0f4fa3aeece1197aee58fe036a865b8f21c435bb3c7010a3f21e1 RLBA-2022:8268 audit bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for audit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms audit-libs-devel-3.0.7-103.el9.i686.rpm 3d5d176759d2e720c5e85418d3d728d5ccf9248d39d1aa11d47015990b1fb6e3 audit-libs-devel-3.0.7-103.el9.x86_64.rpm e4d53cd4a6e3d2e0e6b6e6afea6e22df620553ab584610282f8631cfd2191e94 python3-audit-3.0.7-103.el9.x86_64.rpm 45107b96863c18ad3aa4f949850e861080d5047e135ea9b8e707d52f70da3ad0 RLBA-2022:8269 openldap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openldap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openldap-devel-2.6.2-3.el9.i686.rpm de2ed63c0b23f0bc42686991006ec4680ed52c8da60c97b93dc6c61522bebe44 openldap-devel-2.6.2-3.el9.x86_64.rpm a2e8275b9fb7a58330ccef915bc16dcde33df32274ef73d4fa6255aee0c4907c RLBA-2022:8272 glibc bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for glibc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms glibc-devel-2.34-40.el9_1.1.i686.rpm 809dcfd1bb41816d5633c66b90ac759cbb40cdb33cff1c52bb1b114b0956e55c glibc-devel-2.34-40.el9_1.1.x86_64.rpm 7e7b8ccf16deb632f4d20b56b0a6eda9704c6255b2c04386b9d4e65ad378fe7a glibc-doc-2.34-40.el9_1.1.noarch.rpm 1f147fbfd881a31bce8bca9620c16d73535f1a52f5055fe1c686f3fd76af8fab glibc-headers-2.34-40.el9_1.1.x86_64.rpm c4edb39982fbcd3975b254a378b452ea1d73b94f8db90b01027c749c749a9e17 glibc-locale-source-2.34-40.el9_1.1.x86_64.rpm 045c95d9ff47011ee0225aea5115ddbe42fea8c3bc129b9c0d3cb2fea1a7a7e3 glibc-utils-2.34-40.el9_1.1.x86_64.rpm be083837ee6d4762cde490f3b9cce8421f1f0d2d3d79611e7ec8df1a540d0d7a RLBA-2022:8274 elfutils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for elfutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms elfutils-debuginfod-0.187-5.el9.x86_64.rpm 74d191c310368c6fe50302fe0bfcaac1c21172dab8c979cf352596d517717473 elfutils-debuginfod-client-devel-0.187-5.el9.i686.rpm b6926325d67c577f837fe8dd4a1ce70337cf11b13e5044db87bcd1cb7943ae85 elfutils-debuginfod-client-devel-0.187-5.el9.x86_64.rpm 5e0d12356ad7ff76d32724b2a7f79147c8bd6254f3c79fc728a395d997466077 elfutils-devel-0.187-5.el9.i686.rpm 5ef294d3eaafe0ce99c9ca294e087774fbb283c91912c8a81337873d315cd1c9 elfutils-devel-0.187-5.el9.x86_64.rpm 239d1c34e57a44c3572a686bbad7d6924de96fed3f401cf911f14e1ddf0a9436 elfutils-libelf-devel-0.187-5.el9.i686.rpm ea9732151e5ff5319dcb7edd7f49d39aab079cb16acb2cc2979c0ef996a1ea76 elfutils-libelf-devel-0.187-5.el9.x86_64.rpm a4241c148695dd1b6b037c2ce2f52c42c56b0f8f7f8ad938033e4b8f21b5e535 RLBA-2022:8277 gcc bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cpp-11.3.1-2.1.el9.x86_64.rpm d148f36c0ec62cac2eadd8e7c7e9eb3f3b4e18bac06331813636ec7a23e63485 gcc-11.3.1-2.1.el9.x86_64.rpm cc2aee1abcbfdb6a07d5f8be22d51ac72737f2d34978e16bdef678556ef8591f gcc-c++-11.3.1-2.1.el9.x86_64.rpm e0c4545be404df2911ab67d53f9f416872939b18087f57900f7d3b08867ba741 gcc-gfortran-11.3.1-2.1.el9.x86_64.rpm 8616099b3e02f6f9a25251fc0a906925b9b53303234d3f9086f88d9103fac6b6 gcc-offload-nvptx-11.3.1-2.1.el9.x86_64.rpm c93805d13a0253b86e949d96cbe7053fea172c2f5a5ce84a32b5970229eab8b6 gcc-plugin-annobin-11.3.1-2.1.el9.x86_64.rpm bc733c636dfe9ea76d77f3c68a4825d4027a7a55f7c832131b040052de48c40b libasan-11.3.1-2.1.el9.i686.rpm 67aaf6255c372bd93f1f869cdf2dffb5b980a65bcef1ef41f7221a6ee4ad3de5 libasan-11.3.1-2.1.el9.x86_64.rpm 10d133bc154cff2b7660bca951a2623a34a8a4d788bf9f9c99804a42b1d50f17 libgccjit-11.3.1-2.1.el9.i686.rpm 7e0b6b973c102d471ed69483ba8a93a8072c32a00041b3aee3209e20ce0acc4d libgccjit-11.3.1-2.1.el9.x86_64.rpm 033a09ed2536a1f76e4b299ed58cae088bdd43b35b444396e91c3e14cde44e1c libgccjit-devel-11.3.1-2.1.el9.i686.rpm dc4d240174b37f79d385d43a61b695d74ab3857043daf8daef74dd4c58f69f8c libgccjit-devel-11.3.1-2.1.el9.x86_64.rpm 8c4a2badd481a9b5a3d2af3e43ab112a0c540f70afa8632f10f0a54dd4b2b08b libgomp-offload-nvptx-11.3.1-2.1.el9.x86_64.rpm 8896733a6612ac5f6dd22ad4a8b2d4037e914cab47c46be84a162ff7be9c8826 libitm-11.3.1-2.1.el9.i686.rpm 4117cac369a1b8a06e231989716d7a2e6ac445be8e6f0d08191ceb15d78e9280 libitm-11.3.1-2.1.el9.x86_64.rpm 4c65e4d646a9ff46734a48e8ca53e819d203980c06463fc284ebfd9c7babe412 libitm-devel-11.3.1-2.1.el9.i686.rpm 1e3e83ecfc6d83ad90a70ed455b35a7aa5240e358dcbf56ef799d1b4e9e22f8d libitm-devel-11.3.1-2.1.el9.x86_64.rpm b21c1d29b74273714f20b8f7a8276dfad00ecc5a327cf8bcbaf4c23e4b8f9d38 liblsan-11.3.1-2.1.el9.x86_64.rpm 8b483d41a8e9b9f162047324757196bd2097a5b0a60a8061939be79275b64745 libquadmath-devel-11.3.1-2.1.el9.i686.rpm 327b22ee75d68a24d2959afd4d00c9259c8ad357e42ad96057d669748e17630e libquadmath-devel-11.3.1-2.1.el9.x86_64.rpm a228c4afd6d39e97f06ff210cb6af62d535938a50438091cd341d1575866b48e libstdc++-devel-11.3.1-2.1.el9.i686.rpm 35c72f980003d33655e58ee46b73df5bfb0f3c96a0cbd44c298890f9dd0f0d9b libstdc++-devel-11.3.1-2.1.el9.x86_64.rpm d373150cea8b186773b5fb9bc4b2dff50540886e738b41de6c94421b605e097f libstdc++-docs-11.3.1-2.1.el9.x86_64.rpm 51a1504c746bcd4ecc7cc787473b10fb7cfb1e6415e4434b832d4043f9fd6ec9 libtsan-11.3.1-2.1.el9.x86_64.rpm 42f96813abb08d24ac8d9cd03fe5b07c10dbc5b4bf3892f670ce40d3ed2ece79 libubsan-11.3.1-2.1.el9.i686.rpm 0e6b04176d5d67d1c5b035b0edcb4db155bff95ff5f87acc24a4e666703451ea libubsan-11.3.1-2.1.el9.x86_64.rpm 3e4d5935c3488090ef608ae9e708fbb01511ba574818cf2bb52b50ad950e1927 RLBA-2022:8281 binutils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for binutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms binutils-devel-2.35.2-24.el9.i686.rpm a7387a1c59877888e2e1b0de2902c9757311abe7afbf4a9f60c26ab2cc262312 binutils-devel-2.35.2-24.el9.x86_64.rpm d90efc204c44d0af31838476d2c102a2fc85922d9219340d20ab8be1ee186b00 RLBA-2022:8283 selinux-policy bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for selinux-policy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms selinux-policy-devel-34.1.43-1.el9.noarch.rpm d6f125a446987ccf60dc6740d1d056d7517718e5aa12f56d801d53fa03b09055 RLBA-2022:8286 libnl3 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnl3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libnl3-devel-3.7.0-1.el9.i686.rpm da13f6502183d5d1cca4b9dbb497258cfb7d968522fc741af9c7159e233bd85c libnl3-devel-3.7.0-1.el9.x86_64.rpm 756dabb06311d203841c444259ef05eff3c638dc2a80d76f47b4c3eb53065046 RLBA-2023:2186 augeas bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for augeas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms augeas-1.13.0-3.el9.x86_64.rpm 878347c8f91aee2180839b458d957aff6378cfe6195c36fe286faaf27594d1a8 augeas-libs-1.13.0-3.el9.i686.rpm 64ebcddda882555442ef01802adc0678ec75cc1aee11d672b4ecfd81851681de augeas-libs-1.13.0-3.el9.x86_64.rpm 65de9c1aadae07e7f8b62436062b34a711583711f5f37b992bdc7d51eb79ae37 RLBA-2022:8290 expat bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for expat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms expat-devel-2.4.9-1.el9_1.1.i686.rpm d56de768135c8173e1a48fd540d0d95c0e6f222c8ace97b3065c3bca57c2f615 expat-devel-2.4.9-1.el9_1.1.x86_64.rpm 442a1d6ce6f18fe5e24d2816d8781dd54885432cf72a77f0ab3945a68117049b RLSA-2022:8291 Moderate: rsync security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for rsync. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Security Fix(es): * zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field (CVE-2022-37434) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rsync-daemon-3.2.3-18.el9.noarch.rpm 824879326e73ed8ae1ad7a69ccc236b5ff5456be5c333b86768178d347855027 RLBA-2022:8293 libsemanage bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsemanage. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-libsemanage-3.4-2.el9.x86_64.rpm 29463431665c6085ccf87b129aa5a0b4d03bd60fe8f77747348b16e10bc4ba80 RLBA-2022:8296 dnf-plugins-core bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dnf-plugins-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-dnf-plugin-modulesync-4.1.0-3.el9.noarch.rpm 047c5006fa0ade759287c62d632b72fb5cd8e92bbb1ed85c9f011e675e07ced6 RLBA-2022:8298 libsolv bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsolv. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-solv-0.7.22-1.el9.x86_64.rpm 29f8d1886f7925eb85c57d0ffb17d279f8cd5795e1ed8abe5a8b9cc839b88e87 RLSA-2022:8299 Low: curl security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for curl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: bad local IPv6 connection reuse (CVE-2022-27775) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libcurl-devel-7.76.1-19.el9_1.1.i686.rpm 7ad05dc436af09c7642094ec4ad4eb00e84f3473b51d0bba0f55dbd7d76d1d33 libcurl-devel-7.76.1-19.el9_1.1.x86_64.rpm aec15566a0f096caa322970eb819aceae4520f8feac9ed3ec46a649bc6d7ed00 RLBA-2022:8314 cockpit bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-packagekit-276.1-1.el9.noarch.rpm c79af451aee2593e9d528c03a05126e7e23a49e9888e592ffb5732925c65c577 cockpit-pcp-276.1-1.el9.x86_64.rpm d22671f5f54ebe215955076e0b7d3fb6a45e5c0a41ba6453aabb628e8019f856 cockpit-storaged-276.1-1.el9.noarch.rpm 213901645908a54a412c8a3c2f0d2c94ce1ff131761743a1e171af6aa915fdb8 RLBA-2022:8315 pam bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pam. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pam-devel-1.5.1-12.el9.i686.rpm 50dc7625f534c417f37880424958ab807afa732c723e58ed6f2ae45613644226 pam-devel-1.5.1-12.el9.x86_64.rpm 0083d0fbab70a97ab13129d62e368cb55a7e7e4aee30e1818ecb6c97138adaa0 pam-docs-1.5.1-12.el9.x86_64.rpm a4896059cb33cf4b864677a2fb9fda08f68c400be5e826ddfa0a93879697f4a0 RLBA-2022:8316 pcre2 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pcre2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pcre2-devel-10.40-2.el9.i686.rpm e58fba84050103a18b9e672529133e4b787d69ea4b51a093c81455ecdd069a1e pcre2-devel-10.40-2.el9.x86_64.rpm f9e112427b5b0d9798c920f5d4f6270656ba090477add6342b2e0e7b81be04c8 pcre2-utf16-10.40-2.el9.i686.rpm c1099697afc6439124ac7367f526467d1816580175278833363fa4b5a1810111 pcre2-utf16-10.40-2.el9.x86_64.rpm 4bcb1905ee28cf81c9c273435de89ca0bc61d673513602545a388728527011c2 pcre2-utf32-10.40-2.el9.i686.rpm 2820beee5519fcad7a391e7de154a1b0632f926d08744b4b363d9d057295fcd2 pcre2-utf32-10.40-2.el9.x86_64.rpm 908174188fe078b154cd985f63e6abcd7627335c596cefbe967231b48323b929 RLSA-2022:8317 Moderate: samba security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for samba. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. The following packages have been upgraded to a later upstream version: samba (4.16.4). (BZ#2077487) Security Fix(es): * samba: server memory information leak via SMB1 (CVE-2022-32742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms samba-client-4.16.4-101.el9.x86_64.rpm 269b2f991012b5fb98d7ec6790bfdd6333c7752da28de7c2c74ecbc31f55cc71 samba-krb5-printing-4.16.4-101.el9.x86_64.rpm 1b213b164924644c330236ea917bc1a38e454ff27736f19e8117a256f92b33a6 samba-vfs-iouring-4.16.4-101.el9.x86_64.rpm 16e17079edb7614b36eeaf3dc7a97cdb2927b416c8530e085c6105806668da6f samba-winbind-clients-4.16.4-101.el9.x86_64.rpm 89f7f7078de542c68c4f8e59fb8419a4ecb9f7f25b3aedb2989a45d8152853e5 samba-winbind-krb5-locator-4.16.4-101.el9.x86_64.rpm 89cb41e28112f137bd722450c38d6444fe6d3067fa86dd08af5e97f8eaf51969 samba-winexe-4.16.4-101.el9.x86_64.rpm ae286f5a98c6c83d849d64287501c959f03ef5f0bca494caca68efc380b554ad RLBA-2023:2390 varnish bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for varnish. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms varnish-6.6.2-3.el9.i686.rpm 751573ca6f0f38d546a3a5af1737a75fa0596ef36193c8db83ccc6db2074e2c1 varnish-6.6.2-3.el9.x86_64.rpm 99ea5fe35727445b627888597eaa461c8dbd67f56aafee27659a661d582987ab varnish-docs-6.6.2-3.el9.x86_64.rpm b69dff9c003b879416d8165a4d0985c7e28929991f67cff3f032508c440ae3d3 RLBA-2022:8321 tuned bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tuned. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tuned-gtk-2.19.0-1.el9.noarch.rpm 1c9ddb0f97692ca12aaaab8774e9a3bd2f9c2ece51a83e6af3877d7f40e6b420 tuned-profiles-atomic-2.19.0-1.el9.noarch.rpm 45f3a2076de14cde1076d567ea4c742bcdf4940c55b8aa94c3d00da687a9e541 tuned-profiles-mssql-2.19.0-1.el9.noarch.rpm ef81a0b00fce912b74d0acd6f89c62a2c8fb9a97d0a4e9cd6ebc1bc9547dfbee tuned-profiles-oracle-2.19.0-1.el9.noarch.rpm 1f2860569d3e452cae234fdd9daa3599c569eb80720d81ac205b2ccbd88f7bb7 tuned-profiles-postgresql-2.19.0-1.el9.noarch.rpm 5e72b3d9f2f34210e8b7daf0fbfc56e296db5b5bf8c2c9f73d3e14bb2838f192 tuned-profiles-spectrumscale-2.19.0-1.el9.noarch.rpm f43fa461844b121b04d606501c6fdad5ed4879298a246e840c7f129b97fa2d95 tuned-utils-2.19.0-1.el9.noarch.rpm 5e797cef9186c9d8cf23e4939d0c121155ee39573d91221ec4112be783e2dd99 RLBA-2022:8324 lksctp-tools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lksctp-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lksctp-tools-devel-1.0.19-2.el9.i686.rpm 1adaf0305856a05ba35c417687800b82104dbd135aee0e4907e71ddc528c98d8 lksctp-tools-devel-1.0.19-2.el9.x86_64.rpm bf2e756643f8a88569b72930c7a44ef9b1bd76826798d43bd77c11b772f2a6b7 lksctp-tools-doc-1.0.19-2.el9.x86_64.rpm b668730b3ef6fc60ff22801aa6e25e9e2c7813e3ad51109bfd987dd136cb2747 RLBA-2022:8325 sssd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sssd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sssd-idp-2.7.3-4.el9_1.3.x86_64.rpm eccbe135e9df9e1c11bb358bf5acec78bb2b12d26be98a1e013a3170e3efce1d RLBA-2022:8327 systemd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for systemd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms systemd-devel-250-12.el9_1.1.i686.rpm 921151c64773074869b8df7f17977e220c78b208d5b2148198755ec8cfd9f3fd systemd-devel-250-12.el9_1.1.x86_64.rpm 9561845b251615a5715cf19ae5ac180cf2f72cfd4b93e6472db40a1663802123 systemd-journal-remote-250-12.el9_1.1.x86_64.rpm f3d437b037773dcea88ddf212091b9a55471acb33169138759be996306050b81 RLBA-2022:8335 policycoreutils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for policycoreutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms policycoreutils-dbus-3.4-4.el9.noarch.rpm 6c622e89c42463a5f91ea15d64e6ea77da6f0ff1a652ab81c0d2653a00f9be33 policycoreutils-devel-3.4-4.el9.i686.rpm a0203511190d9d5b61d16272056f6dfbd679fcaf7ab45f2d26f2552ff7f58b48 policycoreutils-devel-3.4-4.el9.x86_64.rpm dabec59ce4c4279412b09f5d1b3ee6504c4fe5384e911b30e4f199b4c345fe85 policycoreutils-gui-3.4-4.el9.noarch.rpm 62180abb4a616c3372be379dbfa9872062d6dcc5a45123f7d0f564d7854b3d8e policycoreutils-python-utils-3.4-4.el9.noarch.rpm 49fe78cc3fc417c1858ffc7a368ca19a422f6188bc56c54b09ee5831a35a8bd4 policycoreutils-sandbox-3.4-4.el9.x86_64.rpm b7e170aea02be2850de6f0c709a3b174b289c6e8b827e84de8ac4cac13e944e4 python3-policycoreutils-3.4-4.el9.noarch.rpm 430e5acf1f2dcecf99a19b766468aa113735ed360afa705f2d67538012f1256d RLBA-2022:8336 libselinux bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libselinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libselinux-devel-3.4-3.el9.i686.rpm fd8175819491a9c460dbddfebfe1cf09d86c9a840e0d9a0c82dd9cd5a91e9a00 libselinux-devel-3.4-3.el9.x86_64.rpm 5bf91e732d37861a8069181e07e2c9c406f1a7d9c9f94f2817438ae5640bebd3 libselinux-ruby-3.4-3.el9.x86_64.rpm 90423ca8fdb79b4269929514febcbeb6ab67173754808603b15294a8bb74095e python3-libselinux-3.4-3.el9.x86_64.rpm 82504a744c65bb0497e22a97b5c5f82f61d6bfefcdd4e6d9e97810316a2357fc RLBA-2022:8337 libsepol bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsepol. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libsepol-devel-3.4-1.1.el9.i686.rpm 5f70ccee6c6ef01c4d30520cf151e2a140965e8eba80b8fe54e6769aafd238e2 libsepol-devel-3.4-1.1.el9.x86_64.rpm 310ec23e55c83373715a04f6d0d2772584ddda1328efd84f3c57941c37aae053 libsepol-utils-3.4-1.1.el9.x86_64.rpm 3d14da387d8ac4f4cc31cd21f3f78ede3b40835f58575ce4aa6635694951ecb6 RLSA-2022:8340 Moderate: freetype security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for freetype. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeType is a free, high-quality, portable font engine that can open and manage font files. FreeType loads, hints, and renders individual glyphs efficiently. Security Fix(es): * FreeType: Buffer overflow in sfnt_init_face (CVE-2022-27404) * FreeType: Segmentation violation via FNT_Size_Request (CVE-2022-27405) * Freetype: Segmentation violation via FT_Request_Size (CVE-2022-27406) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms freetype-devel-2.10.4-9.el9.i686.rpm b3234e2b8c4a10a81a68fd3dda3c03c8c2088b92467a34ff55a65532e94667d6 freetype-devel-2.10.4-9.el9.x86_64.rpm 7318ee2e07a945a3604463edcdeb61175819b00326d008084c8fd2ab04ef92ba RLEA-2022:8344 libnvme bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnvme. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libnvme-1.0-5.el9.x86_64.rpm d4cf64c80090cff21b408d28066ef47251b765f0cb7fee14ce7d7d0540cc442a RLBA-2022:8348 setools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for setools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms setools-4.4.0-5.el9.x86_64.rpm 213804d0de4b30e55c0df9709a8b453271b0a9c3a8490c89743ea5a51534a214 setools-console-analyses-4.4.0-5.el9.x86_64.rpm 318f503c1d342a9d36ae213bbd1b313098c362de31df0ce5f59ca178b07dfd28 setools-gui-4.4.0-5.el9.x86_64.rpm ef8bee7b3a66ed8ec446519c04714f2731c9301bc1f239b430d3907edb4df0d2 RLBA-2022:8349 iptables bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iptables. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms iptables-devel-1.8.8-4.el9.i686.rpm 9c67a1c58563c3f2bbc918c03d709800efc48de8714061ce10c842072e50323a iptables-devel-1.8.8-4.el9.x86_64.rpm 788a79d8144d5225e8d4e22d512563b1381096bf3f0f8bc0ac43585f6b923684 iptables-nft-services-1.8.8-4.el9.noarch.rpm 740e2ff608d71b50f74a875dcd843bb1391b325e5a344d3a8115d9bff50cb33e RLSA-2022:8353 Moderate: python3.9 security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. The following packages have been upgraded to a later upstream version: python3.9 (3.9.14). (BZ#2128249) Security Fix(es): * python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107) * python: open redirection vulnerability in lib/http/server.py may lead to information disclosure (CVE-2021-28861) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-devel-3.9.14-1.el9_1.1.i686.rpm 48fd68110090a368bf2f23454cd5fb4227ddd7e312101d3415b2868257198b9d python3-devel-3.9.14-1.el9_1.1.x86_64.rpm beabc37d468844e408deb670ef0497adc44d7a14060b9f41beb213445fbfcdff python3-tkinter-3.9.14-1.el9_1.1.x86_64.rpm b952c1061c4c06a74066ee00a44b763a940fffc7f5a7b373d45363581345b5de python-unversioned-command-3.9.14-1.el9_1.1.noarch.rpm 6f7e039a812180a993547ce15afb3e327d06a856110cc19a815484bad0dc3279 RLBA-2022:8357 ndctl bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ndctl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms daxctl-71.1-7.el9.x86_64.rpm 39586bf871b5140109b1b60372858c558219240326a90a0014a40608e7487b96 daxctl-devel-71.1-7.el9.i686.rpm 64270d6abdcd45e6f8ab690bfc974267429440fc247b01d19b06b48566ff8721 daxctl-devel-71.1-7.el9.x86_64.rpm 2146c616a30188ebffa7592aef6e850adb0fa3ec061e46e71d137c60c75d01d7 ndctl-devel-71.1-7.el9.i686.rpm 06f743d9ffde417ae32134382c94c498f10aaaa285e4b1125115463529b196a5 ndctl-devel-71.1-7.el9.x86_64.rpm 32e49ebc9a46c37cf793e8067bc133205c1cc82909b213b89e325834adb08e05 RLBA-2022:8358 lvm2 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lvm2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lvm2-dbusd-2.03.16-3.el9.noarch.rpm 3e98db639ebc15c012fbed761a3b270a3d3a4fb47fc8d9e4e15a45dff9db27aa lvm2-lockd-2.03.16-3.el9.x86_64.rpm 23b3dbe8343622f5ed9a9ee9526293de542e763f7a70261039c89b1a717635d3 RLSA-2022:8361 Moderate: e2fsprogs security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for e2fsprogs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The e2fsprogs packages provide a number of utilities for creating, checking, modifying, and correcting the ext2, ext3, and ext4 file systems. Security Fix(es): * e2fsprogs: out-of-bounds read/write via crafted filesystem (CVE-2022-1304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms e2fsprogs-devel-1.46.5-3.el9.i686.rpm 07388b83d035f28482d7cefa81db9f31802277232ee69d1cc0b4df46fc7b37f1 e2fsprogs-devel-1.46.5-3.el9.x86_64.rpm 3aa34006224cc6715de275def35c6029b5c9a6ffc1f60bb4ef509edc73842be8 libcom_err-devel-1.46.5-3.el9.i686.rpm fe2f160e6762d3c7bf8049d188bf2f3b6870f34a9824351ff04f325601da993c libcom_err-devel-1.46.5-3.el9.x86_64.rpm 51a17ac00ef7784ab84df2d685ea05ebb759697ee231ceddecd3f77cc1258056 RLBA-2023:2402 maven bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for plexus-interpolation, httpcomponents-core, maven-wagon, maven, google-guice, jsoup, jansi, apache-commons-io, apache-commons-lang3, maven-shared-utils, plexus-utils, plexus-classworlds, jakarta-annotations, httpcomponents-client, apache-commons-codec, plexus-cipher, atinject, javapackages-tools, maven-resolver, plexus-containers, jsr-305, cdi-api, apache-commons-cli, slf4j, guava, plexus-sec-dispatcher, sisu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms apache-commons-cli-1.4-17.el9.noarch.rpm 0256cd4929509de69b612a2a198b286106f234ff9bccc20fc9536e896019b297 apache-commons-codec-1.15-7.el9.noarch.rpm c8d353deaaab985d4e54a5ea6fcf91eead1dfecf27fa3c315fc449e846afe7e4 apache-commons-io-2.8.0-8.el9.noarch.rpm 0ff32544fd571e05db2fa7d66490f8f72545a22f6c6ecac04bcca3c01e348f46 apache-commons-lang3-3.12.0-6.el9.noarch.rpm c85e547c1de396d0bcccb97ad289a21ab3f82ae794c0df65f234f681cb06cb8b atinject-1.0.3-6.el9.noarch.rpm 28fdd8eef912fb2cdb8f6be65271904d3242e89092280352a85d9290aadd0035 cdi-api-2.0.2-6.el9.noarch.rpm 18165f017a3a4eff6831b6eb9d031bde1f35e6dc4a4b744c8024999e1bebece9 google-guice-4.2.3-9.el9.noarch.rpm 148074c471a1bc938eeada2dae6f84642971fcc9fe1e55b8b25f7b180f2cb0a3 guava-30.1-6.el9.noarch.rpm faf48d962bcd88e632899ddfcd99f0430136c2fa0f6fe9bd3f9f88182683a830 httpcomponents-client-4.5.13-3.el9.noarch.rpm 71fd80f9de11e828a1471a40140c90133f81e062ce74ec2fc12803fab297707e httpcomponents-core-4.4.13-7.el9.noarch.rpm 5c7fa4374d88b03ac66ccc9b8e8e28c824637390e47ee1bb43f66d0c7a2fc7c6 jakarta-annotations-1.3.5-13.el9.noarch.rpm 441505298839dec09e5866d37fd02c70935990102e9970ad583db159492eae7f jansi-2.3.3-6.el9.x86_64.rpm a78de66c7209680061436c34b5a7135b02f9eb343d583f73625b25ff2444cf30 javapackages-filesystem-6.0.0-4.el9.noarch.rpm a1a1fae59af48ce72d029f342bf2021d2c84f5c3b13f95e5118952134cbd32c7 javapackages-tools-6.0.0-4.el9.noarch.rpm 6bce582734079cb02963b39d547736b6546c7125906459abd591c01a76971b32 jcl-over-slf4j-1.7.30-13.el9.noarch.rpm 8ab3b83a0fede6d0a6c7bfd8139f62c33f668e976eec42affc83e81d13dac966 jsoup-1.13.1-10.el9.noarch.rpm c8bd1377015450ae65bd8b875ef87e0b29a026347cdcbc7621d54415e89c0f81 jsr-305-3.0.2-6.el9.noarch.rpm 1546f4a64091b52e4c521a862813ad28700d141e50a30302c34147c3889e9905 maven-3.6.3-15.el9.noarch.rpm ab7dd6668c353233ff479c2e7276f14a59913208ef012d76f4bd045748a97e24 maven-lib-3.6.3-15.el9.noarch.rpm 61f07bd619548b4378e96b3095014e592979b6f1b7a0fd8598ec102d43429d31 maven-openjdk11-3.6.3-15.el9.noarch.rpm 44f618c6eb344a66cbd768127f9c0fff14363379569737b8ffcc79821248cd9c maven-openjdk17-3.6.3-15.el9.noarch.rpm b3ac1f6d7c43cc2264ff82da6ac227322bcda819cdfc4d0547fb7a4d841b35e8 maven-openjdk8-3.6.3-15.el9.noarch.rpm 39b19c699df73b947f89903e032c34f7472c9ca59a4d81d7e2c8ee170d1fa7da maven-resolver-1.6.1-10.el9.noarch.rpm dfd77cf0c0ff35b49c5ea6a8a408ff59d83f8e4e135d9194f5db890c2300af44 maven-shared-utils-3.3.4-3.el9.noarch.rpm 24a55717a2fc384bcf1e692c88a3c1efd2dcc0eb56fd360637a17641f3095273 maven-wagon-3.4.2-7.el9.noarch.rpm 71f7ecc1e7e182d65d7f3e2dc0842c1f5f554c8aff8e9129ecd5bdac63b55f9a plexus-cipher-1.7-27.el9.noarch.rpm 4d006a3e01f59db51154475df079fb6e0709c78ace9f80e0f93a0fa9399d8380 plexus-classworlds-2.6.0-11.el9.noarch.rpm d96083367fea8b1d9815b5b17cdb08ca8d726f4f0c5477e1e2ad04ce902abf16 plexus-containers-component-annotations-2.1.0-10.el9.noarch.rpm fd965bbec2f095b6cb953767a123a37e6de79064d20c652b68604649d47b3622 plexus-interpolation-1.26-11.el9.noarch.rpm 94d70b0d15c62b94f8fb5e16f4ee97a39576312800161d90cc7f47eadc0a3985 plexus-sec-dispatcher-1.4-37.el9.noarch.rpm 77895175d3d631b568859f15a9b048f0de7942af0204622ed14c1b26f20b2014 plexus-utils-3.3.0-10.el9.noarch.rpm 9662f2350e069e100f6930d8941e2cee21155ed7c6ae354135e26dc8cfdb3674 sisu-0.3.4-10.el9.noarch.rpm 5b6197bbcaa82c35da6445a83bc50896a9bc0a84619362a6c30ef40487ed9291 slf4j-1.7.30-13.el9.noarch.rpm d6612b852596eb13dffec2111f299481742f302a0df2d5b177f4c1a791b810db slf4j-jdk14-1.7.30-13.el9.noarch.rpm 3634c3d5b2b9b91f4bb1c781b50eafc9e9f7a3b4f5b0cdb177b9bb5d0658e67b RLBA-2022:8367 iscsi-initiator-utils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iscsi-initiator-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-iscsi-initiator-utils-6.2.1.4-3.git2a8f9d8.el9.x86_64.rpm b83bdee93bb55251aae331c4de72992904343d8a7b09bf1a82f5101ef4fb3c7e RLBA-2022:8375 openssh bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openssh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openssh-askpass-8.7p1-24.el9_1.x86_64.rpm c9ee7509274f9bf535ba0d0d31a437976e974e41f1c88d70c4cbecd79d4ff44f pam_ssh_agent_auth-0.10.4-5.24.el9_1.x86_64.rpm a99122dc4f324bc279cfc5b8e463a89a4ab7f46346fbed6401faf1e73de3a03f RLBA-2022:8376 nfs-utils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nfs-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nfs-utils-coreos-2.5.4-15.el9.x86_64.rpm f936cd0c52c81f3d06cb803767c1619745c775feee6cd95bac46d2f948814350 nfsv4-client-utils-2.5.4-15.el9.x86_64.rpm 3055d3fabad65a7c4e3d48692a0b93169110b66772c46e052c5177e31de03548 RLBA-2022:8377 libarchive bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libarchive. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bsdtar-3.5.3-3.el9.x86_64.rpm 4ded2e97cd2c07212049de76e085f931f103f82a8abefe3e7daf7f74e9557ec7 RLBA-2022:8379 dracut bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dracut. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dracut-caps-057-13.git20220816.el9.x86_64.rpm d896ca63bb9c171ee48d99bd2829d043df4f474c41201f3060b434b9347ef739 dracut-live-057-13.git20220816.el9.x86_64.rpm ca6c6d538de824614165db28e1b9c34368079dcb77b536b94f305d01b30a6126 RLBA-2022:8382 lshw bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lshw. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lshw-gui-B.02.19.2-9.el9.x86_64.rpm 438d5338c05ab109a7280ae817e5e586c74e8ccd178b24052031e52c3e13d9b2 RLBA-2022:8383 cups bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cups. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cups-2.3.3op2-16.el9.x86_64.rpm dba44af2e13b0ec0a5bd68a9eed4a6bcbefce317fe13d7864917d8bc91977276 cups-client-2.3.3op2-16.el9.x86_64.rpm 5ccd0545ab3ea672bcb2f408d396edfc062d7dd8e6974b0900e0299affa243d0 cups-devel-2.3.3op2-16.el9.i686.rpm f690fe106819a8f0c8cc1f3c5f8abfc534994a636249ce673fa56a47a6307b3f cups-devel-2.3.3op2-16.el9.x86_64.rpm 19cddbe902b265394e1b5dbfddd2dbfaf24e482f482918789ab370eb355d0b1b cups-filesystem-2.3.3op2-16.el9.noarch.rpm d7c395d05098b6949e66ca22cc1ba8e4799f3ca2b56a9c35e0853ff94b4c0064 cups-ipptool-2.3.3op2-16.el9.x86_64.rpm 6353be85cb23f0ac73e50f00c7aafb2dafac5e396ac560dbb24ad19d04fa4014 cups-lpd-2.3.3op2-16.el9.x86_64.rpm 6f942d8b03112fd536bc834c3c73bc284771d7043b31aa15de19bc3779d514b4 cups-printerapp-2.3.3op2-16.el9.x86_64.rpm 520f2d1cc64591bd57273ed9cdbf7d32c5f8b53c566ab59653854d65d7ddc2aa RLSA-2022:8384 Moderate: harfbuzz security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for harfbuzz. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list HarfBuzz is an implementation of the OpenType Layout engine. Security Fix(es): * harfbuzz: integer overflow in the component hb-ot-shape-fallback.cc (CVE-2022-33068) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms harfbuzz-devel-2.7.4-8.el9.i686.rpm c5f1ec66bd9b88f450e60402ab5e0f69b7b5b5ea3656caf2c104f59ec1b49a66 harfbuzz-devel-2.7.4-8.el9.x86_64.rpm 10d199f02e1d51b7b9cd73b54101f5481a245703fabaae9a8b3b2c255477983c harfbuzz-icu-2.7.4-8.el9.i686.rpm 10aef92b251b1257110d8f5f2d394c61b1a6b7b8bc31feb543c6526e18c9f41a harfbuzz-icu-2.7.4-8.el9.x86_64.rpm e169468fddfbeae31d8bec6b50514a13b3cac0b98185f006a385e5fa501a4ba1 RLBA-2022:8388 bluez bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bluez. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bluez-cups-5.64-2.el9.x86_64.rpm 8a8e71c10ae2f0c541e9ee8a52ea0f1143c1dd6211594aa7019bf412cabfcb73 bluez-obexd-5.64-2.el9.x86_64.rpm e18742504f5ce0356eddd3261328686ae389c9d2be991ee60f0b740fc14362fd RLBA-2022:8389 firewalld bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for firewalld. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms firewall-applet-1.1.1-3.el9.noarch.rpm 132cfd331c126e6c7f57780ddf807fbce3818c83aa80400a7b7a68ccc3ced384 firewall-config-1.1.1-3.el9.noarch.rpm 513101f93d671366a0bf846ec3dd60e79c01443b9e0dbd2d064294f7b58b4e37 RLSA-2023:0946 Important: openssl security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for openssl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286) * openssl: read buffer overflow in X.509 certificate verification (CVE-2022-4203) * openssl: timing attack in RSA Decryption implementation (CVE-2022-4304) * openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450) * openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215) * openssl: invalid pointer dereference in d2i_PKCS7 functions (CVE-2023-0216) * openssl: NULL dereference validating DSA public key (CVE-2023-0217) * openssl: NULL dereference during PKCS7 data verification (CVE-2023-0401) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * HMAC generation should reject key lengths < 112 bits or provide an indicator in FIPS mode (BZ#2144000) * In FIPS mode, openssl should set a minimum length for passwords in PBKDF2 (BZ#2144003) * stunnel consumes high amount of memory when pestered with TCP connections without a TLS handshake (BZ#2144008) * In FIPS mode, openssl should reject SHAKE as digest for RSA-OAEP or provide an indicator (BZ#2144010) * In FIPS mode, openssl should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator (BZ#2144012) * In FIPS mode, openssl should reject RSA signatures with X9.31 padding, or provide an indicator (BZ#2144015) * In FIPS mode, openssl should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16 (BZ#2144017) * In FIPS mode, openssl should reject KDF input and output key lengths < 112 bits or provide an indicator (BZ#2144019) * In FIPS mode, openssl should reject RSA keys < 2048 bits when using EVP_PKEY_decapsulate, or provide an indicator (BZ#2145170) * Rocky Linux9.1 Nightly[0912] - error:03000093:digital envelope routines::command not supported when git clone is run with configured ibmca engine backed by libica.so.4 (OpenSSL 3.0) (BZ#2149010) * OpenSSL FIPS checksum code needs update (BZ#2158412) rocky-linux-9-x86-64-appstream-rpms openssl-devel-3.0.1-47.el9_1.i686.rpm 17bc0d5769df372510d9c14c3e2e99a81d242d8416cd359b707adc0774747a5f openssl-devel-3.0.1-47.el9_1.x86_64.rpm aeeff49fd81a7185b664c2001a1462ecefc6f077afe2892fda7ef2b205ae4191 openssl-perl-3.0.1-47.el9_1.x86_64.rpm 9af60eb73db63e790f746b7a8d29ee7c52ab0cf9b834df07c2a4477b2d8451bd RLEA-2022:8391 RDMA stack bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ucx, rdma-core, mstflint, libvma, libpsm2, fabtests, opa-fm, opa-ff, eth-tools, libfabric. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms eth-tools-basic-11.3.0.0-1.el9.x86_64.rpm e8fca5f6410b3cc8baed2f67126cb46c3f87f92e075fb8aa92d4d1a98b2b964b eth-tools-fastfabric-11.3.0.0-1.el9.x86_64.rpm 15a4716dfe7ebb61e8092c1cb92806bd3979d9477c308575804fffef38cfefee fabtests-1.15.1-1.el9.x86_64.rpm 1ce75ca3934c9eabaf501f1463f6eb500ab196152cf93d9cc26e90c3eaed3994 ibacm-41.0-3.el9.i686.rpm 90aac98e505537b1987a974afacb3f46678850293ddce51c091c32b5b2a758df infiniband-diags-41.0-3.el9.i686.rpm d0d4cd2b10e1e7f557861d9a123543a9656a8bf3b619ee388b76328a05f9e9c1 infiniband-diags-41.0-3.el9.x86_64.rpm b62e80e9e0e1e7718fdadcffaca96a26e752235a9a205e91aa14eaae9c608c96 libfabric-1.15.1-1.el9.i686.rpm e682db4fd862722330a4c9648d677d0a52998a5779bb9fdd92f35ca0ae5128e7 libfabric-1.15.1-1.el9.x86_64.rpm 95bcb9bdec56e40eab42bb41dcd7208a6f67def03f76d4475abb55293fdd5e87 libpsm2-11.2.229-2.el9.x86_64.rpm d7ba242dc79688fd5a9e02dfdea06c572d443fc5cb01b47e25bb0a02fdc94d4b libvma-9.6.4-1.el9.x86_64.rpm 2cbfed023436d40c56456d5874bbfc98019d5bd8acaa9a63521b501d9946bead libvma-utils-9.6.4-1.el9.x86_64.rpm 13e5b68493f9016c100305958bc1dddb204e7dd855d029705f5ce2a89696be1b mstflint-4.21.0-1.el9.x86_64.rpm eb584401fae30c96206656897be0123f26f98302c4fdc95cf71f6107873f5740 opa-address-resolution-10.11.1.3.1-1.el9.x86_64.rpm dd375db5b04de49b93593331e777fd594604130d1462e80f4b682e2d1821e107 opa-basic-tools-10.11.1.3.1-1.el9.x86_64.rpm 5904ecbe2bdf0783bda5193dfdda0e916f90b5e7244933fd72b4ffa05b02f2d4 opa-fastfabric-10.11.1.3.1-1.el9.x86_64.rpm 5e4f2ce19be5e6a8b6623c730abb332f8209bb3074e6610242c7ea8c663910e4 opa-fm-10.11.1.3.1-1.el9.x86_64.rpm ded9de152502d7ea969ed3a15f0919dc8c5a9c44c80f22041cbbbf2278a25a62 opa-libopamgt-10.11.1.3.1-1.el9.x86_64.rpm 345f3052cf46e449e31309e7180ce19ff55dd06e13315239971375876145de11 python3-pyverbs-41.0-3.el9.x86_64.rpm f07cecfa45bef993bae2d065bc79ed2d7bb8d015cdc3d497dad081806dff80ee rdma-core-devel-41.0-3.el9.i686.rpm 9059e3159391e594ceaad159dd3643e71309863a86d097b3889c32333292d93d rdma-core-devel-41.0-3.el9.x86_64.rpm 3cd681cdc42164f5672e330f421d38ba49dd5e8ca4bd28290e579e7d4201a3da ucx-1.13.0-1.el9.x86_64.rpm 68047a26615ebfe4776385591b1452f8dc9a3bb2ec5f3bc0d397bfc5d190cab7 ucx-cma-1.13.0-1.el9.x86_64.rpm 7d8aada8d71e77c77222ac71824c4681af905e00f4a2702e0155a696dcdbab4b ucx-devel-1.13.0-1.el9.x86_64.rpm 8520df00d8d8544565c82273ce686406a48185d9645614864fce13afdeb487ec ucx-ib-1.13.0-1.el9.x86_64.rpm 597c4f9d048c113de5202dd2b6503d2e0b3a7fa3c9661a63127b4b56be040fea ucx-rdmacm-1.13.0-1.el9.x86_64.rpm a3aadb00dc8dbc7504178005e9f3c1912637c02f87d1f732a771a7d86cb297d4 RLBA-2022:8395 fwupd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fwupd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fwupd-plugin-flashrom-1.7.9-1.el9.x86_64.rpm e6ed42e7c4f6f4a7689346ad5973c64ac82b538c8177ec166c785ea5d2750b38 RLBA-2022:8404 util-linux bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for util-linux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libblkid-devel-2.37.4-9.el9.i686.rpm 316bf890297cbf97bb697eb2da35a687807ed48b277e7139f58597efc6102967 libblkid-devel-2.37.4-9.el9.x86_64.rpm 35441be62b604902e2b7318c28dc44d74695d9d3d710518e61fb2384c84ba4fe libmount-devel-2.37.4-9.el9.i686.rpm efc3eb9367ca28d9f11e0c5acb33b4862352bfdbf4de591e8cd1c2d3440b5ba8 libmount-devel-2.37.4-9.el9.x86_64.rpm 04f56834c1cbae3d13a9ac7bc9ff54d256ba1d782d98a58e32420f39e2007034 libuuid-devel-2.37.4-9.el9.i686.rpm bf1123b3cbbb9aa9d1df986f82e0580e6ff671cf9b08b4e01310b73e515b35f9 libuuid-devel-2.37.4-9.el9.x86_64.rpm 62d22b5a35d072dcfa99537d82490467a99acd3407edba9ae026c89726ad9da2 python3-libmount-2.37.4-9.el9.x86_64.rpm 1452fb7e7b70309dab9807d7fdbf2b27a332f1b52b91717515ebd6f615a1aaac uuidd-2.37.4-9.el9.x86_64.rpm 5817fbcd78f0bbe3f77009c6242381ab055d3db925e088bda90e630c2c361c44 RLBA-2023:2635 .NET 7.0 bugfix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet7.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.105 and Runtime 7.0.5 [rhel-9.2.0.z] (BZ#2183591) rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-7.0-7.0.5-2.el9_2.x86_64.rpm ff1c2ed8baddce700a04e5aea4608c698ed231bcf73e690331cb7805bf6419a8 aspnetcore-targeting-pack-7.0-7.0.5-2.el9_2.x86_64.rpm 1660272c4be02801af8ccd5e482dc89fd00942b8d55354ece7e49bf105a2b6e6 dotnet-apphost-pack-7.0-7.0.5-2.el9_2.x86_64.rpm 64177ee30383313ea4ca14f1b651303e6e2b5ed444d8dcefb4073eab9d958873 dotnet-host-7.0.5-2.el9_2.x86_64.rpm 09f13802f53f392da1cbea34456dea2db4a5b86130387b2ca86a4371ba5a86ff dotnet-hostfxr-7.0-7.0.5-2.el9_2.x86_64.rpm ba147b5b08a201f1488b3cda4a994182ecff09d10fa53085dcb486a14974617d dotnet-runtime-7.0-7.0.5-2.el9_2.x86_64.rpm cc046fb06747c4941f8f6b97b8708c676d7b05c6e5cb5352c3ceac2a75fbdb26 dotnet-sdk-7.0-7.0.105-2.el9_2.x86_64.rpm ad32e9f6eb2ba9b2e80b484d649a91c4c1e6d60e12abc61584569aa4b6051502 dotnet-targeting-pack-7.0-7.0.5-2.el9_2.x86_64.rpm 6085d01ea41a9f5fc06b403562109d68c264a6606fd8181704236b11aaeff009 dotnet-templates-7.0-7.0.105-2.el9_2.x86_64.rpm 380fb51156678e89fead07a639bbdf7b62eb8e61c57c223ab26bb92d17898c51 netstandard-targeting-pack-2.1-7.0.105-2.el9_2.x86_64.rpm e0be21428a7f4224db6068d129cdae949d828bc55e4ad520a5247eb9d4b1b9f7 RLBA-2022:8406 file bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for file. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-file-magic-5.39-10.el9.noarch.rpm eafbe173068a90394c9fe7b2d3b21b6a156c9ac4d11de3b49cd289a579b14a24 RLBA-2022:8423 inkscape:flatpak bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for enchant2, cairomm, gc, libwpd, gsl, python-lxml, boost, potrace, python-appdirs, poppler, inkscape, python-scour, librevenge, libwpg, lapack, gspell, libsigc++20, poppler-data, double-conversion, gtkmm30, openblas, pangomm, atkmm, glibmm24, numpy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms atkmm-2.28.2-2.el9.x86_64.rpm 996adf691e2f558ee1915a6a801bbb8aa13192da905e3799f2489caa00de73a9 blas-3.9.0-8.el9.x86_64.rpm 851f8672e184a9559b9eac883f9d313effc98b229b5c6998f08fb95af576ebbd boost-1.75.0-8.el9.x86_64.rpm 2b89487c09db0b35a7362567ce0ff1d5201c2506cd4bfa6566c6920d7e544d3f boost-atomic-1.75.0-8.el9.x86_64.rpm 52f6c732819ebf1d53883ad641d508277547b25da358551ec816cc82114b4409 boost-chrono-1.75.0-8.el9.x86_64.rpm 784bb368e9c791972907a8c607ae01bcb36c1c84c5afc243bb5329bb67b1e75f boost-container-1.75.0-8.el9.x86_64.rpm f86c65db24dcf198694a7a99c16ac64e727806ac1421a452c3557e5dfc65142b boost-context-1.75.0-8.el9.x86_64.rpm 5690e1e27778a78e6dc3333589a18665292a6d124af89961c79b4e95e41e8a6a boost-contract-1.75.0-8.el9.x86_64.rpm 7639b3e54afb9b4f245ccfc478eaab944ba9d636d417673516571b69cce74434 boost-coroutine-1.75.0-8.el9.x86_64.rpm 1c969e24534ab25683dd4b0da6d25c59e533fa7991662358818b593252954d75 boost-date-time-1.75.0-8.el9.x86_64.rpm d2690b53b36c6b20d446ec415a316f91b5bd84341041bfb2b35500d5ed46bc98 boost-devel-1.75.0-8.el9.x86_64.rpm 445ecc85b49b9558aadb335d4ea78e2cd75dede7309e777ab05396d9fe6c56cd boost-fiber-1.75.0-8.el9.x86_64.rpm c09d9b1ad94a8b5e49595c62db6ed09b624573e2028ce1501e1250da1d66b369 boost-filesystem-1.75.0-8.el9.x86_64.rpm 9c1f68c454e382215bc975715e64a3a052a1ccd504b657ded0854516e605009d boost-graph-1.75.0-8.el9.x86_64.rpm 0f6030fc7c7b7da4e743cabc1b056713fae24421d4692064f4e9b2e979a2d6c5 boost-iostreams-1.75.0-8.el9.x86_64.rpm fafc9e5eaf848b17fa018b0334edd2d8669f3b8ba95d3da7a000db4fcedea585 boost-json-1.75.0-8.el9.x86_64.rpm 4c92f0b910932f0416f8e37c16753b9cfb52e1ffc79e00c2883f2fb7dd63810f boost-locale-1.75.0-8.el9.x86_64.rpm 675fab2cef3901472d42b5fb0b2f93879a07eca1e40058728f87ab40878a2be3 boost-log-1.75.0-8.el9.x86_64.rpm 1fa22ae6a28b47b77f1f4ec4b461dc27077b9793dfdd85f49285c57eeabe5720 boost-math-1.75.0-8.el9.x86_64.rpm a9ef94d68c80620bfa8ff38bd2d8a5af5d7ca467220b7988f620f2153ad27161 boost-nowide-1.75.0-8.el9.x86_64.rpm 85999a51192fc0651e2e96f3eac90e49c43245bf25adcbf4720b63d7d872c4e1 boost-numpy3-1.75.0-8.el9.x86_64.rpm 00786890629260f3dd4ddd5bf3550706abeea9621213c11f26ef019a2760490b boost-program-options-1.75.0-8.el9.x86_64.rpm a592d4e9bc4f74c271f5168e7cf170ee43197786cc062a8c39b4fd18be32ee6e boost-python3-1.75.0-8.el9.x86_64.rpm 872c074bcb326cf370bdeec3c46bd3eeb96618d9813b6de4d2d291a2d57b5731 boost-random-1.75.0-8.el9.x86_64.rpm b89f4b4f71b504626c34f084b66d3b9a84e9c6bd793865d3c0959a83d1772098 boost-regex-1.75.0-8.el9.x86_64.rpm 7acf03c8e422065e10def6a635d20db6ddc9be09b811e7ae998b491839596d2c boost-serialization-1.75.0-8.el9.x86_64.rpm 73f42ce6e03d855f1e11302477c48eb6aeb38c2047e64e79ceec56e06297141f boost-stacktrace-1.75.0-8.el9.x86_64.rpm 884cb497445e44aa7e79873ef67da9a82a67713565072454dff7fa47ce7d007a boost-system-1.75.0-8.el9.x86_64.rpm b1674470337ca1d81bd071c4acf828f9f253c02d23f88e51f55556e9e7959b3f boost-test-1.75.0-8.el9.x86_64.rpm 1b15ed51d4fc5e3412a97f2f864efc708d75cbe52905fcb2e99a97f22edd0487 boost-thread-1.75.0-8.el9.x86_64.rpm 55488650633017e39e16d913b0bc65ff1444a31a0bebeaec7b327ce45eeee989 boost-timer-1.75.0-8.el9.x86_64.rpm fa0cfb1e6ce59764063b808621065b23b5acdfbfb8e5f32d3930b02b97a21162 boost-type_erasure-1.75.0-8.el9.x86_64.rpm 736921e12d23345f446c453ae0f0d4ef808b16baa61bb19de7bd72d2bc87a383 boost-wave-1.75.0-8.el9.x86_64.rpm 555b3380ef055a497bcc49cd44d938a0712b963a1b8c1960fb3032be5bf996ba cairomm-1.14.2-10.el9.x86_64.rpm 74216e92ac5d1452d6d8fde90970c1769ebfebb0bfaf86610070221a008851b2 double-conversion-3.1.5-6.el9.x86_64.rpm 1530845af7fb79dcd217cd440af0f7017e60db6ec27148c18393f2b55737f977 enchant2-2.2.15-6.el9.x86_64.rpm f0ac2534a1dd08b82840623a8472d5c88e12d830df402ba7300421667a1c4be9 gc-8.0.4-7.el9.x86_64.rpm d2f44792623901e691ae83365e6971d818e2d11d4fd773c80128d55bfa05225d glibmm24-2.66.1-1.el9.x86_64.rpm a9c054a0e3ef1f92748658b37f9d31f8681aa0462d39606fda704eacbec262e4 gsl-2.6-7.el9.x86_64.rpm 6ad7c0869388e9fa92edb51cf895cffdda934117bb65031d182f782020281aa5 gspell-1.9.1-3.el9.x86_64.rpm c1a520e082ae470c3134508db102a390f5ffd09105ca56bc944d82b4c1cf4cbe gtkmm30-3.24.5-1.el9.x86_64.rpm 2c453a3ec8c3362afce41a5f7bf5819f86ab12a22c676c91448ca42cdfddeb0a inkscape-1.1.1-6.el9.x86_64.rpm f41239ddc8f7f0a3e4a1dc9563b5fc9ec6e6d0ae16a91cec9b2fec6548af1171 inkscape-docs-1.1.1-6.el9.x86_64.rpm 084003d83120ff0d437fad39f647183c0d49935e745e62263fb6bc77f32f21b4 inkscape-view-1.1.1-6.el9.x86_64.rpm 75da2f2ddf354ec333f2bdba96df00a9f5de052b5fc914a5ca9453a9546900a4 lapack-3.9.0-8.el9.x86_64.rpm 1a536d4d6cb79bd3f8aa0d31d941fc58aac684438279fcdf27fce903ba9d1357 librevenge-0.0.4-22.el9.x86_64.rpm 08c936b4b644599ddd86781dc40a6930b18b4919bb0c51c545e56255d25f0007 libsigc++20-2.10.7-2.el9.x86_64.rpm 7c7327a10e3efd22b91835e0565427fbf1f60939224196aa1b4273ed5befe8eb libwpd-0.10.3-10.el9.x86_64.rpm 4eb1d2801cfacee5e40c761087f00bd5b4836ca6c9d829f3dc70c52f93c16215 libwpg-0.3.3-8.el9.x86_64.rpm e5d38146349f3d2b9a82ae52f94acc190015a6dc1f3fa3b215711eb8860ad562 openblas-0.3.15-3.el9.x86_64.rpm 47461d2fa724b1437330f2fb5cc45073a4c3f598d02880af488ed6e8199c2bdb openblas-openmp-0.3.15-3.el9.x86_64.rpm 9fb2ca11be237ff5e3aa5ebcf1466ca5c10389c4a94dd35b01a8ac6a70d98a49 openblas-serial-0.3.15-3.el9.x86_64.rpm 774951fbb53756cc9e4d40a3a7cb34ca962ea4986bf8cf7deba3fdcb85703682 pangomm-2.46.1-1.el9.x86_64.rpm 4e3f00c9fb7171f1c7ff417fba8a8e3e75363197dfa62fb2b95696a328528376 poppler-21.01.0-13.el9.x86_64.rpm 15ddb379f068e8ca500afb38d995cfff4a3e7d1b817e49eea972794ce81556fc poppler-cpp-21.01.0-13.el9.x86_64.rpm 054570e8f0f540fbca5b9ab189d2324eacdd0b92d451ad8a05568c59ef7215de poppler-data-0.4.9-9.el9.noarch.rpm da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057 poppler-glib-21.01.0-13.el9.x86_64.rpm b94c9ee00b74ec8654e20fba90c4d737032b68e40472594aa73098eb8ea1bb40 poppler-qt5-21.01.0-13.el9.x86_64.rpm ef9016a67305875d59d938f227a003e0731d31ebad1f8500d8c763b44ec8e163 poppler-utils-21.01.0-13.el9.x86_64.rpm 40f4a80e48516f8812cda92f063eca147a9598459c5b9a0e3c4c10ff0a92c27f potrace-1.16-7.el9.x86_64.rpm 85c1600915d76fbfee10e31f44d7881c98ed480637cc103965f7f9466274b802 python3-appdirs-1.4.4-4.el9.noarch.rpm 0d5da656f5ea1bf0a6e0a1b1b636f33a9a417fcbd8211d6fd64ede4593690102 python3-lxml-4.6.5-3.el9.x86_64.rpm fa211bf07228f42800523d7e6d2c932f1f9f15812f944947820d29fa4bd27bbb python3-numpy-1.20.1-5.el9.x86_64.rpm 634f138213b0f5acf5fb6a5ad9635278bce15867c9afe8af749c1b99f333665d python3-numpy-f2py-1.20.1-5.el9.x86_64.rpm 939dacdf39c4f56847d34891617126d916a6b02175ca9bba7f8d6aee970a5dd6 python3-scour-0.38.1-5.el9.noarch.rpm 442f8d590848134a589e19234b3f071ac534757bc59260991e63c2df279c0b3b RLSA-2023:0810 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.8.0 ESR. Security Fix(es): * Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) * Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) * Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) * Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) * Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) * Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) * Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) * Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) * Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) * Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-102.8.0-2.el9_1.x86_64.rpm be6f9252b2b58f1d6db0aa56a75a6858027604a69c62688ecd2052a603fc2076 firefox-x11-102.8.0-2.el9_1.x86_64.rpm c3dfb1d07ef389a4d9c1523e8ec02a840217d46d7b3f32bf21e31d7a813c1361 RLBA-2022:8424 libreoffice:flatpak bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for zaf, hyphen-uk, libpagemaker, hyphen-ca, hunspell-et, hyphen-eu, hyphen-ga, libvisio, raptor2, hunspell-ta, mythes-nl, hunspell-lt, hunspell-sk, ongres-scram, hunspell-hu, libshout, hunspell-nso, poppler, hunspell-nl, hunspell-hi, openjpeg2, libabw, hunspell-es, hunspell-sv, hyphen-sv, hyphen-te, google-carlito-fonts, hunspell-br, hunspell-ml, hyphen-pl, hunspell-pl, hyphen-el, hyphen-ru, hunspell-bg, mariadb-connector-c, hyphen-es, mythes-ro, hyphen-as, libloader, libmspub, dconf, mythes-en, libreoffice-voikko, hunspell-de, hunspell-id, hunspell-eu, libexttextcat, hyphen-da, pentaho-libxml, redland, hunspell-kn, libcmis, libepubgen, libodfgen, hunspell-fr, hunspell-th, hunspell-zu, xmlsec1, libnumbertext, hyphen-gu, hyphen-nl, hyphen-ro, libfontenc, librevenge, libwpg, hyphen-it, mythes-it, libmwaw, ttmkfdir, postgresql-jdbc, hunspell-sr, hunspell-ga, hunspell-ro, openoffice-lv, lksctp-tools, mythes-sk, mythes-cs, hyphen-cy, libformula, liblayout, clucene, hunspell-hr, yajl, mythes-ru, hunspell-gl, hyphen-ta, mythes-da, hunspell-tn, libqxp, lpsolve, hunspell-gu, mythes-pt, mythes-sl, libetonyek, hyphen-lt, google-noto-fonts, hunspell-ar, neon, librtas, hyphen-sk, hunspell-cy, boost, hunspell-ko, hunspell-si, flute, hunspell-pt, hyphen-fa, libzmf, hunspell-nr, hunspell-pa, hunspell-ve, mythes-ca, sac, hunspell-it, hyphen-bg, gstreamer1-plugins-good, openoffice.org-dict-cs_CZ, hyphen-gl, hyphen-hu, taglib, bitmap-fonts, libwps, hyphen-de, libbase, hunspell-af, hunspell-or, mythes-ga, xorg-x11-fonts, hunspell-no, hunspell-kk, libvoikko, mythes-sv, hunspell-el, hyphen-id, hunspell-da, libwpd, hunspell-ss, hunspell-ts, hyphen-bn, hyphen-sl, libeot, mythes-fr, hunspell-te, mythes-pl, pentaho-reporting-flow-engine, mythes-de, mythes-es, hunspell-as, hunspell-fa, hyphen, hunspell-uk, mythes-el, hyphen-hi, mythes-hu, hyphen-or, hyphen-mr, hunspell-xh, hyphen-pa, libserializer, poppler-data, hunspell-mr, hspell, hunspell-st, hunspell-ru, libfreehand, hunspell-ca, hyphen-fr, hunspell-bn, gstreamer1-plugins-base, twolame, libcdr, Box2D, liborcus, hyphen-ml, hunspell-sl, javapackages-tools, librepository, libstaroffice, libfonts, v4l-utils, rasqal, voikko-fi, hyphen-kn, mythes-uk, mythes-bg, hyphen-pt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bitmap-fangsongti-fonts-0.3-40.el9.noarch.rpm 4ae7407557f356b5385e5af30828d696db176922a084bfcd18e82ddd557ddbad boost-1.75.0-8.el9.x86_64.rpm 2b89487c09db0b35a7362567ce0ff1d5201c2506cd4bfa6566c6920d7e544d3f boost-atomic-1.75.0-8.el9.x86_64.rpm 52f6c732819ebf1d53883ad641d508277547b25da358551ec816cc82114b4409 boost-chrono-1.75.0-8.el9.x86_64.rpm 784bb368e9c791972907a8c607ae01bcb36c1c84c5afc243bb5329bb67b1e75f boost-container-1.75.0-8.el9.x86_64.rpm f86c65db24dcf198694a7a99c16ac64e727806ac1421a452c3557e5dfc65142b boost-context-1.75.0-8.el9.x86_64.rpm 5690e1e27778a78e6dc3333589a18665292a6d124af89961c79b4e95e41e8a6a boost-contract-1.75.0-8.el9.x86_64.rpm 7639b3e54afb9b4f245ccfc478eaab944ba9d636d417673516571b69cce74434 boost-coroutine-1.75.0-8.el9.x86_64.rpm 1c969e24534ab25683dd4b0da6d25c59e533fa7991662358818b593252954d75 boost-date-time-1.75.0-8.el9.x86_64.rpm d2690b53b36c6b20d446ec415a316f91b5bd84341041bfb2b35500d5ed46bc98 boost-devel-1.75.0-8.el9.x86_64.rpm 445ecc85b49b9558aadb335d4ea78e2cd75dede7309e777ab05396d9fe6c56cd boost-fiber-1.75.0-8.el9.x86_64.rpm c09d9b1ad94a8b5e49595c62db6ed09b624573e2028ce1501e1250da1d66b369 boost-filesystem-1.75.0-8.el9.x86_64.rpm 9c1f68c454e382215bc975715e64a3a052a1ccd504b657ded0854516e605009d boost-graph-1.75.0-8.el9.x86_64.rpm 0f6030fc7c7b7da4e743cabc1b056713fae24421d4692064f4e9b2e979a2d6c5 boost-iostreams-1.75.0-8.el9.x86_64.rpm fafc9e5eaf848b17fa018b0334edd2d8669f3b8ba95d3da7a000db4fcedea585 boost-json-1.75.0-8.el9.x86_64.rpm 4c92f0b910932f0416f8e37c16753b9cfb52e1ffc79e00c2883f2fb7dd63810f boost-locale-1.75.0-8.el9.x86_64.rpm 675fab2cef3901472d42b5fb0b2f93879a07eca1e40058728f87ab40878a2be3 boost-log-1.75.0-8.el9.x86_64.rpm 1fa22ae6a28b47b77f1f4ec4b461dc27077b9793dfdd85f49285c57eeabe5720 boost-math-1.75.0-8.el9.x86_64.rpm a9ef94d68c80620bfa8ff38bd2d8a5af5d7ca467220b7988f620f2153ad27161 boost-nowide-1.75.0-8.el9.x86_64.rpm 85999a51192fc0651e2e96f3eac90e49c43245bf25adcbf4720b63d7d872c4e1 boost-numpy3-1.75.0-8.el9.x86_64.rpm 00786890629260f3dd4ddd5bf3550706abeea9621213c11f26ef019a2760490b boost-program-options-1.75.0-8.el9.x86_64.rpm a592d4e9bc4f74c271f5168e7cf170ee43197786cc062a8c39b4fd18be32ee6e boost-python3-1.75.0-8.el9.x86_64.rpm 872c074bcb326cf370bdeec3c46bd3eeb96618d9813b6de4d2d291a2d57b5731 boost-random-1.75.0-8.el9.x86_64.rpm b89f4b4f71b504626c34f084b66d3b9a84e9c6bd793865d3c0959a83d1772098 boost-regex-1.75.0-8.el9.x86_64.rpm 7acf03c8e422065e10def6a635d20db6ddc9be09b811e7ae998b491839596d2c boost-serialization-1.75.0-8.el9.x86_64.rpm 73f42ce6e03d855f1e11302477c48eb6aeb38c2047e64e79ceec56e06297141f boost-stacktrace-1.75.0-8.el9.x86_64.rpm 884cb497445e44aa7e79873ef67da9a82a67713565072454dff7fa47ce7d007a boost-system-1.75.0-8.el9.x86_64.rpm b1674470337ca1d81bd071c4acf828f9f253c02d23f88e51f55556e9e7959b3f boost-test-1.75.0-8.el9.x86_64.rpm 1b15ed51d4fc5e3412a97f2f864efc708d75cbe52905fcb2e99a97f22edd0487 boost-thread-1.75.0-8.el9.x86_64.rpm 55488650633017e39e16d913b0bc65ff1444a31a0bebeaec7b327ce45eeee989 boost-timer-1.75.0-8.el9.x86_64.rpm fa0cfb1e6ce59764063b808621065b23b5acdfbfb8e5f32d3930b02b97a21162 boost-type_erasure-1.75.0-8.el9.x86_64.rpm 736921e12d23345f446c453ae0f0d4ef808b16baa61bb19de7bd72d2bc87a383 boost-wave-1.75.0-8.el9.x86_64.rpm 555b3380ef055a497bcc49cd44d938a0712b963a1b8c1960fb3032be5bf996ba Box2D-2.4.1-7.el9.x86_64.rpm 20c2c7567463b52ba373066175fe68758a0b52bf969b3a5c5de9769be3bfa567 clucene-contribs-lib-2.3.3.4-42.20130812.e8e3d20git.el9.x86_64.rpm 37e66e38042fd0b394f138de56a3e601c8d2aa6e8c198b333eff53a52f7c6836 clucene-core-2.3.3.4-42.20130812.e8e3d20git.el9.x86_64.rpm cbeb94c40b03f61dc2454880bb52a07aa80a7cd3eeaa0bbf9371c0b05aaf164c dconf-0.40.0-6.el9.x86_64.rpm 094e218a547ef05f2b38e7ce685a39242def2065a7a44fdd4cd7455326d5b02f flute-1.3.0-27.OOo31.el9.noarch.rpm 59c9fdbad28e29822220d1b939e5e080b36388122db1abc90e6161ee07b2c308 google-carlito-fonts-1.103-0.18.20130920.el9.noarch.rpm e34d9dd16bdd38557fbca87d54c755ad862c1920db64b6dff3e83e035d4c51a4 google-noto-fonts-common-20201206-4.el9.noarch.rpm 31f82f2aeb2a9823a50c6bc6551c5104b27dadea6e32bc951076bad1086540fd google-noto-sans-armenian-fonts-20201206-4.el9.noarch.rpm bf7cc7abb3e5ff1c66330c4b97b11485a099a7ed0f984b656c2e1d9f01640fc7 google-noto-sans-avestan-fonts-20201206-4.el9.noarch.rpm beadf4ba113760952280a94591edd237f91a69d6f85d89c0f9dc1f7f3fd43feb google-noto-sans-bengali-fonts-20201206-4.el9.noarch.rpm 8548c74c937f3e7db8868a19b3817a2d959f97f8b5f392f6e50a5a2c959f143f google-noto-sans-bengali-ui-fonts-20201206-4.el9.noarch.rpm c0c5a2c05ff9be22b71228b70e5ab223420caf6a10d50283890cf25a29509313 google-noto-sans-brahmi-fonts-20201206-4.el9.noarch.rpm 1bf706231661c463480d958c7490aeb92203406e49f0f1aef62d11ce1fa5ebb9 google-noto-sans-carian-fonts-20201206-4.el9.noarch.rpm 113f7b00689f1340a773a05c8c808b674432162ae3a3b171bae82d63305fa3d0 google-noto-sans-cherokee-fonts-20201206-4.el9.noarch.rpm a0706e303f29c9011bb26bb2479aaa4f2e4c4c54ffd740e39620d891fe4db52d google-noto-sans-coptic-fonts-20201206-4.el9.noarch.rpm f6a9214fcb8a1c146b2c0450fcf29f9896a9a0333291cc79eca0867fb9b79da3 google-noto-sans-deseret-fonts-20201206-4.el9.noarch.rpm 9a026ff507ceb64d2d3a9ac25d56233d4247d3efde87875b5918dd9ae5745579 google-noto-sans-devanagari-fonts-20201206-4.el9.noarch.rpm 574b2de4cdd2cb267afe9d2f085a837dee2cf2b0e723eee7a10218fecf475802 google-noto-sans-devanagari-ui-fonts-20201206-4.el9.noarch.rpm b63204ccc4a1f922f186163dd990c3430d2bfd615fdcbc9a44117243f3fc28ba google-noto-sans-egyptian-hieroglyphs-fonts-20201206-4.el9.noarch.rpm d930ccdefe09fdf68bd7fad91604813b8aee1886856233e23d74a98326e5e4e8 google-noto-sans-ethiopic-fonts-20201206-4.el9.noarch.rpm bada0302bd6a0304e66ea3eb1b321ac9ba7be13afe32548536a158b7579b8b17 google-noto-sans-fonts-20201206-4.el9.noarch.rpm 28141ddd90fa91934ddebe991d8c7de1b79b465b228d3894927bb3f9c8fdd65a google-noto-sans-georgian-fonts-20201206-4.el9.noarch.rpm b02e89a7355a5ed5d43dea7a0837bb997ee618d358944852a1e3108803f5e29a google-noto-sans-glagolitic-fonts-20201206-4.el9.noarch.rpm 66e02f55d102f5b87a3395b409e8881caea66969123865ad6288e2da3e4a8f48 google-noto-sans-gujarati-fonts-20201206-4.el9.noarch.rpm 5c90e4d16a661c8b88ceec03b6f915b597f79306a9abf3ded826704d4f89f8ce google-noto-sans-gujarati-ui-fonts-20201206-4.el9.noarch.rpm 870dc502b64ffcdf87ed5c65937cb1f10838f081fec9c9632a847694e120d3d6 google-noto-sans-gurmukhi-fonts-20201206-4.el9.noarch.rpm bfaa948840d81f07d94ff446c758416a9bca0949337733cdacf99d921f224953 google-noto-sans-hebrew-fonts-20201206-4.el9.noarch.rpm a85ac39547d8cca7b82d940db30440f126a1c999dc301be7d25a18140bd8e53e google-noto-sans-imperial-aramaic-fonts-20201206-4.el9.noarch.rpm 91f25fd1085fa38df9ab8f49393d1d24949cec190b1e49a727b0ec41c886fe91 google-noto-sans-kaithi-fonts-20201206-4.el9.noarch.rpm 46eac4aaa61ae5f3582b9e110b13e255d4faeaeebedd73807b2182e4ce99e21f google-noto-sans-kannada-fonts-20201206-4.el9.noarch.rpm 1ce1fcdfb40a91bcc29b1b5b15fcea869f0e32ab7af811f675c8e9ff866fafeb google-noto-sans-kannada-ui-fonts-20201206-4.el9.noarch.rpm 019eaff18a4903434f997e788c52485c0e76576716398db962b88f8588f4a8f3 google-noto-sans-kayah-li-fonts-20201206-4.el9.noarch.rpm d34a1befd85064beec2c3e6ff6cd2420b13e690ea2b2e26c7b0b25209e41990c google-noto-sans-kharoshthi-fonts-20201206-4.el9.noarch.rpm ad52dc955821833f70569809893b70a5d08c5d148ca0b73ca1bec66029430761 google-noto-sans-khmer-fonts-20201206-4.el9.noarch.rpm 6e58eb704f774a6020f1ba8df79695249ef7cbc52945a727d4e7f55f46909899 google-noto-sans-khmer-ui-fonts-20201206-4.el9.noarch.rpm a6484d377f0775d2103a75ee0a934f592e222c769a3486dc6db0b8c968f6ef9b google-noto-sans-lao-fonts-20201206-4.el9.noarch.rpm d48231b63523c5c80b1159f09b8e0084d8cca9cb18e0e4d8d6a75bdbc8c3c12f google-noto-sans-lao-ui-fonts-20201206-4.el9.noarch.rpm bde7dd54374d1328049cbf47c79080b48dfe94dd17108c050939afaa6c49e902 google-noto-sans-lycian-fonts-20201206-4.el9.noarch.rpm f5fe0cd62bb4a7777208577c42e4760563d196beebeedb554e77d71a65d0e5ba google-noto-sans-lydian-fonts-20201206-4.el9.noarch.rpm bb409b389067457f14f046cc701c251841a77ae5850ae0f78ab675289ced69a3 google-noto-sans-malayalam-fonts-20201206-4.el9.noarch.rpm 2105588077cc6472b75e442668fb4de2754abd5aca3ba7e92fb5fe188b9e941e google-noto-sans-malayalam-ui-fonts-20201206-4.el9.noarch.rpm e9cdd00c5869ed97d6b9136c919bb981f4f7db004f330a0b9c1eb87d51046420 google-noto-sans-mono-fonts-20201206-4.el9.noarch.rpm ac836683fef5d53782443a5ca9e242e9ec485ae48997fffa3f891ccca24c686d google-noto-sans-nko-fonts-20201206-4.el9.noarch.rpm 6bbb07adb6fe9cbedafa34ba3a3042c582ac00718ee1d3e27f820cbe12b0b99f google-noto-sans-old-south-arabian-fonts-20201206-4.el9.noarch.rpm de2e844575df1e53e2c13aa185c3f3799a8db0ad8cf99e008e39a77d8a874b1e google-noto-sans-old-turkic-fonts-20201206-4.el9.noarch.rpm df238431d0ecd438aad4f381ba57069b2e5faa2294b7453f49b5b4975a18cb4d google-noto-sans-osmanya-fonts-20201206-4.el9.noarch.rpm 34edd3787a75da2090243d9163ecbe310d9a132ed6127d6d0d81327b9fc5197c google-noto-sans-phoenician-fonts-20201206-4.el9.noarch.rpm e5fc01016dcf3f9a3672682a87e1e3be36e664cc84595d0d8b24d1da81460137 google-noto-sans-shavian-fonts-20201206-4.el9.noarch.rpm 387927fc4039d9932c7e4e2bebac751de912836ea408f390df45251368b37aa3 google-noto-sans-sinhala-fonts-20201206-4.el9.noarch.rpm f52428535c691fc689838d76d648ba0d96dfbcae9d3da25ddd232875d887e46b google-noto-sans-sinhala-vf-fonts-20201206-4.el9.noarch.rpm c1755b5799336661fd4332f02a81d7756ef539144a531274f6d8603be1d9855f google-noto-sans-symbols-fonts-20201206-4.el9.noarch.rpm c0a2cb82211120d5938aea228558a2e169b501200d7398974e69f8f8208e6fdd google-noto-sans-tamil-fonts-20201206-4.el9.noarch.rpm 5383183555d32c0958c08816ebbdb80f14dde1dcbc42e7246a243c17472ffa35 google-noto-sans-tamil-ui-fonts-20201206-4.el9.noarch.rpm 46f9c3ad39d73cca39dab6a4424fa634e695bf2e75084554858059a936716730 google-noto-sans-telugu-fonts-20201206-4.el9.noarch.rpm 99608b9d004a762a3a87adb1d76394978749117dd8679ab3cc6795e43bac998b google-noto-sans-telugu-ui-fonts-20201206-4.el9.noarch.rpm 9689feb995f4ed0dfcf17dedcc4602db6eb5773b842e16b5a2c3fb66e3a5bbb7 google-noto-sans-thaana-fonts-20201206-4.el9.noarch.rpm 525ef3f0a3b32ca61f16bbfede3ae5534ee7be9242252caa44d1637ece0942da google-noto-sans-thai-fonts-20201206-4.el9.noarch.rpm b312cb23601048e390769a0a6280e82ab89cb049f978fadf0a7911111353ec51 google-noto-sans-thai-ui-fonts-20201206-4.el9.noarch.rpm 866fb229471ec7a1c1ed20997dd531128e70b86ad52f8937e17778ed980aa334 google-noto-sans-ugaritic-fonts-20201206-4.el9.noarch.rpm 0f750d1ff62e45f934fb4ce9d2262a5817e8f9d7e278f9e043f45700322dc57c google-noto-sans-vai-fonts-20201206-4.el9.noarch.rpm ee09130885ae9a3c72c5726bc267064912d6ef452d90094adc63f8067b34e9dd google-noto-serif-armenian-fonts-20201206-4.el9.noarch.rpm ead3574fab52ae6ab80ab344a149f754483a9af30130ca99d4eb0bf3ca036911 google-noto-serif-fonts-20201206-4.el9.noarch.rpm 310ef12e97fae05d5be0a96db0a1e089ce27e11c7d165c07c8f58702d205aad7 google-noto-serif-georgian-fonts-20201206-4.el9.noarch.rpm 254913c6436b77e5d3b99478e8c2507df2d62ed2a7a94a4a931ccb3225f1bd4f google-noto-serif-gurmukhi-vf-fonts-20201206-4.el9.noarch.rpm c4ac4eb3bb1c7e56f2d0ef0de5b1d67f182db840a02d6f10fc5bd6097b9ff7f2 google-noto-serif-khmer-fonts-20201206-4.el9.noarch.rpm c6af89c3a0402db2f3fcb3513ef92c301c7f261eb88c3f5aa7683a80a809a63d google-noto-serif-lao-fonts-20201206-4.el9.noarch.rpm fee731802fd1e6e904f5d052511e09bbbf99f8f904035593e79ab443dc5f5183 google-noto-serif-sinhala-vf-fonts-20201206-4.el9.noarch.rpm b29749e587ddbe93aa7b2b4ef6ee5ab58b7cca7652d2c84ace2b16d21c416f6e google-noto-serif-thai-fonts-20201206-4.el9.noarch.rpm 98d3bbbeb9d6d0ae880338747570e93be51146edea1e4452220c99539d47768b gstreamer1-plugins-base-1.18.4-5.el9.x86_64.rpm 0cfca79f1e2f645681fd396585570e003502a50b8b783af8f501b76699f351d4 gstreamer1-plugins-base-devel-1.18.4-5.el9.x86_64.rpm d1eeefab4b42ffc1b66e58aa2841c9c45909747de79bd382860187eeb3aaf457 gstreamer1-plugins-good-1.18.4-5.el9.x86_64.rpm ac3ed569780c6d98d0af08cc74f11869ea2dc680268783022a3abbf3c803ecd1 gstreamer1-plugins-good-gtk-1.18.4-5.el9.x86_64.rpm 1cc4571c2a3b86f158b82740ff72fa84a2bb58da4244001aeefc2eabb4265c13 hunspell-af-0.20080825-24.el9.noarch.rpm af7dcb9279eb657670463349b40ea3b4b0f38b37227be83969240e261ecc3c9c hunspell-ar-3.5-15.el9.noarch.rpm c15960b12fec79e8389ca45119d9183c76498b4a8d274a99a6eeace91d77b6b0 hunspell-as-1.0.3-25.el9.noarch.rpm 72263ade0a0c7b301bd424e68097f464dc7ce44d911655f51889098dac134a48 hunspell-bg-4.3-22.el9.noarch.rpm 3a15fbc8c9f64f7339cc3ee55fc7427363875e788a60c68bce0f03cbabdc8793 hunspell-bn-1.0.0-17.el9.noarch.rpm 7919e3e0e4547ce1365e81da9a737f2a4c6378b4035a7db4519e2c45b0c1955e hunspell-br-0.15-9.el9.noarch.rpm ce559316f2f4a86a0d2191714d6b912f1d5bb4b45d0a9d8899dab36cc81fb2f3 hunspell-ca-2.3-19.el9.noarch.rpm 98d95c4b2476bea9913ebcc3e06826b728f29b2f6244e3027fba3965664d5d2d hunspell-cs-20080822-16.el9.noarch.rpm d41708944d1a017f9ca6924391d132ea91d50640acb15b9fa5141e7eb69aa784 hunspell-cy-0.20040425-26.el9.noarch.rpm 6c531de94e6d5fa0790909aeaedc448daab984abbbb09e589a7795217c829469 hunspell-da-1.7.42-17.el9.noarch.rpm 396e20ab93f5fe8eeccab6dcf8345c8548c028ab5d2831afcc190a3e7080749d hunspell-de-0.20161207-9.el9.noarch.rpm 3868429078d7fe50289f72571b03ddcc2eaa422b5e40271044981d23443c8495 hunspell-el-0.9-9.el9.noarch.rpm 3076e800013bace8d0a9346c67cddbf3333d39b1b71b3c4ee1eaff8b1a594395 hunspell-es-2.3-10.el9.noarch.rpm 0760232ced5b31bb2e44a25ad31bfd6a711b42b858d9ba56cca4755dda577713 hunspell-es-AR-2.3-10.el9.noarch.rpm 257a2e6ec47c0f2378c76c458c5f49e3978de7a45a52331999477da62160a0b2 hunspell-es-BO-2.3-10.el9.noarch.rpm ed301b9b815ed4d864689dbad90cec92c8ca0f81b74ced48ff70af49537fb9de hunspell-es-CL-2.3-10.el9.noarch.rpm 715b7cd2d9235425b3971bbb3af70d44dab18663b94b3d12471aca2433527ffb hunspell-es-CO-2.3-10.el9.noarch.rpm 1a62b6934fa105551fcd3f917553387bccf4f0eaa1df1051e8b8ed29d265d446 hunspell-es-CR-2.3-10.el9.noarch.rpm 1bd60ff4a833ceb27639b534b26ae8dbe17788e85be419de07c4d7aa5e2d29a4 hunspell-es-CU-2.3-10.el9.noarch.rpm 3e8679bc7b08cfd496642e90894126348900f893023ecd7a1d348d724756efb5 hunspell-es-DO-2.3-10.el9.noarch.rpm 8192d50c5d4e2db6a7948958bb757df1d30f37dde9bd33e80854c8b0bcd8c310 hunspell-es-EC-2.3-10.el9.noarch.rpm 0fd4781d3ba30a7759cae30ac147b2258075501238e90e2d3bb7b5c62c4de7a5 hunspell-es-ES-2.3-10.el9.noarch.rpm 0b4a26169f7dc8b4d50d06a756462e55b0fcecc9192eb1689d53fb32232bf1f4 hunspell-es-GT-2.3-10.el9.noarch.rpm 5e88c0c8c1b6027c6485fafb7788edc8c438c25306b10ed470e1e6ab44dba19d hunspell-es-HN-2.3-10.el9.noarch.rpm c4bab3b11653280c0f6fbf65abcb503312459f1e458d43dbb1c82d464a834a81 hunspell-es-MX-2.3-10.el9.noarch.rpm 6f093964b5137a1c7fdb59c477e5ec21b9b9f5c09229d63614cd7340aa85aae0 hunspell-es-NI-2.3-10.el9.noarch.rpm 76752ffbbc15eb125119c68a1f20aa4a70955c3cea00f4d7512ce57174bb2ae6 hunspell-es-PA-2.3-10.el9.noarch.rpm 64ecb188342e5155e4729361dbaa49d21053666409f4986daa25217ed8ec5e68 hunspell-es-PE-2.3-10.el9.noarch.rpm 1c3ab8e9f6e491e20a769fc8e8a49a7fdc99b818aff48c0baa69d3113a9d539c hunspell-es-PR-2.3-10.el9.noarch.rpm ccfdeee701dba25a21de3724e3032d1e0783022f989cfdc46129790cd1560a3d hunspell-es-PY-2.3-10.el9.noarch.rpm b0ce1ed36a3698c194e7746ce9f63a28ddc567ca5bdb0534a1b0faacc56376c0 hunspell-es-SV-2.3-10.el9.noarch.rpm 6ade64caff032d0eb89ad742c7461294e896efb248d9ffa6a28b5bdbb46fe5fd hunspell-es-US-2.3-10.el9.noarch.rpm 128788fdb272458b3d9a734ea84fee2f8cd75b4326ae823133a924872efb4550 hunspell-es-UY-2.3-10.el9.noarch.rpm a327c807df21c1f359e0ea02e780d15b01950a88f72c868bbc96f06443877d73 hunspell-es-VE-2.3-10.el9.noarch.rpm d8acb85c18d29950045e3b13c21f3d612bed9b37211d356ee88da9f7251f5df8 hunspell-et-0.20030606-27.el9.noarch.rpm 801dc5859e9074f24ffcf9361ffbb9a343de8aaeb6b941ae5250792a1c617d90 hunspell-eu-5.1-4.el9.noarch.rpm 537810243aedb23383d8cadc964b7c7fcd72f88d72bcace49d73facd02d35f38 hunspell-fa-0.20070116-26.el9.noarch.rpm 4b17d2bf290009dc2651a87af6e440a762b198b0dedbfad56539ac3cd7742c1c hunspell-fr-6.2-9.el9.noarch.rpm c83e8350b9ac8cf35b100592338bb441215b49db34e3739e9f7418f8fc484496 hunspell-ga-5.0-10.el9.noarch.rpm 5be98da184a0d5f7463620fdc48f275b9a11aa59f699cf52b71499c3296eab73 hunspell-gl-0.20080515-24.el9.noarch.rpm 21385c28644e09b9f1b988a0a565195174cc7489517e97df7772b4cee3034a28 hunspell-gu-1.0.0-17.el9.noarch.rpm 66791ef5b1e8054336d039076ac9a3f714903c7e0231aa5c46e1a698b2c3c154 hunspell-he-1.4-15.el9.x86_64.rpm 8407294c0e91c482f161fbea14a168bbde348d617cfae897f8c8aeb10990be45 hunspell-hi-1.0.0-17.el9.noarch.rpm bbe3af1a286af37d59561f1f03001ad5f359bd07db908e3bd602ae9e8be6e507 hunspell-hr-0.20040608-25.el9.noarch.rpm 63e6b0f4d1394a853a30b8a50f798f0107e55e6ae4dff52320b510d03551d275 hunspell-hu-1.6.1-21.el9.noarch.rpm ffdabdb86ae03e1c2cdfd5e60c64ca68febbfc13f1d982524f8f4d3d4b5505ca hunspell-id-0.20040812-24.el9.noarch.rpm 436c963c279db77baf9a3b7d529b087bc354bd19eeb7117bcf29f7b0f12dd6e7 hunspell-it-2.4-0.25.20070901.el9.noarch.rpm c2c6cdfcb06e0a6f6d9ad6d8ca4a36eaef4e98a6a4f6db1d8608f926af91729f hunspell-kk-1.1-22.el9.noarch.rpm c8e36e644f2d0690bf78513d9af250ec15817960750af10f4c3a111172ab5417 hunspell-kn-1.0.3-24.el9.noarch.rpm 57d6234d4cbcd74b7725bddeab73c4d414040d7de88b212d45c8f17ebefc63ab hunspell-ko-0.7.0-12.el9.noarch.rpm 70faf561e7467b6589b3be806f869c80fbcb61d00a7c8dbd7394ca4f81a5b412 hunspell-lt-1.2.1-26.el9.noarch.rpm 1f992ba7c33a41e8b136e7964ff2a1c18bbba394e238ba75e48a67c743eec8e5 hunspell-lv-1.0.0-15.el9.noarch.rpm f3d6d94df4dac45f622d3c966d5af9e0217456f2b2c8e05b48d1ad2880faec3f hunspell-ml-0.1-26.el9.noarch.rpm 775e1d9566a7928b5dfdea5f854ff223b22a6bfa24ab9c68457b7e9a269b76ff hunspell-mr-1.0.0-17.el9.noarch.rpm 91e43704bff637b14797f3c1adb66df99318113f9ee4cf8b766c1440e5435650 hunspell-nb-2.0.10-15.el9.noarch.rpm 2172ae96a7371ed0f4f70603e4c56b39ff761209cc9ab00fc9eeb5cc8d3e27ae hunspell-nl-2.20.19-5.el9.noarch.rpm e6869ff09e5e5219072e8aa217f280380862a6f89ea936b7f8c1a987e49f5ba7 hunspell-nn-2.0.10-15.el9.noarch.rpm b54e6dfd49f9df5559fbc3af350e4410015f820c326b6d636782f293b4819b30 hunspell-nr-0.20091030-22.el9.noarch.rpm 1038bc6662efaade4134554b1579614fab069cc0e1730e2b7d7d3205a423cf16 hunspell-nso-0.20091201-22.el9.noarch.rpm bd1152ee53cf8ed52605fa56905b12308e20aeb1ae5f0f3ab378212782f5c005 hunspell-or-1.0.0-17.el9.noarch.rpm a38165a2386bd2f9cb392ca5a0b410977e90902015a2e7912f83c36535e7066f hunspell-pa-1.0.0-17.el9.noarch.rpm a98cb01fc3d30ccd8e78e289c4526400b4fcd3efc5c5f358ce9e3cdd7eb5739b hunspell-pl-0.20180707-9.el9.noarch.rpm bc400a0bf222a99aa3297ba0f18a9c9697d1811916616f96edb07d79d2035aa3 hunspell-pt-0.20130125-18.el9.noarch.rpm 80cfcc04f8e4e95303a9887fabaffd365c4c864c9b4f39911d80f4851d94303b hunspell-ro-3.3.7-20.el9.noarch.rpm cdd1459edbf3447ed4442551008bf5aea77215b8df0ffc7ae3994104d6db2d3f hunspell-ru-0.99g5-21.el9.noarch.rpm 8e545ae7f0e19bf0a9a386d044cbd70d3aafb6336e3e5f6f0c1aa263a32848d4 hunspell-si-0.2.1-24.el9.noarch.rpm 1a8689915dc74bd2bb0305c2eafd2892c87494377fbccf3134009bb255b21783 hunspell-sk-0.20110228-20.el9.noarch.rpm 0841e6ab8f8907c39eeabc2f88c7da880d7792740b96d9ead7affacbb6356c71 hunspell-sl-0.20070127-26.el9.noarch.rpm 29fcc4716afed0b4efe5871114a02a719a4e42f062a7111c3267338b960e5dbd hunspell-sr-0.20130330-18.el9.noarch.rpm 1b403338e5436aafbeb10f2663e257a19f90c7844cd13ee8bf0e53e56d3b944e hunspell-ss-0.20091030-22.el9.noarch.rpm f4c7181df5b44144d7ae64b17527e7cf42196142ac7519e5ce398ba8df886c06 hunspell-st-0.20091030-22.el9.noarch.rpm 19548e95cda12bb65731563f4be75eda8f84456fc134a3b2517d08bdd6b28858 hunspell-sv-2.28-16.el9.noarch.rpm e7f48bfc0132e31e5337627f5b64058e808caf01a6be9a8a5175123b314a45fe hunspell-ta-1.0.0-17.el9.noarch.rpm 328b2b5e3c63ec175211a64d66d0b99e4dc02740b52390824f2391ab9222d764 hunspell-te-1.0.0-17.el9.noarch.rpm f0ac26cb0263a69b0b26843b2b0a42c18effdd21a7914e07f20326cd4e005e69 hunspell-th-0.20061212-25.el9.noarch.rpm 400c2759807cbf44b3860376228e18dde3a0d501789aed1ab26d77d706fcad38 hunspell-tn-0.20150904-9.el9.noarch.rpm 34ea7e4b24944f0b4d598c516d9eddfd69aa6ad480733e19ae4a30e2bdd4e5b8 hunspell-ts-0.20110323.1-9.el9.noarch.rpm d35829ad487b4eac19dc344d228188950f20eeec945e550ba91b1c39704777c3 hunspell-uk-1.8.0-9.el9.noarch.rpm 48ebdd08db0310e6e71b43a923951924bc2d7196db356acb9fe65d46ff6c2a4f hunspell-ve-0.20091030-22.el9.noarch.rpm 98701f04fffc38c9a201f8a47fbc71810efb2c454e343ee767e42817d2f13852 hunspell-xh-0.20091030-22.el9.noarch.rpm f527b57afbdf884019be433e8592a38ad374c05dfa7b5097a0724480e91ebacf hunspell-zu-0.20100126-24.el9.noarch.rpm c77e76514bd739ba436edce86a014452d931b2223066e8e5a9935318e801f2dc hyphen-2.8.8-17.el9.x86_64.rpm 6cb90d376202fd7320adda6e032ea9d8f900ef65433dffa9d980f9f294d27994 hyphen-af-0-0.25.20080714svn.el9.noarch.rpm 6c88fb59051144f284b63b65d7c8d9be5b3405e160bf4cdaeb716bf85aae076c hyphen-as-0.7.0-19.el9.noarch.rpm 62cf079957b5135ee90a4c9573acabdacaec1e2784c22d025b7a6698befb2cf7 hyphen-bg-4.3-21.el9.noarch.rpm d101484f69e2b466e0d6237ca6237e0837aa2454b253ebdb0b2b9587797a3a67 hyphen-bn-0.7.0-19.el9.noarch.rpm ffc8d82bf95544ca99c587138c8af4b3c62d7fd71bd0b72ad45a12575129e6ed hyphen-ca-0.9.3-22.el9.noarch.rpm 6d328a0daf3c16d463e75b5c815a25ba16493b84786c6012f366202203ac1f5b hyphen-cs-20080822-16.el9.noarch.rpm 18e74f8c7742f486e921075fcaf9772f0abc57e082098684ae14a25ee6c45c4a hyphen-cy-0.20110620-20.el9.noarch.rpm 21bf50a658aaa7975168d4a0edb16aed89ffe7eded40434cb34475536fd9fcd0 hyphen-da-0.20070903-25.el9.noarch.rpm 3d3a86c41a500360bda82d581eb9640590e25df3419c91b719abf0ff336693d6 hyphen-de-0.20060120-27.el9.noarch.rpm 215a93827a6bb69ecdfd22beb1a513ae0444b1266691fd28211340d20f811d66 hyphen-devel-2.8.8-17.el9.x86_64.rpm c17a95d076bab6e7a42d660aa11679d8e3caba56b1f61e30a3c8cdb10002037d hyphen-el-0.20051018-25.el9.noarch.rpm ac5bb01aa535b95fb216c49ea10f209b58ca30dcf7233472471a6d699ae149e5 hyphen-en-2.8.8-17.el9.noarch.rpm 17a995b6190aeec475f05d7c9a1ad8512c0b450e435a5ec08840d9f6ca68fb49 hyphen-es-2.3-11.el9.noarch.rpm 1ffbac7e70c52e287d4f60beaa89c2b284893f439941bb4a1da9da2aa2807218 hyphen-et-0.20030606-27.el9.noarch.rpm 4325c1a539e7e82ff05d84d68271e9ca4baf3c90dc52792fed7df3130bc6f7ab hyphen-eu-0.20190406-2.el9.noarch.rpm cd8765d7f97a436591f57ae1fa0ac91a562f73fd761adc5062d17d77eb1712d2 hyphen-fa-0.20130404-17.el9.noarch.rpm 974717a2c4f7e7e2bdc24dfc29bd17dd569144dd44b66278b50d30140715bd24 hyphen-fr-3.0-10.el9.noarch.rpm ac33fb2dd1a8b222f7a511160cc0139adf9862d0c6fbdc397457839ab1592b28 hyphen-ga-0.20040220-24.el9.noarch.rpm e56de1b805f46356167e20878cb32084de34d63760b19281111c33f4caaf92bc hyphen-gl-0.99-23.el9.noarch.rpm 7bc701138af824d56e020088c6f6bdc75548b9f14a0572c3f350a81ccb62f0b1 hyphen-gu-0.7.0-19.el9.noarch.rpm 1bc2cdb0750477339128373c1246dd84fb02ac1c87b47afef9fa9275788289b6 hyphen-hi-0.7.0-19.el9.noarch.rpm 531a17aeca603762b2dfde1cefac03fd3444ff8eb79afdb1d560d9ed0a2cc0c5 hyphen-hr-0.20040608-25.el9.noarch.rpm c78ef8203dd18c0ac880333ce116dc4d00592ae804296b4d97c819c013d8971f hyphen-hu-0.20090612-27.el9.noarch.rpm 4f2cf2692cfc9a2a53ab5d45c22e970ed04a119e63a41efd753e68ea13e6a68b hyphen-id-0.20040812-24.el9.noarch.rpm a55d67d93e7e7d64fbc4d9f359600066fef32c43aa70febb779ddc5f3318eda6 hyphen-it-0.20071127-26.el9.noarch.rpm 201ff6ca698b106fe4cb50e825acc24567fe9105bfe2a92784453bcd5196bea9 hyphen-kn-0.7.0-19.el9.noarch.rpm 084b8760980882d1780075366043d08f7e922c801564a1c3ebe07fbcab775e41 hyphen-lt-0.20100531-21.el9.noarch.rpm 2744f8f183abcd3227053b4878cbe0676388f74f15b9a4bb85392ab11fa279e3 hyphen-lv-1.0.0-15.el9.noarch.rpm 3c34d9af57666c4ad894d05eb4ef5021ace04a2607118dd6aaa6952dacc230aa hyphen-ml-0.7.0-19.el9.noarch.rpm 963a83ede6f616e2d1985d8366c8cf0ced0fc6ddf36cc5bb677d9d8586784038 hyphen-mr-0.7.0-19.el9.noarch.rpm 99a1b4a2f635544b9447c4beaa98257527530766b6b6b990a72ce253830b81d0 hyphen-nb-2.0.10-15.el9.noarch.rpm fbe3e04919e2ee3ea3f42a7dea719aeb3bf8026aeba06e8cdedc3cc12034c7a5 hyphen-nl-0.20050617-26.el9.noarch.rpm 4499d532218c3702bc2e119eb3da7a1f3e9e0324e4c88baa6a83d1537b45c77f hyphen-nn-2.0.10-15.el9.noarch.rpm 1fe4fda800adceff35879924988261a57aa6b916d7c1b358e0f6350ddb19ce55 hyphen-or-0.7.0-20.el9.noarch.rpm 8632afe78a2efc13f0c2e3585f4b3671ea514ed853a1b88da583e27109baa06d hyphen-pa-0.7.0-19.el9.noarch.rpm 15e29b82211531f54e490664670e32420acff89dfc2902fff6282d4eb890fb91 hyphen-pl-0.20060726-25.el9.noarch.rpm d5ab3912e231d33a6cb3dcb7ca4242710e2c72029bbd291887f04d0f848774ef hyphen-pt-0.20021021-25.el9.noarch.rpm 0ac82d6ef8216b0575a528af2b11fc0ea2fd96c09b7eb21a874212a53aa0ac5a hyphen-ro-3.3.6-21.el9.noarch.rpm d125d81fd64d0977b0cc96339b1aa3430a7f56644015b5c5628caa069904da9e hyphen-ru-0.20200325-4.el9.noarch.rpm ca015661a72ec25fafba7a4a801c2ef988ba66868f9e9a15478b471ff70b53c6 hyphen-sk-0.20031227-26.el9.noarch.rpm 7ad75d0eb40e087c88ca7735595e02d57904038c17c581bfdcf954d6afb95b34 hyphen-sl-0.20070127-24.el9.noarch.rpm 9ab05103489e198bbf15cf1888cac9f7e750477b1c459a0dd085e05a3f7bdc9a hyphen-sr-0.20130330-18.el9.noarch.rpm 441daaa2ee64b65e43be240b7dc01ec85405df6dd0b2547a3ccb9950b783fd43 hyphen-sv-1.00.1-26.el9.noarch.rpm ccee5e947354f4e54b7681587e9cb7e088ddd0fc6814b7ebae5fc5ed350dce94 hyphen-ta-0.7.0-19.el9.noarch.rpm 2e7ab3efb63bf43757c4aebad1e44d28d7fc4bbe847b79c67981a3662113ee66 hyphen-te-0.7.0-19.el9.noarch.rpm 78e15edeeebf566301b079a7292c2ce93302b1f8d70563f064e76a14092437df hyphen-uk-0.20030903-24.el9.noarch.rpm c841818cec08e45f535d80f23b2f7928abdfec0529677cc576bc125a7c7108e7 hyphen-zu-0-0.25.20080714svn.el9.noarch.rpm 04593c213f283fd3d9eeafb3b8188d5e8e7779b666f25995725e0d8b09db6603 javapackages-filesystem-6.0.0-3.el9.noarch.rpm b42cd1429b4d01f1482fa6fce44e41f5f923219d2fcb09634bd99a1792884dd3 javapackages-tools-6.0.0-3.el9.noarch.rpm bc51f441311b63d60154d6b4daeb1ef129e10fafb492b32d3d89a11bb8ae4181 libabw-0.1.3-7.el9.x86_64.rpm 57ee1c7d2209a6ed69e7b8196e7df228c9805436917fe4480f3f46ea3a2f9f09 libbase-1.1.3-31.el9.noarch.rpm 0225704812b678d00df8da81d77ce6ff25a1cf0e799fbd916fd7f7ec42d11738 libcdr-0.1.7-3.el9.x86_64.rpm 416924ab98608142d48f2fa1419c381d0a4f89c2dc919f37d8a626b522df1b22 libcmis-0.5.2-12.el9.x86_64.rpm a6b97b46b708d2825f553174a46a58efcac80d3e4e9caa4932b7886640079d76 libepubgen-0.1.1-9.el9.x86_64.rpm cfe6a5d4ecfd8c5f52699b6e0ee511e1c7a4db628023e071a8cc87dd22592398 libetonyek-0.1.10-2.el9.x86_64.rpm a9b4305a91b87a1066d00b510f1e641ed76b68d1ddda910c642bb98164c70806 libexttextcat-3.4.5-11.el9.x86_64.rpm 693ef204855a8d31de431211afa6bf3cb4441bdd8d1c6d777d2e3dd608a37245 libfontenc-1.1.3-17.el9.x86_64.rpm 867e2805940f8a3da79fe085ad65dddc3e9968e72f14f076e74c99f28220fe23 libfonts-1.1.3-35.el9.noarch.rpm 6e124b2be12e37786be97347be39a2af623f06237a6a5477ee5a5513f8439081 libformula-1.1.3-32.el9.noarch.rpm bf2ff8277aac84b55ee41db28007025d3c9491860851482ab42dbe756fb38d2b libfreehand-0.1.2-11.el9.x86_64.rpm 443605b03574cad4a615b9c95c88901bd451aa06a13e3838e1ebac4063e04f8d liblayout-0.2.10-25.el9.noarch.rpm 15a5b9aa841da39c3db0215e1eafbc96f1ab24526638e59701b517601aebd291 libloader-1.1.3-32.el9.noarch.rpm 76524a1f91210728fb061e86cebb4b95bca3063c0a97bc4188be5acd2093e3d1 libmspub-0.1.4-17.el9.x86_64.rpm 134288d178b1e75b10b85104e8828cbc727016cb80a9fda010422bf2e044020e libmwaw-0.3.21-1.el9.x86_64.rpm 5939af1d81da64af8587a0e79ffa3b7c79935f2373647dd5956af6b02b519927 libnumbertext-1.0.6-4.el9.x86_64.rpm ba28df9771f3622f4f9eec2c4f397f8e862bedbc34388a1ab006c1b2c79cdaab libodfgen-0.1.8-4.el9.x86_64.rpm 0cc47f1ee1e533ca38bcd5f51db67bd791e39cb530af99852cc3c83a5cc7d1f2 liborcus-0.16.1-8.el9.x86_64.rpm 8daf0d9feaa92edd658508bb16676c0cb733a2d94ede0363130673f5a9fd5bec libpagemaker-0.0.4-13.el9.x86_64.rpm aeadc4e3b241564a62acde116c4cf14ce7e80d5752d337a207f5897836768542 libqxp-0.0.2-11.el9.x86_64.rpm 68ae4d4a89a86d8679f2388a0ca353ff4ec4eebc5e5491a0b1a02f322f201f71 libreoffice-voikko-5.0-10.el9.x86_64.rpm d261cdaa6ac0b1308f2829d5b26c1e286efdb22f8c9a559741e7904cb9cc1fb0 librepository-1.1.3-31.el9.noarch.rpm 7187010217667b14cfa997a68c8d100488244d0151ca83605bcf818c312a4378 librevenge-0.0.4-22.el9.x86_64.rpm 08c936b4b644599ddd86781dc40a6930b18b4919bb0c51c545e56255d25f0007 libserializer-1.1.2-30.el9.noarch.rpm d41c4d826423e13e5242ce523db763d6aef5473ea4d9509b3dabd61dfd9e6d68 libshout-2.4.3-7.el9.x86_64.rpm 4cb1908352b9551a3cb8bcbf0b8fea7806b13730b8320e7dd309022ec3c7d435 libstaroffice-0.0.7-5.el9.x86_64.rpm bc04a4b48d76aea5692f435f541f7d1cbbf92079eeb19dbbeafcfa514de1f783 libv4l-1.20.0-5.el9.x86_64.rpm 959bb071066f041fb801689c1208fe86acaa15fe42d2c15baa157513661ddff3 libvisio-0.1.7-9.el9.x86_64.rpm ebb3d15d8aea355322c45482cc8307b2a08a85bc84a0583e50901a59baebd324 libvoikko-4.3-7.el9.x86_64.rpm 700324de19f57e33d55d6d2659d33801e54dad624a05522216858a452c207e8a libwpd-0.10.3-10.el9.x86_64.rpm 4eb1d2801cfacee5e40c761087f00bd5b4836ca6c9d829f3dc70c52f93c16215 libwpg-0.3.3-8.el9.x86_64.rpm e5d38146349f3d2b9a82ae52f94acc190015a6dc1f3fa3b215711eb8860ad562 libwps-0.4.12-4.el9.x86_64.rpm 62282f3726ad1ce6c96e48e56f1715e785851fcca66a0a938304b63c73f2cff0 libzmf-0.0.2-18.el9.x86_64.rpm fad9a7c80d5216744838f59a4910ee3f9f7425e946079d4477deb161cb02911b lksctp-tools-devel-1.0.19-2.el9.x86_64.rpm bf2e756643f8a88569b72930c7a44ef9b1bd76826798d43bd77c11b772f2a6b7 lksctp-tools-doc-1.0.19-2.el9.x86_64.rpm b668730b3ef6fc60ff22801aa6e25e9e2c7813e3ad51109bfd987dd136cb2747 lpsolve-5.5.2.0-28.el9.x86_64.rpm 8cebb5cad8dd51f2b52b1c11ad7d722205d5320889e977806a488fa40976809b mariadb-connector-c-3.2.6-1.el9_0.x86_64.rpm 007d48646e32a1747734871f4169495fd04ae62b670a9a5ebcca9997329f6a8c mariadb-connector-c-config-3.2.6-1.el9_0.noarch.rpm 35f4f3a713b96698a63a27da304f0bf8be14b273feb16c7713ed80be96968e3f mariadb-connector-c-devel-3.2.6-1.el9_0.x86_64.rpm 2562fbfe459c902520b792ca0827024402b856c0eab28da8df59e2bcda2bbb31 mythes-bg-4.3-21.el9.noarch.rpm 1adbe54a0c7eb1202cbb26ba7c51ca751d13830ad03908055dca4b9685d106bb mythes-ca-1.5.0-24.el9.noarch.rpm ad28f615e6adb8f6b301fdd332c96174a4be0c2833e3278ac3cd92219f0a869b mythes-cs-0.20070926-27.el9.noarch.rpm c6857f4b2dd2106cec80af9c9f8205dd48cefb7d2cb288fc21365b2de07f118e mythes-da-0.20100629.15.16-22.el9.noarch.rpm 2b954be891c353a68857af3e2e799e4093d47c081142c9765c872d8c835ca233 mythes-de-0.20210302-3.el9.noarch.rpm 56c95a157a56bddd5099247a488cd48a79681cb802f850bad40b3114a4182298 mythes-el-0.20070412-27.el9.noarch.rpm a275fdae229940ad7d9edfc038006084f3b9821950927a23924553fef0bd2393 mythes-en-3.0-33.el9.noarch.rpm cf77df328ac9fde5a66bb392d0368e3614f98348add60f25bfa147cc56c68b83 mythes-es-2.3-10.el9.noarch.rpm 5558683bcb22d8d4dad872c1d676f773431ca0cb9638e3555c8f62a4fa6321b2 mythes-fr-2.3-19.el9.noarch.rpm c680189f706dc2eb7191c64120c4efee318fa736c2540cf9718b0d6283c150eb mythes-ga-0.20071001-27.el9.noarch.rpm ce8a140f4df5889d91d2922bb42b4d3fb1dbd79d6ddd8846b806353311d84ff3 mythes-hu-0.20101019-23.el9.noarch.rpm 95a297935550661cbd50f82ff687520b1d365dc5789655e09f44c58d93e6a967 mythes-it-2.0.9l-26.el9.noarch.rpm c77c1ebc7f6cdd800035b1113c9a6b9aa8df6d6811ed0eddf8b962ab11b943f6 mythes-lv-1.0.0-15.el9.noarch.rpm 38a287d0f9ed600a88cbb8ffb914587a482ab5a304c68f8554f43d765b624264 mythes-nb-2.0.10-15.el9.noarch.rpm e2702784a62eb29ea53cf451234a5436df578795cf0dda910ec787eed0c85c1a mythes-nl-0.20130131-17.el9.noarch.rpm 1f74bf8d1b717c0d1f382202310399c2076d2657e95777c9709eaba627cb8121 mythes-nn-2.0.10-15.el9.noarch.rpm 17428513a908da123fc9f47d6e991a8be825d45c0dda2bad710f3dec165aa523 mythes-pl-1.5-28.el9.noarch.rpm ecc49e8e0fad3e5bbf3d7969c0cbbdfce69d9eb8e3cf121a4d8ac1b9209903d2 mythes-pt-0.20060817-27.el9.noarch.rpm 1f838022bcfe9f5ac68afecdd1a7777512ce152a64c55dd3cce528e21ce23c36 mythes-ro-3.3-22.el9.noarch.rpm b4918cf04157679ab5a4129bc36231376656f94cdf6f0f5b8eb203fa98d3dba7 mythes-ru-0.20070613-25.el9.noarch.rpm 9f6e5aae4f13117e8936deee04145ab323a4421a82069313d206bd4eaf7e28a3 mythes-sk-0.20130130-19.el9.noarch.rpm 03582afed4713463c6d2376e7da2c6070854138e336c8e4defffaee187f7ceed mythes-sl-0.20130130-19.el9.noarch.rpm 620a3a3435471659887e87a057a13b791a686072bd3560243e493069368a9f3d mythes-sv-1.3-21.el9.noarch.rpm 9fc5085b06b63737af2f1e2c65ca3f0be775e6e4f9c3655c0c904ae71c2248b3 mythes-uk-1.6.5-22.el9.noarch.rpm bc1c8989fb30dd6edfe73708ad38e53ffdc92277ac3f4106b8aa99502c65b34d neon-0.31.2-11.el9.x86_64.rpm 30f1a44690c5c485d0e538647112dca795b6ff5212d509910169d99ca31fb7ed ongres-scram-1.0.0~beta.2-15.el9.noarch.rpm 67117ccb0bef7edf510d7dc808554ead8151a0a74e6f433e124c7c39e4c21580 ongres-scram-client-1.0.0~beta.2-15.el9.noarch.rpm ef4f44fc7846ce0792b62325340cfbaa205fb08577a0fac07a23c63fdba45dc9 openjpeg2-2.4.0-7.el9.x86_64.rpm 380ef2db96766ecee5e15cce67f91b5d73c721672930add64bd35de5da12c6a7 pentaho-libxml-1.1.3-30.el9.noarch.rpm d5bd66a21381dea955a3d4ed04f1a50d6945581cbadc22bb57c40b9169e21de4 pentaho-reporting-flow-engine-0.9.4-24.el9.noarch.rpm 561a49e72bc60b08310c457fb4285791957b91e446a6a135c2347e82e0420776 poppler-21.01.0-13.el9.x86_64.rpm 15ddb379f068e8ca500afb38d995cfff4a3e7d1b817e49eea972794ce81556fc poppler-cpp-21.01.0-13.el9.x86_64.rpm 054570e8f0f540fbca5b9ab189d2324eacdd0b92d451ad8a05568c59ef7215de poppler-data-0.4.9-9.el9.noarch.rpm da2b5406581206668caa0ef6d4f872ad73d750130530b0bd1f10f1b6350e9057 poppler-glib-21.01.0-13.el9.x86_64.rpm b94c9ee00b74ec8654e20fba90c4d737032b68e40472594aa73098eb8ea1bb40 poppler-qt5-21.01.0-13.el9.x86_64.rpm ef9016a67305875d59d938f227a003e0731d31ebad1f8500d8c763b44ec8e163 poppler-utils-21.01.0-13.el9.x86_64.rpm 40f4a80e48516f8812cda92f063eca147a9598459c5b9a0e3c4c10ff0a92c27f python3-libvoikko-4.3-7.el9.noarch.rpm 73a5975f925a7844c3d769d5fafcd88fc87267861a44178c5166e14c72b3632f raptor2-2.0.15-30.el9.x86_64.rpm e2efc340bbaffff080b1e749f8b0f407eccb103d7e18cc22b2410fc1a1276a8e rasqal-0.9.33-18.el9.x86_64.rpm da2b7d16720df33c04b45a638d3018d7378b38180d54b2940ca18ebf70e66b2f redland-1.0.17-29.el9.x86_64.rpm 487ebda1111a329b243ad96fd478700d8bd3aeaa1486997fd492be2e18d3b18d sac-1.3-37.el9.noarch.rpm 4dbe6a598a31f30cbe55f370a717c1c92e865c76608caabccf29652b5d61863e taglib-1.12-6.el9.x86_64.rpm cc2facc9d62682050fc6dafa0c10912ff8c946341e998149af446987e4a28f10 ttmkfdir-3.0.9-65.el9.x86_64.rpm 6cfb418a09a8d4be9d36182e6117dbde8da7544b531bdad0290ef554556979a6 twolame-0.3.13-19.el9.x86_64.rpm cb8a7422139ee89be5d6fe58dfcc4930990d10ec32de90d3067ab9eafbd49d3f twolame-libs-0.3.13-19.el9.x86_64.rpm d8f30c0bc45e7e2f226df3074305465bec7100acbe2f41cb2eb282af70e2e4c0 voikko-fi-2.4-5.el9.noarch.rpm e02465f34a865a3c3c199ed15da8830664ac53d8994a6c25a9fb69e3462ebc36 xmlsec1-1.2.29-9.el9.x86_64.rpm ed359cb1064bc282048f64807e663451ab90a7889397046b7c0f4073addb6f2a xmlsec1-nss-1.2.29-9.el9.x86_64.rpm 04ac02ee0c92dcfc7b874aba876a0c3a399112738b4cad3ec1180248fed1b7f2 xmlsec1-openssl-1.2.29-9.el9.x86_64.rpm 435bab72ad769eb537ef105f65c170c7ee79ff70cdca9cbd1d0b7c508ce86679 xorg-x11-fonts-100dpi-7.5-33.el9.noarch.rpm 99925527ec7b481b08966060808f65b47cbf2a211afb57c48e0b987e01b74dcd xorg-x11-fonts-75dpi-7.5-33.el9.noarch.rpm 8805fc822c80faba4831bd9fc84d04d34c6ff77d20a6e4add64627930d49772f xorg-x11-fonts-cyrillic-7.5-33.el9.noarch.rpm 3e4d48cce916e54a9308f4afa0002bc077d02b7f1f7d75bdf5f5507904d2b5f2 xorg-x11-fonts-ethiopic-7.5-33.el9.noarch.rpm 6d00592365ff90dac1a9f72113f806fbef033e8dc4aaea2cece3043556059001 xorg-x11-fonts-ISO8859-1-100dpi-7.5-33.el9.noarch.rpm 09a1fc3beb00e4bf154022161406ae6ce446531e8236aed29d0f4c5cbc894b90 xorg-x11-fonts-ISO8859-14-100dpi-7.5-33.el9.noarch.rpm d50ed20df11b76b01a18be51e19378f8d44853f72ce256b1b54e6dc7326b8445 xorg-x11-fonts-ISO8859-14-75dpi-7.5-33.el9.noarch.rpm 431c953352383d87fa4fb14353e8f42ffadabe3c921c72b9f34779746fda4fb6 xorg-x11-fonts-ISO8859-15-100dpi-7.5-33.el9.noarch.rpm 6b333fba8868f7b955eacff7f5047a95e1b28eb728be821777d1a87c5446fd3b xorg-x11-fonts-ISO8859-15-75dpi-7.5-33.el9.noarch.rpm 6d6e1c7d4be02c7cf72b5372e4516101547e20965d8d2cebce99bc04b7139039 xorg-x11-fonts-ISO8859-1-75dpi-7.5-33.el9.noarch.rpm f8aef16693ea659a69d132019f065c8718703e976b44135bdbe6af5224f9663c xorg-x11-fonts-ISO8859-2-100dpi-7.5-33.el9.noarch.rpm e486dab4bd974a7c068967e05d231ebe77e52d8ae41ec004bd77488d2619f00d xorg-x11-fonts-ISO8859-2-75dpi-7.5-33.el9.noarch.rpm 0adedee390a6e84a8e3290c9284751d9155e43752eb10d27ffcae67be632b434 xorg-x11-fonts-ISO8859-9-100dpi-7.5-33.el9.noarch.rpm 51202ece3457e9accbb09b5acbc4718ecac5457c5382b093062033e6cabd56b4 xorg-x11-fonts-ISO8859-9-75dpi-7.5-33.el9.noarch.rpm 982115d80a7c4bc223fafd92c8e758dcc9f0c6cdf0897e02896f1c021179e669 xorg-x11-fonts-misc-7.5-33.el9.noarch.rpm f3f5ff63add1ff98c1e90033eb06a626073009b0a21047289d555ce1ad2cef7d xorg-x11-fonts-Type1-7.5-33.el9.noarch.rpm a16cf0e08f8d384c264fc6ea074e652961c69123df0ec9dd49a2a1e2541a67ec yajl-2.1.0-21.el9.x86_64.rpm 98abfa321a3c820e0f4bc94b62a1f2eea9f1c9392593adfb0d947d92972ed0de RLSA-2023:0824 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.8.0. Security Fix(es): * Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) * Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) * Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) * Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) * Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) * Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) * Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) * Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) * Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) * Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP (CVE-2023-0616) * Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-102.8.0-2.el9_1.x86_64.rpm ee0236a731da14a7dfc78bd0b7554283e35908f0459b67b5464507f24c226bae RLBA-2022:8430 fence-agents bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Bug Fix(es) and Enhancement(s): * fence_ibm_vpc: Add an authentication token caching mechanism (save token in session for configurable interval) (Rocky Linux9) (BZ#2127878) * fence_azure_arm fails with 'ServicePrincipalCredentials' object has no attribute 'get_token' (BZ#2127882) rocky-linux-9-x86-64-appstream-rpms fence-agents-common-4.10.0-30.el9_1.1.noarch.rpm 5d6d0e5288bb4819931c80f67c6d82c53d0239200e500fef0c55d3ef0a14e55a fence-agents-compute-4.10.0-30.el9_1.1.x86_64.rpm 987cdfdcb4cf9924bb79f8450816d0d9d9c64a16e68b9ee9216aa28b2e504140 fence-agents-ibm-powervs-4.10.0-30.el9_1.1.noarch.rpm e11a479ddc95d9e0b96b91503c26cf1c926debbbee5de99806f2c87a646f4381 fence-agents-ibm-vpc-4.10.0-30.el9_1.1.noarch.rpm 5799c0043df987e445448a5f44a9a080ab8dc9fa7d2e1f18764138932001e69e fence-agents-kubevirt-4.10.0-30.el9_1.1.x86_64.rpm 81f39692a3915637682b3c922fab5f48cf18c63836b45a075a16d72196cf9871 fence-agents-virsh-4.10.0-30.el9_1.1.noarch.rpm 8ee652646647df883c5a6a87e14bdca664b779635ff7595ac866d0f89f89d3f8 fence-virt-4.10.0-30.el9_1.1.x86_64.rpm ad8079229d80d22fa0b8a61057b51407ad042735f9265cbee09e8c01d2b02744 fence-virtd-4.10.0-30.el9_1.1.x86_64.rpm d38c221fad37130c267cb2e09f09e54c7a1661d8f391298aa667b988f94416f7 fence-virtd-cpg-4.10.0-30.el9_1.1.x86_64.rpm 7311bd308b7fce7626e1f1efceb4a2ebe51142076cf4d47af3b383af25d612a8 fence-virtd-libvirt-4.10.0-30.el9_1.1.x86_64.rpm 7c7a047976567520da46e488d7770e91a655a19440cc4afce78756c6125c7571 fence-virtd-multicast-4.10.0-30.el9_1.1.x86_64.rpm cb792c9a484d9d15cf5973d6a91e80650cb25bd23d2769ed7eb8852605304c6d fence-virtd-serial-4.10.0-30.el9_1.1.x86_64.rpm d4c34e220f40da921730f096c90d89a975509b4d566b16599c7bee32dbc69aa2 fence-virtd-tcp-4.10.0-30.el9_1.1.x86_64.rpm 641685476e28e6708dc334ca1aaf3a92ad48ce39ce395796d44e85e77b7bf30a RLBA-2022:8432 containers-common bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for containers-common. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The containers-common package contains common configuration files and documentation for container tools ecosystem, such as Podman, Buildah and Skopeo. Bug Fix(es) and Enhancement(s): * containers-common-1-44 is missing RPM-GPG-KEY-redhat-beta (BZ#2123611) rocky-linux-9-x86-64-appstream-rpms containers-common-1-45.el9_1.x86_64.rpm 0317217135c1f62f4bbac2e7a2bbee073556e7fab000b8179d04176bf3c7c039 RLBA-2022:8433 runc bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for runc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime. Bug Fix(es) and Enhancement(s): * Error: runc: exec failed: unable to start container process: open /dev/pts/0: operation not permitted: OCI permission denied [Rocky Linux 9.1] (BZ#2124700) rocky-linux-9-x86-64-appstream-rpms runc-1.1.4-1.el9_1.x86_64.rpm a06c71f8d70df988d7821a0999b7fdc6d426bdcd45e9e421861730a5eb97a7a3 RLBA-2022:8435 netavark bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for netavark. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Netavark is a rust based network stack for containers. Bug Fix(es) and Enhancement(s): * Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-9.1.0.z] (netavark) (BZ#2136306) rocky-linux-9-x86-64-appstream-rpms netavark-1.1.0-7.el9_1.x86_64.rpm b805d4e34fd20718453196fbdc15a8c0039f9e1619260ea51a3781a92221b2b3 RLBA-2022:8437 ansible-freeipa bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-freeipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ansible-freeipa package provides Ansible roles and playbooks to install and uninstall FreeIPA servers, replicas and clients also modules for management. Bug Fix(es) and Enhancement(s): * [ansible-freeipa] ipaserver: Add missing idstart check (BZ#2132976) * ansible-freeipa Replica Install Setup DNS fails (BZ#2132990) * ipaconfig does not support SID and netbios attributes. (BZ#2132996) * [ansible-freeipa] Require a clear error message while updating netbios_name without enable_sid. (BZ#2135756) * [ansible-freeeipa] It should not be possible to disable SID from ipa config module, and the error message should be clear (BZ#2135757) * [ansible-freeipa] Do not require 'enable-sid' for 'add-sids' and 'netbios-name'. (BZ#2135776) rocky-linux-9-x86-64-appstream-rpms ansible-freeipa-1.8.3-2.el9_1.noarch.rpm b8daad624892a66649974061a744caf221b30df61e86b052ef643c53ebf71716 ansible-freeipa-tests-1.8.3-2.el9_1.noarch.rpm 19b460be48462862efa1a8dded89994549516dfdb9f714f7f00f3c8e11421cb5 RLBA-2022:8436 aardvark-dns bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for aardvark-dns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The aardvark-dns package is and authoritative DNS server for A/AAAA container records. Bug Fix(es) and Enhancement(s): * Two aardvark-dns instances trying to use the same port on the same interface. [Rocky Linux-9.1.0.z] (aardvark-dns) (BZ#2136395) rocky-linux-9-x86-64-appstream-rpms aardvark-dns-1.1.0-5.el9_1.x86_64.rpm 5ba5a97a46dfe56a33954eeb4ffc3b5e3f3b98d2aa78d9cfe32935cf6f2ca633 RLBA-2022:8438 osbuild-composer bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for osbuild-composer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The osbuild-composer package is a service for building customized OS artifacts, such as virtual machine (VM) images and OSTree commits. Apart from building images for local usage, it can also upload images directly to cloud. The package is compatible with composer-cli and cockpit-composer clients. Bug Fix(es) and Enhancement(s): * osbuild-composer can't access /var/cache/osbuild-composer/rpmmd on package upgrade from 9.0 (BZ#2136533) rocky-linux-9-x86-64-appstream-rpms osbuild-composer-62.1-3.el9_1.rocky.0.1.x86_64.rpm 5fd3dd03308ff4fdc0425624faf133682b8ae2fcb10253d14e75624cebc71bf1 osbuild-composer-core-62.1-3.el9_1.rocky.0.1.x86_64.rpm 97adf1242eed105452bdb0cec262c4b582211965251fdd616768163093d7edea osbuild-composer-dnf-json-62.1-3.el9_1.rocky.0.1.x86_64.rpm c7914c05891ea381cc5fb9cac010bbd7cbe735d82c37dd41d9250176f388400d osbuild-composer-worker-62.1-3.el9_1.rocky.0.1.x86_64.rpm ee80f68d07cb1eb06425f3fceffaa9d8e8449b51bedb85e5a30d9da21f016aee RLBA-2022:8439 python-podman bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-podman package is a library of bindings to use the RESTful API for Podman. Bug Fix(es) and Enhancement(s): * [RFE] python-podman: Podman support to perform custom actions on unhealthy containers (BZ#2136283) rocky-linux-9-x86-64-appstream-rpms python3-podman-4.2.1-1.el9_1.noarch.rpm fc48be3f554f9ee78ec7fe4d347b9929648d6b37d3d336189edc160295031b79 RLBA-2022:8440 mutter bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mutter. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mutter is a compositing window manager that displays and manages desktop through OpenGL. It combines the window-management logic inherited from the Metacity window manager with a display engine that uses the Clutter toolkit. Bug Fix(es) and Enhancement(s): * [AMDCLIENT 9.1 Bug] [Lenovo]When switch to some resolutions will be black screen [Rocky Linux-9.1.0.z] (BZ#2136747) rocky-linux-9-x86-64-appstream-rpms mutter-40.9-10.el9_1.i686.rpm 4e3d16a73c4d923e5e9af5f5a8138cd682cfeb5ab527375cb3e3a323470ffac7 mutter-40.9-10.el9_1.x86_64.rpm 2d3b70879b9922cc48ca36a67b707aee6d8dcd283fffaf3c81104f9e9da621d7 RLBA-2022:8443 Rocky Linux9/skopeo container image update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for skopeo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Skopeo Universal Base Image provides a command line utility to inspect images and repositories directly on registries without the need to pull them. This updates the Rocky Linux9/skopeo image in the Rocky Enterprise Software Foundation Container Registry. To pull this container image, run one of the following commands: podman pull registry.redhat.io/Rocky Linux9/skopeo (authenticated) podman pull registry.access.redhat.com/ubi9/skopeo (unauthenticated) rocky-linux-9-x86-64-appstream-rpms skopeo-1.9.4-0.1.el9_1.x86_64.rpm 2a77ae05a0cb0755f9cbb2c1e699a62fa7c162554295bb2d50a6a1e486c80d6f skopeo-tests-1.9.4-0.1.el9_1.x86_64.rpm c28cbaef7f50c84612c7fc66d551131465f1b48136556a093ff4ae5f403405bb RLSA-2022:8444 Moderate: keylime security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for keylime. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution. Security Fix(es): * keylime: exception handling and impedance match in tornado_requests (CVE-2022-3500) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms keylime-tenant-6.5.1-1.el9_1.4.x86_64.rpm 74d2ff21c54cd23d1f2756838008f2640b69a17b4de8070de7c282b47eeaeb43 keylime-6.5.1-1.el9_1.4.x86_64.rpm 4ebeccd3fa45154859133692dd6e8e7f2ae6b60b4451f3294956928ab32b336c keylime-base-6.5.1-1.el9_1.4.x86_64.rpm 44389a08b4c3b149c3432bd37888893de9bc2c3261069d71a0e873224add559d keylime-registrar-6.5.1-1.el9_1.4.x86_64.rpm bc7a81d8e8e9e3547550806883103a9cbc1d95f78b84494c940912a65bbdc91f keylime-selinux-6.5.1-1.el9_1.4.noarch.rpm 2829767011452d2edcfef51925c82770435032a78ca2d3c6de6efafe149ac9ac keylime-verifier-6.5.1-1.el9_1.4.x86_64.rpm 22b126056912799186d289c10e59d6c86b3a802b7fa697722a19fac6a166fb16 python3-keylime-6.5.1-1.el9_1.4.x86_64.rpm a289908636025492c0a33826cb1057d77c797d8e52dc02d0779f3e844055d470 RLBA-2022:8446 bind-dyndb-ldap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bind-dyndb-ldap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The dynamic Lightweight Directory Access Protocol (LDAP) back end is a plug-in for BIND that provides back-end capabilities for LDAP databases. It features support for dynamic updates and internal caching that helps to reduce the load on LDAP servers. Bug Fix(es) and Enhancement(s): * named-pkcs11 crashing into dns-pkcs11 library red-black tree (BZ#2130614) rocky-linux-9-x86-64-appstream-rpms bind-dyndb-ldap-11.9-8.el9_1.x86_64.rpm 3a72e9b5a513cf3ec462e02cfcf10df61fe2d6cc45be0d92f4da32205fd86815 RLBA-2022:8449 rpm bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rpm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es) and Enhancement(s): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2136770) rocky-linux-9-x86-64-appstream-rpms rpm-apidocs-4.16.1.3-19.el9_1.noarch.rpm f84de4b4316328f580034a4c2cf49a45e547bb106dd37248ffa57a50d9adbffd rpm-build-4.16.1.3-19.el9_1.x86_64.rpm b2cb65dcf5676b8367432c49088762a3f35a67ebdcf5b50829f8c49b529934c3 rpm-cron-4.16.1.3-19.el9_1.noarch.rpm 4c3cf15444097a08bfd5fe216283672af6024b6f756b1307ee3ba86cf2dd7fe7 rpm-devel-4.16.1.3-19.el9_1.i686.rpm 37d8f29633a662fbe8d6ba5b4126b6e8ab7eb48d5403300bd6677ab3729e24f1 rpm-devel-4.16.1.3-19.el9_1.x86_64.rpm 0159f41701a0966d15a08a218c5fadbc147f9a5178ba78e290b009a973dec9c2 rpm-plugin-fapolicyd-4.16.1.3-19.el9_1.x86_64.rpm 4598210a33576198b8bbadb493836434b5f84969f087cb1ae38d4a0d507b3338 rpm-plugin-ima-4.16.1.3-19.el9_1.x86_64.rpm 65cd73befb77706ba853afee4a338aed5cfda86e66046df728a110e960cdf813 rpm-plugin-syslog-4.16.1.3-19.el9_1.x86_64.rpm 2a7708702cc92a3ae4cdce4126b34264f8826aff95e81e3857e84fe733265bff rpm-plugin-systemd-inhibit-4.16.1.3-19.el9_1.x86_64.rpm a2dee2e1dd3cc40049a500d021858a55128774a78b4c7effc5e8fd7cc90601cb RLSA-2022:8493 Important: python3.9 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: local privilege escalation via the multiprocessing forkserver start method (CVE-2022-42919) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-devel-3.9.14-1.el9_1.1.i686.rpm 48fd68110090a368bf2f23454cd5fb4227ddd7e312101d3415b2868257198b9d python3-devel-3.9.14-1.el9_1.1.x86_64.rpm beabc37d468844e408deb670ef0497adc44d7a14060b9f41beb213445fbfcdff python3-tkinter-3.9.14-1.el9_1.1.x86_64.rpm b952c1061c4c06a74066ee00a44b763a940fffc7f5a7b373d45363581345b5de python-unversioned-command-3.9.14-1.el9_1.1.noarch.rpm 6f7e039a812180a993547ce15afb3e327d06a856110cc19a815484bad0dc3279 RLBA-2022:3319 new packages: mesa-demos Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mesa-demos. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms glx-utils-8.4.0-12.20210504git0f9e7d9.el9.0.1.x86_64.rpm 4bca2a9207bf337a972d9da4cff424e84d9a5db33dbb3d43781ad7b6f040a779 mesa-demos-8.4.0-12.20210504git0f9e7d9.el9.0.1.x86_64.rpm a9a4fde82c80da96167bef4983924cf21bf84b46ef4a1770db55861b8a699c25 RLSA-2023:2074 Important: emacs security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for emacs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news. Security Fix(es): * emacs: command injection vulnerability in org-mode (CVE-2023-28617) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms emacs-27.2-6.el9_1.1.x86_64.rpm 6ce822afa9ffd07b47b9e06d18b68f3a79f36ae80990ea900bfb1152acfa8697 emacs-common-27.2-6.el9_1.1.x86_64.rpm aeefc75141b367025bce09b94626d203b5dfde34fbafb0d0473a541379caf2f4 emacs-filesystem-27.2-6.el9_1.1.noarch.rpm 948154bc7cb631093e374e98bfa15d767aa94b301e41697a097e8c4ec77f78ee emacs-lucid-27.2-6.el9_1.1.x86_64.rpm a1b498eacae205bf012e2a71ab74d4738df389ce32c5fec7a63efd9461bffc43 emacs-nox-27.2-6.el9_1.1.x86_64.rpm f19ce6bb52309c07d74ee87364be221387aa685811122717383578c6b397ab67 RLBA-2022:2549 new packages: wireshark Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for wireshark. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms wireshark-3.4.10-1.el9.x86_64.rpm 340fc5ccc766ac99ab350c3cf95b531ba160c7ce48838215bf5701fe002ab3b5 wireshark-cli-3.4.10-1.el9.i686.rpm 230a17aabdf30bc03154b1386952243a0a53b8265c4751e73db0090085120e9b wireshark-cli-3.4.10-1.el9.x86_64.rpm 54fc2fe4a29d3ebaef62d47d23d76ca5bb9f76914f76967c065372f8200fd899 RLSA-2022:8637 Important: krb5 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for krb5. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: integer overflow vulnerabilities in PAC parsing (CVE-2022-42898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms krb5-devel-1.19.1-24.el9_1.i686.rpm e9437d87122b41e9f67a3f8625c4bec8dd9522653dcb7f8cb351648833d8c99c krb5-devel-1.19.1-24.el9_1.x86_64.rpm f9dd6b0c2ad3644a89ccb7b9a0fa736e5307a265ea6b3a6176c470b3a33d039e RLSA-2022:8643 Important: varnish security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for varnish. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * varnish: Request Forgery Vulnerability (CVE-2022-45060) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms varnish-6.6.2-2.el9_1.1.i686.rpm c068a1f9d3a1c249487d18db2f18b2012bc8c6cd9b8ee37e136cdbf6469b5d9a varnish-6.6.2-2.el9_1.1.x86_64.rpm e59a3aff50bf54c2855693ea6a88f52aadd286ab784af4b9c19258dcdaef326d varnish-docs-6.6.2-2.el9_1.1.x86_64.rpm 1f4218dfac56d7056b83497444bf39bd2dd07bceade816145460324491df49da RLBA-2023:0947 ipset bug fix and enhancement advisory Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipset. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ipset packages provide the ipset utility and the ipset service to manage IP sets in the Linux kernel. Depending on the type, an IP set may store IP addresses, networks, (TCP/UDP) port numbers, MAC addresses, interface names or combinations of them in a way that ensures high speed when matching an entry against a set. Bug Fix(es) and Enhancement(s): * systemctl restart ipset extremely slow restoring large saved set (BZ#2043008) rocky-linux-9-x86-64-appstream-rpms ipset-service-7.11-7.el9_1.noarch.rpm c6b353b8305a632f943cc583d6eccc8a5200ef9b9172927565f006e5d44058db RLBA-2023:0949 iptables bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iptables. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iptables utility controls the network packet filtering code in the Linux kernel. Bug Fix(es) and Enhancement(s): * ebtables among-src partially broken (BZ#2136584) rocky-linux-9-x86-64-appstream-rpms iptables-devel-1.8.8-6.el9_1.i686.rpm 852130b8e23c4644f99de82940934707a266be64dad156180db64f78b5113f23 iptables-devel-1.8.8-6.el9_1.x86_64.rpm 1b4fb2d1cb2166532be03e9283298f7e415f8f3c03e7eb15646f379fd68c0ef6 iptables-nft-services-1.8.8-6.el9_1.noarch.rpm 1d6b000608ee5c08e9433e434fe818c6bd7414ab775418e7a195af00e5701a11 RLBA-2022:8785 tzdata bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tzdata. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022g, which addresses recent time zone changes. Notably: * On November 30, 2022, the northern edge of the Mexican state of Chihuahua has changed time zone to agree with the nearby US locations. * A new Zone America/Ciudad_Juarez that splits from America/Ojinaga has been added. rocky-linux-9-x86-64-appstream-rpms tzdata-java-2022g-1.el9_1.noarch.rpm ff69047c3082c3e0a940ee04ef561126d256c588b86fc17cca3a5da1f7b8851a RLBA-2022:8899 firefox:flatpak bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. Bug Fix(es) and Enhancement(s): * Update firefox:flatpak module stream for Firefox 102.5 release (JIRA:Rocky LinuxPLAN-137721) rocky-linux-9-x86-64-appstream-rpms dbus-glib-0.110-13.el9.x86_64.rpm bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071 dbus-glib-devel-0.110-13.el9.x86_64.rpm 78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756 libsbc-1.4-9.el9.x86_64.rpm b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd mozilla-filesystem-1.9-30.el9.x86_64.rpm 725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742 sbc-1.4-9.el9.x86_64.rpm 94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1 RLSA-2023:0953 Moderate: python3.9 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * Python: CPU denial of service via inefficient IDNA decoder (CVE-2022-45061) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-devel-3.9.14-1.el9_1.2.i686.rpm c42490b4eaf04c0d16244809e1619c42398010db85ee97c7eaf9671c48b2b915 python3-devel-3.9.14-1.el9_1.2.x86_64.rpm 1b8a7b2b64858b877d163d6c6c0f3383eb2c82bfb75526024e3a7074fa03bdb5 python3-tkinter-3.9.14-1.el9_1.2.x86_64.rpm 0caf2ccd01c94547498dec8683053ff68adc4145a78347e891bd21f942c2c624 python-unversioned-command-3.9.14-1.el9_1.2.noarch.rpm 8c1295c94bea9fedb13b7154d2ff121c6ae51dc0e767221593129ca3ffc3a304 RLSA-2023:0954 Moderate: systemd security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for systemd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting (CVE-2022-4415) * systemd: deadlock in systemd-coredump via a crash with a long backtrace (CVE-2022-45873) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms systemd-devel-250-12.el9_1.3.i686.rpm 1df2fcec62f2c59d6164ed5013923427267b0ce180b38ab417a7c18a64137ee2 systemd-devel-250-12.el9_1.3.x86_64.rpm d61c188a279c79e01344d02373b750f4a14b283f5fe0e75fb69c77411859fff5 systemd-journal-remote-250-12.el9_1.3.x86_64.rpm 79f375287305a3a536a7b0b34f16627c021f1723fc1abdac247e074196d83946 RLSA-2023:2078 Important: libwebp security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libwebp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently. Security Fix(es): * Mozilla: libwebp: Double-free in libwebp (CVE-2023-1999) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libwebp-1.2.0-6.el9_1.0.1.i686.rpm 30a3caf13a4f74a70361f3e91cde738b04228c83c93424995b8b8f86ed32716e libwebp-1.2.0-6.el9_1.0.1.x86_64.rpm 6ec56e54fd04fa7ead4e4138b12ad8e7e61aeb7cf00dbb16a2eccb456e8980cd libwebp-devel-1.2.0-6.el9_1.0.1.i686.rpm 5a51591cdaf4c29ca60d82312e047296c50833650e8a9f11973273d1cb37a9b0 libwebp-devel-1.2.0-6.el9_1.0.1.x86_64.rpm 985fa5c4eb7835e0e0fbf772ec3740ebb9f7408cb910e81b4c4c4552895673aa RLBA-2022:2550 new packages: oniguruma Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for oniguruma. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms oniguruma-6.9.6-1.el9.5.i686.rpm e8a525cd43c96c1f220b14befd7a38f81eff2485d9ad1af547d894e52d26cf4d oniguruma-6.9.6-1.el9.5.x86_64.rpm 6db5037eeddf4108851a44f08e71f54b397647e5ad5593c5889714400088bedb RLSA-2023:0957 Moderate: lua security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for lua. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language. Security Fix(es): * lua: use after free allows Sandbox Escape (CVE-2021-44964) * lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file (CVE-2021-43519) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms lua-5.4.4-2.el9_1.x86_64.rpm 08ea59847e48d1e94c58d3f8be4eab60be02f66883429fdb79c711a5f3f0faff RLSA-2023:0958 Moderate: vim security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for vim. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: no check if the return value of XChangeGC() is NULL (CVE-2022-47024) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms vim-common-8.2.2637-20.el9_1.x86_64.rpm ecb9078bca6357278341911895ba4dbe2565807d9eda9be3cd7d822751e48917 vim-enhanced-8.2.2637-20.el9_1.x86_64.rpm dbfee7a023eb444a484cbf31805bb52eb2ad1d4ea3a5a891cd8ef78dc2672a11 vim-X11-8.2.2637-20.el9_1.x86_64.rpm 720fb5f4e53bdc791360f2e7260aa223d69abe462fd7d60bd804aa6c6017cbcb RLBA-2023:0960 selinux-policy bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for selinux-policy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es) and Enhancement(s): * selinux-policy AVC denials during ipa trust-add (BZ#2168961) rocky-linux-9-x86-64-appstream-rpms selinux-policy-devel-34.1.43-1.el9_1.2.noarch.rpm e1c40431b1dd691ce3e287db8da0359adbbbf311cda207fae8a358f51d9cdac8 RLBA-2023:0964 libvirt bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. Bug Fixes: * libvirt doesn't catch mdevs created thru sysfs (BZ#2141364) * libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2152083) * qemuAgentGetDisks cannot parse response from a guest agent running in Windows VM (BZ#2154410) Enhancement: * Backport the qemuDomainGetStatsCpu fallback Implementation (BZ#2157094) rocky-linux-9-x86-64-appstream-rpms libvirt-8.5.0-7.4.el9_1.x86_64.rpm 57a3167b3cba57e16e0143fcbca907b123d3b20b4c23b5075b18543792ee85c3 libvirt-client-8.5.0-7.4.el9_1.x86_64.rpm 3220cacbb995fb62c90b0a73de1c823c7b9eb6a643bd89ee2eb5f878b4b81f14 libvirt-daemon-8.5.0-7.4.el9_1.x86_64.rpm e96432441a860d4e978865352a881bb54d790a58c4a7538b06bae73e3a549a6b libvirt-daemon-config-network-8.5.0-7.4.el9_1.x86_64.rpm 20bb239425b9962aceafc9c4dd6a96c75bee4a9b0db2752ed32a4d9d163bb20d libvirt-daemon-config-nwfilter-8.5.0-7.4.el9_1.x86_64.rpm 87bec2fe43f1f842288ba9dcb3e6840bafbbc5aead3f766b7e0f928ae0c7cfb6 libvirt-daemon-driver-interface-8.5.0-7.4.el9_1.x86_64.rpm 380273e78bd4408ec37f7360b06aecb2c911011dfd54194abc481a8261ae853c libvirt-daemon-driver-network-8.5.0-7.4.el9_1.x86_64.rpm 6980bcb2f8ab6f01bde49dab89f0f1919d16a73a33040c0f584d1db9c04fb317 libvirt-daemon-driver-nodedev-8.5.0-7.4.el9_1.x86_64.rpm cf5e2b276124ec165a6189df87c1ab74fefb417768e0d0897d4935a21e8808f1 libvirt-daemon-driver-nwfilter-8.5.0-7.4.el9_1.x86_64.rpm ed2eb26159abc683f58df74c365a67be78998b18f5e842a5506e5b38b8fe575a libvirt-daemon-driver-qemu-8.5.0-7.4.el9_1.x86_64.rpm 35f6218a1a1b3b2713d2ade31c119ea016f0e1dd0e278eeb6532fa5acafea738 libvirt-daemon-driver-secret-8.5.0-7.4.el9_1.x86_64.rpm 4bea5b106c1d9b2e1e5709c6e42d1637b9b395a63de055a407c17cacb98144ad libvirt-daemon-driver-storage-8.5.0-7.4.el9_1.x86_64.rpm 8b0c96d055e5193138b87f57a1e9485d4ff9072d992f8f9e5ef5201942eee911 libvirt-daemon-driver-storage-core-8.5.0-7.4.el9_1.x86_64.rpm 5b6daa4a7d930663981fcc5680f29c409e6b4940d6a9ee71fbc63536abbf3297 libvirt-daemon-driver-storage-disk-8.5.0-7.4.el9_1.x86_64.rpm 55b7f1616b2e42eb6ecfdf8e8e2b9ca637269b4a84e2ad7ed6e957adaac4f42e libvirt-daemon-driver-storage-iscsi-8.5.0-7.4.el9_1.x86_64.rpm 12a1858f54c45044aaf106d31906ed99d95aa5e1eb3025bebfa22e0975f0aa5b libvirt-daemon-driver-storage-logical-8.5.0-7.4.el9_1.x86_64.rpm a740964d7ab2cdfdb0a5d50d1a9de9cc42298727066f0258b1c7f1560a0c8fde libvirt-daemon-driver-storage-mpath-8.5.0-7.4.el9_1.x86_64.rpm 1c7a4077827efcad0e5001788a8f9dff6621aa84352f381416b69452b4978f2d libvirt-daemon-driver-storage-rbd-8.5.0-7.4.el9_1.x86_64.rpm a84dec6f2988295b9333b14012beb50ba8bf113a30627b78d51d963f816e1896 libvirt-daemon-driver-storage-scsi-8.5.0-7.4.el9_1.x86_64.rpm 0c706fa0b5a287bb7a561f633f0b508e082b3110d94d3757da6087404dcb3ada libvirt-daemon-kvm-8.5.0-7.4.el9_1.x86_64.rpm be6bb2de5cecee95649c6ca0048d9186629444145c8d836510b791a42dcf18b1 libvirt-libs-8.5.0-7.4.el9_1.x86_64.rpm dfae7c46013b26d1a09431c781b2b9aebfb68f1995865fbdff0e12cbfad4ac0f libvirt-nss-8.5.0-7.4.el9_1.x86_64.rpm d559b9698a318c831d66b881a3af4dabd2975c0b0d1a539c0fdee4bd0ee5709e RLBA-2023:0962 cloud-init bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cloud-init. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Bug fixes: * Ensure network ready before cloud-init service runs on Rocky Linux (BZ#2153183) * systemd[1]: Failed to start Initial cloud-init job after reboot system via sysrq 'b' (BZ#2165942) rocky-linux-9-x86-64-appstream-rpms cloud-init-22.1-7.el9_1.0.1.noarch.rpm 1108613c461841b1268e21cd769ed37d771c9185588399e0d550447cbc35fba6 RLSA-2023:0965 Moderate: php security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for php. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. The following packages have been upgraded to a later upstream version: php (8.0.27). (BZ#2161667) Security Fix(es): * XKCP: buffer overflow in the SHA-3 reference implementation (CVE-2022-37454) * php: standard insecure cookie could be treated as a `__Host-` or `__Secure-` cookie by PHP applications (CVE-2022-31629) * php: OOB read due to insufficient input validation in imageloadfont() (CVE-2022-31630) * php: Due to an integer overflow PDO::quote() may return unquoted string (CVE-2022-31631) * php: phar wrapper can occur dos when using quine gzip file (CVE-2022-31628) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms php-8.0.27-1.el9_1.x86_64.rpm 6e936eee74340e5a2ef68ff7dcc084d25575f3be5b9e8b5da01a0fc973043c7c php-bcmath-8.0.27-1.el9_1.x86_64.rpm ab39a03f649a9de6ff338ae78c9bbffec3651f0826f6a1d8fc9ea8fba0cbd2f2 php-cli-8.0.27-1.el9_1.x86_64.rpm c1f75ef714cbbe0a99b674ae251b8f62f53604cd494ff27e701ccf000410adcd php-common-8.0.27-1.el9_1.x86_64.rpm 470dd54da09171a89720667bb6f0093ff71c18de31505952d95193645bae5d20 php-dba-8.0.27-1.el9_1.x86_64.rpm 552df425057f413fcc56503bd09645df2e29a0c79ed182009703e523415fa542 php-dbg-8.0.27-1.el9_1.x86_64.rpm 3bfd5ebd7d87c3ddcdbf83b1b03553e4a0939ab940231656e3342e62d5e5a38f php-devel-8.0.27-1.el9_1.x86_64.rpm eff522c315d36b6ca261703e53b734abc0ccd43a5a3adae9453468cd9516defe php-embedded-8.0.27-1.el9_1.x86_64.rpm aea94e12b69410a12a4b65fefe8813fe1047adb9ccb5c9cfc07b3d709fa5fdbf php-enchant-8.0.27-1.el9_1.x86_64.rpm f18ae2a95314760ee773d89b392ce9c674d26951d1662df5b7a4b374d03490d5 php-ffi-8.0.27-1.el9_1.x86_64.rpm 59616f998f32268cf0d55afc1c031b8552a820027935e08157e6efbaf8c1bc0b php-fpm-8.0.27-1.el9_1.x86_64.rpm cb413faf20308620ef17dbd247e8fec107f882c461505c0514fa9758cdd0a7e2 php-gd-8.0.27-1.el9_1.x86_64.rpm c6d9808434fb1566dc684f18ece56020732611f2d92aed186fe4ae82eaa61481 php-gmp-8.0.27-1.el9_1.x86_64.rpm deba46e9d780608626fa328093eda3970bd637b9e6713a8ebb646a81ee38b456 php-intl-8.0.27-1.el9_1.x86_64.rpm 03708d625478cb954ee5583da8745c333682773bc00337414cdee2dbf054654e php-ldap-8.0.27-1.el9_1.x86_64.rpm b9781557ac23fc73645c2193b563564718e1b0a70d9140061551125ea59741e9 php-mbstring-8.0.27-1.el9_1.x86_64.rpm 1f0861a211a8ea03969d9b967a3d1734eeae37680a364f3f2c2e556482d22d63 php-mysqlnd-8.0.27-1.el9_1.x86_64.rpm 10e5b013f0166dfa6cf64a89da9093e247b5d303899adedcb5f146576c7af21e php-odbc-8.0.27-1.el9_1.x86_64.rpm 41ff36835b0709066711b9e7a4596027c4231bf330df0564db42529c27e6365b php-opcache-8.0.27-1.el9_1.x86_64.rpm 6916caceaa2919b7a3858390beb8377ca0ee40f4b37a284a134fb97b8bedd0ee php-pdo-8.0.27-1.el9_1.x86_64.rpm 42e7826396f1a8ec2e1fb18cf5cfe0b991870e747d80c90b2a107c8b820ba78d php-pgsql-8.0.27-1.el9_1.x86_64.rpm fd7cadc0491362b8141920538a9782cf588984693d56f2831e89e64054533f44 php-process-8.0.27-1.el9_1.x86_64.rpm 0d7d7a1308e21ef4704b22e436fcc01d720c3a0740c09e2ef0192995dd8d2c44 php-snmp-8.0.27-1.el9_1.x86_64.rpm 0613c9fa7d3caea73d293543c1c515b86f6216012368275977da6aafdf94a5dd php-soap-8.0.27-1.el9_1.x86_64.rpm 467c032468810f9a9815a17371b48b7654a912893d6149d73e60da5850a67b5e php-xml-8.0.27-1.el9_1.x86_64.rpm 5f3af1b9950f82465fda05ea6f20aec71c9a53122ea57cc77ee74bcc6f0ea97b RLBA-2023:0968 containers-common bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for containers-common. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The containers-common package contains common configuration files and documentation for container tools ecosystem, such as Podman, Buildah and Skopeo. Bug Fix(es) and Enhancement(s): * Update shortnames.conf. (BZ#2158512) rocky-linux-9-x86-64-appstream-rpms containers-common-1-49.el9_1.x86_64.rpm 8795db0690ba77f4e97782fc178b53581f82ba0a989b41834a03d99bc809a3b2 RLBA-2023:0967 udica bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for udica. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The udica package provides a tool for generation SELinux policies for containers. With udica, you can create a tailored security policy for better control of how a container accesses host system resources, such as storage, devices, and network. This enables you to harden your container deployments against security violations and it also simplifies achieving and maintaining regulatory compliance. Bug Fix(es) and Enhancement(s): * Bump release to preserve upgrade path. (BZ#2164991) rocky-linux-9-x86-64-appstream-rpms udica-0.2.6-30.el9_1.noarch.rpm 2133a41838dab65ad8db2f8933766eb8953f07c03e479fb5dbb4f413d6eec1f8 RLSA-2023:0970 Moderate: httpd security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_dav: out-of-bounds read/write of zero byte (CVE-2006-20001) * httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-36760) * httpd: mod_proxy: HTTP response splitting (CVE-2022-37436) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * httpd-init fails to create localhost.crt, localhost.key due to "sscg" default now creates a /dhparams.pem and is not idempotent if the file /dhparams.pem already exists. (BZ#2165975) rocky-linux-9-x86-64-appstream-rpms httpd-2.4.53-7.el9_1.1.x86_64.rpm be77545283eaa94ee8f4b8677e7cd540bbe40a45f3cd3e3367b1173db3ebbda7 httpd-core-2.4.53-7.el9_1.1.x86_64.rpm ff4803f8b9c698e90413034d7e16d78439ba15f346c676caad2d2241be632c42 httpd-devel-2.4.53-7.el9_1.1.x86_64.rpm f62954406eadb85cad7b882e8e0d8deb27556c204adf9957b34e9da0519d3c4a httpd-filesystem-2.4.53-7.el9_1.1.noarch.rpm d95490f97281d675b284a5d9e5620b2e4469f188176ad6a9fafcfabd049fa169 httpd-manual-2.4.53-7.el9_1.1.noarch.rpm 6c42f3d57a0a3480478753f17c63e90523e2b232eac7132379fc6ca9d55cb466 httpd-tools-2.4.53-7.el9_1.1.x86_64.rpm e2fa756359c33ce3350e46bcdf3bf5cebc69c2d674ed07520e918dae9176fab6 mod_ldap-2.4.53-7.el9_1.1.x86_64.rpm 90d24163651f5a8ca7e59c0456455bc05590bb6d629abe5d6444f0199ddf4fb9 mod_lua-2.4.53-7.el9_1.1.x86_64.rpm 2957b20949445ccc2844bf9bfcec2ae2f7f45f4fed4bb40e0a1893296516aeb1 mod_proxy_html-2.4.53-7.el9_1.1.x86_64.rpm 264a4340280a1b041a67b8bf6b9bba42f03d95c08f7e7aec9195b3fc24b303ec mod_session-2.4.53-7.el9_1.1.x86_64.rpm 74fe0e842d0f724837798401405740ee7bd63ff1b443bb166ab9d33ac44e7e9e mod_ssl-2.4.53-7.el9_1.1.x86_64.rpm d4cccb00b014dec5b48c791c30f782340fed7edd3fa3b0c9c8f2fcd15c15a8b9 RLBA-2023:0972 WALinuxAgent bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for WALinuxAgent. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Windows Azure Linux Agent supports provisioning and running Linux virtual machines in the Microsoft Windows Azure cloud. Bug fix: * /dev/disk/azure/ is created as symlink to sr0 or sda and not as a directory (BZ#2168913) rocky-linux-9-x86-64-appstream-rpms WALinuxAgent-2.7.0.6-6.el9_1.1.rocky.0.noarch.rpm 5af51818d1c38b70b1dc2994e9ca7a8bd6a72bc1a413afa8667982513a41d727 WALinuxAgent-udev-2.7.0.6-6.el9_1.1.rocky.0.noarch.rpm 8ae764d4370c2d8c4f42b3087561ebc2fc77e19623aead53884b774e846ebfc7 RLSA-2023:1337 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.9.0 ESR. Security Fix(es): * Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751) * Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176) * Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752) * Mozilla: Invalid downcast in Worklets (CVE-2023-28162) * Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation (CVE-2023-28164) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-102.9.0-3.el9_1.x86_64.rpm 5dbd79fe888aaadcc13d1700b2a91d7df197145776c8125680d29dcaa3c9a82b firefox-x11-102.9.0-3.el9_1.x86_64.rpm 571c301f6130899c57adfbb891dc0a800a9e24cdd9aaa62add6e1364bacfcb1d RLBA-2023:1756 .NET 7.0 bugfix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet7.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es): * Update .NET 7.0 to SDK 7.0.105 and Runtime 7.0.5 [rhel-9.1.0.z] (BZ#2183592) rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-7.0-7.0.5-1.el9_1.x86_64.rpm 7be96285ff00ac0b571fe978e2c59120232c420867f5f46d03dfc00855aa90ea aspnetcore-targeting-pack-7.0-7.0.5-1.el9_1.x86_64.rpm 1d142f98871151b134807309a953b4295847757e7b3ffe5f4a95d7d2bf2213b2 dotnet-apphost-pack-7.0-7.0.5-1.el9_1.x86_64.rpm aaf2ed50fdbf6aaf5a695fcf43d14c9cf86195927a49bdf5287f6cd02ecf76a3 dotnet-host-7.0.5-1.el9_1.x86_64.rpm 463f8236639a2815118b81b9ed25325862aa7cb30e92a134795be352efe3dd4a dotnet-hostfxr-7.0-7.0.5-1.el9_1.x86_64.rpm ba8c98b2a7068c7800bae9e864b9627741bf30937807bff653cc7a0f26e6c53a dotnet-runtime-7.0-7.0.5-1.el9_1.x86_64.rpm 1429180f71ee4f027ec77a6f42cc66b4d6624e5a07d481e6c1e70ad1819ba61c dotnet-sdk-7.0-7.0.105-1.el9_1.x86_64.rpm 7d8a1bafeb2d7c410fe71e51af9ba0190df33a88886f26ecd638b66341b72b4a dotnet-targeting-pack-7.0-7.0.5-1.el9_1.x86_64.rpm 779ed5f89d63a4834a4517cbd4e58856acb577328a7bfcfaa75102121b40aaca dotnet-templates-7.0-7.0.105-1.el9_1.x86_64.rpm f7b6cfaf0fb748be8e6a890aea472e47d7d2cf7e30c80cf0c36949d12985d095 netstandard-targeting-pack-2.1-7.0.105-1.el9_1.x86_64.rpm c5000d6b44dfb59cfc8dcd99d1dfd1e77458f6963ee41b0f1b4367318d8b78bb RLSA-2023:0302 Moderate: libtiff security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libtiff. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * LibTiff: DoS from Divide By Zero Error (CVE-2022-2056, CVE-2022-2057, CVE-2022-2058) * libtiff: Double free or corruption in rotateImage() function at tiffcrop.c (CVE-2022-2519) * libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c (CVE-2022-2953) * libtiff: Assertion fail in rotateImage() function at tiffcrop.c (CVE-2022-2520) * libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c (CVE-2022-2521) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libtiff-4.4.0-5.el9_1.x86_64.rpm 9ad603482201a15f2fe22300f480783803f3533a648cf0c3ac815aa2ede25c42 libtiff-4.4.0-5.el9_1.i686.rpm a8904df1e994a0a1bd4c0744bab2ae19ef64f51d34b3cc6c1e9f90e4a86dc786 libtiff-devel-4.4.0-5.el9_1.i686.rpm 99887ab930d1a7382528eff8bcf1437a3a173910637bd60d2de0b1f8a7d33ed5 libtiff-devel-4.4.0-5.el9_1.x86_64.rpm ef870eca9ad97a5edf3db88926078f6d425bba15f2a682454037b6636d474959 RLBA-2023:1758 .NET 6.0 bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet6.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es): * Update .NET 6.0 to SDK 6.0.116 and Runtime 6.0.16 [rhel-9.1.0.z] (BZ#2183583) rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-6.0-6.0.16-1.el9_1.x86_64.rpm d43ee9d3cd4deea5ce74fc19a28b8f3382ed5203e903a79b0e6cd17748c12f60 aspnetcore-targeting-pack-6.0-6.0.16-1.el9_1.x86_64.rpm 8f5fa49f9f580bafefc67e8160faf4aeebcda6e1aea6ef5389015a9c2490bb41 dotnet-apphost-pack-6.0-6.0.16-1.el9_1.x86_64.rpm cb523fafdaaf016dd135300071cb864d0d3aead770296857f9454870cee21f66 dotnet-hostfxr-6.0-6.0.16-1.el9_1.x86_64.rpm 31169c86ba49746c6344503e36f042fdc5d4fb86b761ff147d2a248fb2260fa8 dotnet-runtime-6.0-6.0.16-1.el9_1.x86_64.rpm 161734b887337c8a13ee91d5ed2eef26c327ce5db695f3fcda38e5e5a373c2f8 dotnet-sdk-6.0-6.0.116-1.el9_1.x86_64.rpm e2fe5b22e7a1c785988e291bdea89b633e1340aa03583f5029a8621793622365 dotnet-targeting-pack-6.0-6.0.16-1.el9_1.x86_64.rpm ff9c3d55e4c80d13f630d17afc0cd06dc81ef29f22773b2a9c3c4f5f71b2e2ed dotnet-templates-6.0-6.0.116-1.el9_1.x86_64.rpm c7eeedf70bf6fb2555c7ad1e975eb47d102d992c5069044f490578fd0a4b5d9a RLBA-2024:8805 tzdata bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tzdata. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2024b, which addresses recent changes. Notably: * This is an optional update. This update does not contain any urgent time zone changes. * Several changes to improve historical data and conformance. * A variety of changes documented in detail in the NEWS file. rocky-linux-9-x86-64-appstream-rpms tzdata-java-2024b-2.el9.noarch.rpm 2257e7ce68b1f585192959ecc5346b52cc69a44bc129031e50d5a3d953fcce21 RLBA-2022:2611 new packages: libwacom Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libwacom. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libwacom-1.12.1-2.el9.i686.rpm 3c356caaefae99a28ef2ac0d9a7aaef52dbe398ae79a0a4ae645b9e2aa55eaf4 libwacom-1.12.1-2.el9.x86_64.rpm 60d405a6a845c91e1c7e0b0ba4855f039a3b2b6e57a0371e76d6407e9fd890af libwacom-data-1.12.1-2.el9.noarch.rpm 7b674d89e0eeaf2c1e28fa58ec7d9a5e3ac085c97ac70d36c01a9a4efb6bbf60 RLSA-2023:1879 Important: java-17-openjdk security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for java-17-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * In FIPS mode, the list of cryptographic services and algorithms available is limited to those that are FIPS compliant. It was found that this filtering was too strict and was also excluding service attributes. These attributes are now made available in FIPS mode, as they are in non-FIPS mode. (RHBZ#2186804) * Previously, the XML signature provider was unable to operate in FIPS mode. Following recent enhancements to FIPS mode support, the XML signature provider can now be supported. It is now enabled in FIPS mode. (RHBZ#2186811) * The PKCS#11 provider used by FIPS mode can be supported by different PKCS#11 tokens. It was found that some PKCS#11 tokens may not be initialised fully before use, leading to an exception being thrown by the provider. With this release, this exception is now expected and handled by the FIPS support code. (RHBZ#2186807) rocky-linux-9-x86-64-appstream-rpms java-17-openjdk-17.0.7.0.7-1.el9_1.x86_64.rpm 4e87fe43167588c98b34ea536987099840c4afa9bb7077a8d3cb99cb89a25a4f java-17-openjdk-demo-17.0.7.0.7-1.el9_1.x86_64.rpm a843368e5c5dfb12fa63f6559769a54edb61b04e2b85b5771ee15d6baa522729 java-17-openjdk-devel-17.0.7.0.7-1.el9_1.x86_64.rpm 13bec13c7ad1598288168c612882315062220673325ab479fd56b264d6e4315c java-17-openjdk-headless-17.0.7.0.7-1.el9_1.x86_64.rpm f52eeb243c1c52f9aea6f87dd634494a86fd30ea57d04df9a1f5ad25ca2ee341 java-17-openjdk-javadoc-17.0.7.0.7-1.el9_1.x86_64.rpm 5f5f49eaed774a85ae7b6c12084b47526ba5926be203cad8b82ce744e3d7a9cb java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el9_1.x86_64.rpm 0646059998f75171de747fea74108c5bfd231d0a0d773e108d3a7ef459c3341f java-17-openjdk-jmods-17.0.7.0.7-1.el9_1.x86_64.rpm 124cabe6e47e757074c59ca70889b2bc90ff5de15ec9f090cdd5d8f700d87352 java-17-openjdk-src-17.0.7.0.7-1.el9_1.x86_64.rpm 9dc6fea58049b1ff69cbcd98df0bb433d7e6bf9550c549ccc61850862b73a802 java-17-openjdk-static-libs-17.0.7.0.7-1.el9_1.x86_64.rpm 12478dc71ae3d2aeec06e3285ab89e1a1f760a5d0cbcf0e2ba7aaa1c9e8c4c37 RLBA-2023:2639 java-17-openjdk bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for java-17-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Bug Fix(es): * All Rocky Linux versions now share a single OpenJDK build (RHBZ#2189326) * In FIPS mode, the list of cryptographic services and algorithms available is limited to those that are FIPS compliant. It was found that this filtering was too strict and was also excluding service attributes. These attributes are now made available in FIPS mode, as they are in non-FIPS mode. (RHBZ#2186803) * Previously, the XML signature provider was unable to operate in FIPS mode. Following recent enhancements to FIPS mode support, the XML signature provider can now be supported. It is now enabled in FIPS mode. (RHBZ#2186810) * The PKCS#11 provider used by FIPS mode can be supported by different PKCS#11 tokens. It was found that some PKCS#11 tokens may not be initialised fully before use, leading to an exception being thrown by the provider. With this release, this exception is now expected and handled by the FIPS support code. (RHBZ#2186806) rocky-linux-9-x86-64-appstream-rpms java-17-openjdk-17.0.7.0.7-3.el9.x86_64.rpm ae9eb82d6013ac02868240492456bb8c2649642f76d960df50e31170c52c5605 java-17-openjdk-demo-17.0.7.0.7-3.el9.x86_64.rpm e80cbf1cb30586e7bed4f7623bd25bbd4235c09b10e88c6f8e8e305b138ecfcb java-17-openjdk-devel-17.0.7.0.7-3.el9.x86_64.rpm 539ca2f0e08d59f12828b2bbcaa15d6adef1eac8e1d79801522a61c0e355f284 java-17-openjdk-headless-17.0.7.0.7-3.el9.x86_64.rpm 39d1796524c2ab82904a80fe705c6acfb6f463831a01e4ced84770eb1e0d4011 java-17-openjdk-javadoc-17.0.7.0.7-3.el9.x86_64.rpm 6ab2611e087d598662947987f9917b2c282ffe2badcc014ea4c546ba7c75013f java-17-openjdk-javadoc-zip-17.0.7.0.7-3.el9.x86_64.rpm bfc9bcc7a2d9327bd70effb25c0f6c3ef3f2c28772ac4ffb19d3e30587f41761 java-17-openjdk-jmods-17.0.7.0.7-3.el9.x86_64.rpm 15c8e0b859274cfa5edc8d4e7d24eafce275bdc1ebeb3c6c7ac27c812232bbdb java-17-openjdk-src-17.0.7.0.7-3.el9.x86_64.rpm 24d4b6ef66823fd011c2e8c414b0cd4f8e1d56ec22300f322e74d093a6223724 java-17-openjdk-static-libs-17.0.7.0.7-3.el9.x86_64.rpm 61172b99cecdc1d96b74e2ed7562c4bdaf0699cc57115e57dd460294dcafd362 RLSA-2023:1880 Important: java-11-openjdk security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for java-11-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-11-openjdk-11.0.19.0.7-1.el9_1.x86_64.rpm 07b1788ec367da3590ca1e8f28a189e4b6093d6de92ba1eeb5abcb19373bb82b java-11-openjdk-demo-11.0.19.0.7-1.el9_1.x86_64.rpm a15eaf5b078c9c5b2c057d23c1b02b8e19095d7c462bf971ac55fb47b9fc1bdc java-11-openjdk-devel-11.0.19.0.7-1.el9_1.x86_64.rpm 9da3667e598d2052e5358f586434f13befc70d7c39d8b6a16adfa6d3ee3cbc60 java-11-openjdk-headless-11.0.19.0.7-1.el9_1.x86_64.rpm 04af1b29209a0854035ee6dc3ef61dd99486e2d14d4685361bbee65f2e537046 java-11-openjdk-javadoc-11.0.19.0.7-1.el9_1.x86_64.rpm e27228183316b84a1ba807a6c2200ef5d29b0e8884755d6d39edb1e3533cc044 java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el9_1.x86_64.rpm bf8ad95245b853cd621bfc69e9d80eb1c2525ba753642cddba45835de3d8a3cb java-11-openjdk-jmods-11.0.19.0.7-1.el9_1.x86_64.rpm eab1430c33d3a2d156da285fa61e31ff94fb871cab987757054c86ec2d2844d1 java-11-openjdk-src-11.0.19.0.7-1.el9_1.x86_64.rpm 70df124380575bb1eb58aafeb2bf1be84ceef96f957899001f42153455be738d java-11-openjdk-static-libs-11.0.19.0.7-1.el9_1.x86_64.rpm 8fed70a0919abad76e2f623dcbdbcc843988fc2bcbaa2e501030b78646b40d7e RLBA-2023:2640 java-11-openjdk bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for java-11-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Bug Fix(es): * All Rocky Linux versions now share a single OpenJDK build (RHBZ#2189325) rocky-linux-9-x86-64-appstream-rpms java-11-openjdk-11.0.19.0.7-4.el9.x86_64.rpm 3b81cb31ca7b60aefcf86732fc72afe9be5208426c7551b448f3e045b94e3a4b java-11-openjdk-demo-11.0.19.0.7-4.el9.x86_64.rpm 4cbb607d0ea430db7591919fd1288882d20be9a2e213860d69a6f62856165b32 java-11-openjdk-devel-11.0.19.0.7-4.el9.x86_64.rpm 13c6c72e0e108623a1a2e7920e7beacc6980fe40a6bafc4e94421e80f7bcace9 java-11-openjdk-headless-11.0.19.0.7-4.el9.x86_64.rpm a7cd5f37cc56598250b142d0ff58519ea79c1fb02c785f121fedac532f95b085 java-11-openjdk-javadoc-11.0.19.0.7-4.el9.x86_64.rpm 7e3d770d856b05185c528e94d64597bfcddebc1b8e631c3d008fe0cb3926e3d1 java-11-openjdk-javadoc-zip-11.0.19.0.7-4.el9.x86_64.rpm 785f76e26ffab484f84c39dd9788e332f5db9c574880bf12cb4a1a438774faf1 java-11-openjdk-jmods-11.0.19.0.7-4.el9.x86_64.rpm b0b50ac57bd38d225dcf84cc25c248fbba96b901a0c3c6f4c5723113fa5e586a java-11-openjdk-src-11.0.19.0.7-4.el9.x86_64.rpm ea7a3257e9455a016b1e7f2da0503e4e7cce740807d9d63422634664f169796e java-11-openjdk-static-libs-11.0.19.0.7-4.el9.x86_64.rpm fec4252ba2b5149c91b317f662019c59a429fcf1c795ab79c51811cf1cf33d4c RLSA-2023:1909 Important: java-1.8.0-openjdk security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * The RSAPSSSignature implementation works with RSA keys via the SunRSASign provider. However, it did not fully check that the RSA key could be used by the provider before attempting to do so, leading to the possibility of errors being returned with custom security providers. The implementation now validates RSA keys and will allow other providers to handle such keys where it cannot. (RHBZ#2188024) rocky-linux-9-x86-64-appstream-rpms java-1.8.0-openjdk-1.8.0.372.b07-1.el9_1.x86_64.rpm e5d71065577dde54cb390075336e02cd3e50b7c23dff9e1f470418d2c8187d2e java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el9_1.x86_64.rpm ea5f08818b4dbab7562497daa8f7105e608dcf73ba580d51ba57ecdd1fe52d7b java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el9_1.x86_64.rpm 5744f9bb42afd85ed795d49ab0e44d707b7bd8bcbff597dd0cc366759ebe25c3 java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el9_1.x86_64.rpm 6fb95376dc06f8727f601a99b3a911e3358ee490376ea654e1b039dabceb47d1 java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el9_1.noarch.rpm e7aafc93beb0b0aa72525a52420286d5caa7c1729dfc23747641f1aa1008f061 java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el9_1.noarch.rpm e8ed0f2151577dac7f6666ac58778d9ae76dc81a7a286d72df5607b03fd6bb52 java-1.8.0-openjdk-src-1.8.0.372.b07-1.el9_1.x86_64.rpm a71a8ea5be7a44355557d9dcc767b61e0cedeced41925dde267f0975e0265495 RLBA-2023:2643 util-linux bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for util-linux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The util-linux packages contain a large variety of low-level system utilities that are necessary for a Linux system to function. Among others, these include the fdisk configuration tool and the login program. Bug Fix(es): * Backport hint about systemd daemon-reload (BZ#2180441) rocky-linux-9-x86-64-appstream-rpms libblkid-devel-2.37.4-11.el9_2.i686.rpm f6af8044ebe46df5d7a08b41edc4cbe34bfe37e49cdb87e1d0ca7fce805a80a7 libblkid-devel-2.37.4-11.el9_2.x86_64.rpm 26d008f911df4a06a37516c6d02be87335b22eb45418efb5a89f7a333f592e7a libmount-devel-2.37.4-11.el9_2.i686.rpm fdf9fee96aa26f9f8ad5e83be70c8b1b5ce00cc14c997d584df60d7b8369394b libmount-devel-2.37.4-11.el9_2.x86_64.rpm dbefcf0be87637b25a19f447b1685cadcba2f4ac2c15fa178c010756afba055e libuuid-devel-2.37.4-11.el9_2.i686.rpm 8e33dc534ad224cbfbd1fbe7d8ef092f807a9695ac7444debc1540e6045215e8 libuuid-devel-2.37.4-11.el9_2.x86_64.rpm 96054824a7a93ce9a6ffe3bacf20f301d947d8ea270e556c662186404c3a965d python3-libmount-2.37.4-11.el9_2.x86_64.rpm 4862f817cc9b180f346fe67bcb57431bbe3874c70f606a773994743f0c151918 uuidd-2.37.4-11.el9_2.x86_64.rpm 67497fb5eced621e99237f202dad9768bd7950b6722726d8f11f488db52825ff RLSA-2023:0077 Moderate: .NET 6.0 security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for dotnet6.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.113 and .NET Runtime 6.0.13. The following packages have been upgraded to a later upstream version: dotnet6.0 (6.0.113). (BZ#2154459) Security Fix(es): * dotnet: Parsing an empty HTTP response as a JSON.NET JObject causes a stack overflow and crashes a process (CVE-2023-21538) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-6.0-6.0.13-1.el9_1.x86_64.rpm 9db0dc0600bdea1d83e9cf77244d47746337cd3d132e8d11278559003b4ce323 aspnetcore-targeting-pack-6.0-6.0.13-1.el9_1.x86_64.rpm 551600b9437595edcbeb0ec2b5e5f0267af1e10da9373256f0d797a0289a8885 dotnet-apphost-pack-6.0-6.0.13-1.el9_1.x86_64.rpm 9d6fa29af152f6cb805c18a7825a22cfff1735023b30d7f4d1786cd6bad70adc dotnet-hostfxr-6.0-6.0.13-1.el9_1.x86_64.rpm 58ecd780e4538f926e33de436242765dfa0c61490260ee484747e409e0a46b1f dotnet-runtime-6.0-6.0.13-1.el9_1.x86_64.rpm 4c0201e920e53c917d9fe9b64b17498fe8e8d67e36e5606a3ce234e051578588 dotnet-sdk-6.0-6.0.113-1.el9_1.x86_64.rpm 2b47d910f58052a3881edb2c7eaa066804fc58bd101fba881f9a466e6a9e84b9 dotnet-targeting-pack-6.0-6.0.13-1.el9_1.x86_64.rpm 31d66d2443534ec6cd75d4e3f168bf8fcd138192f4459b6235a2818cb15114fa dotnet-templates-6.0-6.0.113-1.el9_1.x86_64.rpm acfc5cb8bdd3bdaf790f2066c7d210bd469a7914c429dd4f94aa7c2635158e4a RLBA-2023:0080 .NET 7.0 bugfix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet7.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.102 and Runtime 7.0.2 [Rocky Linux-9.1.0.z] (BZ#2154468) rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-7.0-7.0.2-1.el9_1.x86_64.rpm 45a3ea757e590caf1fe512335d62daf8273796fcac047292b1c2d87d135ddd45 aspnetcore-targeting-pack-7.0-7.0.2-1.el9_1.x86_64.rpm 933dff30066a5323eab4d9ab8fe243394a2025d444348588effe1b38b873fea5 dotnet-apphost-pack-7.0-7.0.2-1.el9_1.x86_64.rpm f5e8e740ecb08cac5385fc703376e33fe476ee725c9405c87ba212e710db7b86 dotnet-host-7.0.2-1.el9_1.x86_64.rpm 39131f5c63acdc7834ae652fa087ce57cadd1a9a95d378033654a89816d8c0bf dotnet-hostfxr-7.0-7.0.2-1.el9_1.x86_64.rpm a622fc3fce5da03f4b8cd03be87cfdeb4ee8d18d1ccd3d12390a76b93fdaaa02 dotnet-runtime-7.0-7.0.2-1.el9_1.x86_64.rpm 63bfb252dd6e8f7ffb01d4fa0f8c398f1f9b1118248ad5a9d071543c05d3c57a dotnet-sdk-7.0-7.0.102-1.el9_1.x86_64.rpm 0dc3dd8c128c66261929c65e9bdcec9f1e7486e000a18cc2352f157acaebc427 dotnet-targeting-pack-7.0-7.0.2-1.el9_1.x86_64.rpm 165b7a4cd93d6876f7b16baaae518090b6c19979a4fc1fa786903cb38b2b02d0 dotnet-templates-7.0-7.0.102-1.el9_1.x86_64.rpm 50a32099402a38ce5cf0f4f9a6a0b8cc1be33680e0f7a9fee18b469825d58c7d netstandard-targeting-pack-2.1-7.0.102-1.el9_1.x86_64.rpm 394ee25bb288039ecc63f93370b77863cad2d60cc3e0de16af66a04870f16b9c RLBA-2023:2174 libvirt-python bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt-python. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-libvirt-9.0.0-1.el9.x86_64.rpm 263200cd884b50b6777ccecae3ebfb4af21fd7e93facf7e0fed6b674b3a4fd2d RLSA-2023:1809 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.10.0. Security Fix(es): * Thunderbird: Revocation status of S/Mime recipient certificates was not checked (CVE-2023-0547) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack (CVE-2023-28427) * Mozilla: Fullscreen notification obscured (CVE-2023-29533) * Mozilla: Potential Memory Corruption following Garbage Collector compaction (CVE-2023-29535) * Mozilla: Invalid free from JavaScript code (CVE-2023-29536) * Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 (CVE-2023-29550) * Mozilla: Memory Corruption in Safe Browsing Code (CVE-2023-1945) * Thunderbird: Hang when processing certain OpenPGP messages (CVE-2023-29479) * Mozilla: Content-Disposition filename truncation leads to Reflected File Download (CVE-2023-29539) * Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux (CVE-2023-29541) * Mozilla: Incorrect optimization result on ARM64 (CVE-2023-29548) * MFSA-TMP-2023-0001 Mozilla: Double-free in libwebp (BZ#2186102) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-102.10.0-2.el9_1.x86_64.rpm add6a1ab8f47c33aef7d09e7f9368d33fa2874722635b0332f5a6d808347f9d2 RLSA-2023:1918 Important: webkit2gtk3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * WebKitGTK: use-after-free leads to arbitrary code execution (CVE-2023-28205) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.36.7-1.el9_1.3.i686.rpm 5c342f110e58012aecd1c636547e731f4d4b91fe0dbfeee2a53a02cb4b3590e2 webkit2gtk3-2.36.7-1.el9_1.3.x86_64.rpm 2083a9bcd1a5391202e744dfb9cfcb8cb7a693a9e4c9e9eb7a43347a68abffdd webkit2gtk3-devel-2.36.7-1.el9_1.3.i686.rpm af3568c9576b799b32244d2714c77434b77c61938db1ff73ab53accd04b6ad3a webkit2gtk3-devel-2.36.7-1.el9_1.3.x86_64.rpm 1b5141cf0645582e06fac4123989824b2c211663fdb55891e7d451d227c4ca0a webkit2gtk3-jsc-2.36.7-1.el9_1.3.i686.rpm 150eab2166f75bfce4acb05e2f1db4485f3fe99974568e76ef24496a113e4bcb webkit2gtk3-jsc-2.36.7-1.el9_1.3.x86_64.rpm 53c439a0fe85632e6302704d0fdf7b76655ea182650cb6ce47ca1c74dff3c26d webkit2gtk3-jsc-devel-2.36.7-1.el9_1.3.i686.rpm 5a7e0a3f0a8f0ffcb8dadf600dfdcbfe3bc60aafae5ba4588102389ceecdf9be webkit2gtk3-jsc-devel-2.36.7-1.el9_1.3.x86_64.rpm aa52f2e3fd8e11981662df5946792f94ab16398b6e738a11c9e180f853e85268 RLBA-2023:1779 nss bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Bug Fix(es) and Enhancement(s): * RFC5054 groups are occasionally allowed in FIPS mode (BZ#2180924) rocky-linux-9-x86-64-appstream-rpms nspr-4.34.0-18.el9_1.i686.rpm 32dc03324a78b17641a4d0bf308522a8c3d9fbc5ccdd8a8eebc16ce8059d5a63 nspr-4.34.0-18.el9_1.x86_64.rpm 54bf7721b9211bae17a39abf00fd2f277fa17832dea3373efecc02a07693e35b nspr-devel-4.34.0-18.el9_1.i686.rpm a8c12537ceaccefa83770bde083654cce939af08e968d09bb05e9add2a7eb27c nspr-devel-4.34.0-18.el9_1.x86_64.rpm 6cbff63fd99df9ebe43198faec44a91f55be5e72b702633f0d2938d162a786a5 nss-3.79.0-18.el9_1.i686.rpm b6f9249336d8725838d54557f50b4604f83c49c97282d95f6db6ecc406e56058 nss-3.79.0-18.el9_1.x86_64.rpm 861d1df85972ff033d3c80e51df0786a16bb7eb065597793e932c28ba9d06922 nss-devel-3.79.0-18.el9_1.i686.rpm e23a708d2dd5d4d83349a12b43933ec6847bbab51abea7fb032a3e49fe9ee723 nss-devel-3.79.0-18.el9_1.x86_64.rpm 24c17017d11d109ffa1a6942cef0d41d91da768121c38955671466601cfa98e0 nss-softokn-3.79.0-18.el9_1.i686.rpm aeb5f8a4b90b4cc3196d010de8a9a952d8c808d72e942c67a7e5446a80bf38b7 nss-softokn-3.79.0-18.el9_1.x86_64.rpm eb0e6ceca59abd45058c4c6e1cc11234b2197e4883f48ea323bb0bb85268f6ba nss-softokn-devel-3.79.0-18.el9_1.i686.rpm 159ecbfbdaf52315d3cc01ef63806e1cb519c5837c4c1b37f79ae63e16b6b722 nss-softokn-devel-3.79.0-18.el9_1.x86_64.rpm 0712fe035d3c8cc1e275b65976f6fc1f17f53c188d083755113a9a5cd2fc96f9 nss-softokn-freebl-3.79.0-18.el9_1.i686.rpm 3ebc9e1800b9fdfd3d41b14ce6dfac4ae52c084be508657a9dffba3de11214b3 nss-softokn-freebl-3.79.0-18.el9_1.x86_64.rpm 292ff920e8f0f826f0b688727c684193035d0c3d99d3c4ecb066c08b60bf1cd1 nss-softokn-freebl-devel-3.79.0-18.el9_1.i686.rpm 2cf9fb4f8fa799acebd87add27ece6aadd32d729ae30c7b8d587bdd15e1950db nss-softokn-freebl-devel-3.79.0-18.el9_1.x86_64.rpm 561089fe686a08d14d342dc549e669c3e09c1e7ac765cf49e32022dc4a1a3374 nss-sysinit-3.79.0-18.el9_1.x86_64.rpm 4ba942b7afb60392543a7980509d46830015dc4cc51d17160dc567c149160801 nss-tools-3.79.0-18.el9_1.x86_64.rpm d6dd87880a0d8f89e20b36c8897ebed0b031e953533793741569816375e62969 nss-util-3.79.0-18.el9_1.i686.rpm ae42405c92567f6168628ba0bbed18e82267ac1ef12cf5de4e51f18efbaf708b nss-util-3.79.0-18.el9_1.x86_64.rpm a593cb870784733e2e614122b36eb1c72fbfa0e8cd7a94cf692ea522d18bdb14 nss-util-devel-3.79.0-18.el9_1.i686.rpm 32c315dc1a24c468af32469b96ab1b78ed9cfac84b61f36d14ae750bb8772297 nss-util-devel-3.79.0-18.el9_1.x86_64.rpm 0f12d730f6e75ad3406108f69a9256d6c2c32e6fbd45eeed56c1ac1def69be7d RLBA-2023:2232 gnome-software bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-software. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-software-41.5-2.el9.x86_64.rpm cfb7719701c1a2709dc41062f0274a6496c0158565c115bd66cf0f7fbf0613dc RLBA-2023:2332 gnome-session bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-session. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-session-40.1.1-7.el9.rocky.1.x86_64.rpm 3440d0bd76789bc611a2f928118d12b95e9cf8112737128ebbec361bece3918f gnome-session-wayland-session-40.1.1-7.el9.rocky.1.x86_64.rpm d85cd9a2b4f1e1cd5cf3c07b8ee70812272b6126874f1acecee40ce59aaf3657 gnome-session-xsession-40.1.1-7.el9.rocky.1.x86_64.rpm 51b7122ecb77badd7cbae1443ec04d4b15859a1308c82019b8e382c1862c6844 RLBA-2023:2348 swtpm bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for swtpm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms swtpm-0.8.0-1.el9.x86_64.rpm 5eb01dd8584a5049fe99ca0bae3a344c2ac1209bd16ae5e6c7affbcb6d54ea1c swtpm-libs-0.8.0-1.el9.x86_64.rpm 10e022aec0504ea5429d99e5f33baea9f278c1ee43bd4dd012a5cbeb4a5f0e48 swtpm-tools-0.8.0-1.el9.x86_64.rpm e0e25c30526267a12c61655d6437ce906bc25c1ab2dd3ba22bb856fad5dd961c RLEA-2023:2439 tomcat bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tomcat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tomcat-9.0.62-11.el9.noarch.rpm df8ceaa641e4a4c1c20427f6653c7a46d25b6fe857b91236ae541a734bf15183 tomcat-admin-webapps-9.0.62-11.el9.noarch.rpm 35f3a73db547a12da372dd45739d99125e7bdfe66057868b02115499960deccd tomcat-docs-webapp-9.0.62-11.el9.noarch.rpm 5aa02026c680a2425aef89bb159de769e635fbe1b313fc0b3871347730d9ddaf tomcat-el-3.0-api-9.0.62-11.el9.noarch.rpm 8920ed1d8510665b40f6cb100062afbdde10ca7dd75867bb9565ebd7466b2efd tomcat-jsp-2.3-api-9.0.62-11.el9.noarch.rpm bc18baa41267f1be7a56480832c133da8bd4d5ded1eb7997ebaa502d0a8b4375 tomcat-lib-9.0.62-11.el9.noarch.rpm 26cbf617902b9a5ee92ed4b223fe88091aa441adda30b0a2887b8b498c4619fb tomcat-servlet-4.0-api-9.0.62-11.el9.noarch.rpm 6e85705c742bcd7f5b61d7219bc5f2b1f813d4d0f6c6aa1b32fbba7e34d1b68a tomcat-webapps-9.0.62-11.el9.noarch.rpm 5d6287b0a8534434381d7ef959676a64ee793c56102d53d85d7a5822187f5920 RLBA-2023:2622 pipewire bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pipewire. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PipeWire is a multimedia server for Linux and other Unix-like operating systems. Bug Fix(es) and Enhancement(s): * Audio sound can't output unless switch device manually on Orchid Bay MLK. (BZ#2180869) rocky-linux-9-x86-64-appstream-rpms pipewire-0.3.47-3.el9_2.i686.rpm f0e145c1ddd11bbecf9c53299502968bdfcfe3177b9d7c98b139580bf1b8cb1e pipewire-0.3.47-3.el9_2.x86_64.rpm deb3fb0d3b1a6e6927ef70efe5f1c7d5b4f56e885659bd84490f6b3ab2ba8112 pipewire-alsa-0.3.47-3.el9_2.i686.rpm e26d6a1ac900790aca8c0a2269eda0cfa8c76af48cb96ecb51598736648305e1 pipewire-alsa-0.3.47-3.el9_2.x86_64.rpm c8101bf20b093c8f791f696f3ee3a282ee4885f9c0ec5162a5e53df255b4bf55 pipewire-devel-0.3.47-3.el9_2.i686.rpm ffe02e45e62bd8cacf89c2d7ebd639c06bf62e472757132c0a5ebc3748796d41 pipewire-devel-0.3.47-3.el9_2.x86_64.rpm 3add690c6e66b7679c8a5de993b5d56929f6cc71e12e222144718603cdb2d0e2 pipewire-gstreamer-0.3.47-3.el9_2.i686.rpm 838e6d64bf2fa01ded1641e959e58f8cf31bbf7630c7ea13fd8e3ab38f2ab6ef pipewire-gstreamer-0.3.47-3.el9_2.x86_64.rpm 3256144b1bb3e2c07f3df7eee2104d7a21596097514a04e99718a4ded25b3cbc pipewire-jack-audio-connection-kit-0.3.47-3.el9_2.i686.rpm e960af264c197d697c6e3e6d57d8297c69065fac7d04ca2ac11e0e5778878f5e pipewire-jack-audio-connection-kit-0.3.47-3.el9_2.x86_64.rpm bf8779782a4c8c61c10b4f8693f6183a83b0a1e5cda967190ca99dd64aee0d67 pipewire-jack-audio-connection-kit-devel-0.3.47-3.el9_2.i686.rpm f89a1b86113af7c7e2dfbdf170d2c3995ee0fd7ff2e5c34a642cf783b4c19425 pipewire-jack-audio-connection-kit-devel-0.3.47-3.el9_2.x86_64.rpm cab1562091604d1145f9d857dfdd297a9543fb6721a3a79bb5615a270cec79eb pipewire-libs-0.3.47-3.el9_2.i686.rpm bb8211b84ae1cc6e12d509a5dfc6a45b819f53fb3f19c07a963817ed43c08026 pipewire-libs-0.3.47-3.el9_2.x86_64.rpm 59a9e208e3739d2b1cab08ba2071f8ec6f9162c21e2ac5e9f754e5f15ad61c4d pipewire-pulseaudio-0.3.47-3.el9_2.x86_64.rpm f4eec78c14c28f6e9a8ea50c68d56d0df6a75289f1dd9984b0ce0baacc3b41ca pipewire-utils-0.3.47-3.el9_2.x86_64.rpm 5d5b48df2378c4590cca81591a0413945e1ed2c017c57407dc7fdf8b526ce906 RLBA-2023:2630 crun bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crun. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The crun packages contain a runtime for running Open Container Initiative (OCI) containers. Bug Fix(es) and Enhancement(s): * Could not find symbol `criu_set_lsm_mount_context` in `libcriu.so`. (BZ#2184222) rocky-linux-9-x86-64-appstream-rpms crun-1.8.4-1.el9_2.x86_64.rpm 1f67eff45da5f7a0712fc9cda18dd25dbeca41349ff8043a56c6918e6480b7f1 RLBA-2023:2631 fuse-overlayfs bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fuse-overlayfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fuse-overlayfs package provides an overlayfs FUSE implementation, which can be used in rootless containers. With FUSE, it is possible to implement a fully functional file system in a user-space program. Bug Fix(es): * Rootless podman with additionalimagestore does not work on Rocky Linux8.6 (BZ#2185133) rocky-linux-9-x86-64-appstream-rpms fuse-overlayfs-1.11-1.el9_2.x86_64.rpm 7fdfa1b0c40f09c00502997d47788d75233a882ebb8bc96f509a507bdaedc6c0 RLBA-2023:2636 netavark bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for netavark. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Netavark is a rust based network stack for containers. Bug Fix(es) and Enhancement(s): * The --dns-add command is not functioning - netavark. (BZ#2188566) rocky-linux-9-x86-64-appstream-rpms netavark-1.5.0-3.el9_2.x86_64.rpm ba50fd3e86220df6f228978a2ea03f9372e13b50f5f6b9b6ca4975ab695bd6ed RLSA-2023:3559 Important: c-ares security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for c-ares. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API. Security Fix(es): * c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms c-ares-devel-1.17.1-5.el9_2.1.i686.rpm 4f76050b95dcfc6563e6451612787a8e5a797e1ae8ad8ca9b1f98becc3fbc044 c-ares-devel-1.17.1-5.el9_2.1.x86_64.rpm 80f651c56639c3c05acb548249f75365e54e865eaacba2c9e51488ddbd2322bc RLSA-2023:2655 Moderate: nodejs and nodejs-nodemon security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for nodejs, nodejs-nodemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (16.19.1), nodejs-nodemon (2.0.20). Security Fix(es): * c-ares: buffer overflow in config_sortlist() due to missing string length check (CVE-2022-4904) * http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability (CVE-2022-25881) * Node.js: Permissions policies can be bypassed via process.mainModule (CVE-2023-23918) * Node.js: Fetch API did not protect against CRLF injection in host headers (CVE-2023-23936) * Node.js: insecure loading of ICU data through ICU_DATA environment variable (CVE-2023-23920) * Node.js: Regular Expression Denial of Service in Headers fetch API (CVE-2023-24807) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms nodejs-16.19.1-1.el9_2.x86_64.rpm d8e13a42016b0781b34e399c82b13809912968b98a5acea57ccb5b32b0441d90 nodejs-docs-16.19.1-1.el9_2.noarch.rpm 3f03aea4f319170206cf7312fb3edc0d20e95e7c196ff2a9638b04d4cdfdabda nodejs-full-i18n-16.19.1-1.el9_2.x86_64.rpm 212c18f45e0ab01a82c15fc4df739eb095519182b10efcf468ed98397d83ccf2 nodejs-libs-16.19.1-1.el9_2.i686.rpm 8bde566a861d88c8eefb820fb6ce9e31d7fe5939306026d4c21721535f48e3b0 nodejs-libs-16.19.1-1.el9_2.x86_64.rpm dd864feb184b7b6fa3393b554a18f6627f463a23e285f208ca6c47aa67b116ec nodejs-nodemon-2.0.20-3.el9_2.noarch.rpm c31ae00cb453cf07ab8e679c615fd412c87d8faab3b24a1f162824a6310dc4a5 npm-8.19.3-1.16.19.1.1.el9_2.x86_64.rpm f4e210497e2cc86395dc1c042489cb8279854b459b1fa355b6b204c2e6e7c584 RLBA-2023:3144 httpd bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Bug Fix(es): * mod_rewrite regression with CVE-2023-25690 (BZ#2190324) rocky-linux-9-x86-64-appstream-rpms httpd-2.4.53-11.el9_2.5.x86_64.rpm 590f46f669fab5f5e24e4c62f82818c9262627380b350ba028c7ffc27e621a13 httpd-core-2.4.53-11.el9_2.5.x86_64.rpm 9c19882d69d86b1a2de3951efd5793627605592237d8f7512671f37a1ebe4245 httpd-devel-2.4.53-11.el9_2.5.x86_64.rpm ee00ee8ec9a4af5cc342c152a1dae286618b9f0a3bb4bfc2962f9abb3cf05f3c httpd-filesystem-2.4.53-11.el9_2.5.noarch.rpm 4c7a90692ff9f0e2fdc3536f7538aed28d0ea09ff95d34bc2c15ff16e2610d26 httpd-manual-2.4.53-11.el9_2.5.noarch.rpm ee0f420fc411e6ab15e10d6b62a98e3d3bffedc30fc0dcd05cd0d27635a0c14b httpd-tools-2.4.53-11.el9_2.5.x86_64.rpm fc30292d98b046de28f8bf9dc2f0f2fca5656451c9ff54d360a1289e323797b4 mod_ldap-2.4.53-11.el9_2.5.x86_64.rpm 2aefd89e88d3034d08a7ae1c40a2e93773856a7f8355b29827cbbd366f18b9f4 mod_lua-2.4.53-11.el9_2.5.x86_64.rpm ccfdea219d19d747a47c2ee6860c2d12355159595f89e0f4d53117f687428e86 mod_proxy_html-2.4.53-11.el9_2.5.x86_64.rpm 92af0a2f73e83d6f98ae8ac0f4a2947c10957877ba72a3500bad6179e1169c81 mod_session-2.4.53-11.el9_2.5.x86_64.rpm b24489af91fa5b4228c7ec9885da97cde7d3006fcb4d565c1d68975eca610776 mod_ssl-2.4.53-11.el9_2.5.x86_64.rpm 23e85be6a80567686a66db6a7f16f7333d1c13717d525bce16867d892c5637ea RLBA-2023:2578 file bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for file. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-file-magic-5.39-12.el9.noarch.rpm a5bd2fde9fa423a2fc00c2d1d458fd6ba8851acda5e72018a55bb1968ac76358 RLSA-2023:3432 Important: webkit2gtk3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: a use-after-free when processing maliciously crafted web content (CVE-2023-32373) * webkitgtk: an out-of-bounds read when processing malicious content (CVE-2023-28204) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.38.5-1.el9_2.2.i686.rpm 68ceb1e81999ef058956e6706910d470287df33c9f413e007789986451e46e4b webkit2gtk3-2.38.5-1.el9_2.2.x86_64.rpm 4e9d993b96023fab0384b89dafbc97a06cf56f3d49f90677fa2d9dbe338cb9dd webkit2gtk3-devel-2.38.5-1.el9_2.2.i686.rpm 4ea140a97ef2c965e4b3ee73de2ff050d58efd84e0c993912ebd078232c67dd1 webkit2gtk3-devel-2.38.5-1.el9_2.2.x86_64.rpm 33f7aadbc437651978d4962357618e8e4ea69735f77cbe1a7630a69187303d6d webkit2gtk3-jsc-2.38.5-1.el9_2.2.i686.rpm 35b2db998e9a597a98ab4dde3bb05fb83e9aa12bf9cf6d38ccedd2d8469e0c98 webkit2gtk3-jsc-2.38.5-1.el9_2.2.x86_64.rpm 6a670d5353eea8fe70c7f2b6cc5e04dd54451f468e4d43a4d68ca4c9e456d40b webkit2gtk3-jsc-devel-2.38.5-1.el9_2.2.i686.rpm 45adad3805b8690983fcf4a1724eb50f5fb051f40cd6780c93a1ad13e277190f webkit2gtk3-jsc-devel-2.38.5-1.el9_2.2.x86_64.rpm 4c50fce181b5d69b80de6f75dcf89dec553b25e0b64a658c0bdfcd16d3176cc0 RLBA-2023:3731 krb5 bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for krb5. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Bug Fix(es): * PKINIT module initialization fails if a well-known MODP group cannot be loaded (BZ#2209715) * PKINIT: CMS SHA-1 signature verification cannot be allowed in FIPS mode (BZ#2209717) * Make ticket signature optional during PAC verification (BZ#2211388) rocky-linux-9-x86-64-appstream-rpms krb5-devel-1.20.1-9.el9_2.i686.rpm 423d2b587d56ac0301d527189b012696b7aa99dd02fa8e8de358a47e69723fd3 krb5-devel-1.20.1-9.el9_2.x86_64.rpm ebf85e5d850e4d02a13aa028e709983d65829a80422d24d950844127f6db5188 RLSA-2023:3147 Important: apr-util security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for apr-util. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Apache Portable Runtime (APR) is a portability library used by the Apache HTTP Server and other projects. apr-util is a library which provides additional utility interfaces for APR; including support for XML parsing, LDAP, database interfaces, URI parsing, and more. Security Fix(es): * apr-util: out-of-bounds writes in the apr_base64 (CVE-2022-25147) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms apr-util-1.6.1-20.el9_2.1.i686.rpm 025e1c288aa9d2bdd95c3af0a8d8bf29df0b3c47fca1dce2d89282ae2935a99e apr-util-1.6.1-20.el9_2.1.x86_64.rpm a2e36b65ea809a0f3109a1f1e48e418651d72efd3806489ce6c1f01c9ee11617 apr-util-bdb-1.6.1-20.el9_2.1.i686.rpm 96bfba7a875ae5522e5c3b670a40912bf7cbfdd8cdaf3eef179109037622d19f apr-util-bdb-1.6.1-20.el9_2.1.x86_64.rpm 08cb535b0e2e733faf60c121deefd92786c667ac011e30f3439d1adbb8855405 apr-util-devel-1.6.1-20.el9_2.1.i686.rpm 144f7b405e34575bd7fb52ab53e71eb04011f384228e81621389402f6ec08d30 apr-util-devel-1.6.1-20.el9_2.1.x86_64.rpm e40e92ae468c02d09c2cfc4586b3cb291270d5e11032fa13d3bdfa6c0e7ec5de apr-util-ldap-1.6.1-20.el9_2.1.x86_64.rpm e1616d1c4c1aecc2bd015fec9dee520713a10a836dddb78224d8c9c7f9ea096a apr-util-mysql-1.6.1-20.el9_2.1.x86_64.rpm 9f06de3b2f3c15222ce8922a59d6d8281408bfb543905a50debb290673331d3f apr-util-odbc-1.6.1-20.el9_2.1.x86_64.rpm f5533d062878ee491627552a0b1e48d32cd4a1e3ca2ce8482dcd8d55d3b9f1d9 apr-util-openssl-1.6.1-20.el9_2.1.x86_64.rpm 267b4fd421b0796dc864fefcefc25dcab74e8773cfc90d97e1e0c31e292a7af7 apr-util-pgsql-1.6.1-20.el9_2.1.x86_64.rpm 4425dc475f32ed789c59f313c72258d620231b33a42461865badb1d2b6199151 apr-util-sqlite-1.6.1-20.el9_2.1.x86_64.rpm a55c136788b18d94f6daa8340d5d83a6812fbcc3f0653fb4e8c6bd676789b3a8 RLSA-2023:3587 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.12.0. Security Fix(es): * Mozilla: Click-jacking certificate exceptions through rendering lag (CVE-2023-34414) * Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12 (CVE-2023-34416) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-102.12.0-1.el9_2.x86_64.rpm 38d3108be48db5b0b72539815eeac50fa19abaab3c9adf8106c5678ba43880b1 RLBA-2023:3712 linuxptp bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for linuxptp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The linuxptp packages provide Precision Time Protocol (PTP) implementation for Linux according to IEEE standard 1588 for Linux. The dual design goals are to provide a robust implementation of the standard and to use the most relevant and modern Application Programming Interfaces (API) offered by the Linux kernel. Bug Fix(es): * ptp4l not able to recover from errors on netlink socket (BZ#2208210) * Don't re-arm fault clearing timer on unrelated netlink events (BZ#2208265) rocky-linux-9-x86-64-appstream-rpms linuxptp-3.1.1-6.el9_2.2.x86_64.rpm b31c54177ca11c225210e4583f4f50ef621e990d2434c32fbf39904eb4278f35 RLBA-2023:3721 ansible-core bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es) and Enhancement(s): * ansible-test: Fix vendoring support rocky-linux-9-x86-64-appstream-rpms ansible-core-2.14.2-5.el9_2.x86_64.rpm 408bb6eaec63e1ccb940c0fb35efdf5e767d1c14d9035c7453934a504c8d8923 ansible-test-2.14.2-5.el9_2.x86_64.rpm b875f745b9f28d3b064f8cd17d5081ce6669ac3de49e1fbac004d758ba1a671b RLSA-2023:3923 Critical: go-toolset and golang security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Critical An update is available for go-toolset, golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. The golang packages provide the Go programming language compiler. Security Fix(es): * golang: cmd/go: go command may generate unexpected code at build time when using cgo (CVE-2023-29402) * golang: cmd/go: go command may execute arbitrary code at build time when using cgo (CVE-2023-29404) * golang: cmd/cgo: Arbitratry code execution triggered by linker flags (CVE-2023-29405) * golang: runtime: unexpected behavior of setuid/setgid binaries (CVE-2023-29403) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms golang-1.19.10-1.el9_2.x86_64.rpm b18c663f7c932e10004181efc2790aef320b1227213b13c46ee6b7ac7ff3bcf3 golang-bin-1.19.10-1.el9_2.x86_64.rpm 2f3b0ac988259da21fc4a4343ac01d9e842bfb5ab03659396f3ea150113a2c6e golang-docs-1.19.10-1.el9_2.noarch.rpm f13da42269450bbd760e96548ecf979395c5a235dda03801a21a4ef595f68977 golang-misc-1.19.10-1.el9_2.noarch.rpm 1b553ecb1d2cf30dfcf5252933ef1dced2234408cff090c186b4e1d98f7a4166 golang-race-1.19.10-1.el9_2.x86_64.rpm ddd8825766d02b8f0330f0acf89d607b1de9c53d797a1d5583dae6d9e90cae04 golang-src-1.19.10-1.el9_2.noarch.rpm 6017b1aa6dc6661868e6bf2c443af54982dfc73f9078b4fdbab5a3bb52998195 golang-tests-1.19.10-1.el9_2.noarch.rpm 4c918bd80d40bf8ddb1c12d4f5809faa346292daed691511808692710ebaafc8 go-toolset-1.19.10-1.el9_2.x86_64.rpm 69c95eb5a1d3ed7f2d87dd40233e3fb3a9cc2b1d635f1293b836240f237f205b RLSA-2023:3948 Low: open-vm-tools security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for open-vm-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Open Virtual Machine Tools are the open source implementation of the VMware Tools. They are a set of guest operating system virtualization components that enhance performance and user experience of virtual machines. Security Fix(es): * open-vm-tools: authentication bypass vulnerability in the vgauth module (CVE-2023-20867) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms open-vm-tools-12.1.5-1.el9_2.1.x86_64.rpm ec2f977d437b3b3f1b86bdbb8e817f6481cbef390ae24dfd7df79d6bb7da5730 open-vm-tools-desktop-12.1.5-1.el9_2.1.x86_64.rpm c6e12901888737aacb747e4cc5422c2c3607faa37cfe19751283c39b6ac69fe9 open-vm-tools-salt-minion-12.1.5-1.el9_2.1.x86_64.rpm 3457b2540bb62345612aee9e112563b30e9ae70cb22aa9a8ff8bcc98f9d477c6 open-vm-tools-sdmp-12.1.5-1.el9_2.1.x86_64.rpm e7fbe86d51f3e67e42a59a8c58f7c1232f95bbd72b92085cd2db06f416ae5f40 open-vm-tools-test-12.1.5-1.el9_2.1.x86_64.rpm 2c4ccd88ed04b84056bd87d74fbeb9c20c5b09e2b248358bea59df919ad1cf9a RLBA-2023:4596 thunderbird bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Bug Fix: * TLS broken for POP3 and SMTP connections. (BZ#2230038) rocky-linux-9-x86-64-appstream-rpms thunderbird-102.14.0-2.el9_2.x86_64.rpm 23c0f4952a70cb7171c8546aa118b57d5dba6b75f29718263748bd425c9753e3 RLBA-2023:4592 nodejs bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nodejs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Bug Fix(es): * nodejs: Coredump during --force-fips (BZ#2227919) rocky-linux-9-x86-64-appstream-rpms nodejs-16.20.1-2.el9_2.x86_64.rpm e42a9b9650cca99275ac97cd40b96a8e55e577f68a1142f93c1ab3615700ccdf nodejs-docs-16.20.1-2.el9_2.noarch.rpm db6aa3445e6355e7533e98d9bf0588ecd409427c907b4edf9f04ace0bc6edead nodejs-full-i18n-16.20.1-2.el9_2.x86_64.rpm 7f00bb635b1f5ff8eacd87fac0520d254382fd9334c6d35961ef7467354d976c nodejs-libs-16.20.1-2.el9_2.i686.rpm 38dbeb9ed25f5afe765828ad568c3d3842a359ea1aaa58483c975efca49bcd76 nodejs-libs-16.20.1-2.el9_2.x86_64.rpm f02193bcd47c79f60a0453ea5bf5d50b494ff6c5a6ed5250233d4895f8a689a0 npm-8.19.4-1.16.20.1.2.el9_2.x86_64.rpm d2b0f36dd69add0b05c91c9720fc1483e2a3495dc627001f396ef58626fbfd9a RLSA-2023:4634 Important: rust security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for rust. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rust Toolset provides the Rust programming language compiler rustc, the cargo build tool and dependency manager, and required libraries. Security Fix(es): * rust-cargo: cargo does not respect the umask when extracting dependencies (CVE-2023-38497) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms cargo-1.66.1-2.el9_2.x86_64.rpm 81a1fd466eb40011c219accce4194a8cd0070c0fc759eff2e29f0aa5f188b23a clippy-1.66.1-2.el9_2.x86_64.rpm b60c9b4e12b9f4a00a933ca4906959e8fafc8b51d62c84b77e602fcbb0d8233c rust-1.66.1-2.el9_2.x86_64.rpm 63c1e59419adcee2eb7c88538312e2b966a38519040b6d885084c533a03a7c90 rust-analysis-1.66.1-2.el9_2.x86_64.rpm 2f5f936e87947b8cea32837c46446e98b4bc52dd40e5bacd14a2c358eb7dd05b rust-analyzer-1.66.1-2.el9_2.x86_64.rpm 8ce8841ede82f5cb4b46d7173917d91e539eced3cbe504243903ef5c4552ff0f rust-debugger-common-1.66.1-2.el9_2.noarch.rpm 6509fe6d48ec51e2f647c5ce6da22a347ebde6df8de7b3352bf2f2e5340d4fbd rust-doc-1.66.1-2.el9_2.x86_64.rpm 7b77cb493c34269ee82f8cdded77b613e0f55abad51d29382d51b6a6bf730703 rustfmt-1.66.1-2.el9_2.x86_64.rpm 726744afacd945ce2e6d3e8d34fc1aaf97c723fcc49c2a7e664bb60a459f5aba rust-gdb-1.66.1-2.el9_2.noarch.rpm 23b3e744c1150a6ffa575a9b79fb24d9d4a05a82b2007bf5c6c6dfb4dd310af2 rust-lldb-1.66.1-2.el9_2.noarch.rpm 2a244b546ffbec93c0a373c97b198fea95d260e3c22d530b5e18a8807d03d1c6 rust-src-1.66.1-2.el9_2.noarch.rpm 7ded2d934d158a2ede2af4b4672eac3c740d5288330521a209491feb75701507 rust-std-static-1.66.1-2.el9_2.i686.rpm 9f004f22a39ad07f5f74736ceca255ecd5f82fa6ef45bf36b24ad8e96899920a rust-std-static-1.66.1-2.el9_2.x86_64.rpm 21952294f0ba4eb300cabfbc0657d6c22720d523cccef4d5ff073420d45c8a66 rust-std-static-wasm32-unknown-unknown-1.66.1-2.el9_2.noarch.rpm cda250ea5f74bd9b242df3f712fcdacd2d85598a4fd0b4d3a60523622e053740 rust-std-static-wasm32-wasi-1.66.1-2.el9_2.noarch.rpm cbe5aa0ca5cdc1739bc546ccbdbe9dc9c824e65b1bcfbeb41c9a086762e03997 rust-toolset-1.66.1-2.el9_2.x86_64.rpm c64c1ca156b02432568fcdba6894e11fa364f76c5e0f381847021312b5c94fac RLSA-2023:4569 Moderate: dbus security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for dbus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered (CVE-2023-34969) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms dbus-daemon-1.12.20-7.el9_2.1.x86_64.rpm 2682ef845404706c4f4cce5ff12039dd755f6ddb58d0c9a6917d7d767f2234ef dbus-devel-1.12.20-7.el9_2.1.i686.rpm dd448e55477ec686434d4fe234dff899239ddf945780bbd139128d9cb3e7b2fa dbus-devel-1.12.20-7.el9_2.1.x86_64.rpm dad9a295748e339f36433f54d0bd55cbce4a6a54f2de09d45033ce19a84e2d27 dbus-x11-1.12.20-7.el9_2.1.x86_64.rpm 42d3c4ec7042bf5208a9b3276b73848ecd2315c50636123ac0161655a7170c92 RLSA-2023:4099 Important: bind security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for bind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: named's configured cache size limit can be significantly exceeded (CVE-2023-2828) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms bind-9.16.23-11.el9_2.1.x86_64.rpm 00192b7f42a86854bc750189cb1a8cc64294d7d7abdd0408eb7bcacca4853d3f bind-chroot-9.16.23-11.el9_2.1.x86_64.rpm 6332182bf6202c8ac4fc513aa4a636590cc78af610e75d34bc2f1b1da221751f bind-dnssec-doc-9.16.23-11.el9_2.1.noarch.rpm 619e25a841f104d76eeed2139a438e3d47302318eb143d73428a3b025201ae00 bind-dnssec-utils-9.16.23-11.el9_2.1.x86_64.rpm 6f4daef396587960ce972f1bc27b4e0cdf18768a94b26769cac28cadf965d358 bind-libs-9.16.23-11.el9_2.1.x86_64.rpm 9e410cedf417d88f0cdc1b953d63a412499c75d04a9e9205b4ba21b6925ef03f bind-license-9.16.23-11.el9_2.1.noarch.rpm 1cdb4051deaed39ff89e96a2e9a8235af331cf28fc8c77ec2f41cc88eda98530 bind-utils-9.16.23-11.el9_2.1.x86_64.rpm 73a44b80541b9c9c6f0929cb8d155e96703aaa04d29426d16e13459fd303c613 python3-bind-9.16.23-11.el9_2.1.noarch.rpm 9c850d2bb211ab45477a3a18ee59931f011b1993d22c9831e2bb0e33888a774f RLSA-2023:4571 Important: iperf3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for iperf3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Iperf is a tool which can measure maximum TCP bandwidth and tune various parameters and UDP characteristics. Iperf reports bandwidth, delay jitter, and data-gram loss. Security Fix(es): * iperf3: memory allocation hazard and crash (CVE-2023-38403) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms iperf3-3.9-10.el9_2.i686.rpm 7f075299078b153968b736a2f961ff4d0321f7aed476bb447ff5601f1f14df2e iperf3-3.9-10.el9_2.x86_64.rpm 0965fd9b63ddb36610b465cfe6b95f4fbee658811cdbb04c9f4e7dc9db34bf7c RLSA-2023:4178 Moderate: java-1.8.0-openjdk security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049) * OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-07, 8u382) [rhel-9] (BZ#2220662) rocky-linux-9-x86-64-appstream-rpms java-1.8.0-openjdk-1.8.0.382.b05-2.el9.x86_64.rpm e72a5c6769e621d5e095a55540a275399d6858831955c9a3bcfc3087361c0fe5 java-1.8.0-openjdk-demo-1.8.0.382.b05-2.el9.x86_64.rpm 74026380889f60033d36c9758402ab4172456f5791a52fc0dd41a2f1cbdc1209 java-1.8.0-openjdk-devel-1.8.0.382.b05-2.el9.x86_64.rpm c6716a507cbb614c018c1b6493884d4f4808838ab3ec26b12662aabc29c2f753 java-1.8.0-openjdk-headless-1.8.0.382.b05-2.el9.x86_64.rpm 8c334b8b4e0a910546ef0ccd281ece82ea8ae3e2e622c3d4370de1a05afee4d9 java-1.8.0-openjdk-javadoc-1.8.0.382.b05-2.el9.noarch.rpm b5e39c366b1d4539a4b44607cc756218c8ca7ac87b0801a15743a1a1269db091 java-1.8.0-openjdk-javadoc-zip-1.8.0.382.b05-2.el9.noarch.rpm 0b6ccc2f05590f4b3ad0c39b80740421dc94f07dfdcc6e265e4b9cd1e8bccb7d java-1.8.0-openjdk-src-1.8.0.382.b05-2.el9.x86_64.rpm 6db056f7fa19681dd06852a93f9d5720c5f31cf886681a97a66571cdb6f038c3 RLBA-2023:4374 java-11-openjdk bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for java-11-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * The recent OpenJDK 11.0.20 security update accidentally removed a runtime dependency on the tzdata-java package. Installations of the package on systems that did not already have tzdata-java installed were left with missing timezone data. This mistake is rectified in this build. (RHBZ#2224428) For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms java-11-openjdk-11.0.20.0.8-3.el9.x86_64.rpm 35ceef7cc9f3c8e3059cb547c2c42ae25fc05297fb7b22297b347651d19c8413 java-11-openjdk-demo-11.0.20.0.8-3.el9.x86_64.rpm f3aa9dee6aaef3d82791f7be3ebcacbf1b3fe30c1d9bff3740e796b54dc868ee java-11-openjdk-devel-11.0.20.0.8-3.el9.x86_64.rpm ffb78cda1474cdacae155883b75092b8e68b6c00b37edec7086dd4f8c77263d3 java-11-openjdk-headless-11.0.20.0.8-3.el9.x86_64.rpm d286296da8b8c8aa5befa707af931a264f551a1fb191748b57318af0e37ce331 java-11-openjdk-javadoc-11.0.20.0.8-3.el9.x86_64.rpm c6826fadd7b415a310410f8e8a37999b8c756e32aac595173b439f03b25be26d java-11-openjdk-javadoc-zip-11.0.20.0.8-3.el9.x86_64.rpm 6abf017d2a373a138fdabb4822a0fb6649b057807f90caed2904167dc0127ce6 java-11-openjdk-jmods-11.0.20.0.8-3.el9.x86_64.rpm 9fbacbd1d6070c757a88a18d6ed655dc0b4be7cb562920a9cdb8a7035e608861 java-11-openjdk-src-11.0.20.0.8-3.el9.x86_64.rpm adacf4c3012c7d5e80e3d1c4e49067b3dcf6efbd8590c5deecc0cb2d084797d9 java-11-openjdk-static-libs-11.0.20.0.8-3.el9.x86_64.rpm aedb8d0a43dc07178fd023aaddaae73c8738965ace056499592d1da68afb7227 RLBA-2023:4375 ostree bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OSTree is a tool for managing bootable, immutable, versioned file system trees. Bug Fix(es): * backport https://github.com/ostreedev/ostree/pull/2874/commits/de6fddc6adee09a93901243dc7074090828a1912 (BZ#2224105) rocky-linux-9-x86-64-appstream-rpms ostree-2023.1-6.el9_2.i686.rpm 747e2be3560f4ecd9b49ed63940d92997e4a4b207c67119375e302e6158f8f1c ostree-2023.1-6.el9_2.x86_64.rpm 0f30b965cf6a892b71215353c0a7162a5a09ed024e3b3774a36676852423ef58 ostree-grub2-2023.1-6.el9_2.x86_64.rpm 2be3823f8a3953ab05c7a2770a7bd8b4a280cdc48e2acf553bbd5adee97c0ee6 ostree-libs-2023.1-6.el9_2.i686.rpm 41d3ec4ae2fe02b392db626fb56725099c54cd2d77c56e03ff10e5b2cbe95494 ostree-libs-2023.1-6.el9_2.x86_64.rpm 85805e28384fcb598c577e934eebe212927c39e8597a0eb3adf6c58a922ddffe RLSA-2023:4201 Important: webkit2gtk3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-32435) * webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2023-32439) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.38.5-1.el9_2.3.i686.rpm dc34bf349a6ee0a95bbf0263698e34acd29b1ac72465ae3e7acb032adcc299b2 webkit2gtk3-2.38.5-1.el9_2.3.x86_64.rpm b025681bd3f30e209a8d3ca4f9a716a68818ee4fb527f466ab43298e46908a6b webkit2gtk3-devel-2.38.5-1.el9_2.3.i686.rpm 0bd2d728e1b34637162dbd9d4683acf52d3b74c8533750635c564929c62253cc webkit2gtk3-devel-2.38.5-1.el9_2.3.x86_64.rpm 056420f51e49ce46ad081147e555de80f800394a700f0ff641554b7de966e5e7 webkit2gtk3-jsc-2.38.5-1.el9_2.3.i686.rpm a186b6cf0cbff1d01888edf490b1b0583ae72f1e4317bd5d27fb258fd5a0bf8b webkit2gtk3-jsc-2.38.5-1.el9_2.3.x86_64.rpm 2395030cfa42488d7c4c64a702499fbc9363f985027c3eb0f223c8aae6d63499 webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3.i686.rpm ae54f67d81b22ebdaac3a5ee0feb4d97999fb8ea7dce97d636f8037477aa37a0 webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3.x86_64.rpm 6ae004f1ea10a2e6a42e8f224d0c8785d50d4f6cd180aa979668b4a374eec955 RLBA-2023:4370 pcp bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Performance Co-Pilot (PCP) is a suite of tools, services, and libraries for acquisition, archiving, and analysis of system-level performance measurements. Its light-weight distributed architecture makes it particularly well-suited to centralized analysis of complex systems. Bug Fix(es) and Enhancement(s): * pcp hacluster pmda doesn't report dc status properly (BZ#2222858) rocky-linux-9-x86-64-appstream-rpms pcp-6.0.1-5.el9_2.x86_64.rpm efc73172098610075af75af9c7a64cdd7fd0ad98c61b1c36a733c3fd776a5242 pcp-conf-6.0.1-5.el9_2.x86_64.rpm c034795910bfbe9e57a29d32488ae38d9c4ba1ff808d8fca06e14181a2d9c113 pcp-devel-6.0.1-5.el9_2.i686.rpm a4fa415f87fede4ba8aeb2255c6ca6f6fa87e1bc9fb973f0fa359d144a4cb923 pcp-devel-6.0.1-5.el9_2.x86_64.rpm 429d5805ec0107beaf8ec1d5a043093732aeee4a95afb78b41ec970471fdf0d7 pcp-doc-6.0.1-5.el9_2.noarch.rpm 1ac71cadba70e99cdc664394b81705857c28cf8dc04d171a0c3264d61c00498e pcp-export-pcp2elasticsearch-6.0.1-5.el9_2.x86_64.rpm 410f2e27221985865ca93d8f893fcb856e15a59f61ac1bfacd42c9a3b268d0ec pcp-export-pcp2graphite-6.0.1-5.el9_2.x86_64.rpm cdaebb6489a6dfd2ad0a1939d0e49515ec5e0c7b8d2cdc2b0898cc8e06298546 pcp-export-pcp2influxdb-6.0.1-5.el9_2.x86_64.rpm ffc86bc9a3bfd462f11582ad3adb7859fa72bb308d41696a19b2abc8fe2b2d23 pcp-export-pcp2json-6.0.1-5.el9_2.x86_64.rpm 5d02bd570f01b578882336781c9fbb4ae6aeeefb1f7ceea3166de673153fcd52 pcp-export-pcp2spark-6.0.1-5.el9_2.x86_64.rpm 55d46ff7be399da6e17358003eb2cad8323bcdf839298c67f2514443f4367d7b pcp-export-pcp2xml-6.0.1-5.el9_2.x86_64.rpm 6735e6771d70b61f784e4bbc9fe9bcd83f186b012fe889fd6203c215c9db2af8 pcp-export-pcp2zabbix-6.0.1-5.el9_2.x86_64.rpm 36705211351fee38316f01237f3d1bf402323316261cfb4674d9553a238e91db pcp-export-zabbix-agent-6.0.1-5.el9_2.x86_64.rpm dc269b2319ff947dda67dbcfc66c80d3891ad1fa0a0c11150402bd73db0bc770 pcp-gui-6.0.1-5.el9_2.x86_64.rpm 802dd59a32521cb8c897ea32dc75cd6289a8af98bb06126239f5cf8a6d9ab33f pcp-import-collectl2pcp-6.0.1-5.el9_2.x86_64.rpm 5a1df0483e2a45a4e0f9d8eb9c33c7b9a4d8277de2541b71f2e563e82dbd5dd0 pcp-import-ganglia2pcp-6.0.1-5.el9_2.x86_64.rpm ada8ccab9fb57d3a0e2f1002520d4300bbee02b2471dbcace8b064b6902505f9 pcp-import-iostat2pcp-6.0.1-5.el9_2.x86_64.rpm 6410b617304ef03edc9207a24673eb754d723b28dd50c2666507a44780a9494c pcp-import-mrtg2pcp-6.0.1-5.el9_2.x86_64.rpm 46dca1fe9c12ea5f2be21285fb8d4bda79a05c6c7a2736c984eb1890fe71ed38 pcp-import-sar2pcp-6.0.1-5.el9_2.x86_64.rpm b9b756b96853be83d91f550437f5f431b465c19252e5d19a30427811c6ebb7e8 pcp-libs-6.0.1-5.el9_2.i686.rpm ad55db9acfdf30612e601a70e0d98697aaf496ca90521f90817fb431a675900c pcp-libs-6.0.1-5.el9_2.x86_64.rpm de2e2535f4d187190e66661d244140ee9a783b4910a04967b109a169495c221d pcp-libs-devel-6.0.1-5.el9_2.i686.rpm 46614f08f65f15de6484bef4278ea80d03d5aaf9299852b905c6498b8c978b24 pcp-libs-devel-6.0.1-5.el9_2.x86_64.rpm 68ac27f709e9be4a4c278eed0892e89a3e2680711e1dfeebb11135328afa9099 pcp-pmda-activemq-6.0.1-5.el9_2.x86_64.rpm d34fa54152c4f7e770bfb56eeaad0852dce7f7a83bc40eeb31d8f15dbe0aa729 pcp-pmda-apache-6.0.1-5.el9_2.x86_64.rpm a2db26a17543b50927a58dbc3aec2c249557b13bdcf252021c660ce867313bc0 pcp-pmda-bash-6.0.1-5.el9_2.x86_64.rpm ba7f0b20909697b78ecf8d0383322b8ae9ae02208d97931975b73ebd826c8528 pcp-pmda-bcc-6.0.1-5.el9_2.x86_64.rpm b494ee73dff57b01c423d730c67c948d275e89e07c01484f09cf4779fa779f4a pcp-pmda-bind2-6.0.1-5.el9_2.x86_64.rpm 6592e079e51206fe25f8b1d8df78e78cb17f56664eb45d89a08949652ce8c050 pcp-pmda-bonding-6.0.1-5.el9_2.x86_64.rpm 23d25afbf7fe2fb8fc68ea338722d0706d5a9840022eb3f0841a72fcf3b82d28 pcp-pmda-bpf-6.0.1-5.el9_2.x86_64.rpm 610481ff5c9af95058266cafee643cfb9ffb3f890eda8d009e81bf7b7b1901e9 pcp-pmda-bpftrace-6.0.1-5.el9_2.x86_64.rpm 467294d6bcd9df700fbdb383c9bd2b4c2e12fb50adb6fa1058a99853c19cfe50 pcp-pmda-cifs-6.0.1-5.el9_2.x86_64.rpm 0c7602c592a457080e4179a9a0fb09cc6e850de0021412c5fccf8fc46af5684b pcp-pmda-cisco-6.0.1-5.el9_2.x86_64.rpm 0d4b79bdf5353f9f7d2df40965b6ff1640875183a75eb3c95ece25dacb53a8c4 pcp-pmda-dbping-6.0.1-5.el9_2.x86_64.rpm b8233efc9bc2e54d362bcd7d0e489f8c42dc469e00a81de0dfd598ecc005e20d pcp-pmda-denki-6.0.1-5.el9_2.x86_64.rpm 038ce31e64ad26f5036eb1804548e43920d6c3a55b9a6a61b43a9db6961f12c9 pcp-pmda-dm-6.0.1-5.el9_2.x86_64.rpm 7f4ff77b4094d9a0b95f8d76b23be7b2807d2d195eae246a084ae42fe42dde50 pcp-pmda-docker-6.0.1-5.el9_2.x86_64.rpm d2a4dbd4dd90bb121dfc10b3c427a84f2b7cd75f60fe3756f47efc3f984b7ec0 pcp-pmda-ds389-6.0.1-5.el9_2.x86_64.rpm 9a2a6592b639a5d9596455c0c7a100a8a9a8ca5b107e21b5af3e1b77dd1abbc8 pcp-pmda-ds389log-6.0.1-5.el9_2.x86_64.rpm b6d5747c9da77bc6240232218f3778fa2cb3de23591ea7525cfa3011ef3a10c5 pcp-pmda-elasticsearch-6.0.1-5.el9_2.x86_64.rpm a83bb386328859735517797e483b1a6f1a217f96bdc6d30605783fb914b799d3 pcp-pmda-gfs2-6.0.1-5.el9_2.x86_64.rpm 3a1466cd147060e5812ec989c8cdb0a3cd52a6dc3903342698611013ba7de389 pcp-pmda-gluster-6.0.1-5.el9_2.x86_64.rpm b194c8edacf9e6dc1922eca81d122b050184d821cb200fd3893191bec261f5ff pcp-pmda-gpfs-6.0.1-5.el9_2.x86_64.rpm b31d96e0e429820ec816be7e67b4faee92612096807bb729b82904a88462d242 pcp-pmda-gpsd-6.0.1-5.el9_2.x86_64.rpm 67913261b31acd722ea411e2351b4d471ef5de8c68d8f7ba485bd655c50c3fdc pcp-pmda-hacluster-6.0.1-5.el9_2.x86_64.rpm aabefaf20b6e88a1b1889c0814dc44a1d1ca0e59b79fc7dbc44566148e6d4187 pcp-pmda-haproxy-6.0.1-5.el9_2.x86_64.rpm 27d943aca00f5737ea55ac208794fa40b522a7c75ccf5e8a44ae2d362cb85e32 pcp-pmda-infiniband-6.0.1-5.el9_2.x86_64.rpm 5eab55c138dc1bc1e97e09bb21eda75515d729ed60e724456aea6b2b98213177 pcp-pmda-json-6.0.1-5.el9_2.x86_64.rpm dabe200b343131c474663c7dd865a0ffa7e0700c3651d831047720b54bc3b607 pcp-pmda-libvirt-6.0.1-5.el9_2.x86_64.rpm 6b2ac5ba8ce94330224ecef9c01ef30533281f48a160a19c9ff5aaa8a9c97966 pcp-pmda-lio-6.0.1-5.el9_2.x86_64.rpm 6f2ff540d8ad870ab2d701f671ddbe37118d4186ec41e2c16b3732f5061624ce pcp-pmda-lmsensors-6.0.1-5.el9_2.x86_64.rpm 9d0c54eecd48381f89609c3656abbf7c5a13db47703d8e8ebdd6057868c8bc3b pcp-pmda-logger-6.0.1-5.el9_2.x86_64.rpm a2601b79f2b71577016f1172568d74aca179a0a3f56f5103c7b4f4d001518025 pcp-pmda-lustre-6.0.1-5.el9_2.x86_64.rpm 6337b28b138b653fda835e16bc57ea1dd71ac267e622adf4e8f4193664409c7b pcp-pmda-lustrecomm-6.0.1-5.el9_2.x86_64.rpm dccf972542442753eb11d9361fd0d3ff384538a56934e219c4ed1bffa5f102e5 pcp-pmda-mailq-6.0.1-5.el9_2.x86_64.rpm 8e40be49b9dd9ff9ac0cd973fdbfe25de22ac8faec52b61fef958d85305cca38 pcp-pmda-memcache-6.0.1-5.el9_2.x86_64.rpm 71471e52916ed1e1e0a59c5dca3dab26c5cf1b70f0acf66c8c795214655642ef pcp-pmda-mic-6.0.1-5.el9_2.x86_64.rpm f5d227aed2585548cb1ebf3273709f9abc949fd74407a0fa4ef0c618afb730a0 pcp-pmda-mongodb-6.0.1-5.el9_2.x86_64.rpm 60cdcfbb4661d2e8ec36bedd63c32a82f49ab97a2459fcba1b3dc3824c43f3c8 pcp-pmda-mounts-6.0.1-5.el9_2.x86_64.rpm 0ee4fc926777b3940f1aced582215499ec69abca1e5b58ce9c401bef89eebba1 pcp-pmda-mssql-6.0.1-5.el9_2.x86_64.rpm 0347666dcd615081e41e2255a4ff6b2a3cb9b4a9aa5c44fc768fc32daebb1688 pcp-pmda-mysql-6.0.1-5.el9_2.x86_64.rpm 2129a629a188fbd77f292c62ab5ddc9e6f1e6d12a2c8505a5a8502bde4039f36 pcp-pmda-named-6.0.1-5.el9_2.x86_64.rpm ce33623c553be10bb772bbb6e35ee4a9e519e2e05822fe7b0726e742f32fef4d pcp-pmda-netcheck-6.0.1-5.el9_2.x86_64.rpm 8e5b555312a13a0bfda314aa31beeb0c32c7bcc4b5af94dfeb86ac0f8c49cf56 pcp-pmda-netfilter-6.0.1-5.el9_2.x86_64.rpm f3eb4c10ec9e5ba6077936ce5d91724699f0627c48438caafcfe9c4cc7478468 pcp-pmda-news-6.0.1-5.el9_2.x86_64.rpm e54ab7bd5e6fe555decd686f21c6098b2d704bcec52d2774a275a363168699a7 pcp-pmda-nfsclient-6.0.1-5.el9_2.x86_64.rpm d73bc32dabeb13cd64adc0d8dad49f888c3b32cff68657279c35e39fa7e3de81 pcp-pmda-nginx-6.0.1-5.el9_2.x86_64.rpm 5101ed720a5ceb748b89d7abecc28f4a244666eba8309ce303f8fa31e667c6ec pcp-pmda-nvidia-gpu-6.0.1-5.el9_2.x86_64.rpm fbcd9d569850f258939d7712ac84e3091387ad26a679cbb0d1292324919c7b08 pcp-pmda-openmetrics-6.0.1-5.el9_2.x86_64.rpm 8eb310c049b76fa5700a4b9ade86723c89b5ca09e44614fb01a5f594f0823e5b pcp-pmda-openvswitch-6.0.1-5.el9_2.x86_64.rpm a90ea120d174537d3795f415616027bffbd2c011bc537db20da79f00412eeefa pcp-pmda-oracle-6.0.1-5.el9_2.x86_64.rpm a3fee86c66fa1392bd340d6ae6346058dc51578b9abb016605631000cad3a10b pcp-pmda-pdns-6.0.1-5.el9_2.x86_64.rpm 3d27489f3be689b46016cfce8a63922b1d2e5cde5de823ace5a72b7cc68bd0a8 pcp-pmda-perfevent-6.0.1-5.el9_2.x86_64.rpm 72c64979f429d48e871555fcc887bbe9c7e9a8b7dd55822485be028b6e48662e pcp-pmda-podman-6.0.1-5.el9_2.x86_64.rpm 1fa39d896eebf75d0f56cad66204868694a7308d77a4d32f344c749ef39bf6de pcp-pmda-postfix-6.0.1-5.el9_2.x86_64.rpm 48d81f2ae128c311e0fc5a9770c4226fbe4c8714680ba74c6b77db0e67233b33 pcp-pmda-postgresql-6.0.1-5.el9_2.x86_64.rpm 6dbab8cda5cc308388ccd56cd5403b170b4af698db133b79c05e0af2f3c3d007 pcp-pmda-rabbitmq-6.0.1-5.el9_2.x86_64.rpm 397bc80635bd87e21b1ea94bc6cea95791f390e0f2022af3188b3ce615ca350e pcp-pmda-redis-6.0.1-5.el9_2.x86_64.rpm d16dd727a4ce3667dc3890910c494983e41888c86db5ac6a1fa5e926b4f24863 pcp-pmda-roomtemp-6.0.1-5.el9_2.x86_64.rpm 52c7d92aa3776eb927afa318cedb357fee8d99aad002e35d8b0b2afd75de824b pcp-pmda-rsyslog-6.0.1-5.el9_2.x86_64.rpm 648578b1810c0fb9e1ef282ab0400fcf36ffc18ce0813683ef589181e4c26cfd pcp-pmda-samba-6.0.1-5.el9_2.x86_64.rpm aab8fa5d5ac72b10886d53649c7c4276b952d27031e53d51c8ffef490aa7203c pcp-pmda-sendmail-6.0.1-5.el9_2.x86_64.rpm 84fe4252b49e4a66f73ffec4ad4e266ddaf0161687108c90b35959565eefafa1 pcp-pmda-shping-6.0.1-5.el9_2.x86_64.rpm 88def4c33b9a69180a1e30835bbc1e1deef1301dd5fa462c8a25b3ecc2ef786b pcp-pmda-slurm-6.0.1-5.el9_2.x86_64.rpm d7486ba815184c3a36b90dc0d7f7e1cbacfea6313db4d74a0edfcfd037cb7450 pcp-pmda-smart-6.0.1-5.el9_2.x86_64.rpm 3bdc25fa80c2469d11e0ce0af2632988a1f09fd38841c2c9d864cac682e60cc1 pcp-pmda-snmp-6.0.1-5.el9_2.x86_64.rpm f48be492161af69cb262f590ccf3d805ed0aca746502709e55de746280a248e6 pcp-pmda-sockets-6.0.1-5.el9_2.x86_64.rpm 420619fccba79fe4eb93779a3ed8c1f946fc4b322f4d4510a6fe451e4f2b51e9 pcp-pmda-statsd-6.0.1-5.el9_2.x86_64.rpm 5c89643e8d62e218b163fb68a6a395a153fdda8cf3213b7a39b6a7cff4fb3658 pcp-pmda-summary-6.0.1-5.el9_2.x86_64.rpm 2f3148ee069f87707f1c5257e307a5789baec9fbf105d75103a2d19bc0799416 pcp-pmda-systemd-6.0.1-5.el9_2.x86_64.rpm c27b03466c8a534d78641432bb94ffec9306c8e1ed582d49376672bdd0e4cd04 pcp-pmda-trace-6.0.1-5.el9_2.x86_64.rpm 1333aeeb8101e41ddb26922435a2b6f136cdc5789e72b5809a005d2148a34e22 pcp-pmda-unbound-6.0.1-5.el9_2.x86_64.rpm 44310839328a144ffb1cd7c66b3dd510607bff22e3262de1905a17b3d060c81d pcp-pmda-weblog-6.0.1-5.el9_2.x86_64.rpm d419b9161e3752520a3e25cac4286642e808ca4a6382dde04e586cc6cce53b7b pcp-pmda-zimbra-6.0.1-5.el9_2.x86_64.rpm 872cbe9689fce80f1d7adfb98be053708625cd91222d8eeb0e07c91c9f17f498 pcp-pmda-zswap-6.0.1-5.el9_2.x86_64.rpm a1ecab777a30d23432d38ba3a4432f8b62fdabeb4ad37a1fa7a501ce7c1c347f pcp-selinux-6.0.1-5.el9_2.x86_64.rpm bf7224ba117d31fca6a0fa38b1b68f8ef1ce716d075ad353c549754a1f947c48 pcp-system-tools-6.0.1-5.el9_2.x86_64.rpm 6b70ee032d3d0855e41f35713ea872077de4bc84e6f6d329d4fa4ce5783124fe pcp-testsuite-6.0.1-5.el9_2.i686.rpm ba9cc512829000ae1357009343f5758a0cb13581460652abed98f095de67b9e1 pcp-testsuite-6.0.1-5.el9_2.x86_64.rpm 23023a08fe8848fff89ffacdaedd075c0b64a8c143a55fb5dd98e3a3bb17c537 pcp-zeroconf-6.0.1-5.el9_2.x86_64.rpm c3f4bbe552f31395e85cf57f3c67b74353ea5298f498bbdb6e44242778b0d5cc perl-PCP-LogImport-6.0.1-5.el9_2.x86_64.rpm 9449f72d93e44f6d0d9b436f1d83398b8e7c0b5668ef3f9eeb60f839879c4b91 perl-PCP-LogSummary-6.0.1-5.el9_2.x86_64.rpm 34da646b9e70709d5bf1e808807b168f9add2509513413a47b4cc8db36ca5a20 perl-PCP-MMV-6.0.1-5.el9_2.x86_64.rpm f37854c61720ad5c6d613c687eb89375485bb7639456d2bd39d119a162cf53f6 perl-PCP-PMDA-6.0.1-5.el9_2.x86_64.rpm 7a507bfdf44509470c9816771382ae5c0f7c56b3b8f0be2e46ff472c5756a32f python3-pcp-6.0.1-5.el9_2.x86_64.rpm 083101b59a7bcdfee4425c03e322ea53f3ab0a1145223dc34d8e37050e6bff9c RLSA-2023:4462 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.14.0 ESR. Security Fix(es): * Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions (CVE-2023-4045) * Mozilla: Incorrect value used during WASM compilation (CVE-2023-4046) * Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-4047) * Mozilla: Crash in DOMParser due to out-of-memory conditions (CVE-2023-4048) * Mozilla: Fix potential race conditions when releasing platform objects (CVE-2023-4049) * Mozilla: Stack buffer overflow in StorageManager (CVE-2023-4050) * Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 (CVE-2023-4056) * Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, and Thunderbird 115.1 (CVE-2023-4057) * Mozilla: Cookie jar overflow caused unexpected cookie jar state (CVE-2023-4055) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-102.14.0-1.el9_2.x86_64.rpm 0064dfc397c76c3480e31e48ceeaef75a4c43255e0f5783507b7938b96fd2ae0 firefox-x11-102.14.0-1.el9_2.x86_64.rpm d78d8fd2b1f4ed6de359b72b361f34669b97bd46d6089c2ebcd517abf9879492 RLSA-2023:4499 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.14.0. Security Fix(es): * Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions (CVE-2023-4045) * Mozilla: Incorrect value used during WASM compilation (CVE-2023-4046) * Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-4047) * Mozilla: Crash in DOMParser due to out-of-memory conditions (CVE-2023-4048) * Mozilla: Fix potential race conditions when releasing platform objects (CVE-2023-4049) * Mozilla: Stack buffer overflow in StorageManager (CVE-2023-4050) * Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 (CVE-2023-4056) * Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1 (CVE-2023-4057) * thunderbird: File Extension Spoofing using the Text Direction Override Character (CVE-2023-3417) * Mozilla: Cookie jar overflow caused unexpected cookie jar state (CVE-2023-4055) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-102.14.0-1.el9_2.x86_64.rpm 3d9c1e8839f2818aeaa5c4fea6e5e948845fa3d93bbccb55bbe67801d99488a0 RLEA-2023:4366 alsa-sof-firmware enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-sof-firmware. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The alsa-sof-firmware package contains the firmware binaries for the Sound Open Firmware project. Enhancement(s): * [Dell 9.3 FEAT] - New MB with AMP Codec Change on Maya Bay (BZ#2218951) rocky-linux-9-x86-64-appstream-rpms alsa-sof-firmware-2.2.5-2.el9_2.noarch.rpm 42447bfa3dd406c5a51faa76a71ac618c6bbb435af54a37391d93ce51bb51117 RLSA-2024:4165 Important: pki-core security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pki-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System. Security Fix(es): * dogtag ca: token authentication bypass vulnerability (CVE-2023-4727) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms idm-pki-acme-11.5.0-2.el9_4.noarch.rpm 1e8b80befc37d0e51d55e6f245e95ecc03f0c4972193eb4244c4043b30c37cbe idm-pki-base-11.5.0-2.el9_4.noarch.rpm 941b0e8ab1e39a2d682d9c3ae386805541bcb70d4c5dcadc8cb5469027866296 idm-pki-ca-11.5.0-2.el9_4.noarch.rpm 0c5e25e9d180c47530306f73313cb43e8fdcc1a6614a50e5a6760c069aa074ce idm-pki-est-11.5.0-2.el9_4.noarch.rpm c28c722b64a4827e17cb9ed11a8f777248c8eedcec1abf2c3bdd8d340d00009c idm-pki-java-11.5.0-2.el9_4.noarch.rpm 72790b48c935e221766118978be18a91f4e5754f107727186df52d02e28bbd65 idm-pki-kra-11.5.0-2.el9_4.noarch.rpm db035c01641c131e8622c5cc95c8944cba617fa9c12b6ec2b8e7d564c94ed457 idm-pki-server-11.5.0-2.el9_4.noarch.rpm ee7ad84da3ad56c75625210d85c47cf5087de70ee9cc7c752c97cf3f4487e407 idm-pki-tools-11.5.0-2.el9_4.x86_64.rpm ee40c35d7a59aa19b76b6b04cda4891aac6ce503d3ec879e344f651198f5e073 python3-idm-pki-11.5.0-2.el9_4.noarch.rpm 64ed511faba53264af8a77e26a70934395c6473a4393ce3de59b5d05700d8ff1 RLBA-2023:4365 cloud-init bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cloud-init. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Bug Fix: * The system did not generate SSH host keys and lost SSH connection after cloud-init removed them with the previous update to the cloud-init package. (BZ#2217065) rocky-linux-9-x86-64-appstream-rpms cloud-init-22.1-10.el9_2.0.2.noarch.rpm ceb7cd0bf27e1b4a8bec4a619227dfec7ca158288b9c623066d1c62b3454ad1f RLEA-2023:4372 WALinuxAgent bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for WALinuxAgent. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Windows Azure Linux Agent supports provisioning and running Linux virtual machines in the Microsoft Windows Azure cloud. The WALinuxAgent package has been rebuilt to include the new subpackage WALinuxAgent-cvm. (BZ#2222947) rocky-linux-9-x86-64-appstream-rpms WALinuxAgent-2.7.0.6-9.el9_2.1.rocky.0.noarch.rpm 4109c3f9f6167c0a910ad05d7d2b00fd7a36936a512a7b6b98b4a68d0a0156d5 WALinuxAgent-udev-2.7.0.6-9.el9_2.1.rocky.0.noarch.rpm 80b4e9bca7804e88cf29197abb27e6f802a9c0e3404a9270c7b18793578a5d5f RLBA-2023:5075 sip6 bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sip6. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SIP is a collection of tools that makes it very easy to create Python bindings for C and C++ libraries. Bug Fix(es): * sip6-6.6.2-1.el9 introduces a regression bug when using sub-classed C++ exceptions (BZ#2225605) rocky-linux-9-x86-64-appstream-rpms sip6-6.6.2-1.el9_2.1.x86_64.rpm cc6cdfbb5a4d821edd105d53ebb71bed180dca6dd388e6133750204005e322e8 RLSA-2023:3595 Important: python3.9 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: urllib.parse url blocklisting bypass (CVE-2023-24329) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-devel-3.9.16-1.el9_2.1.i686.rpm 81634c4262a4944830a25a6b06c0d586d119e45b4193587fce50c44d60a28c5c python3-devel-3.9.16-1.el9_2.1.x86_64.rpm c91735cbd56db64b4d5cb27defe81a6fe2b8da7db777e59a3ebc3aa7a9faf4e1 python3-tkinter-3.9.16-1.el9_2.1.x86_64.rpm ac677835c540fa0a96279d254749bd3b3ee84dab7bee51e4d6826019221ca7f5 python-unversioned-command-3.9.16-1.el9_2.1.noarch.rpm aa57dbab5adaa4444d9287ae233ffc0a90edb3a41d9cddcfeedd649910eb7b30 RLBA-2023:3730 avahi bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for avahi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Bug Fix(es): * [Rocky Linux-9] Avahi-tools package built but not shipped. (BZ#2204487) rocky-linux-9-x86-64-appstream-rpms avahi-glib-0.8-12.el9_2.1.i686.rpm a42712c3176a297bc30ac7b397e6954a644898b378eebe5617fbfbef8b1356c5 avahi-glib-0.8-12.el9_2.1.x86_64.rpm 8a133d5c385e147023b5c385d0621d9264da4fa24f83cea9b02a31e48c63cc49 RLBA-2023:3732 selinux-policy bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for selinux-policy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es): * Missing type transition for cloud-init to create /root/.gnupg with correct label (BZ#2203797) rocky-linux-9-x86-64-appstream-rpms selinux-policy-devel-38.1.11-2.el9_2.3.noarch.rpm 9e86f62c40e241267b1d9026cfad65170b8147f3c38dbf2a3cef4afb308c05fd RLSA-2023:3423 Important: cups-filters security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for cups-filters. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently. Security Fix(es): * cups-filters: remote code execution in cups-filters, beh CUPS backend (CVE-2023-24805) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms cups-filters-1.28.7-11.el9_2.1.x86_64.rpm 015ef7ca12e9a9fed0072ebdd50379f3ab19aa28d85b8db96b6ec79d7d66dd1a cups-filters-libs-1.28.7-11.el9_2.1.i686.rpm b1c315d2aee7866fa926d3bc7f0a10cffac55716ddd2347fc73800d8fc64d699 cups-filters-libs-1.28.7-11.el9_2.1.x86_64.rpm b5d57ea1e0a737820ce27a926e2decdbc1e50ed7592af954b940ab4cd24a98c7 RLSA-2023:3585 Important: python3.11 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. Security Fix(es): * python: urllib.parse url blocklisting bypass (CVE-2023-24329) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-3.11.2-2.el9_2.1.x86_64.rpm bb5004b65e6ed8fc8c5d14f21309fe38aaf78ccb13936f22f4faf8e5ec1d1249 python3.11-devel-3.11.2-2.el9_2.1.i686.rpm 0ace6acc95186337091f4ab632b9dfa8cc60ec2b7364157a87f06679fab89e4a python3.11-devel-3.11.2-2.el9_2.1.x86_64.rpm 0ed5c7724577b7fd9d5b5c9950c65161ee35ad748836b8a83c696d05811cdadd python3.11-libs-3.11.2-2.el9_2.1.i686.rpm 883760c8131df37fd968f52cc969c106c0a37db905e35e888fd6000ccc505e56 python3.11-libs-3.11.2-2.el9_2.1.x86_64.rpm 57656d41c3cbe800787be9d0f53f5006d75a0fc7bd055ed15b7490ae0597c9cd python3.11-tkinter-3.11.2-2.el9_2.1.x86_64.rpm 0a74181c20b442214a032b9d5f633d2abaf1bf1a214a24310dd9f3a210b32fc7 RLSA-2023:3711 Moderate: libtiff security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libtiff. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: heap-based buffer overflow in processCropSelections() in tools/tiffcrop.c (CVE-2022-48281) * libtiff: out-of-bounds read in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0795) * libtiff: out-of-bounds read in extractContigSamplesShifted24bits() in tools/tiffcrop.c (CVE-2023-0796) * libtiff: out-of-bounds read in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c (CVE-2023-0797) * libtiff: out-of-bounds read in extractContigSamplesShifted8bits() in tools/tiffcrop.c (CVE-2023-0798) * libtiff: use-after-free in extractContigSamplesShifted32bits() in tools/tiffcrop.c (CVE-2023-0799) * libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0800) * libtiff: out-of-bounds write in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c (CVE-2023-0801) * libtiff: out-of-bounds write in extractContigSamplesShifted32bits() in tools/tiffcrop.c (CVE-2023-0802) * libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c (CVE-2023-0803) * libtiff: out-of-bounds write in extractContigSamplesShifted24bits() in tools/tiffcrop.c (CVE-2023-0804) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libtiff-4.4.0-8.el9_2.i686.rpm 2c3e6b252e4b58e4dc0cabeb8be81de1cbd82d74df373222ccca8e6402721f3c libtiff-4.4.0-8.el9_2.x86_64.rpm b72293f66532108a05f92261731658359c97103fed7a0c65a0605613c8df8d07 libtiff-devel-4.4.0-8.el9_2.i686.rpm 8464c176b0ad99eeb97ac9ee487fcb055a5bfadacad56b8f103e09cb7344c07a libtiff-devel-4.4.0-8.el9_2.x86_64.rpm 7a2af83f48faeeff8f7050f7f3c99a97af72505a9f98563da28c3d68bb7fee5d RLSA-2023:3715 Moderate: libvirt security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. Security Fix(es): * libvirt: Memory leak in virPCIVirtualFunctionList cleanup (CVE-2023-2700) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libvirt-9.0.0-10.2.el9_2.x86_64.rpm a8a77b731f8d1b064814830e827d3b202365b3a9313a8a52ee7afadb71988e32 libvirt-client-9.0.0-10.2.el9_2.x86_64.rpm b91541ed580e9b276af05f804603cebaee385b1e1a5f92185d9b08cd0f2572a3 libvirt-daemon-9.0.0-10.2.el9_2.x86_64.rpm d6456c7427ef1f55d8a848dbca911c57a45081b8de681ae88bb293e0707ad1eb libvirt-daemon-config-network-9.0.0-10.2.el9_2.x86_64.rpm 74921043c4b765c8147f358a5b4e39a3dfe9e8b90d4913c73e0ca1e2a24ac2a1 libvirt-daemon-config-nwfilter-9.0.0-10.2.el9_2.x86_64.rpm 3be08a0bb256e830db8f6cb6d651f1884cc59ff076197e50586655839d40fc3b libvirt-daemon-driver-interface-9.0.0-10.2.el9_2.x86_64.rpm 4877035c9bc64347ae4aab73506326febd45b7e015b9ad03851176d7fefdd2f5 libvirt-daemon-driver-network-9.0.0-10.2.el9_2.x86_64.rpm a1b9decad4b8192a06d90d4ef84831df2f8d5ea74a3e06e70beb7c16e950f012 libvirt-daemon-driver-nodedev-9.0.0-10.2.el9_2.x86_64.rpm 834d2167a390a0b6c1fec5726823a56d18b7b1a1d8dabc96335870db1c22ae3c libvirt-daemon-driver-nwfilter-9.0.0-10.2.el9_2.x86_64.rpm 71519438408501cfc73706084f5839673d9e3f96ab8d7efbb5677c6191491ecd libvirt-daemon-driver-qemu-9.0.0-10.2.el9_2.x86_64.rpm 80d4f346434b9574c15c809adc52cd7a1895e510546cb4d89e7ae6dbd35df310 libvirt-daemon-driver-secret-9.0.0-10.2.el9_2.x86_64.rpm f70e594708c22c9066bbd2b6533136b78e1ae31dbda21feb21e67f7422283342 libvirt-daemon-driver-storage-9.0.0-10.2.el9_2.x86_64.rpm 8a7984d868b512a320a90f0de38f939ce73f24859e7a882a7ab1fc1d072da638 libvirt-daemon-driver-storage-core-9.0.0-10.2.el9_2.x86_64.rpm 24864e01713548226d7f67f54b16c0a0717b7a6eac81ed7d4a60634fc6e5c71f libvirt-daemon-driver-storage-disk-9.0.0-10.2.el9_2.x86_64.rpm 0668fbe4b77ac970bfba8f63cc5f79f557d835df25f13dcc9f2f457b58c23a21 libvirt-daemon-driver-storage-iscsi-9.0.0-10.2.el9_2.x86_64.rpm 5b96e19eeded9f5a3df4cdea3dd9b0f749cbdb1bb4f9944443ee669e8068b4fd libvirt-daemon-driver-storage-logical-9.0.0-10.2.el9_2.x86_64.rpm d8aee17c72e2ec4546797935d09e9fcf2e34e84e10fc13d84c1c60504b925213 libvirt-daemon-driver-storage-mpath-9.0.0-10.2.el9_2.x86_64.rpm d6d1921cd347bf4a19b4d5fa102c91b867a2f0c3c982096cb6303b1c8df7544c libvirt-daemon-driver-storage-rbd-9.0.0-10.2.el9_2.x86_64.rpm 3706ab8e224f54cbf042958a73082aad07e90cf902773af49aa81db8028b4718 libvirt-daemon-driver-storage-scsi-9.0.0-10.2.el9_2.x86_64.rpm 4a5e65092e7bea0333538dc3539df2b80fd93db3317a043ce8819a7642fea52c libvirt-daemon-kvm-9.0.0-10.2.el9_2.x86_64.rpm 15f73cd7d9ecf9d906e796e6764f53cd8b38c5c663543e8b4fc163541435c972 libvirt-libs-9.0.0-10.2.el9_2.x86_64.rpm de961cfc3263cb757231188d5eb3fea9ca40596ad48a84d7dee3bb4f79e6f501 libvirt-nss-9.0.0-10.2.el9_2.x86_64.rpm f15ca5831dc5b43272ce70bbca281d9f241d67b26e1c4c147a9c41eacdcaa252 RLSA-2023:3714 Moderate: postgresql security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for postgresql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: schema_element defeats protective search_path changes (CVE-2023-2454) * postgresql: row security policies disregard user ID changes after inlining. (CVE-2023-2455) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms postgresql-13.11-1.el9_2.x86_64.rpm 2c335535b43ac494c65174295c5800c3092409ba18aae46c8010147db20ca72c postgresql-contrib-13.11-1.el9_2.x86_64.rpm 1b01df0e4a0a2baf991f632283bd4550b8e01f7fb3235a6cde6b29b2e17aec2b postgresql-plperl-13.11-1.el9_2.x86_64.rpm 12f73bebbdbeeaac867033b60d0818c6de3d570ba0afedb0431fbb5f7f0f7900 postgresql-plpython3-13.11-1.el9_2.x86_64.rpm bba6d017fe1fc66e29b2cfad4d5e4ee7645850707f8a67d0201d9c7fc11aa5cc postgresql-pltcl-13.11-1.el9_2.x86_64.rpm 1389ac60eec38264397e072c6416dee8c5a4ecf01514dc6be50d8f4e33daf81f postgresql-private-libs-13.11-1.el9_2.x86_64.rpm 2dfa6507ec488ce782a939e85bf715f44150bc52ade99637f4d87ea71936d866 postgresql-server-13.11-1.el9_2.x86_64.rpm ad4bbfbb1bdc6bcdb3737715cf7dcdcd189d76c31de0f911f7c055f2801cfb10 postgresql-upgrade-13.11-1.el9_2.x86_64.rpm af2c51af7127d188e565e1d2081e72e0f8df2bb09344287c19e47bd0bf61e5e4 RLBA-2023:3720 criu bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for criu. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The criu packages provide the Checkpoint/Restore in User Space (CRIU) function, which provides the possibility to checkpoint and restore processes or groups of processes. This in turn allows improved fault tolerance or high availability (HA) of a system by restoring a failed process to its state in an earlier point in time. Bug Fix(es) and Enhancement(s): * Containers migration "podman container checkpoint" doesn't work on Sapphire Rapids CPU. (BZ#2203235) rocky-linux-9-x86-64-appstream-rpms crit-3.17-5.el9_2.x86_64.rpm 28d2c9cbe1e57c919b77608d96f65084c7483610f542869aaa30e216f1584500 criu-3.17-5.el9_2.x86_64.rpm 4d8f96c132b3879ac0c1842247269aaf5738bf16ff7131ea0f7e4222fc5b6dc6 criu-libs-3.17-5.el9_2.x86_64.rpm 97e155ce0cc795306d175f97a607af91a054255577a4bd80aa20041f85205312 python3-criu-3.17-5.el9_2.x86_64.rpm b3caeb4ecef91cbdf75b34cf9153e36b26b800f5a089962841253d6c283cbebe RLBA-2023:3710 virtio-win bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virtio-win. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The virtio-win package provides paravirtualized network drivers for most Microsoft Windows operating systems. Paravirtualized drivers are virtualization-aware drivers used by fully virtualized guests running on Red Hat Enterprise Linux. Fully virtualized guests using the paravirtualized drivers gain significantly better I/O performance than fully virtualized guests running without the drivers. Bug Fix(es): * [virtio-win][NetKVM] The minimum(32) of RxCapacity in 'defaultConfiguration' does not equal the minimum(16) in inf (BZ#2203205) * [virtio-win][fwcfg] Fwcfg - Windows update reports errors (BZ#2203207) * [virtio-win][virtiofs][nfs] overwrite confirmation during copy > 5K file to the shared directory -nfs mounted (BZ#2203209) * [virtiofs][virtio-win] Give some hint when start virtiofs service with device is disabled detached (BZ#2211912) Enhancement(s): * [RFE][virtio-win][virtio-fs] Add host UID and GID parameters (BZ#2203228) * [virtio-win] Add WinFsp code to virtio-win source RPM (BZ#2208395) rocky-linux-9-x86-64-appstream-rpms virtio-win-1.9.34-0.el9_2.noarch.rpm e9cbb63909176930d6932eff316b6152c7ad8f57838cc235b8a4cb083222119f RLBA-2023:3717 passt bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for passt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list passt implements a translation layer between a Layer-2 network interface and native Layer-4 sockets (TCP, UDP, ICMP/ICMPv6 echo) on a host. It doesn't require any capabilities or privileges, and it can be used as a simple replacement for Slirp. pasta (same binary as passt, different command) offers equivalent functionality, for network namespaces: traffic is forwarded using a tap interface inside the namespace, without the need to create further interfaces on the host, hence not requiring any capabilities or privileges. Bug Fix(es): * With passt-selinux installed, installation of selinux-policy-devel reports harmless, but confusing syntax errors (BZ#2190510) * Reinstalling passt-selinux package leads to temporarily disabled policy (BZ#2190511) rocky-linux-9-x86-64-appstream-rpms passt-0^20230222.g4ddbcb9-4.el9_2.x86_64.rpm 8a9db681596c8f5b341a58caee000a746a75edefd399e534de7d349ecf6b6174 passt-selinux-0^20230222.g4ddbcb9-4.el9_2.noarch.rpm c542f3f907b9aa6d40ad11ded502d8d94ba0b0e8872b0bc0414e571f880c27ed RLBA-2023:5298 fido-device-onboard bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fido-device-onboard. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fido-device-onboard package provides a rust implementation of the FIDO Device Onboard Specification. Bug Fix(es) and Enhancement(s): * Update FDO to the latest release (BZ#2224364) * Libvirt FDO installation Failed to instantiate TCTI (BZ#2231069) * fdo-aio can't get started (BZ#2233734) rocky-linux-9-x86-64-appstream-rpms fdo-admin-cli-0.4.12-4.el9_2.x86_64.rpm c9fcbc32b5ec0180408e71ee2c933b556bcef3f60e086baaed812b925afe6061 fdo-client-0.4.12-4.el9_2.x86_64.rpm 9aaf8db2c15f2c65ebc60a301ee744eba7d418fa5033c4819647eb4a79ce89c3 fdo-init-0.4.12-4.el9_2.x86_64.rpm 5b0095e29385f3038759b743c76c94114620f0da1c19ddc373940da63461af64 fdo-manufacturing-server-0.4.12-4.el9_2.x86_64.rpm 8476e07978ee2fa573960f01f1dd74406a84f41e4f9b9aedc4ef048c0807e37e fdo-owner-cli-0.4.12-4.el9_2.x86_64.rpm 99f72538a125a66b51b119ae84dc7b87fb25b0cf8a6ff126d2cbd47609454970 fdo-owner-onboarding-server-0.4.12-4.el9_2.x86_64.rpm 25cee59e2a40457fd7ab526444228e34ddd92bc77934882b95673d00b6870ed8 fdo-rendezvous-server-0.4.12-4.el9_2.x86_64.rpm b27b8df882874b8a6079325e13c3dda1cf7b4b6bbc1338ad098dc4acf952d0b0 RLEA-2023:4865 new package: gpsd-minimal Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gpsd-minimal. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gpsd package provides a service daemon that mediates access to a GPS sensor connected to the host computer by serial or USB interface, making its data on the location, course, and velocity of the sensor available to be queried on TCP port 2947 of the host computer. This enhancement update add the gpsd-minimal package to Rocky Linux 9. (BZ#2228096) rocky-linux-9-x86-64-appstream-rpms gpsd-minimal-3.25-1.el9_2.3.x86_64.rpm 56ef72391b9cff267c64992a11c928f45f3ecdd158ef1858b8791c22721e61ea gpsd-minimal-clients-3.25-1.el9_2.3.x86_64.rpm 3010805c5ba0a5752f2fe9fcac2b79c43d73c2284e6d9d32eeedca6065efdce9 RLSA-2023:4838 Important: cups security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for cups. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: Information leak through Cups-Get-Document operation (CVE-2023-32360) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms cups-2.3.3op2-16.el9_2.1.x86_64.rpm 531724a8ae36160e584d3fcdb03b73b0287c58aaa886aed0188f8c78e345fc21 cups-client-2.3.3op2-16.el9_2.1.x86_64.rpm f74c34e6986b8ebbd010341e14af3a725631894ad1b5e5d28288630acc2644a1 cups-devel-2.3.3op2-16.el9_2.1.i686.rpm fda77eac7a6ff6df06a6cca01324da7c63bb4dc5f3060944ce1f8816cf59e687 cups-devel-2.3.3op2-16.el9_2.1.x86_64.rpm 6e4f54aeeb62a0eb0c597fe1a7e147aac519b6598de47249e82d39ea9ff635b6 cups-filesystem-2.3.3op2-16.el9_2.1.noarch.rpm 7cda2a4598214fbe6c70fe5dd6cc2a36dae24088903770e58444102d1f6d1a1a cups-ipptool-2.3.3op2-16.el9_2.1.x86_64.rpm f3c1294c63934c7e217144bae2b4b3610384e114ece1f461c9d354f721f770de cups-lpd-2.3.3op2-16.el9_2.1.x86_64.rpm 90228174babe7346e41a851809c8cb1dabf7ddd8938a5d5df18acf9a76d271ca cups-printerapp-2.3.3op2-16.el9_2.1.x86_64.rpm f13113593a1204619e01056f72efa3fbd02d643222c24ecdb2e67a824df55d57 RLSA-2023:5313 Important: open-vm-tools security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for open-vm-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Open Virtual Machine Tools are the open source implementation of the VMware Tools. They are a set of guest operating system virtualization components that enhance performance and user experience of virtual machines. Security Fix(es): * open-vm-tools: SAML token signature bypass (CVE-2023-20900) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms open-vm-tools-12.1.5-1.el9_2.3.x86_64.rpm 8b0e2c92c3d412bdcacb82820d6cca832cdbf677228706d955aa76d2cc0028ef open-vm-tools-desktop-12.1.5-1.el9_2.3.x86_64.rpm 829f763816665daaa9191f7e4d1d49be43d678f991b9ac811293d39ea2983990 open-vm-tools-salt-minion-12.1.5-1.el9_2.3.x86_64.rpm c1a3079f293a9975a802ce8b251527d0684bfcff1fe66cb46cef04ccc20a853d open-vm-tools-sdmp-12.1.5-1.el9_2.3.x86_64.rpm f66254d5b386682e855dbd70a41038e109f52ba30f95e0ee7432a9a074e8e75d open-vm-tools-test-12.1.5-1.el9_2.3.x86_64.rpm 6e53446556360cc7d1a2487e76d0e416ad0491aecbcc572d3c561c92a25b8324 RLBA-2023:5088 389-ds-base bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for 389-ds-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Bug Fix(es): * Paged search impacts performance. (BZ#2231841) rocky-linux-9-x86-64-appstream-rpms 389-ds-base-2.2.4-5.el9_2.x86_64.rpm cb7b3ef3d2fa74fbbcbb0fa1266d47db7003530140e7ba717e183dd291dacd3d 389-ds-base-libs-2.2.4-5.el9_2.x86_64.rpm 955f13209762844a699d09706f26016915c324e736509009bd163cfb42c5d26a python3-lib389-2.2.4-5.el9_2.noarch.rpm 945dff6c303300458854a513cd69fc7e83d16cd7fa5eb720312bd71d75d4a53c RLSA-2023:5214 Important: libwebp security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libwebp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently. Security Fix(es): * libwebp: Heap buffer overflow in WebP Codec (CVE-2023-4863) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libwebp-1.2.0-7.el9_2.x86_64.rpm 2e6565c2ff97f2fbc2633e6bdfcf8e877b17567142e6851743419632d437cb15 libwebp-1.2.0-7.el9_2.i686.rpm aa103fb08f6af44316ea09febb058e68cda3e8fce292f04553e167a3c7651fc8 libwebp-devel-1.2.0-7.el9_2.i686.rpm e01b01c776fc949a649c7a981e9f404acd2fc33216f3cd266d9602b28b7621e8 libwebp-devel-1.2.0-7.el9_2.x86_64.rpm 6fd011aba4d88178a9bb1864a6c3a4b905a1456033051a1d862c784702362dd3 RLSA-2023:5924 Important: varnish security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for varnish. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms varnish-6.6.2-3.el9_2.1.i686.rpm 7233021549a34421e686c1b2041001f2e66a76d323c434200548f0fc136bafda varnish-6.6.2-3.el9_2.1.x86_64.rpm 457a433b4426ed3bb128133a55c73525fac2d9381a33aa6dab6f00cd1a6582b7 varnish-docs-6.6.2-3.el9_2.1.x86_64.rpm e3d545fffa2b3a9bf7293f0714473a4707c30edd31240321f044c3cf856f0578 RLSA-2023:5765 Important: nodejs security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for nodejs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * nodejs: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487) A Rocky Enterprise Software Foundation Security Bulletin which addresses further details about this flaw is available in the References section. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms nodejs-16.20.2-3.el9_2.x86_64.rpm ced322c092ff463d444f77af4bd48ab75a8607decaeea9e15e42300c70af7c0f nodejs-docs-16.20.2-3.el9_2.noarch.rpm 6519a5202ef9875196bc6d369af54179965d66ab6eb35bfc757cc6c99da2a0f7 nodejs-full-i18n-16.20.2-3.el9_2.x86_64.rpm 6eec823fdd34632fcd9ac6572915be04be4c833e212987c9d9872103fbf23d7a nodejs-libs-16.20.2-3.el9_2.i686.rpm 2c48b577714f68bb6a9b7ecdea021c2f80c8a20546c7df9c1112e37f99fe7c9b nodejs-libs-16.20.2-3.el9_2.x86_64.rpm 694650198c13598b8b37fd7167585b6a83817ab0141642530478d5e6a4de8b95 npm-8.19.4-1.16.20.2.3.el9_2.x86_64.rpm 1216b64a82539aa829391769be7245a4b51360bf27bcdbe68c2b5905b6082ed1 RLSA-2023:6266 Critical: squid security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Critical An update is available for squid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * SQUID-2023:3 squid: Denial of Service in HTTP Digest Authentication (CVE-2023-46847) * SQUID-2023:1 squid: Request/Response smuggling in HTTP/1.1 and ICAP (CVE-2023-46846) * SQUID-2023:5 squid: denial of Service in FTP (CVE-2023-46848) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms squid-5.5-5.el9_2.1.x86_64.rpm 00ec04dfd1657bac0e911783a26b8210d140c5d1bfbe455ffa3f076896377f24 RLBA-2023:6412 alsa-sof-firmware bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-sof-firmware. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms alsa-sof-firmware-2.2.5-2.el9_2.noarch.rpm 42447bfa3dd406c5a51faa76a71ac618c6bbb435af54a37391d93ce51bb51117 RLBA-2023:6536 net-snmp bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for net-snmp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms net-snmp-5.9.1-11.el9_2.x86_64.rpm b6edc3804049080df6d087f0bd453af4a7c2c8d4b83a3f24b22e8d224ae4a30f net-snmp-agent-libs-5.9.1-11.el9_2.i686.rpm 6f1f9205b2ecc1eb595ed55cfa5434a8e2243b38f289a7215d6859338273628f net-snmp-agent-libs-5.9.1-11.el9_2.x86_64.rpm f7aa2cb858fbb65de89a4921f50b281c9230c466c246edf241acb6ada62b7e6a net-snmp-devel-5.9.1-11.el9_2.i686.rpm d15e205f970491ddfe874c82b727f2642edbb27c1078d5a92a978c90eeaaf505 net-snmp-devel-5.9.1-11.el9_2.x86_64.rpm c683d10535307d6c2198dd7d3e0849dda282babd6fc19d5ff1055159cc0d18d4 net-snmp-libs-5.9.1-11.el9_2.i686.rpm 8bf90a3594c43ab7ba9968f9cf5ea468c9fcfdff171c1ddd8a1288b16d176290 net-snmp-libs-5.9.1-11.el9_2.x86_64.rpm c204dcbaca9bb5f87edf637cc4003fd122b9a5ac7b047d0f63619b6c83ad9d3c net-snmp-perl-5.9.1-11.el9_2.x86_64.rpm db5d84b120c02f82675a8082dce9b9306ee207ca6a66328cb7526a80f6843fc8 net-snmp-utils-5.9.1-11.el9_2.x86_64.rpm 8c895d0081ebc31a42be374d5318b1adf1a2de5fbcee600c1f35017d1db5427f python3-net-snmp-5.9.1-11.el9_2.x86_64.rpm c72f48985c2ff0563775b1031f2e79d8ff9362b78bb6b60486a60bf62cf13210 RLBA-2023:6552 scap-security-guide bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scap-security-guide. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms scap-security-guide-0.1.69-2.el9_2.rocky.0.1.noarch.rpm 4cd3d4080048693c8c5692900785d5e9a9c6322edc941b06dfd85c12d8ea1374 scap-security-guide-doc-0.1.69-2.el9_2.rocky.0.1.noarch.rpm 6f437e6c8514a35a8b6e138c1c28a79900fda10ced1001c26ca0b1877409d37c RLSA-2024:2758 Moderate: kernel security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation (CVE-2023-6240) * CVE-2024-25743 hw: amd: Instruction raise #VC exception at exit (AMD-SN-3008,CVE-2024-25742,CVE-2024-25743) Bug Fix(es): * ffdhe* algortihms introduced in 0a2e5b909023 as .fips_allowed=1 lack pairwise consistency tests (JIRA:Rocky Linux-27009) * mm/mglru: fix underprotected page cache (JIRA:Rocky Linux-29235) * [EMR] [TBOOT OS] SUT could not go to S3 state with Rocky Linux 9.2 Tboot OS One CPU return -16 running BUSY (JIRA:Rocky Linux-29673) * system hangs completely - NMI not possible (JIRA:Rocky Linux-30678) * ice 0000:6f:00.0: PTP failed to get time (JIRA:Rocky Linux-30110) rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-427.16.1.el9_4.x86_64.rpm 9b5b7012f7779a771f60f403a2a23d4e2bfe2a1183bc18362c650a3a15bc4f3a kernel-debug-devel-matched-5.14.0-427.16.1.el9_4.x86_64.rpm efecfb852fcefe18069273cc671f18d8226e7e2e260d62164e6bb9e3d593338c kernel-devel-5.14.0-427.16.1.el9_4.x86_64.rpm 576d205326a864027dc2810fae40777861a64944f6102c0bdea7d89f527dfb2a kernel-devel-matched-5.14.0-427.16.1.el9_4.x86_64.rpm 70605c8e540df200c306832facc6ccebc9651aab266c1438393c5fc700dc7845 kernel-doc-5.14.0-427.16.1.el9_4.noarch.rpm f035f49ab6e5cf0139e6fcc4208d8434dfb34ec0677ccdd3d62bd5ea873c6a2b kernel-headers-5.14.0-427.16.1.el9_4.x86_64.rpm bcd7bed269b0fddf53304a153658552b5c15d17edde61e37ff760f9d4dbf2dff perf-5.14.0-427.16.1.el9_4.x86_64.rpm 5483769fecd0c1bb52552c5c783d6ae3d149a9915402e17d615a67e77997ea95 rtla-5.14.0-427.16.1.el9_4.x86_64.rpm 8a06d9a7398e409d83f742a79fbb3eafc41a5d4862f6ba00e86ed2fffb0b5c23 rv-5.14.0-427.16.1.el9_4.x86_64.rpm 9f3fee42df3cb74c085f0e6fa529de1118a7e661010fe2636a89f2f1fe8c75e3 RLSA-2024:1818 Moderate: java-1.8.0-openjdk security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011) * OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068) * OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085) * OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-1.8.0-openjdk-1.8.0.412.b08-2.el9.x86_64.rpm 04c3bd756ca8c6c5e8c5d121fbac3fadfeb62209682ef253fdacb4430e63f6fe java-1.8.0-openjdk-demo-1.8.0.412.b08-2.el9.x86_64.rpm 8cda4469b372c76da0932a9d0f092d1b846368878aaede237c460bde21a32289 java-1.8.0-openjdk-devel-1.8.0.412.b08-2.el9.x86_64.rpm d912010173461b29d8efbd64f6d55fca4af3ec4817cf239054f38aecac368eb1 java-1.8.0-openjdk-headless-1.8.0.412.b08-2.el9.x86_64.rpm 1855ef52d2e8f68508b4ccfe458d44c0578be566b3446d8bb8aae54f68bdc434 java-1.8.0-openjdk-javadoc-1.8.0.412.b08-2.el9.noarch.rpm d85f668f7812cd642f9816c9390f9bdcd44942b097957c2b6252ca1dec519279 java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-2.el9.noarch.rpm df6abdbb98c05b41936348d87f018ef61940f446cf5f1c9c91e4e924accdddfd java-1.8.0-openjdk-src-1.8.0.412.b08-2.el9.x86_64.rpm ae95d1546ed41b0636e5923a5819259b33592870d69a264e40439183b6bd4294 RLSA-2024:1828 Moderate: java-21-openjdk security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-21-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-21-openjdk packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit. Security Fix(es): * OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011) * OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068) * OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) (CVE-2024-21012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-21-openjdk-21.0.3.0.9-1.el9.x86_64.rpm 3e23ce536bd1824c4defdc09aad82b37f883c25dbf9a9fec6e67052c5c52399e java-21-openjdk-demo-21.0.3.0.9-1.el9.x86_64.rpm 89c9ca98661f6a7cacf7f9f78a59caddd74affbfbfe5ee9e5b772c97004ab71a java-21-openjdk-devel-21.0.3.0.9-1.el9.x86_64.rpm 26386e2829715739156d101ac2495c7bcc2b9d88f636fbabb494f364a7dede7c java-21-openjdk-headless-21.0.3.0.9-1.el9.x86_64.rpm 70b51b6a7cd8bba111465ba9328aeee15f3297e168147b37221640871bb9c5fe java-21-openjdk-javadoc-21.0.3.0.9-1.el9.x86_64.rpm ab7a6396c3ad381f371090a4152b18a5b457701e6fabc23f756e32795a235893 java-21-openjdk-javadoc-zip-21.0.3.0.9-1.el9.x86_64.rpm f8733dfaca359c0a16d1da5d285c18e64beb1b2996cc82833ee37a3512c7e8ef java-21-openjdk-jmods-21.0.3.0.9-1.el9.x86_64.rpm 1288c4c52121c4959f0c6294e2b78d6602d662a4e4f5e4189f43ee9ec76e68b0 java-21-openjdk-src-21.0.3.0.9-1.el9.x86_64.rpm 02b0777997debf47248f7e356df771d7f72e1dc485963ddd86a1eb0ab57adf44 java-21-openjdk-static-libs-21.0.3.0.9-1.el9.x86_64.rpm 240147219f0a746fa2a62f6115553cfa9ca7b51a8a5c44b9ad6f1d02b9d2ea7a RLSA-2024:1822 Moderate: java-11-openjdk security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-11-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011) * OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068) * OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085) * OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094) * OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) (CVE-2024-21012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-11-openjdk-11.0.23.0.9-3.el9.x86_64.rpm a8bee5a8b6e0935a55721b02c6787ba3129352adf813ace86396069e8442ab8b java-11-openjdk-demo-11.0.23.0.9-3.el9.x86_64.rpm 35d3c8c1f64ecfb257ff90be8d3160fd307d522c4005a94e6194195c0c363b22 java-11-openjdk-devel-11.0.23.0.9-3.el9.x86_64.rpm 83512f4c7823e0fb7cf1cfa1dc7386faf739541dc4f9bdb08ef8fcd36ccf220c java-11-openjdk-headless-11.0.23.0.9-3.el9.x86_64.rpm 4becbe62a7cb1c09a0c8476f850135aa1972af8143ade34981d7b1dc42702eae java-11-openjdk-javadoc-11.0.23.0.9-3.el9.x86_64.rpm 436404efaa47f005a0f00b632b9d510546614723b2e9002b4adee284652ec99c java-11-openjdk-javadoc-zip-11.0.23.0.9-3.el9.x86_64.rpm 471dc2fc606c7d5ee1b033d86d887e45545e22239e41896d614fad0b8e562f35 java-11-openjdk-jmods-11.0.23.0.9-3.el9.x86_64.rpm f5e6d8b770382620d6087e4bb77ba40dc571813acdaaf01bd9aca10aee47fa81 java-11-openjdk-src-11.0.23.0.9-3.el9.x86_64.rpm 126877f791bd1b035188e7a8b0b219e1146d0b38612eb03ddfd3b9676d0b5fca java-11-openjdk-static-libs-11.0.23.0.9-3.el9.x86_64.rpm 3104fe342fc99a27056d781f9026c41f4d4e0f773975b41051a2c39ab85a1d66 RLBA-2024:2397 cockpit bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-packagekit-311.1-1.el9.noarch.rpm 83c1a42d6cfc3d2728cda5fdb9d7ecaa865df2d34ef87c61cfa6498b22252dcd cockpit-pcp-311.1-1.el9.x86_64.rpm b1d59b72484f46bcaf2f95174dee1d44f6ae9d0d31735e2bf9375d6abcbdb5ab cockpit-storaged-311.1-1.el9.noarch.rpm 4d9be377e995f5c117c3d47ab518dcd5c9ac70b811371b571d13549649e1de47 RLBA-2024:2402 selinux-policy bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for selinux-policy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms selinux-policy-devel-38.1.35-2.el9_4.0.1.noarch.rpm d0ac8b03238a61fb728f82021746c0fc9c80c6cb62679090555ad8c346c38a6c RLBA-2024:2403 gcc bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cpp-11.4.1-3.el9.x86_64.rpm 298cbccf8768fae253209641cdea3bce81b652f78c7c1178b1f907ce1f146246 gcc-11.4.1-3.el9.x86_64.rpm 44ff2c768848a786c1a737005e503c14fa047319ec19dd3d4e10af603cb3d8cb gcc-c++-11.4.1-3.el9.x86_64.rpm cc84b7f4df78e85cf055adc5d4c56a98524e58c5263b934c5caaf2d5a9807446 gcc-gfortran-11.4.1-3.el9.x86_64.rpm dbee18a4d3d12f717bfff4df208e4932e5bcc77ba3574f693278d1ba96397c66 gcc-offload-nvptx-11.4.1-3.el9.x86_64.rpm 320172a4c7a22a09f46f5ac4cd3c6b89e823ab1803ddee7d24eee013bc3d6b2b gcc-plugin-annobin-11.4.1-3.el9.x86_64.rpm a116385451e828a33ec377da8a265436c6c941ab1487cb579528445dd02ee638 libasan-11.4.1-3.el9.i686.rpm a3604e623848b721f89e31c9295764b357e4fcc301452214d06c4f91706b067d libasan-11.4.1-3.el9.x86_64.rpm c72fddd916c15f948c5f9a7ac5192f498f43b9bf8553b5347812734aaaa92896 libgccjit-11.4.1-3.el9.i686.rpm 76ed9df8df17a157c171e8078168cfb812d45290c2ae0c89fccd566137838d7f libgccjit-11.4.1-3.el9.x86_64.rpm f81ea6fa882c7d7309d5965d263b6cb8159501d3bebdf657752b347e4213ed1e libgccjit-devel-11.4.1-3.el9.i686.rpm 76c91bfcce6d836c65a687455742d47978f9f6395b28086e30b63319b1f5cd1b libgccjit-devel-11.4.1-3.el9.x86_64.rpm 03ba9e92a1542d9f8503036da559e70c0990ab5182247d9461708b34be54ed6c libgomp-offload-nvptx-11.4.1-3.el9.x86_64.rpm 773f34667e021eabc24a85cf1befc44a13630827237b98dd0732325a39dd8654 libitm-11.4.1-3.el9.i686.rpm ad8160d8ef1ae66758373bcf501efc1da4495bdebac12c65ac5e0b3abe12be8b libitm-11.4.1-3.el9.x86_64.rpm ab319a06959d29801519e9d3c159f5be00fadf9297d24db27710ab32620c660e libitm-devel-11.4.1-3.el9.i686.rpm 5bff22d7cb10b953ef48f66ccfedae4402f87734379d8a51f80727356afc2930 libitm-devel-11.4.1-3.el9.x86_64.rpm e53817b57f720b6d33b9b7726ccde737d20ef54d98520215f772af88a05989bb liblsan-11.4.1-3.el9.x86_64.rpm bd3e48bf281cdbb13460052762839db3a5da5a33d034d4f2ce2fcc046852a74e libquadmath-devel-11.4.1-3.el9.i686.rpm 05d297634f1136ce0e052e96cbb5f629c93ede26bf15768f8c6d30b45826724f libquadmath-devel-11.4.1-3.el9.x86_64.rpm 7fdbf636758fd4a5961092c3715c2c321632d49a06c5f40b19876735697c0960 libstdc++-devel-11.4.1-3.el9.i686.rpm afe2fcca9a5e6fd8a1ce48e7ef600a088f85ada5745dcf5c2d76b2dfa6bbd92b libstdc++-devel-11.4.1-3.el9.x86_64.rpm 8cdf0dbc08b88670e85087cf6c577e2b1e8cce4a4ad56053f4475955a4ee681c libstdc++-docs-11.4.1-3.el9.x86_64.rpm 002c032ecb174b98babcaf22c4537899b3ccc3f168866829b52229f0734b03a7 libtsan-11.4.1-3.el9.x86_64.rpm b58c83417e42dbe90b33026b8687f4691cbdc31714a2e92cafb060245c41d274 libubsan-11.4.1-3.el9.i686.rpm 1421821662d0e331b7a96097d00103970a8e07e6fad853bcd4e320e58151e01c libubsan-11.4.1-3.el9.x86_64.rpm ba9dbf19955f2f3664cc0562aa6b9a606bcdb8a9cf6f4427bef91cdb8f40a1f1 RLBA-2024:2411 e2fsprogs bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for e2fsprogs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms e2fsprogs-devel-1.46.5-5.el9.i686.rpm 0187446cc4eb6bb3561534fcc87df748af101af7c842737249b294ef916013e2 e2fsprogs-devel-1.46.5-5.el9.x86_64.rpm ee8f8dadfaed78631142761287e91b2368419edfaa1cf8deccf57047ebff1f4b libcom_err-devel-1.46.5-5.el9.i686.rpm 14bd56419ae4accd1697ba56961aedf3993bf2431553a7cebdc88b9ec9ced5d0 libcom_err-devel-1.46.5-5.el9.x86_64.rpm fd52e043dd3c1c50de3c38c52b9ed407fa50fcebaa68f410bcf43742c495e83b RLEA-2024:2424 libnvme bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnvme. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-libnvme-1.6-1.el9.x86_64.rpm e4f3e844d9e977455d24daf58da0633b0f044805702cb3d7f6cf4bc68f139b66 RLBA-2024:2428 glib2 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for glib2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms glib2-devel-2.68.4-14.el9.i686.rpm c55094b15804237fafa83aecc36f8f718a9300dc7ebda626fcc39ec8efb14b12 glib2-devel-2.68.4-14.el9.x86_64.rpm 17c38749b910b54187c222e5db88f3cae3427d577c020caeb95bdd3142d6a48c glib2-doc-2.68.4-14.el9.noarch.rpm 7feea8b72925736dc5f8f1a5ba3e251372af10ce1587c3582c3926c1bf8b7275 glib2-tests-2.68.4-14.el9.x86_64.rpm 3801190b855a519ee9cadd17b9a2640d1aa2e49622ea159ea94efe819069a12a RLBA-2024:2429 rdma-core bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rdma-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ibacm-48.0-1.el9.i686.rpm 63d954da1e64c0df0259cb4791a1b8375bd54f0f20515f61bd16d70b3186d78e infiniband-diags-48.0-1.el9.i686.rpm b16269c09c271de3b79d63e26bb8cd25bd8ac5d121779a1d3963660b34c64955 infiniband-diags-48.0-1.el9.x86_64.rpm 0149cc535ac9f7e486181210d42229389706349fc7de8eab2bfd05ebd5a57a12 python3-pyverbs-48.0-1.el9.x86_64.rpm cca587ecede6121412d30bb6ff5e23706180616ba983cb5c9f0cf60f004f6e37 rdma-core-devel-48.0-1.el9.i686.rpm 835decf10fef36adf99380ef0d3530498e4f37be6037b72bb76f3735717463ee rdma-core-devel-48.0-1.el9.x86_64.rpm 048c876d7719634fecae62d7a36399cc7b69751e3b0ee5b5c1d6cda4c99e9a4d RLBA-2024:2427 elfutils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for elfutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms elfutils-debuginfod-0.190-2.el9.x86_64.rpm e7d2586c9d72aa384fad234895d6bc18c8fa365002256847618beea363c723b7 elfutils-debuginfod-client-devel-0.190-2.el9.i686.rpm d0c4b5ea4dbd177dbed773cd52523ace99f8322bd9cb9a71e21b8758399310d3 elfutils-debuginfod-client-devel-0.190-2.el9.x86_64.rpm 6ce71c022318fe3ba2974cf768ae522fa20fe4a662e6a8a0731ac2cd13d3e3be elfutils-devel-0.190-2.el9.i686.rpm e6563f871a80d2eeb5fbc04a3465c9be31645e41f67d98cb3fae1afce4492cba elfutils-devel-0.190-2.el9.x86_64.rpm 8677c3d96d39598ad4f17e67a95183cd7b8fedba42d5f65feee257cfb483a809 elfutils-libelf-devel-0.190-2.el9.i686.rpm aaed9969768ba945ce7bb0ebe88cce9f0c862882c825275fed9d8e8ccd23469f elfutils-libelf-devel-0.190-2.el9.x86_64.rpm cfd03142fa4907668d0295760235ef74ad8b9c5cd88a4be58278c9f10fe75a29 RLBA-2024:2439 libsemanage bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsemanage. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-libsemanage-3.6-1.el9.x86_64.rpm 1d8cb078b1bb1af095eb65709e0b23fc022ec6ac0035aa13e35387856b59209c RLBA-2024:2440 libsepol bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsepol. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libsepol-devel-3.6-1.el9.i686.rpm 48b6e2b8e7646480dab106f2a7a10ad32ea7b672ecf7d5d9328562931616f4b9 libsepol-devel-3.6-1.el9.x86_64.rpm ff527e80a3ffc2ca8fad962653da008ef0fb7b702afa2738deab1b4372dd3815 libsepol-utils-3.6-1.el9.x86_64.rpm 3c5d988deaaa1085d982761663b710be948b2fedaeb6019ec14dd39f84a9d20b RLSA-2024:2463 Moderate: systemd security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for systemd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes (CVE-2023-7008) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms systemd-devel-252-32.el9_4.i686.rpm 40f8714499adb8fb06e8c36410fb17f1552358a7fdaab95f2bd0b8c8f974176d systemd-devel-252-32.el9_4.x86_64.rpm 91e80d328f4020b39d0942dd6f39650040ea6228416c86c6c08ec2e27a549896 systemd-journal-remote-252-32.el9_4.x86_64.rpm 0c73a04132b9d3d63e98e471c84875242fcf7ca504d3886bc5850b690b6ee07a RLBA-2024:2464 xfsprogs bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xfsprogs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xfsprogs-devel-6.3.0-1.el9.i686.rpm ad524b979526977c1c20c9dca74d44de3f95de7aa0d2db21a972caa111a55acf xfsprogs-devel-6.3.0-1.el9.x86_64.rpm 80dd1917b602975f9172afc44eb286501a27bd8e37c88b73e028543536b4575e xfsprogs-xfs_scrub-6.3.0-1.el9.x86_64.rpm c863e0efccf3b33e0bcea5108bff362dc12f9f1a21892ed26f5df6b8a0300a72 RLBA-2024:2494 firewalld bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for firewalld. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms firewall-applet-1.3.4-1.el9.noarch.rpm 6bb702cc5d75e37d1057ece6383cd2c850cfbe2da1a8769fc6bca4ec1bfa5d5d firewall-config-1.3.4-1.el9.noarch.rpm ce71f1987c6b3ebf2bf867c0c50fc799e0f021a387878fb188d5b52d0540481f RLBA-2024:2496 iptables bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iptables. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms iptables-devel-1.8.10-2.el9.i686.rpm f9491c2b95683c3dd268f45f319a91e22be5317ea97ccd75eb0d665fea96a7ec iptables-devel-1.8.10-2.el9.x86_64.rpm 96fb37209b049ccebbdf14a36fffa7f5f67a757c4a4e49c361e8937e55fc271e iptables-nft-services-1.8.10-2.el9.noarch.rpm fcc2ec478dc3b803e81290be3f6ea665dcd7f529d7e63a7a21f38cb255584435 RLBA-2024:2497 lvm2 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lvm2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lvm2-dbusd-2.03.23-2.el9.noarch.rpm 0b2cc3f57c2419929177efe6b42a565c54e76c2abf405e805d28201873518ca7 lvm2-lockd-2.03.23-2.el9.x86_64.rpm 9bad2f64771f9bd486f16bb4266721e57b0ac15e1582ee775dfd3e6bed4ca7e7 RLBA-2024:2518 expat bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for expat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms expat-devel-2.5.0-2.el9_4.i686.rpm 56c587f7f61a02f7e6aa4287ab2bb501446f32958a09b044cffd1a4bda6fceda expat-devel-2.5.0-2.el9_4.x86_64.rpm ac2835b64426a47aef2eddbd0f55b3e0b6ec238b60cfff2d1a325b238ee79ecc RLSA-2024:2570 Moderate: gnutls security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gnutls. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls package provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: vulnerable to Minerva side-channel information leak (CVE-2024-28834) * gnutls: potential crash during chain building/verification (CVE-2024-28835) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gnutls-c++-3.8.3-4.el9_4.i686.rpm 38972e0001b05bbeb2d24b78b2ffcce680c5a16a28fa51ab76c807067908576a gnutls-c++-3.8.3-4.el9_4.x86_64.rpm d6956dfacd00ca5f8dfd681e0d183f0c0ab66d328545183b42b7281687c1b9ff gnutls-dane-3.8.3-4.el9_4.i686.rpm 1162aa1121563f5a25c6b940e105690f341eb7122b5e50333e58bcf92e8617a5 gnutls-dane-3.8.3-4.el9_4.x86_64.rpm b2ac545db9452572798225510df814d3790acc99fc7174d0eb68d9c59d79e437 gnutls-devel-3.8.3-4.el9_4.i686.rpm 588d88835fdac778514efc1a5e2b31d414224e1170cbe4b5e66d2983e97d6c3d gnutls-devel-3.8.3-4.el9_4.x86_64.rpm 615c3aa1a2e05120c9dbcc6f9f1468d3e7a606f13374a95cd16a6b8956054d82 gnutls-utils-3.8.3-4.el9_4.x86_64.rpm 6d0cfb6d8ae5472e1ec2a8a265b5059c4bd7b9e98f6b02ef0e1352777b14d706 RLSA-2024:2571 Moderate: sssd security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for sssd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Security Fix(es): * sssd: Race condition during authorization leads to GPO policies functioning inconsistently (CVE-2023-3758) Bug Fix(es): * socket leak (JIRA:Rocky Linux-22340) * Passkey cannot fall back to password (JIRA:Rocky Linux-28161) * sssd: Race condition during authorization leads to GPO policies functioning inconsistently (JIRA:Rocky Linux-27209) rocky-linux-9-x86-64-appstream-rpms sssd-idp-2.9.4-6.el9_4.x86_64.rpm 5c0feafe14d240ce0e632aef0456d25c4b9fff06ffec70b893074aef24bc8cd7 RLSA-2024:2679 Moderate: libxml2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libxml2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: use-after-free in XMLReader (CVE-2024-25062) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libxml2-devel-2.9.13-6.el9_4.i686.rpm 1eca5890eaa14c34da208f4b9e520945d78ea8eb2059e8bd902be66d3e2c47ab libxml2-devel-2.9.13-6.el9_4.x86_64.rpm 0a2bf7f9d1dae671d4d30e81fad0aef9891c4d4d53a2619fd98cd6394b397cd5 RLBA-2023:6326 libstoragemgmt bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libstoragemgmt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libstoragemgmt-1.9.7-2.el9.i686.rpm 8805e23dae5e94fef215f2284795fe92b837509fe5c1ad85e65071907c1f5038 libstoragemgmt-1.9.7-2.el9.x86_64.rpm e45695642aefccbd47448251350ad9e52c4a26e5fa7079475336f84b46a933df libstoragemgmt-arcconf-plugin-1.9.7-2.el9.noarch.rpm f7ed4701fa76d9e000ef842281589abe3c9edff5a9e2fb3e3d9f320f304ce8ab libstoragemgmt-hpsa-plugin-1.9.7-2.el9.noarch.rpm dcc94143a6578ebd3cd5bd1f19914be088c2ac1d41f61ff1cb76b75b41a310ed libstoragemgmt-local-plugin-1.9.7-2.el9.noarch.rpm 0680f88fe5eb1d1752d104e0bb296d7c5c3df092b9aaed82d15d6031d6f1cc99 libstoragemgmt-megaraid-plugin-1.9.7-2.el9.noarch.rpm e5a19d43c9933cd7ec24639163bf57b56c2e7c5ed0cfa2a278a7391cba33c825 libstoragemgmt-nfs-plugin-1.9.7-2.el9.x86_64.rpm dd6c3cff6a8b3309f194b3de2e7bfaf8919f74e4daea911e4d696c7c11002d88 libstoragemgmt-smis-plugin-1.9.7-2.el9.noarch.rpm a31abbd78835c0784323432e50a852c9123afcccb2ec15483ca531a3fbfeb072 libstoragemgmt-targetd-plugin-1.9.7-2.el9.noarch.rpm a0e48390a638586f2e653065536f867ea9b2ba199b536f2d59e3271c8f25d54c libstoragemgmt-udev-1.9.7-2.el9.x86_64.rpm 89eeb19c0887ca1bdb75cf3da6badeb680cbf43ded07f8a85c1f81392ee6a277 python3-libstoragemgmt-1.9.7-2.el9.i686.rpm 55257a9c62cb711287c3f7ee13940f14fa546c625302a76f6e041d8aff0b4d06 python3-libstoragemgmt-1.9.7-2.el9.x86_64.rpm a2b8bb126e65cd44d4bf23f102de96373d2085e2035cb9d12deb4f7a5108056c RLEA-2023:6416 libblkio bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libblkio. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libblkio-1.3.0-1.el9.i686.rpm 9f0d84987e77ecc1b4220bc82c156c4fac1214f9bc5c89d3629b634a590bf2a6 libblkio-1.3.0-1.el9.x86_64.rpm 409639d9cb0a17dc362d8c62a109dde5c4dac60ec8ff8551d94a3ea87319129b RLSA-2023:6518 Moderate: flatpak security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for flatpak. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. The following packages have been upgraded to a later upstream version: flatpak (1.12.8). (BZ#2221792) Security Fix(es): * flatpak: TIOCLINUX can send commands outside sandbox if running on a virtual console (CVE-2023-28100) * flatpak: Metadata with ANSI control codes can cause misleading terminal output (CVE-2023-28101) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms flatpak-1.12.8-1.el9.x86_64.rpm 480f7919802a060c42446eacf5b02bc4b793e29b8c306317b25287c835ff510e flatpak-libs-1.12.8-1.el9.i686.rpm 9a12d94219b28d85dfcf0bcbd874fedbdaab5a25076d37a62c910bf7cc603f22 flatpak-libs-1.12.8-1.el9.x86_64.rpm 8d0e99f0580fade5e6eb7a5806f59b42c8e8cd407eb97c1b1860f4da696285c6 flatpak-selinux-1.12.8-1.el9.noarch.rpm afaeeef88d4c5849a3ccc533a7ffd2ab98c392dbb88e4abb370b9e76ddbfe5e8 flatpak-session-helper-1.12.8-1.el9.x86_64.rpm 180ce4c11e02442957453159f17b0ed960a61d57678b6e4e0ba48315278955ce RLSA-2023:6551 Moderate: yajl security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for yajl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Yet Another JSON Library (YAJL) is a small event-driven (SAX-style) JSON parser written in ANSI C, and a small validating JSON generator. Security Fix(es): * yajl: Memory leak in yajl_tree_parse function (CVE-2023-33460) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms yajl-2.1.0-22.el9.i686.rpm 86745e09d48757f2394c83aef0f0659f1a9286fb9e6597b9377968334de7912a yajl-2.1.0-22.el9.x86_64.rpm 01f37c41e967b2c966ce4fec0de572168de96be5887ae2abd9b83b623e01e1f4 RLSA-2024:0951 Important: postgresql security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for postgresql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL (CVE-2024-0985) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms postgresql-13.14-1.el9_3.x86_64.rpm ef3a92748f4cb8ceb9c609b77e1c47f7d357786bfbd7be78ced97babbe06a52a postgresql-contrib-13.14-1.el9_3.x86_64.rpm 2c296c76d9ac1238fc95ea0a5d6d138f183f726e8e098e36984a1f10e42a3bac postgresql-plperl-13.14-1.el9_3.x86_64.rpm 07d929406b1079b272d7503ef685dcadd4b7ae77a5e321f766c3e6539c165115 postgresql-plpython3-13.14-1.el9_3.x86_64.rpm e2934532f1475c9bfe78895eb9d8bb76258a4960d857d70493d358583748dda9 postgresql-pltcl-13.14-1.el9_3.x86_64.rpm a121308825ed44009495411b9ce0e3597e5d017a46a5066768de9e6afd35dd17 postgresql-private-libs-13.14-1.el9_3.x86_64.rpm 084616fbd615fad54b1bf6b3092329fbe3830673f6eb11f1a011f17a828254fd postgresql-server-13.14-1.el9_3.x86_64.rpm 932e69f7c683d4d7ebaa1e4735e025229513c3b1f29f3632f98f69bf4d451ead postgresql-upgrade-13.14-1.el9_3.x86_64.rpm 8ff487b9c98e630140d01e75ff7e542d2fb1f9007aa75e63cd92ef4f3c280cb1 RLSA-2024:1691 Important: varnish security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for varnish. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * varnish: HTTP/2 Broken Window Attack may result in denial of service (CVE-2024-30156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms varnish-6.6.2-4.el9_3.1.i686.rpm 686f39e23a6338230bad0d0a86bd354fcc67d47f32a31458bc6f8d907aa37780 varnish-6.6.2-4.el9_3.1.x86_64.rpm 0c412829f752f79f0d621f0fea8567d9afc6a5a4d40d3d298080bda6a3b97234 varnish-docs-6.6.2-4.el9_3.1.x86_64.rpm 18762b709a7af6125177f3a2bb26741471c5106b7bc452063c45c6b1303201f7 RLBA-2024:1736 .NET 7.0 bugfix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet7.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 7.0 to SDK 7.0.118 and Runtime 7.0.18 [rhel-9.3.0.z] (Rocky Linux-31202) rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-7.0-7.0.18-1.el9_3.x86_64.rpm 1d5a70ba4bf52fc51773782c79650dde9042e62b5f3cc39ed7d246f60db1db1f aspnetcore-targeting-pack-7.0-7.0.18-1.el9_3.x86_64.rpm fca3f282779e37c5bb618b948e70e4b07c390c6eabc4d71a58df7613055d5f32 dotnet-apphost-pack-7.0-7.0.18-1.el9_3.x86_64.rpm ec97277a460804965aa6f7a7594787ddfc6048e8b465c08f173b33607097a77a dotnet-hostfxr-7.0-7.0.18-1.el9_3.x86_64.rpm 131920e7ff4e122d1e79376f2fa817a3b7a2569259c79908383c1721249b5bc1 dotnet-runtime-7.0-7.0.18-1.el9_3.x86_64.rpm a1dffa34165645e6e47ed12ff5e06fe7e83a474c02501055bef54f367ed774c5 dotnet-sdk-7.0-7.0.118-1.el9_3.x86_64.rpm af79f766f5f22a7f3b8bb34ba0cca8c4ef2906c9e061006ecac00bb91adc622a dotnet-targeting-pack-7.0-7.0.18-1.el9_3.x86_64.rpm 7a56553a2f344b735d4f4999d08b164f6cd3fcbc71f93fa0aa62799a16a3f231 dotnet-templates-7.0-7.0.118-1.el9_3.x86_64.rpm 2d72f9097d9cffc37e03a68e89b120479d18eb9ea098a2e3e021671d6509eaf3 RLSA-2024:1750 Important: unbound security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for unbound. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. Security Fix(es): * A vulnerability was found in Unbound due to incorrect default permissions, allowing any process outside the unbound group to modify the unbound runtime configuration. The default combination of the "control-use-cert: no" option with either explicit or implicit use of an IP address in the "control-interface" option could allow improper access. If a process can connect over localhost to port 8953, it can alter the configuration of unbound.service. This flaw allows an unprivileged local process to manipulate a running instance, potentially altering forwarders, allowing them to track all queries forwarded by the local resolver, and, in some cases, disrupting resolving altogether. To mitigate the vulnerability, a new file "/etc/unbound/conf.d/remote-control.conf" has been added and included in the main unbound configuration file, "unbound.conf". The file contains two directives that should limit access to unbound.conf: control-interface: "/run/unbound/control" control-use-cert: "yes" For details about these directives, run "man unbound.conf". Updating to the version of unbound provided by this advisory should, in most cases, address the vulnerability. To verify that your configuration is not vulnerable, use the "unbound-control status | grep control" command. If the output contains "control(ssl)" or "control(namedpipe)", your configuration is not vulnerable. If the command output returns only "control", the configuration is vulnerable because it does not enforce access only to the unbound group members. To fix your configuration, add the line "include: /etc/unbound/conf.d/remote-control.conf" to the end of the file "/etc/unbound/unbound.conf". If you use a custom "/etc/unbound/conf.d/remote-control.conf" file, add the new directives to this file. (CVE-2024-1488) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-unbound-1.16.2-3.el9_3.5.x86_64.rpm 779a676b0c3f4e86a7e9012134f6d06ea556ce5405764b5a3052726e07ca11b0 unbound-1.16.2-3.el9_3.5.x86_64.rpm 741e1b5b59468d4fb26e1e7a1097bc1f66eaea18564799b8e50b9223d4d0fcfa unbound-libs-1.16.2-3.el9_3.5.i686.rpm 3a04e0cc8e55df00b2ed31fffb3e545407a151ba89bd24d0474143a84d6e06db unbound-libs-1.16.2-3.el9_3.5.x86_64.rpm 1e87341a97cc10cf26d45c6e766061f51ccdd2dc65ce149821de5152948850dc RLBA-2024:2152 poppler bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for poppler. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms poppler-21.01.0-19.el9.i686.rpm 69ae8b81a8323bbc93b442108276719d21d788ec782e98c0de5bf784ea4d4715 poppler-21.01.0-19.el9.x86_64.rpm b1d2349e296261b031808815925632cfb0e6cad3e8a3515537c06db005a5693d poppler-cpp-21.01.0-19.el9.i686.rpm 4d40458b9bf34803156c493050380412ab4be9614dabcd805fe42d6d26dda044 poppler-cpp-21.01.0-19.el9.x86_64.rpm 5b9551656aa5339d9cb958cdc8a4d9855eb948028cd3a23f7d3b5621e5d686e7 poppler-glib-21.01.0-19.el9.i686.rpm 7ba399b2b5562b3a8239cc25169589bd6dd19d21430e8b3042876109c6903031 poppler-glib-21.01.0-19.el9.x86_64.rpm 1dd2f238b654e281a2248dc462aa8de18d1134451d84ca1bd650d5e0a08fbc40 poppler-qt5-21.01.0-19.el9.i686.rpm 7dfcd8d5b574da2340804ae14134bdd0b5ab5f86f483aecb025a98f074fd4a09 poppler-qt5-21.01.0-19.el9.x86_64.rpm 6b380d09a4412f33e8197cddb913c3f042fb5ab538eeda1fb9761df17eea9bfe poppler-utils-21.01.0-19.el9.x86_64.rpm c0522813e70013e254b713512f69cd5aa54eb5830739c76c6123914e07f5e190 RLBA-2024:2166 xdp-tools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xdp-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libxdp-1.4.2-1.el9.i686.rpm 7c2db5e1d6568e9a6952ccff0ac88668a3b30d5f5d175fd8422d05c5e1638290 libxdp-1.4.2-1.el9.x86_64.rpm 6258c83e49e570e6bf768a861b5ddc7a25e7de02270549cd0e3f8b8370d847ce xdp-tools-1.4.2-1.el9.x86_64.rpm b4e2a304c87931610b3c8a6a0a81cd72a4d95118a80b39cb9023abe1753bcd16 RLBA-2024:2200 virt-v2v bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-v2v. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virt-v2v-2.4.0-2.el9.x86_64.rpm 5616c5baa93b0b19b80d84a813e8973578df9f8d3ad7e9ea7d4281215560c8b1 virt-v2v-bash-completion-2.4.0-2.el9.noarch.rpm a3ca56a8b66cc26fae9432fb53d735e7b6285751419fed180c642445166032ab RLBA-2024:2235 ostree bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ostree-2024.4-3.el9_4.i686.rpm 5888e3f4e887378d1288a4d310ff403b5d1dfa64f1f3002243ed9c10f1b7f513 ostree-2024.4-3.el9_4.x86_64.rpm 81bb522fcfb4e7e5804785d4eb2b34dc0fa8a11ca86b84865cb947be2f8e9e06 ostree-grub2-2024.4-3.el9_4.x86_64.rpm 8dab825e0d672726eb18e7a237ae3be1f6aa15ba847fc5f2607cde9087a7f680 ostree-libs-2024.4-3.el9_4.i686.rpm 5ff642599b10f2db6d8596595f316a758e02f09733cacd6cdc7a83c6ed2e82e1 ostree-libs-2024.4-3.el9_4.x86_64.rpm c363677100f62b72d042d8c1bfa3056c4645778de96ed859e5dfc9712549c09c RLSA-2024:2264 Important: edk2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for edk2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. Security Fix(es): * edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message (CVE-2023-45235) * EDK2: heap buffer overflow in Tcg2MeasureGptTable() (CVE-2022-36763) * EDK2: heap buffer overflow in Tcg2MeasurePeImage() (CVE-2022-36764) * edk2: Integer underflow when processing IA_NA/IA_TA options in a DHCPv6 Advertise message (CVE-2023-45229) * edk2: Out of Bounds read when handling a ND Redirect message with truncated options (CVE-2023-45231) * edk2: Infinite loop when parsing unknown options in the Destination Options header (CVE-2023-45232) * edk2: Infinite loop when parsing a PadN option in the Destination Options header (CVE-2023-45233) * openssl: Excessive time spent checking DH keys and parameters (CVE-2023-3446) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms edk2-ovmf-20231122-6.el9.noarch.rpm 4c5983e3bd7aa795f76f6b36fbcb0c3b01e79b5829de3dc2cdf289e3b58d51d3 RLBA-2024:2263 mesa bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mesa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mesa-dri-drivers-23.3.3-1.el9.i686.rpm 70551ab8120da29f2e7932c51b80006af2bfb2f1477cf8d0e01d0e884382b2f2 mesa-dri-drivers-23.3.3-1.el9.x86_64.rpm ee41fcb7775fa5e0027f2c65f239010fee488cd0cf55f38df13823e12c455357 mesa-filesystem-23.3.3-1.el9.i686.rpm 2db45781f595ff0d537c52e9d4b8d8184de1766765a5e86524636afc338dafe9 mesa-filesystem-23.3.3-1.el9.x86_64.rpm a3d22d1ca9712e8ff03e09d16c5f523f5b36226b65e82c32513e01b6426c6b58 mesa-libEGL-23.3.3-1.el9.i686.rpm e4c1a103e79f13f80ffc233836b390c78455308d7f32498da51490e21cbf1242 mesa-libEGL-23.3.3-1.el9.x86_64.rpm 950674058ea01ebdc7af8b8be751a515da094a7486b75ff164cd10f656e76a95 mesa-libEGL-devel-23.3.3-1.el9.i686.rpm fd2ded4f7afd4bba1e3fd3fe2d6ef3145512c6c6467ea590c2470dbc039d4327 mesa-libEGL-devel-23.3.3-1.el9.x86_64.rpm dbcd26d625da67b640ef95698170bc0db253d2f0ff5ecea444587a5ca0b9fc7a mesa-libgbm-23.3.3-1.el9.i686.rpm d53b4ca964653fc4008e78314c3a8cf8359bf564cb591d62747eaebdd8252a59 mesa-libgbm-23.3.3-1.el9.x86_64.rpm 8a4751848270baf338bb5c78e06e0450c376e8771d917c10b7d12af6028fe29b mesa-libgbm-devel-23.3.3-1.el9.i686.rpm 5833f5d7b579a65be535e6be3b9559e101664ea5f81a6dbb12c687d6f2f9191e mesa-libgbm-devel-23.3.3-1.el9.x86_64.rpm 4c66b8ce5088481c1ec1c1ae64e8bff042e6331fb5b48e7893d1d389d0907825 mesa-libGL-23.3.3-1.el9.i686.rpm 1fd6d400349a2bcd05b98220d477eef973e930c2a540d8aa34260c6f96e0484f mesa-libGL-23.3.3-1.el9.x86_64.rpm bb290ee83674d5690164a12ba481914a1ae06fdbeb23a14015e32c1b270be537 mesa-libglapi-23.3.3-1.el9.i686.rpm b7ddf0ddb03b3f556253800a5516ea24e7c5e3c0075ec5f500999aa96bc15585 mesa-libglapi-23.3.3-1.el9.x86_64.rpm 220e3a0c0893e2f38425e9618ed4195bd56cd381f9f5e3eee684c3b6b0a3c9a5 mesa-libGL-devel-23.3.3-1.el9.i686.rpm 6cf43b6c30555d388edf9b66bccdb111e6df5aa145d333c2e6635432460f4843 mesa-libGL-devel-23.3.3-1.el9.x86_64.rpm f375fa51771ebdf838828e2744c2ed2364fdc2e9386b3e1cde5c5322bdd91ad9 mesa-libxatracker-23.3.3-1.el9.i686.rpm 687b332be509e70a4abb5f5b97300ab9515e154f4a7480ff9a96974ef3dbffb8 mesa-libxatracker-23.3.3-1.el9.x86_64.rpm 2258f5866aa200063cc099ccdf08f3b64c385afbc80251889518850b445f2312 mesa-vulkan-drivers-23.3.3-1.el9.i686.rpm b8dfc1f8dd76dd7cf83bed567235a13d169b73aa183df70a0f42d3de712f3299 mesa-vulkan-drivers-23.3.3-1.el9.x86_64.rpm 012a0e87e5659f4aa3ebfa58e3b8462d039fbd9a62d945aa4d4a0684e3f738cd RLBA-2024:2268 anaconda bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for anaconda. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms anaconda-34.25.4.9-1.el9_4.rocky.0.3.x86_64.rpm a01134c2eee632f1356dc45482fc44739f2a5ddab051dfd9b42598a2d8840708 anaconda-core-34.25.4.9-1.el9_4.rocky.0.3.x86_64.rpm f9ce79cd4a6d6ef74d6bae8887da4ed1f65b13ca87c2473883114a542c22b98b anaconda-dracut-34.25.4.9-1.el9_4.rocky.0.3.x86_64.rpm 7497dc08812bd2e851ddc0edb43aff0d94a792710dd16a4c07c01e592f74e036 anaconda-gui-34.25.4.9-1.el9_4.rocky.0.3.x86_64.rpm 7a377708ec099150ffed020fadae6e1b33ed5505bae831d397addb69e06156f0 anaconda-install-env-deps-34.25.4.9-1.el9_4.rocky.0.3.x86_64.rpm 956775975f3a7a158f25efb052e10c696c932a85f9ac44e7a9ac52b539e1fa61 anaconda-install-img-deps-34.25.4.9-1.el9_4.rocky.0.3.x86_64.rpm 7950aa6db669165289c77f5692354b1961f1a24c38471b4358fca8514849acb8 anaconda-tui-34.25.4.9-1.el9_4.rocky.0.3.x86_64.rpm 12e512b6ac828ee35ffe532c494dd943c8631e69b1f5d21e255a746d6f1d3895 anaconda-widgets-34.25.4.9-1.el9_4.rocky.0.3.i686.rpm 79922676230af124538bfc73d70a7417af049ba9f6333543e9656a798c1af2fb anaconda-widgets-34.25.4.9-1.el9_4.rocky.0.3.x86_64.rpm 241d097f68b31e410e8f252f39ef8b091c201d3447638b0c62ebfcd07a2c5463 RLEA-2024:2269 nbdkit enhancement and bugfix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nbdkit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nbdkit-1.36.2-1.el9.0.1.x86_64.rpm 8efe4eb9fdcfd71bbdd640194bf827d4339e9e18aa8671b83814ba7367f583cf nbdkit-bash-completion-1.36.2-1.el9.0.1.noarch.rpm 3e3a167c8a926a782f993f47a247e85aa2f0d72b7272305873a4fd00a1112890 nbdkit-basic-filters-1.36.2-1.el9.0.1.x86_64.rpm fbf3e07693738f4b3721e8f904beb9d2718d5425c6d6bde679332dafb433b850 nbdkit-basic-plugins-1.36.2-1.el9.0.1.x86_64.rpm bfff09c2ea33919cae617fbd9b9574ac69b51e0a0765624ba16c72270cc12eb5 nbdkit-curl-plugin-1.36.2-1.el9.0.1.x86_64.rpm 6c83c81aa25bca04e634288f465f931e49931d9e3619115fc37295bb4704bc77 nbdkit-gzip-filter-1.36.2-1.el9.0.1.x86_64.rpm 955252174e441cfffc6f9632049f24113c7d41185ded54323fe687d3a174e079 nbdkit-linuxdisk-plugin-1.36.2-1.el9.0.1.x86_64.rpm 6ce576759c79a409deefd2b8b34a560dacf00f77bd98317f992d732f00141f66 nbdkit-nbd-plugin-1.36.2-1.el9.0.1.x86_64.rpm 1aa12859a5aa2034c990a9e33bf4ddd929a04d0da54b5d1acd2b503def69006b nbdkit-python-plugin-1.36.2-1.el9.0.1.x86_64.rpm d54191ce6de49440fb1fe19776c34993cfa824e4354f1130c9f672ef3b569140 nbdkit-server-1.36.2-1.el9.0.1.x86_64.rpm 19511c3ef573c7a9f991192c0caa73f0c01dd4675be9fcfedee6bf3652a66ca1 nbdkit-ssh-plugin-1.36.2-1.el9.0.1.x86_64.rpm 1cca7ad14e7e6b3f5140bff14f5ac88b1da853af64c267bbefdea78a50619a7f nbdkit-tar-filter-1.36.2-1.el9.0.1.x86_64.rpm d7e8c3fa580fff3c7769e4269500f05fb5e67ec45906c8cee8639d09f20775af nbdkit-tmpdisk-plugin-1.36.2-1.el9.0.1.x86_64.rpm 63278db7e4ebc24d8c670cbc9186c2215cefa26e263f46dba41c7f661371e749 nbdkit-vddk-plugin-1.36.2-1.el9.0.1.x86_64.rpm 9348ed528f21b5c3491d6e23d77fc92b05324958126e8438e82754fdbc0fd596 nbdkit-xz-filter-1.36.2-1.el9.0.1.x86_64.rpm 751ef5a0fe56bea3a5250c8a4f6b93f370e85e3352f3856805bcdf008a45ce1f RLSA-2024:2287 Moderate: gstreamer1-plugins-bad-free security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gstreamer1-plugins-bad-free. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es): * gstreamer-plugins-bad: Integer overflow leading to heap overwrite in MXF file handling with uncompressed video (CVE-2023-40474) * gstreamer-plugins-bad: Integer overflow leading to heap overwrite in MXF file handling with AES3 audio (CVE-2023-40475) * gstreamer-plugins-bad: Integer overflow in H.265 video parser leading to stack overwrite (CVE-2023-40476) * gstreamer-plugins-bad-free: buffer overflow vulnerability (CVE-2023-50186) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gstreamer1-plugins-bad-free-1.22.1-4.el9.i686.rpm 3b909543e9f75c0576f7b20e19fb13bb75b9b0eda730de0f6bbbc133bc56694f gstreamer1-plugins-bad-free-1.22.1-4.el9.x86_64.rpm 3a4be8dde26179e64a28bbdbd7b0cb51a5e9db72aa4d8768577871dc19d54fdf RLBA-2024:2371 dovecot bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dovecot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dovecot-2.3.16-11.el9.x86_64.rpm b9ee3ee52898fd90e6a763e8089ea5f57ce6cd622f71d362534864d56ded822c dovecot-mysql-2.3.16-11.el9.x86_64.rpm 21bc6de0fa1e27918d7da9568e94acc78007aecf14c069ddb8fe096053560c60 dovecot-pgsql-2.3.16-11.el9.x86_64.rpm d750cf689170a04267e987bb5dc2abf579eade21d7e61e890cf4a1941449de28 dovecot-pigeonhole-2.3.16-11.el9.x86_64.rpm 6ce671e38fa7851af6af17ec1a9a5f7c9b50e8f117ef7d9a3ce4f4360744f783 RLEA-2024:2546 389-ds-base enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for 389-ds-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Enhancement * [RFE] allows plugins to log multi-factor authentication notification (JIRA:Rocky Linux-30588) rocky-linux-9-x86-64-appstream-rpms 389-ds-base-2.4.5-6.el9_4.x86_64.rpm 01d20c8f6cf05a2a3af4ae9fa3c673c2905b31b94255bfb1770de6bb48dcc3d4 389-ds-base-libs-2.4.5-6.el9_4.x86_64.rpm c86d09ee97ccd6e6da389aaa1e9d1c599deeaaa5bedf0e365e11f2401ffe07d3 python3-lib389-2.4.5-6.el9_4.noarch.rpm 189ee6d2588cda76ccae2b209590f1c800d421c68974ad2e7b24db101a251aa9 RLSA-2024:2551 Important: bind security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for bind-dyndb-ldap, bind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868) * bind: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387) * bind: Specific recursive query patterns may lead to an out-of-memory condition (CVE-2023-6516) * bind: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution (CVE-2023-5679) * bind: Querying RFC 1918 reverse zones may cause an assertion failure when “nxdomain-redirect” is enabled (CVE-2023-5517) * bind: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408) Bug Fix(es): * bind-dyndb-ldap: rebuilt to adapt ABI changes in bind For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms bind-9.16.23-18.el9_4.1.x86_64.rpm ff5356f634bd4693b674cb91b3ea54dbe293f920dd141b37ff311c90da0bf73c bind-chroot-9.16.23-18.el9_4.1.x86_64.rpm e7c7e3cdd5d09d0cd8ace6c0bb8bed0bf194f14df984c529f29fa8ebf0311abb bind-dnssec-doc-9.16.23-18.el9_4.1.noarch.rpm 327b2e07d775badbe551eedd8600184d08a85faaaa26a6e6dfd40f267f0d7a6d bind-dnssec-utils-9.16.23-18.el9_4.1.x86_64.rpm 57777a5c12156b59facd216d9cb7bfa2a1f52b737446b2e6cfcf2333d86a60e1 bind-dyndb-ldap-11.9-9.el9_4.x86_64.rpm 97ce51116c0af3106d55bc8e84927acd0c5e2c808805105a4f8fccfffbca372c bind-libs-9.16.23-18.el9_4.1.x86_64.rpm 2010fad6e6f94c7ec4b0c98d5d3467a71b1a37160237da86f65dc96e0049ce3c bind-license-9.16.23-18.el9_4.1.noarch.rpm 95fbd7bdfe547e58cf2a1bcbe1e122cb0de6e3fd82009a2daf0baf5a10e4ba41 bind-utils-9.16.23-18.el9_4.1.x86_64.rpm 80e30b094df3dc3ac74b4c47aa3b80275d56013d879a287cdc4b2adb05c6137d python3-bind-9.16.23-18.el9_4.1.noarch.rpm 8c5c77d619fa4721dc5d996b281cd864b9cb654ae22a2793e9186382b90a5315 RLBA-2024:2554 .NET 8.0 bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet8.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 8 to RC2 (JIRA:Rocky Linux-13785) * Update .NET 8 to 8.0.0 GA (JIRA:Rocky Linux-15860) * Update .NET 8.0 to SDK 8.0.101 and Runtime 8.0.1 (JIRA:Rocky Linux-19803) * RFE: add -dbg packages to ship complete symbol files (JIRA:Rocky Linux-23070) * Update .NET 8.0 to SDK 8.0.102 and Runtime 8.0.2 (JIRA:Rocky Linux-23804) * Don't set a locale when running msbuild Exec on Unix (JIRA:Rocky Linux-23936) * Update .NET 8.0 to SDK 8.0.103 and Runtime 8.0.3 [rhel-9] (JIRA:Rocky Linux-27553) * Follow-up for Rocky Linux-22734: CheckCertificateRevocationList flag for SHA1 CAs [rhel-9.4.0.z] (JIRA:Rocky Linux-28344) * Update .NET 8.0 to SDK 8.0.104 and Runtime 8.0.4 [rhel-9.4.0.z] (JIRA:Rocky Linux-31208) * Update .NET 8 to RC1 (JIRA:Rocky Linux-4073) rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-8.0-8.0.4-2.el9_4.x86_64.rpm 68247549e343d71f173105da93f02a322365b7a752ded567bd1f6b5f92e37cdd aspnetcore-runtime-dbg-8.0-8.0.4-2.el9_4.x86_64.rpm 466033e45416c4527dea15454d87e412ec159b358d2ee29de76f295129e2cad1 aspnetcore-targeting-pack-8.0-8.0.4-2.el9_4.x86_64.rpm fcfe21fb4553e152b047e30c28433ae0a116235ca603d2ea441d3bebb71a38f2 dotnet-apphost-pack-8.0-8.0.4-2.el9_4.x86_64.rpm 2ca1684999ff0058d12cdfaead4ebfb1299737c2b3e10e8c4dae463d1347504b dotnet-host-8.0.4-2.el9_4.x86_64.rpm 36afb34730c2955f5a131c8233ad384cde0a8f3bc94360de11b8c8d3dbdd0ddc dotnet-hostfxr-8.0-8.0.4-2.el9_4.x86_64.rpm 34aae2c4897d3efbc5bb60a057a389c5cade14a42bfc061545644ac2763f4329 dotnet-runtime-8.0-8.0.4-2.el9_4.x86_64.rpm 8ed6977fa5c824a27b8db2ad4ed29b6caf6d7d49167611dc8a01adc205fcc72a dotnet-runtime-dbg-8.0-8.0.4-2.el9_4.x86_64.rpm ea2f146ff29925dab6c872ec0e689d582948171f42ec23fce320690d8e020e1e dotnet-sdk-8.0-8.0.104-2.el9_4.x86_64.rpm d6375955edc464c888fa3b46ab210ea793f664ba63308f8c7df8ac9e1839bb87 dotnet-sdk-dbg-8.0-8.0.104-2.el9_4.x86_64.rpm 890a4689882f9f3e08b30f1cc9b27b150e169231a66e789f04c7191abf356f47 dotnet-targeting-pack-8.0-8.0.4-2.el9_4.x86_64.rpm cd026a47586ef76850ba43ba9b79177bc302eb25ddc0902b35488a22ff9a1fa3 dotnet-templates-8.0-8.0.104-2.el9_4.x86_64.rpm 6aa81c31e6cac852c0a38810e3902db5dee1ba3e1a0a2061519e9a219a73e276 netstandard-targeting-pack-2.1-8.0.104-2.el9_4.x86_64.rpm ade49c2384930739bdb73e12c7d4b1d0bb3ba2edb6358dfaf6dad2a1c48be4d5 RLBA-2024:2552 .NET 6.0 bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet6.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.123 and Runtime 6.0.23 (JIRA:Rocky Linux-11675) * Update .NET 6.0 to SDK 6.0.124 and Runtime 6.0.24 (JIRA:Rocky Linux-14451) * Update .NET 6.0 to SDK 6.0.125 and Runtime 6.0.25 (JIRA:Rocky Linux-15349) * Update .NET 6.0 to SDK 6.0.126 and Runtime 6.0.26 (JIRA:Rocky Linux-19801) * Update .NET 6.0 to SDK 6.0.122 and Runtime 6.0.22 (JIRA:Rocky Linux-1995) * Update .NET 6.0 to SDK 6.0.127 and Runtime 6.0.27 (JIRA:Rocky Linux-23785) * Update .NET 6.0 to SDK 6.0.128 and Runtime 6.0.28 [rhel-9] (JIRA:Rocky Linux-27541) * Update .NET 6.0 to SDK 6.0.129 and Runtime 6.0.29 [rhel-9.4.0.z] (JIRA:Rocky Linux-31198) rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-6.0-6.0.29-2.el9_4.x86_64.rpm 17b228de59b8c94d8cb61d0eb2a16af231b9d423a9d8f3f817bbf1a6337dd679 aspnetcore-targeting-pack-6.0-6.0.29-2.el9_4.x86_64.rpm d96cc4608d3d116655183f76b5c08f03183b804294f084aa7f8c42c20c542e58 dotnet-apphost-pack-6.0-6.0.29-2.el9_4.x86_64.rpm 823ac89826b19fc4ff04181dd9db9fbcbb7601de8e73a113da689dd744bd90f5 dotnet-hostfxr-6.0-6.0.29-2.el9_4.x86_64.rpm 8cdf34440a40f985f08ea7b3d6729f18564424ce1a21c6746f0739401e3d0621 dotnet-runtime-6.0-6.0.29-2.el9_4.x86_64.rpm 8cb366c17c492b796207df8fc3ab00dbfe29ba67e89f189082404df817a2212a dotnet-sdk-6.0-6.0.129-2.el9_4.x86_64.rpm d8213ff06c9eccd32e31fba3ad25b3c666218d36e64ebe736397104ef6c85226 dotnet-targeting-pack-6.0-6.0.29-2.el9_4.x86_64.rpm 082e82734c331b7b941c08d8cb85509ae411f5511fd846b05dc132edbcb9613c dotnet-templates-6.0-6.0.129-2.el9_4.x86_64.rpm 2226817e8fe6514b06ab59306a6366830cc452ff84a96496ed7a47d6f618d877 RLBA-2024:2556 nmstate bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nmstate. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Bug Fix(es): * Support checkpoint on rollback when using global DNS of NetworkManager (JIRA:Rocky Linux-31190) * Include driver information in systemd network link file created by `nmstatectl persist-nic-names` (JIRA:Rocky Linux-32330) rocky-linux-9-x86-64-appstream-rpms nmstate-2.2.27-2.el9_4.x86_64.rpm 6e80e3a32be70a97cbf32851413c63b014795609bf860459f191a2c8699df68f nmstate-libs-2.2.27-2.el9_4.i686.rpm af121d597d105f1faa8ff7bee8358330ab8e69c6afd38317c23847ceee00f2ba nmstate-libs-2.2.27-2.el9_4.x86_64.rpm 84aa3b9b00d4d3439b67b4454b67c76606123de1633e1bdbf20f1cf0fd6d9dcd python3-libnmstate-2.2.27-2.el9_4.x86_64.rpm 75902b35b54912e82b9b8b94998c7779cc49a45b3423e0bffebc57724bc276f6 RLBA-2024:2558 ipa bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * Enforce OTP for ldap bind (in some scenarios) (JIRA:Rocky Linux-23377) * Unable to re-add broken AD trust - NT_STATUS_INVALID_PARAMETER (JIRA:Rocky Linux-29745) * Backport latest test fixes in ipa (JIRA: Rocky Linux-30905) rocky-linux-9-x86-64-appstream-rpms ipa-client-4.11.0-10.el9_4.x86_64.rpm 2b1ec80adada5a3bef696e1ba376093f2dad187c976aca5c193c30956711394b ipa-client-common-4.11.0-10.el9_4.noarch.rpm 25445b81e0565d116c83e7afddcfcdddccd3811cc91078c7a488f6830d6acfd6 ipa-client-epn-4.11.0-10.el9_4.x86_64.rpm 24c62c9037e6996b9a6ae702ae49ad390f88062cae08ebf7aa2fa150b88a7a3e ipa-client-samba-4.11.0-10.el9_4.x86_64.rpm 4c6b98103b2c2462c73cd436321e6683026b39bb979a180b5d457c89e3a52f34 ipa-common-4.11.0-10.el9_4.noarch.rpm 452254b526e22d696f8dbb2099454e104265e443087d9afcb1a09a975e8e91c8 ipa-selinux-4.11.0-10.el9_4.noarch.rpm ab510d78193d25a80dfffb8c59bed7175db9158e0da47c68a9ec192adf977ebf ipa-server-4.11.0-10.el9_4.x86_64.rpm 942e676508ae99c4ff78859ccc1bc079b87a6f36d77730c02be961dac9660284 ipa-server-common-4.11.0-10.el9_4.noarch.rpm 187f9e8edc4db8c3ce605bfb848f9cf29932bf67a8fcd728a6b0d41df82703b9 ipa-server-dns-4.11.0-10.el9_4.noarch.rpm 6aa42fa1a7a59a2e16e6b522e8009b0bc481cc9581491a60532d1ce66bff9331 ipa-server-trust-ad-4.11.0-10.el9_4.x86_64.rpm 21c46669d2b1b55d4b419e027f9b3c20c121e3a9f60c6e2d7dcc85a18663b8fd python3-ipaclient-4.11.0-10.el9_4.noarch.rpm b2fa9e5b95c4243a3fcca3da4f1eb66015cd9dcc986c54f51f71e326ba0ae43a python3-ipalib-4.11.0-10.el9_4.noarch.rpm a0a4644338e142be85f05d926b4d3004fd4f5f02da4c41c4e29e88a974d914f4 python3-ipaserver-4.11.0-10.el9_4.noarch.rpm 0e8240b50fa26ebd5ec78067ebf5fad0f73f7dcbd799410d996c8f0f1360e870 RLSA-2024:2560 Moderate: libvirt security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. Security Fixes: * libvirt: off-by-one error in udevListInterfacesByStatus() (CVE-2024-1441) * libvirt: negative g_new0 length can lead to unbounded memory allocation (CVE-2024-2494) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fixes: * libvirt: off-by-one error in udevListInterfacesByStatus() [rhel-9] (JIRA:Rocky Linux-25081) * libvirt: negative g_new0 length can lead to unbounded memory allocation [rhel-9] (JIRA:Rocky Linux-29515) rocky-linux-9-x86-64-appstream-rpms libvirt-10.0.0-6.2.el9_4.x86_64.rpm 24682bd3c590ec592ac88f5bf4e9fa5aaa227fddea73447cca9417a952d2e358 libvirt-client-10.0.0-6.2.el9_4.x86_64.rpm 8e50fc70dd9f48c8a89bea6d9f931fcbafbb9a7f6112caad2b5ab83979fa7b07 libvirt-client-qemu-10.0.0-6.2.el9_4.x86_64.rpm deda1aeb0f1724e372ccb1f8d4581377dbd276263e973337f600985bb5f6956e libvirt-daemon-10.0.0-6.2.el9_4.x86_64.rpm 7ef581303c48f746f3a23841a6ad9ddfbeb23b7679f97b26c7ea4a8eeb624aee libvirt-daemon-common-10.0.0-6.2.el9_4.x86_64.rpm 9e9a63a26d44d4269bc7063c221353b6b35ad052c09cdebf8a21bed35c62e0d0 libvirt-daemon-config-network-10.0.0-6.2.el9_4.x86_64.rpm 6cff19719fa1da685cc3af7061a01b54b59f1ddba696fc5e21332ec1692ca5b6 libvirt-daemon-config-nwfilter-10.0.0-6.2.el9_4.x86_64.rpm 1211b36e98c51755f692b343796957b44bdda48d65a7849f9be74e3553fd708a libvirt-daemon-driver-interface-10.0.0-6.2.el9_4.x86_64.rpm 5c4ca04366599229d88526fbdd8309df71d89dd230e66db7d7bb67231e949662 libvirt-daemon-driver-network-10.0.0-6.2.el9_4.x86_64.rpm ff040fff8f47005caa117ef3460d4cf8a75f398694f1bbe1c17336b40a5e90bf libvirt-daemon-driver-nodedev-10.0.0-6.2.el9_4.x86_64.rpm 14cfed91f58b30813654257bc6f70b1aa2d7ebbad33e6474fb3188f0429854dd libvirt-daemon-driver-nwfilter-10.0.0-6.2.el9_4.x86_64.rpm 1d0dd317d07342074687a683b01075ed86f942896c40d01486d2dd8cf01e2ba3 libvirt-daemon-driver-qemu-10.0.0-6.2.el9_4.x86_64.rpm 1100759f762df7cb4552f5068757d483aab1ee6ee8a99e23e35bcfbf1d63ae03 libvirt-daemon-driver-secret-10.0.0-6.2.el9_4.x86_64.rpm a3dc4d127f3cfaa524dece51ab41408ed856b60063f147a52f61da4bb33330dc libvirt-daemon-driver-storage-10.0.0-6.2.el9_4.x86_64.rpm eab63e60eaf661012827edc9b2a0c61d31a047289c939350833224515700fb79 libvirt-daemon-driver-storage-core-10.0.0-6.2.el9_4.x86_64.rpm d9e97b6c7751b967873be75a103096b736447900f40634314409f66c6fc58892 libvirt-daemon-driver-storage-disk-10.0.0-6.2.el9_4.x86_64.rpm 8726b7dd22ed77086cd77d4dae410788ae3ce23ae11f19e1ed83fa357994ebf7 libvirt-daemon-driver-storage-iscsi-10.0.0-6.2.el9_4.x86_64.rpm 35bfcd1d2a0b1fa36c1603d35fe455f73d18f4023457b250d00218f718920469 libvirt-daemon-driver-storage-logical-10.0.0-6.2.el9_4.x86_64.rpm 8041b91626c17f4b7fdb79707bc2ab4aff2227ad45a84dfffcdd785f4d58e2d4 libvirt-daemon-driver-storage-mpath-10.0.0-6.2.el9_4.x86_64.rpm 0e6136fc5051512cdde299892c648d937197a31027aa158e3d16c01b54f2abf3 libvirt-daemon-driver-storage-rbd-10.0.0-6.2.el9_4.x86_64.rpm abeb2247b757fbe997a969e463b974938bea9af6c444e15c29891db34ec6fce7 libvirt-daemon-driver-storage-scsi-10.0.0-6.2.el9_4.x86_64.rpm bb9ec1fbb59d0766d0979a4928de4d80b706ac505a44fc62f2f2d1387536660e libvirt-daemon-kvm-10.0.0-6.2.el9_4.x86_64.rpm d380f0a9675f44ff0bc87c0d572d7884f8127e859bf74e7915836f12332ba59a libvirt-daemon-lock-10.0.0-6.2.el9_4.x86_64.rpm 513b842c42d9eeeea58aba1da9b655260c4124430fb8f22b9e10433b86cb4796 libvirt-daemon-log-10.0.0-6.2.el9_4.x86_64.rpm 8c07dc1f28058f2c858ee94abcd40c285ffac32aee418f111ff1cf29e508f6f3 libvirt-daemon-plugin-lockd-10.0.0-6.2.el9_4.x86_64.rpm 96442b82f8fb45f98c06c1217511df1f3c723c48ea9bf900d7f5a917038b5177 libvirt-daemon-proxy-10.0.0-6.2.el9_4.x86_64.rpm b300346986c61bbc23db11ce11cedeea41fb0e6106824bbf877a9b9709415fed libvirt-libs-10.0.0-6.2.el9_4.x86_64.rpm 2825fb4b0de31926f9b3e28cd7fafd8311e17a792946890148935b36664cdeec libvirt-nss-10.0.0-6.2.el9_4.x86_64.rpm f34c46c3c5272841bac7b25e293a1764419ee94acf422087860618effe511411 RLBA-2023:6386 clevis bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for clevis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms clevis-18-112.el9.x86_64.rpm cd5c910ce2197de9c9eff81a6a724d97b015be3c171348275f1163be3bc8ade9 clevis-dracut-18-112.el9.x86_64.rpm 3a478838dec635284bda920cf96b257f9af567fa567bb8dc82d0775f89b169d2 clevis-luks-18-112.el9.x86_64.rpm bb8f24292570e92fe28edeb74c7154c8469b5e126a8732413945addc435b4f40 clevis-systemd-18-112.el9.x86_64.rpm bc29b699e8605bd21acd3a64c71fdf5f620111382aa9d94cf618141126f2f152 clevis-udisks2-18-112.el9.x86_64.rpm 1bd5159168ca4b962131126491bd7c2bfee9a06e1d3c41f607100b46c5db5543 RLSA-2023:6539 Moderate: perl-CPAN security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for perl-CPAN. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The CPAN module is a tool to query, download and build perl modules from CPAN sites. Security Fix(es): * perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS (CVE-2023-31484) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.3 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms perl-CPAN-2.29-3.el9.noarch.rpm 32a57e85561085a1d806deb5bf09136d04f5359ddf93a199528458cdd36858a6 RLSA-2024:1139 Low: keylime security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for keylime. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution. Security Fix(es): * keylime: Attestation failure when the quote's signature does not validate (CVE-2023-3674) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms keylime-7.3.0-13.el9_3.x86_64.rpm 42c14697ef33763b278e9850b8ea2dc9b4affbed3cff9adf402543cbd2061b82 keylime-base-7.3.0-13.el9_3.x86_64.rpm b5da47d8af8c84fb6c8d7ad9d5f3e92333ddcaf29afe0e75a1bf2213de4edccc keylime-registrar-7.3.0-13.el9_3.x86_64.rpm 5c0dad0347f2a52f6b98f6770d78ab8c012e96a6b85a7bf15835dd6980f01f89 keylime-selinux-7.3.0-13.el9_3.noarch.rpm 57b1e41bdbd0e16b92c9b0f3757175bb57dab1d970cac3c683e19deded286166 keylime-tenant-7.3.0-13.el9_3.x86_64.rpm 601203778673c0de3b44af00a03c5f42af38d52dd125742578029578607189db keylime-verifier-7.3.0-13.el9_3.x86_64.rpm 743138b708f866bb0f427c907b6e96b47dbe99a3ab6725483efa3934377e249d python3-keylime-7.3.0-13.el9_3.x86_64.rpm ea2650d29050d0fd1f13dd7ff8efc171816ddda337f79e1b282685a0aa2d871e RLSA-2024:1502 Important: grafana-pcp security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list grafana-pcp is an open source Grafana plugin for PCP. Security Fix(es): * grafana-pcp: golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394) rocky-linux-9-x86-64-appstream-rpms grafana-pcp-5.1.1-2.el9_3.x86_64.rpm 982033ce0dd9ab3c0fb45cd612c689b67251c3775804652fe5599d01f6bf6fc7 RLSA-2024:1908 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.10.0 ESR. Security Fix(es): * GetBoundName in the JIT returned the wrong object (CVE-2024-3852) * Out-of-bounds-read after mis-optimized switch statement (CVE-2024-3854) * Incorrect JITting of arguments led to use-after-free during garbage collection (CVE-2024-3857) * Permission prompt input delay could expire when not in focus (CVE-2024-2609) * Integer-overflow led to out-of-bounds-read in the OpenType sanitizer (CVE-2024-3859) * Potential use-after-free due to AlignedBuffer self-move (CVE-2024-3861) * Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10 (CVE-2024-3864) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-115.10.0-1.el9_3.x86_64.rpm b0cb77b4c408cd1fc3329faa92daa264b69b3c411a842c802bc98334c58075de firefox-x11-115.10.0-1.el9_3.x86_64.rpm d2fa8ddecfefdaa9ffee1fdf3095ac43e14d567aa0fe9190ebd5fa331c7f5bbb RLSA-2024:1940 Low: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.10.0. Security Fix(es): * Mozilla: Denial of Service using HTTP/2 CONTINUATION frames (CVE-2024-3302) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-115.10.0-2.el9_3.x86_64.rpm c472debc16f3129fc5bd0269674052ca56688c27f9958449d8a5ba2b4765642b RLBA-2024:2058 nss bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Bug Fix(es): * valid signatures shorter than maximum length are rejected [rhel-9.3.0.z] (JIRA:Rocky Linux-32160) rocky-linux-9-x86-64-appstream-rpms nspr-4.35.0-7.el9_4.i686.rpm 488873001440c569629ad050ea08a7f3d341fffd3d199bb35bb8415e3239bde8 nspr-4.35.0-7.el9_4.x86_64.rpm bac72510acd9d28a658797730a4e075f2e86de2b70c5f54eb99ddb193794881b nspr-devel-4.35.0-7.el9_4.i686.rpm 8d693e2f556b7e93a15de69f3807139966711bd64163dfc6619b01725958611c nspr-devel-4.35.0-7.el9_4.x86_64.rpm 1e8420a7a937982bc1d8a2a476e0358a929b16442bb07051c2ea1e22bff9c1e6 nss-3.90.0-7.el9_4.i686.rpm e99299a267a84809c659f93a44f92350d1472ccc43cfe8c69b196fd61279cdd4 nss-3.90.0-7.el9_4.x86_64.rpm 85de577728d21b47e726baae6ab01f0d19de52b5a2db8c9e228dafcd4c3c6ee5 nss-devel-3.90.0-7.el9_4.i686.rpm 217475a68a4fbca8ce8af92593bff9878ea15f21cd4073a83a84811fa08d066f nss-devel-3.90.0-7.el9_4.x86_64.rpm 43cc3cd6d47a1bb5761939540ee21be0f767553e0429573d4952349661bcca62 nss-softokn-3.90.0-7.el9_4.i686.rpm f1705aee9ec3a0fb53631789f760b19215c734e79ad7269e04dbe08cae402f6c nss-softokn-3.90.0-7.el9_4.x86_64.rpm 5645929dee8519e877425ee52709391e526a8732c0dfc31f347d83c2bb91b28f nss-softokn-devel-3.90.0-7.el9_4.i686.rpm 59774a654458da28ac6639ad9710e6313f1aab7632e34ed18d68fe429b13065d nss-softokn-devel-3.90.0-7.el9_4.x86_64.rpm 389d4a4a9aeaeba7c3eb455117a0b22b34b3c0cce42aa30f4d2d4713162f35f9 nss-softokn-freebl-3.90.0-7.el9_4.i686.rpm 9c25f09d16e33b9d93b103d9662195b62b75df6f1748510b0537935e980a26b1 nss-softokn-freebl-3.90.0-7.el9_4.x86_64.rpm 406777813ebfdf93acfbb4acabe98a247f00b329337b191ca036c5367bac3b0a nss-softokn-freebl-devel-3.90.0-7.el9_4.i686.rpm 30ae6a07505120f8788ad9d30ebdcc73ec4c941e5dd398357ddbb5e4146faf11 nss-softokn-freebl-devel-3.90.0-7.el9_4.x86_64.rpm bff7640a5d35d90d4d56682872e72cf0d35157c141862704b56aa520f6c97930 nss-sysinit-3.90.0-7.el9_4.x86_64.rpm 825e160077ef15081bb87dc28f5efe7a8b29a579be3406f60d60e40c04428eab nss-tools-3.90.0-7.el9_4.x86_64.rpm e5ea98329ce0fe6782014eb622fdfa8c09ea5cbc4749aed2c2c04337e91ffe16 nss-util-3.90.0-7.el9_4.i686.rpm 48b74a1590bd8d4c05f20072dd8d863eb168918393f803d1f38de401c1544f0b nss-util-3.90.0-7.el9_4.x86_64.rpm e2fe12e79cd81b05c87c3c589ab71fe39e3d6b073e3ba50360c0111efb8ba0ec nss-util-devel-3.90.0-7.el9_4.i686.rpm f93988f229bc8b5899490357bedb6484044a692f98ae2e210f9864ef7fa5f9c9 nss-util-devel-3.90.0-7.el9_4.x86_64.rpm 32b931be252c026b3892b276ee8ba0a38c07a41f30ef14bb2db84c6ff549ab72 RLBA-2024:2087 container-selinux bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for container-selinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The container-selinux package provides SELinux policies for container runtimes. Bug Fix(es): * container_init_t does not possess ptrace process context (JIRA:Rocky Linux-28925) rocky-linux-9-x86-64-appstream-rpms container-selinux-2.229.0-1.el9.noarch.rpm 23fcdc1a28ba41e39c0e86c95de99fdf055e29b89c9470f215d43e3b7aac86a1 RLBA-2024:2124 crun bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crun. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms crun-1.14.3-1.el9.x86_64.rpm ecd5b6920a01bb91750e93345e50933f007bbe6a79460679fd7e1217e7a663e0 RLSA-2024:2135 Moderate: qemu-kvm security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for qemu-kvm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Security Fix(es): * QEMU: e1000e: heap use-after-free in e1000e_write_packet_to_guest() (CVE-2023-3019) * QEMU: VNC: infinite loop in inflate_buffer() leads to denial of service (CVE-2023-3255) * QEMU: improper IDE controller reset can lead to MBR overwrite (CVE-2023-5088) * QEMU: VNC: NULL pointer dereference in qemu_clipboard_request() (CVE-2023-6683) * QEMU: am53c974: denial of service due to division by zero (CVE-2023-42467) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qemu-guest-agent-8.2.0-11.el9_4.x86_64.rpm e4dc18ff42db1045a8546e0408eef79a6bb9c8f7883e42fe0df66a1b4e99d344 qemu-img-8.2.0-11.el9_4.x86_64.rpm a59485d9bb1d91db6adae2b12bcf1e61509d252e0cd54c2d24865d6942753476 qemu-kvm-8.2.0-11.el9_4.x86_64.rpm a575b25366c4792b905f9be6a00bf659592be6bdf5020a1e0c929130f3243e0a qemu-kvm-audio-pa-8.2.0-11.el9_4.x86_64.rpm 8a53ef8ad8bfb49c5c5fe86fbd2afca67ecbd9dacae8f390a31f0d29efbeffcd qemu-kvm-block-blkio-8.2.0-11.el9_4.x86_64.rpm 0306c0985da977432371ba36d84dc81e90c0486c5a486b9262a5534b7ce5484c qemu-kvm-block-curl-8.2.0-11.el9_4.x86_64.rpm 5b5135158b5d413b8605fa9d5670d5d7d1559067c5680d1c6e24fe6668394fc2 qemu-kvm-block-rbd-8.2.0-11.el9_4.x86_64.rpm 9f29cda87f94aecd3a4373ea6e253319b5236e39ddb7b357b9586115f8ab3ef2 qemu-kvm-common-8.2.0-11.el9_4.x86_64.rpm 583b6783e6da3370bf949d0d029cf5c2616747ebb346e52d8c1cbab07899698b qemu-kvm-core-8.2.0-11.el9_4.x86_64.rpm d1e50b8f614e218ae0224c5478256c696b2dd7a207a620d96798f2e4165b9942 qemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4.x86_64.rpm 7e66b489d170a88cf39abb588421ab53fb673176a3fce84c3fefc03e1fc1e2c1 qemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4.x86_64.rpm 3750ad7813b7500fedebcfc19a2df8faa2c5e2337470ddac992d1e045bd46d55 qemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4.x86_64.rpm f5e41cf525b801a8727a5732435eaa02db6ff98da4ed34d7d87a2fab8c07fb7c qemu-kvm-device-usb-host-8.2.0-11.el9_4.x86_64.rpm dbf5ca64ac195bc9eeed55783f49ba9564dcd6bdbe4665fcabcd909fc2e5983e qemu-kvm-device-usb-redirect-8.2.0-11.el9_4.x86_64.rpm 8661f7808d105e3cd65e0a7be7766f1846f0e589a87fe0b42ea9e4b6e658decf qemu-kvm-docs-8.2.0-11.el9_4.x86_64.rpm f36749ba070619a7889ff57a7957d25dc00e3816360c8dc0407c9a0da42e7d34 qemu-kvm-tools-8.2.0-11.el9_4.x86_64.rpm 65679a6ead56003d88dcdd0ba67f35e37192ae732097049898eabeb63a489b03 qemu-kvm-ui-egl-headless-8.2.0-11.el9_4.x86_64.rpm 1a06ba68a27ed21324a671967df9cae61d8c03b03626e9b36e14cfef6b109bc3 qemu-kvm-ui-opengl-8.2.0-11.el9_4.x86_64.rpm 4def2825ea394653b252fdf7a206b4cc347d94a0ebdf49e454f05b55af9ea2f3 qemu-pr-helper-8.2.0-11.el9_4.x86_64.rpm c955410a50930069d51291a17b11e0d125087f8475b183c65b41cf03c15d7210 RLBA-2024:2140 netavark bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for netavark. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms netavark-1.10.3-1.el9.x86_64.rpm 3930b7b71f2714b01f80f03c8c8193cbe7fc8241a8a6a70fe59d9409fd875642 RLBA-2024:2150 python-virt-firmware bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-virt-firmware. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-virt-firmware-24.2-1.el9.noarch.rpm 7289c515d4b9d5ff4310d3393da999961f672ad405eb739a077e8a9e26c82ebd uki-direct-24.2-1.el9.noarch.rpm 02a2b3a5c2ab365b89df826f49b77c431d8612ec2f46f15338bd74aa8b98556d RLBA-2024:2155 python-drgn bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-drgn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms drgn-0.0.24-2.el9.x86_64.rpm e9098de326fb4bb31f5507ea8755985bc486d3dabbbe37687bc59bef0368839b RLBA-2024:2168 libva bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libva. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libva-2.20.0-1.el9.i686.rpm 5119c02902a717ab17197436503f20164a622c088adc5356630b515534da4384 libva-2.20.0-1.el9.x86_64.rpm a2014d21610d80b058a9273014b178be75097fe3a289bde8fbdf85b312187179 libva-devel-2.20.0-1.el9.i686.rpm 8f99f2a0bedb273947ae4e30b5e760c753892e9e0ef6ed2c58c696e6d3a40367 libva-devel-2.20.0-1.el9.x86_64.rpm 8acc7fce3826ff25a7c38adead37c7de899a17c95e4e886fa61aa8dafdd463e9 RLBA-2024:2189 systemtap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for systemtap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms systemtap-5.0-4.el9.x86_64.rpm e1d976d2fdf38cd9026e70ced91497cfe3b36e84fabc5b23a6ea8050bccf089e systemtap-client-5.0-4.el9.x86_64.rpm a510df8e414922f023cc6e87fade7dd7a365f76ca9a9a31a27ec42974e9b0f58 systemtap-devel-5.0-4.el9.i686.rpm 639cf682a932ef3134681d9a9789b5f60975dbecf8fd7934003aafe8b7e12480 systemtap-devel-5.0-4.el9.x86_64.rpm 035e13552d7377f9148c49ed373e725ab7886f651695e0e757359ecaa8eae8b1 systemtap-exporter-5.0-4.el9.x86_64.rpm 35ed3505793e0783ba068e44b8606a556d9d972fc66f675d3c24a7aaee27fc67 systemtap-initscript-5.0-4.el9.x86_64.rpm 8c281ad469c9dd3dcffd5ba019f2d93632b499f5ef0c7db888cf8126d82e7b88 systemtap-runtime-5.0-4.el9.x86_64.rpm 956ed46a0bf0361f8d05db1c791acd777daeb919600ca559dac161fe4d96b7ae systemtap-runtime-java-5.0-4.el9.x86_64.rpm 1fe0ad7a4c2cd90478910e55d042de0143d3fd3d6eb360fac85c62bb1bf757f4 systemtap-runtime-python3-5.0-4.el9.x86_64.rpm e77e4ddc6451f146c3f0efa74c21947a9358d1c61ce4910f3f99e9592139e3be systemtap-runtime-virtguest-5.0-4.el9.x86_64.rpm 4a4699a4f3c2d4c5067bfb08f5f5cef5c0de1eacecc72827c6965be0e83e8ff0 systemtap-runtime-virthost-5.0-4.el9.x86_64.rpm 7fb89e1f9a6ad7f283bf45ed7d07cc679f0e872ee7f6ed06f75eac06f9f9bcc3 systemtap-sdt-devel-5.0-4.el9.i686.rpm 82f7db579a88973c8085b54b82c5136d86ae7bae45abec22fc979f93ad5cafde systemtap-sdt-devel-5.0-4.el9.x86_64.rpm 039f0303924727ed2daeda9b49ad94aee9a6d249b32555d06303dbadde77991b systemtap-server-5.0-4.el9.x86_64.rpm ea7ee884657511f3bb06ba7c6c93cec3f2b23799eef31e845feb1b7ad9af2cba RLBA-2024:2194 lorax bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lorax. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lorax-34.9.25-1.el9.x86_64.rpm b7e7b9690f84d43390b2ece6edbea6593968167be9e2d74c5f0bc75298ff9e62 lorax-docs-34.9.25-1.el9.x86_64.rpm 5648279159c5c2acc11eaa41c9a15049a2b03c94e466eccff35d46962ec3d342 lorax-lmc-novirt-34.9.25-1.el9.x86_64.rpm 1e80c13b3b6935e921fbbd69c33532edd5f9844c072f404304ca37527e05924d lorax-lmc-virt-34.9.25-1.el9.x86_64.rpm 49a9baabcde364871ecd77f0aea76e6acf962b684bdbaf06f8bd18a149ae7f23 lorax-templates-generic-34.9.25-1.el9.x86_64.rpm 2665b0d5ba4a4182f18d10d77fa96f39930bb8a27271a2ad2207e018a69ed4e8 RLBA-2024:2192 mstflint bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mstflint. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mstflint-4.25.0-1.el9.x86_64.rpm 4d27e49c0a97fe90faa63b021b2061f4d8bd06d59b17fcc11cca6363fd8404ec RLEA-2024:2221 gcc-toolset-13-annobin bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-13-annobin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-13-annobin-annocheck-12.32-2.el9.x86_64.rpm b2119bdd933b9d0eb5880209e7622cd42add0301f26970770e8d4d7353c63dc0 gcc-toolset-13-annobin-docs-12.32-2.el9.noarch.rpm 3e518b37b2c7bc956973266cf35ba42c010207a1b5aafbddc2ad70b3c25a19ad gcc-toolset-13-annobin-plugin-gcc-12.32-2.el9.x86_64.rpm 4057364ea5e6c91645dc618da1a44615f4993e23fc2d8dd80e0bc627ce1ff34a RLBA-2024:2220 ipa-healthcheck bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipa-healthcheck. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ipa-healthcheck-0.16-3.el9.noarch.rpm f9f342d92518b6473ceed9322542feceac762abd8575a1a301ad71ae74967f00 ipa-healthcheck-core-0.16-3.el9.noarch.rpm 0a04ad57dfda6d0a7193a6a730e310fa4f96211e33bb125d747b3b34adad4f6c RLBA-2024:2227 rhel-system-roles bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rhel-system-roles. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rhel-system-roles-1.23.0-2.21.el9.noarch.rpm 6b94e2bc5347199adc46239fb4f406922209efdb7849231fb5a6ed37eded7f6d RLBA-2024:2240 git bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for git. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms git-2.43.0-1.el9.x86_64.rpm 82047539b88e6d2a28111f0f0c7c1c98878358ff237259cc95437071ff8837df git-all-2.43.0-1.el9.noarch.rpm 6264b4bc6a668794aad97a12f08d779362b07837ba7c295d8d249f65e2585ddb git-core-2.43.0-1.el9.x86_64.rpm 426f2f968935392ebc5bd58dbf3bed8aeae970dd53853a5cae8efed44d5af850 git-core-doc-2.43.0-1.el9.noarch.rpm 11cf184fd9c6688e2527aec0ec02bdb9a43299dd622ed94ccb692ee7ee0ef4f0 git-credential-libsecret-2.43.0-1.el9.x86_64.rpm fb67c4b3a74d18473885ab94e8a603eabd129470d8f35c7f134da0fd1ba86ffa git-daemon-2.43.0-1.el9.x86_64.rpm 3f18dcb59117f915321553ebebb38ddd9fc513433923bbcba06eceb27c37306b git-email-2.43.0-1.el9.noarch.rpm 4469ab8fa2b21ba709c59403db2fe454b8c087f27556c7e4fdc6edf755ea6c13 git-gui-2.43.0-1.el9.noarch.rpm c16a96386551279568ac2c635f67531657219d15d5a17a37f1c81eb7f1bd2cd5 git-instaweb-2.43.0-1.el9.noarch.rpm 3a830fe0c6b179d0c8405ff2f91a395ddbefd8a8aaf9e2a755e9861da28f1992 gitk-2.43.0-1.el9.noarch.rpm 702a75a03b0244841eea17cf1738cc46143958d6b50f2ee419c1d734b248ef03 git-subtree-2.43.0-1.el9.x86_64.rpm 20752fbcd8a66c811c750a4a333cea38af12a71de50e9abe139faa8fb71e9b26 git-svn-2.43.0-1.el9.noarch.rpm e294967b42e02f2978b07ee85dc0ddf9d1fb81c3c687f3d15b53f8aca792f927 gitweb-2.43.0-1.el9.noarch.rpm 75e1d568039679493d68d6418f1a9194c8c6e88acc06f550a76a16c4e8d1ed59 perl-Git-2.43.0-1.el9.noarch.rpm 8f6b026ced005bff7287f283fabbd051424d06457cf51ccdabb7b41ccc3d97a4 perl-Git-SVN-2.43.0-1.el9.noarch.rpm 76a9f34a9cf7b44e127bc04320f4667804bdae5097904bfb13f705f0fe171c90 RLBA-2024:2250 pki-core bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pki-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms idm-pki-acme-11.5.0-1.el9.noarch.rpm a003500fcea4d6ecd42f11d187b2798e8f405c2c25946642bef395dc1bf8cf13 idm-pki-base-11.5.0-1.el9.noarch.rpm 32f22a1326b1b36b6e562ded29d7212bdca19c58763bc22d22ae84c61c73ede9 idm-pki-ca-11.5.0-1.el9.noarch.rpm 2353075e0b25922fa9d63ecb833358a97058b9277e1000e0f1f7a4642a40bda0 idm-pki-est-11.5.0-1.el9.noarch.rpm 83134bb398c38cf98ee77ffada8961b20bb67e7275678ba92d59986a279d4054 idm-pki-java-11.5.0-1.el9.noarch.rpm 179d8521150ae769194f3c24dd95f1dde5cbdd10a15bcc08790666a093bbb5ee idm-pki-kra-11.5.0-1.el9.noarch.rpm a6010777eac229e33cb0e35ea134001b64268fc6d3a7a855a6bc1a7aa35d621b idm-pki-server-11.5.0-1.el9.noarch.rpm 899cd816d3123cd15a36ddf345669d88f01c104baffd373786de58a9e66a6c3a idm-pki-tools-11.5.0-1.el9.x86_64.rpm 17354e85a678beac1f7dd28f440db40f1130f551ab1a3fd9f50ea73a4f0d793c python3-idm-pki-11.5.0-1.el9.noarch.rpm 49ab99c6b596b5393d39fecb1f322adc4423e6b24b5719e4573293260926b8ff RLBA-2024:2265 NetworkManager-libreswan bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for NetworkManager-libreswan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms NetworkManager-libreswan-1.2.18-2.el9.0.1.x86_64.rpm e8dcf0b2276c1ff2b83d5e7f4074bab0525e4c4b1f5e813166dbbd50cc5c32b8 NetworkManager-libreswan-gnome-1.2.18-2.el9.0.1.x86_64.rpm b0289fa65b10285dbad854b39f32db98de5562e330e637b27f3cd107f9093c68 RLBA-2024:2271 conmon bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for conmon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms conmon-2.1.10-1.el9.x86_64.rpm 391c45ff77cf158131d76e88be05ef9751baaacf0b44e3ff97444fd9688d9940 RLBA-2024:2267 passt bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for passt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms passt-0^20231204.gb86afe3-1.el9.x86_64.rpm 301c1eff80a20e2f9fcf5684c1a9d0026335b419cf9e0b959374d8ea4b974351 passt-selinux-0^20231204.gb86afe3-1.el9.noarch.rpm 2d09c644801dbaa4454086546ac7e3b95833bbe5034b285d3232fb41a80c2013 RLBA-2024:2281 virtio-win bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virtio-win. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virtio-win-1.9.38-0.el9_4.noarch.rpm 761a7ff242e6278a206a38af0c56e3eb08ce696f5183545ba43bdd58d86e9444 RLSA-2024:2278 Moderate: httpd security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_macro: out-of-bounds read vulnerability (CVE-2023-31122) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms httpd-2.4.57-8.el9.x86_64.rpm 47249e8b9931ce64829761a7f1ad02fef0af9b838b4ed3185cffee13ffe5ef1a httpd-core-2.4.57-8.el9.x86_64.rpm 28ca7e85f34005fbdbeb8e683008aa351cc932eea3f8fcac893415240bb8cc2f httpd-devel-2.4.57-8.el9.x86_64.rpm 063801a4b727db25053215e7abb72d6fab79293730e7df0b57b0612bc65381f9 httpd-filesystem-2.4.57-8.el9.noarch.rpm a6954de6f5771746b49faaeca1a3856cf8cbd4cde336e25fbdfee5d8af47adc8 httpd-manual-2.4.57-8.el9.noarch.rpm 0f3a9604599a1ab41e26bba6af81625b98ee2604b72fc6b7de7c684626def9fe httpd-tools-2.4.57-8.el9.x86_64.rpm 35f81828a42e0e53aeb1d7516d7b041a958cc25a12b54a40142ba4ed81c8caa7 mod_ldap-2.4.57-8.el9.x86_64.rpm f1a0c1896048a18c1cfd20078f6db8dae2d307594b0f6a43feb18bc12536f7ad mod_lua-2.4.57-8.el9.x86_64.rpm 3238f1f065de01959add1322018d152cac7f3aca914c68d566bcf881d5bf6802 mod_proxy_html-2.4.57-8.el9.x86_64.rpm 89799c4a426f372db5215fe572d380c1ddb40001db341702abd723fff6309c4f mod_session-2.4.57-8.el9.x86_64.rpm 78d29186f06a51d2da3e026c6269587cc1847e03798573abf9cd513f6bc316cb mod_ssl-2.4.57-8.el9.x86_64.rpm 30ed46404c44402cca3fc893657c826e31f6c9f8695fd6bc48229e545944ebfc RLBA-2024:2283 rear bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rear. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rear-2.6-24.el9.x86_64.rpm d735832fce28f2098f97dc2e34ec5a05007c6a5447a870304162056a4dc9187b RLBA-2024:2291 boom-boot bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for boom-boot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms boom-boot-1.6.0-2.el9.noarch.rpm e73ec96e5d76b93cf0885b9dbc61699fc8b7ecdf75820f2bca5dc3fa290c00fa boom-boot-conf-1.6.0-2.el9.noarch.rpm 1429315550655a70db2a373d112cbabb25139dd6846a4b78775d8afd947479dc python3-boom-1.6.0-2.el9.noarch.rpm 8aba695c6682e7460ce0b18ad9bc2ef0ecc9f7ffcea61f382d74d1e5b6b76666 RLSA-2024:2302 Moderate: gstreamer1-plugins-base security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gstreamer1-plugins-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-base packages contain a collection of well-maintained base plug-ins. Security Fix(es): * gstreamer-plugins-base: heap overwrite in subtitle parsing (CVE-2023-37328) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gstreamer1-plugins-base-1.22.1-2.el9.i686.rpm 99a46557e593871452defd764667b95d9b99d32b181b001d4490b90b7eabb630 gstreamer1-plugins-base-1.22.1-2.el9.x86_64.rpm 624ad80a70d26242b95f2856fbc93a4aae0803ee1e22d782639fed6f5be102e0 gstreamer1-plugins-base-devel-1.22.1-2.el9.i686.rpm 219951a3e647657822208d08f5cce68e0365193f2e5f77f78dc1943056780703 gstreamer1-plugins-base-devel-1.22.1-2.el9.x86_64.rpm af8a6b6d642654ac3a04df92bd695762112eff941f20626e9ed95348098a16e6 gstreamer1-plugins-base-tools-1.22.1-2.el9.x86_64.rpm 6c1741c4cbdfab62008c3366d01ba2866a7cf3c32a7ce4fae03d419d39be2c18 RLBA-2024:2306 tomcat bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tomcat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tomcat-9.0.62-39.el9.noarch.rpm fc35da66f8fb2c300398d62efe850f2c6b9b4e56125cadb0929fd6ece99fffc5 tomcat-admin-webapps-9.0.62-39.el9.noarch.rpm 7474e0395b579ba93a49bd7803ce04eed2392058b689dc6f92eba6dfd123bbad tomcat-docs-webapp-9.0.62-39.el9.noarch.rpm 6f61f06bf3d3961ab8ec7dacd936f71499e1d63eae6b1cb9129501371e48c8a3 tomcat-el-3.0-api-9.0.62-39.el9.noarch.rpm e7d2c9064855fbfef013ea8ee6dc220f2fc16792b3e0f52aa5cb852119a135aa tomcat-jsp-2.3-api-9.0.62-39.el9.noarch.rpm 9e382c3942d6994c2352d0a69e0ace5a830fec7cc12f46f4e85beb3262b5c385 tomcat-lib-9.0.62-39.el9.noarch.rpm 76bc1a62d9272fb3581be15f61c22ebd352865c9d2d637d3f2b1c67888d5b0dc tomcat-servlet-4.0-api-9.0.62-39.el9.noarch.rpm b1e8cb4bc321aa1c9f588dc3f129dd1bbf8eae89a335fa990229da82c68d886f tomcat-webapps-9.0.62-39.el9.noarch.rpm b0c91faa2a879e50e85bc8d0b7be95d40a14b37a4a8a81761549c608be90708d RLBA-2024:2329 mingw-qemu-ga-win bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mingw-qemu-ga-win. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mingw-qemu-ga-win-107.0.1-1.el9.noarch.rpm 8c300ee1743ef5ce5d24cf7c0d5e94cc2ab57ea916a1a00b72f3e10384ef373c RLBA-2024:2338 virtiofsd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virtiofsd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virtiofsd-1.10.1-1.el9.x86_64.rpm 9a821845325fb5482070bb132f88c64bbceaa18734b631f6e4bedb6f47f6f41c RLEA-2024:2351 rust-afterburn bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-afterburn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms afterburn-5.5.1-2.el9.x86_64.rpm b80275800eb3fb6c5142dc57b6216a02a16bad32b9e41e4f5295899a900f11a9 afterburn-dracut-5.5.1-2.el9.x86_64.rpm 007514eb74487dd5a84761739564cede0b0cddd095b67bbe39fcf71bbf731184 RLBA-2024:2354 certmonger bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for certmonger. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms certmonger-0.79.17-2.el9.x86_64.rpm 016d89830e0d220c1ffffc2c004a95d45e49444637953e52edf0e65ecb1e0fae RLBA-2024:2362 squid bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for squid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms squid-5.5-12.el9_4.x86_64.rpm c55c41498482cc686f1220dfa7cd3d956750228b97816ccf5fe06be823c8e197 RLBA-2024:2361 cyrus-imapd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cyrus-imapd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cyrus-imapd-3.4.1-11.el9.x86_64.rpm 62602c0e629f554f36537a143af2cec6390871573aa9e45fe9d92ee7e9cdbeae cyrus-imapd-libs-3.4.1-11.el9.i686.rpm 9fe4977abae9776ee0afaa0f1d0f5aa70eda7ab3365124d90537131aca264212 cyrus-imapd-libs-3.4.1-11.el9.x86_64.rpm 6d13b2610c0df2e686fefcb3f50cca727f4c406f630496dc2ddc2200440cdf08 cyrus-imapd-utils-3.4.1-11.el9.x86_64.rpm e26155bb0a882e7a2e438c9cdb4c3d292c5251d42e49ea410807d66001d42353 perl-Cyrus-3.4.1-11.el9.x86_64.rpm 538265a8a751c829459a1b490f844a4f19588d14482e1812437e407e5d7fef87 RLBA-2024:2359 cockpit-session-recording bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-session-recording. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-session-recording-16-1.el9.noarch.rpm 10931a009aafe5af63220916026abf1ecca34bd31bea5a234db9bd14afd97559 RLBA-2024:2370 synce4l bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for synce4l. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms synce4l-1.0.0-1.el9.x86_64.rpm 552ed778b51a5f1c4078dcdc21bba91db9fa1e0fa3f13126796883396196f48f RLBA-2024:2381 rust-bootupd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-bootupd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bootupd-0.2.18-1.el9.x86_64.rpm aa8423808dbafce09b3fff863106b45a1382c119983f496469834b1a8369b8d2 RLBA-2024:2388 fuse-overlayfs bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fuse-overlayfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fuse-overlayfs-1.13-1.el9.x86_64.rpm 42edb4465d7bef9283de5bf783665f7036de514d5851a8759440c4141f273e0b RLSA-2024:2548 Moderate: podman security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fixes: * podman: golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786) * podman: buildah: full container escape at build time (CVE-2024-1753) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fixes: * liveness probe not called by podman when using httpGet (JIRA:Rocky Linux-28633) * Unable to copy image from one virtual machine to another using "podman image scp" (JIRA:Rocky Linux-28629) * [v4.9] Backport two docker CLI compatibility fixes (JIRA:Rocky Linux-28636) * Issue in podman causing S2I to fail in overwriting ENTRYPOINT (JIRA:Rocky Linux-14922) * Need to backport podman fix for SIGSEGV in Rocky Linux 9.3/8.9 for UBI based containers (JIRA:Rocky Linux-26843) rocky-linux-9-x86-64-appstream-rpms podman-4.9.4-3.el9_4.x86_64.rpm 83dda3781bcf6fb15d0ffc81fa2e5ba3224fcfed61afd40f0123c6d36c5c7b79 podman-docker-4.9.4-3.el9_4.noarch.rpm b923e8837bc7f916eecfc1e426ed28442d9d9167126668c301c837e0a1a9be50 podman-plugins-4.9.4-3.el9_4.x86_64.rpm ae700303ac9fd359f631a4e9f28caedb46a8b51c9335fe64528d2c39cfed4cc1 podman-remote-4.9.4-3.el9_4.x86_64.rpm e5513af566e2334ee02a5e98a6d5270ba5ef6d1d7e259e3c4fd096726e85c79c podman-tests-4.9.4-3.el9_4.x86_64.rpm 66463c8fcce0d880a1de9367bb16eaae13082ae9fa40c785817891a93a00b9ca RLSA-2024:2550 Moderate: buildah bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for buildah. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Bug Fix(es): * TRIAGE CVE-2024-24786 buildah: golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON [rhel-9] Rocky Linux9.4 0Day (JIRA:Rocky Linux-28230) rocky-linux-9-x86-64-appstream-rpms buildah-1.33.7-1.el9_4.x86_64.rpm 05749800baff333de4aa4ed733c05ef60cbd247157ecdc22aa7a1b96af0ac9f6 buildah-tests-1.33.7-1.el9_4.x86_64.rpm 7d5b120399c1701146ce958e4d75a0a523fd0dd5e5c0a60bc4e559ead70c50c5 RLSA-2024:2549 Moderate: skopeo security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for skopeo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786) Bug Fix(es): * TRIAGE CVE-2024-24786 skopeo: golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON [rhel-9] - Rocky Linux 9.4 0day (JIRA:Rocky Linux-28235) * skopeo: jose-go: improper handling of highly compressed data [rhel-9] (JIRA:Rocky Linux-28736) rocky-linux-9-x86-64-appstream-rpms skopeo-1.14.3-2.el9_4.x86_64.rpm 871acd34f5da528059aee2904ce025346920665c969a9d0b054d36ce6d75eccd skopeo-tests-1.14.3-2.el9_4.x86_64.rpm bb9a8e42487189e4a1551867d4b16223bc25bdb7b327b7a1998bfe6795e8ca1e RLBA-2024:2555 gcc-toolset-12-gcc bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-12-gcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc-toolset-12-gcc package contains the GNU Compiler Collection version 10. Bug Fix(es): * [Rocky Linux9] Backport PR libstdc++/113960 (JIRA:Rocky Linux-30832) rocky-linux-9-x86-64-appstream-rpms gcc-toolset-12-gcc-12.2.1-7.6.el9_4.x86_64.rpm 9f2c6b488abb038d625125a710260e73592e117a084225558e1f1de349ad5d9a gcc-toolset-12-gcc-c++-12.2.1-7.6.el9_4.x86_64.rpm 36c15b067c418f064f4165e275cfd1df796534a1346f1c853b5dae87f221a504 gcc-toolset-12-gcc-gfortran-12.2.1-7.6.el9_4.x86_64.rpm 364778466faaa84d7a5e811644ce9be9ccef700b460b05f756f3d38f0a05c45f gcc-toolset-12-gcc-plugin-annobin-12.2.1-7.6.el9_4.x86_64.rpm cadc2a0330ba24bb919d047e6ae22563fcce0de4d85766380c8d58dd444ca501 gcc-toolset-12-gcc-plugin-devel-12.2.1-7.6.el9_4.i686.rpm da16430386dea715d8f1b8e598adde0545eed1ec0175db8047fe4a28e32669e3 gcc-toolset-12-gcc-plugin-devel-12.2.1-7.6.el9_4.x86_64.rpm c2b108e979c559433cb8b379480848550f44310c25b08501e9f8eac377b6e1c3 gcc-toolset-12-libasan-devel-12.2.1-7.6.el9_4.i686.rpm 613804da7cbff3561156f039471fe6e3a329845f56b49a47c4d05f463d87642c gcc-toolset-12-libasan-devel-12.2.1-7.6.el9_4.x86_64.rpm dfd010fb221946ca42eab83d3b9c5d77657d34c8b67378798dd7bb62190f1da5 gcc-toolset-12-libatomic-devel-12.2.1-7.6.el9_4.i686.rpm 298b45a22ece729671b64d7a6b1382220bb5e044fbfcfdb0ae224786d2418f13 gcc-toolset-12-libatomic-devel-12.2.1-7.6.el9_4.x86_64.rpm 37b37f3b89ae430bbe1a7dc8932876aa742f7ba5f875ad16449b80386faeee78 gcc-toolset-12-libgccjit-12.2.1-7.6.el9_4.i686.rpm 43a9fe2e0ad7f2922bba5a5da202461dd0acf369a0b397e0c399febb7c8e62da gcc-toolset-12-libgccjit-12.2.1-7.6.el9_4.x86_64.rpm 7d0211424125687b8755155cd6b96147dd9d78ababc80466bba438d1a47b1b35 gcc-toolset-12-libgccjit-devel-12.2.1-7.6.el9_4.i686.rpm 714253be93b950d852cb09c4c6b6ab9a4bdefb16a762a711d77d13f8d4b69a65 gcc-toolset-12-libgccjit-devel-12.2.1-7.6.el9_4.x86_64.rpm 02ac0170723b508ed472745fea2c9d48a8cd7445c1f8cbd987e94ff64d3dfed0 gcc-toolset-12-libgccjit-docs-12.2.1-7.6.el9_4.x86_64.rpm 4dc581fee056211cf68cb6844baa13e9b36bc2160884ca12225dd65600ab2643 gcc-toolset-12-libitm-devel-12.2.1-7.6.el9_4.i686.rpm 82bde850523ac60da6196e158513c6c7700ab63974e8e70a01fd1d4a4b84d426 gcc-toolset-12-libitm-devel-12.2.1-7.6.el9_4.x86_64.rpm 304d9bac53dfe3fe48213e5f919016d3884671c77106898295e4dfab502d4bcc gcc-toolset-12-liblsan-devel-12.2.1-7.6.el9_4.x86_64.rpm 6be32b0a39a2dbb3b3fe443eec881db1171f2f77e8062cbf3e6daf42bd0735c8 gcc-toolset-12-libquadmath-devel-12.2.1-7.6.el9_4.i686.rpm a18d09dc6c55cc17c733047da08aeb72e0225760241eebd066bc2545a9e279cc gcc-toolset-12-libquadmath-devel-12.2.1-7.6.el9_4.x86_64.rpm e0817048a87f97bec36c2c9e97a52559047bfc51afd9f3069baf4111a38a89df gcc-toolset-12-libstdc++-devel-12.2.1-7.6.el9_4.i686.rpm 28eecb68f8ef7c62f7bf6ae1d659198800ee9569166083c4c506209a205d9aa3 gcc-toolset-12-libstdc++-devel-12.2.1-7.6.el9_4.x86_64.rpm 84b0a4ee292d414543037846b4b0c7cb500d03fe840f07a71d6f3a8154bbab76 gcc-toolset-12-libstdc++-docs-12.2.1-7.6.el9_4.x86_64.rpm e5303e338d2c6d26175a56ac827e360959a63787163c44d39f17d8e37be2c488 gcc-toolset-12-libtsan-devel-12.2.1-7.6.el9_4.x86_64.rpm ff4f7b39a6c0ec414b7e040100e3f81cc424a57d5dfe986cac6dff694b8198a5 gcc-toolset-12-libubsan-devel-12.2.1-7.6.el9_4.i686.rpm 6134994a009795f02d01309443f63bc821fc3fd83a8c7b6869e9f8fdb6e3bd94 gcc-toolset-12-libubsan-devel-12.2.1-7.6.el9_4.x86_64.rpm 4e56c3968e3dd518ed02a55a55485d76e906e0c11b419db372a18e590b8f488f gcc-toolset-12-offload-nvptx-12.2.1-7.6.el9_4.x86_64.rpm 3a53e4194612954e04572f55abd6d5d30311305cfbc4bc798afff60f95e8536a libasan8-12.2.1-7.6.el9_4.i686.rpm 854509184fd9788ed5e6e623d6dad04eaacc10bfe9cb1f740ff20ee82fa875d6 libasan8-12.2.1-7.6.el9_4.x86_64.rpm d4cfa8881e0847c4448dca785dafab05e24bb8734ce2b0184e8629e11d1effb9 libtsan2-12.2.1-7.6.el9_4.x86_64.rpm 9a9ecba0f67aab62f83d2b37efb0c7a38a5cc84f49b46c665c135c58b1ab46b7 RLBA-2024:2553 bootc bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bootc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bootable container system Bug Fix(es): * Update bootc to 0.1.9 (JIRA:Rocky Linux-30879) rocky-linux-9-x86-64-appstream-rpms bootc-0.1.9-3.el9_4.x86_64.rpm 8533b58441c913bb8553e324a84c8e29585ac3dc473fe7ec765732decebf6082 RLBA-2024:2557 containers-common bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for containers-common. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The containers-common package contains common configuration files and documentation for container tools ecosystem, such as Podman, Buildah and Skopeo. Bug Fix(es) and Enhancement(s): * Update containers-common in 9.4 0day (JIRA:Rocky Linux-33394) rocky-linux-9-x86-64-appstream-rpms containers-common-1-91.el9_4.x86_64.rpm eff1ddc99c483dd29413211b68cccc739a89cd48ec9d00edaaf4f81109ca9b99 RLSA-2024:2559 Moderate: python-jwcrypto security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python-jwcrypto. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-jwcrypto package provides Python implementations of the JSON Web Key (JWK), JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Token (JWT) JOSE (JSON Object Signing and Encryption) standards. Security Fix(es): * python-jwcrypto: malicious JWE token can cause denial of service (CVE-2024-28102) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-jwcrypto-0.8-5.el9_4.noarch.rpm 844dc0be5135fbfbfc8cbcb3caf9ce32004a4e0fe21027488bf6228a6c233701 RLBA-2024:2563 nss bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Bug Fix(es): * valid signatures shorter than maximum length are rejected [rhel-9.4.z] (JIRA:Rocky Linux-32161) rocky-linux-9-x86-64-appstream-rpms nspr-4.35.0-7.el9_4.i686.rpm 488873001440c569629ad050ea08a7f3d341fffd3d199bb35bb8415e3239bde8 nspr-4.35.0-7.el9_4.x86_64.rpm bac72510acd9d28a658797730a4e075f2e86de2b70c5f54eb99ddb193794881b nspr-devel-4.35.0-7.el9_4.i686.rpm 8d693e2f556b7e93a15de69f3807139966711bd64163dfc6619b01725958611c nspr-devel-4.35.0-7.el9_4.x86_64.rpm 1e8420a7a937982bc1d8a2a476e0358a929b16442bb07051c2ea1e22bff9c1e6 nss-3.90.0-7.el9_4.i686.rpm e99299a267a84809c659f93a44f92350d1472ccc43cfe8c69b196fd61279cdd4 nss-3.90.0-7.el9_4.x86_64.rpm 85de577728d21b47e726baae6ab01f0d19de52b5a2db8c9e228dafcd4c3c6ee5 nss-devel-3.90.0-7.el9_4.i686.rpm 217475a68a4fbca8ce8af92593bff9878ea15f21cd4073a83a84811fa08d066f nss-devel-3.90.0-7.el9_4.x86_64.rpm 43cc3cd6d47a1bb5761939540ee21be0f767553e0429573d4952349661bcca62 nss-softokn-3.90.0-7.el9_4.i686.rpm f1705aee9ec3a0fb53631789f760b19215c734e79ad7269e04dbe08cae402f6c nss-softokn-3.90.0-7.el9_4.x86_64.rpm 5645929dee8519e877425ee52709391e526a8732c0dfc31f347d83c2bb91b28f nss-softokn-devel-3.90.0-7.el9_4.i686.rpm 59774a654458da28ac6639ad9710e6313f1aab7632e34ed18d68fe429b13065d nss-softokn-devel-3.90.0-7.el9_4.x86_64.rpm 389d4a4a9aeaeba7c3eb455117a0b22b34b3c0cce42aa30f4d2d4713162f35f9 nss-softokn-freebl-3.90.0-7.el9_4.i686.rpm 9c25f09d16e33b9d93b103d9662195b62b75df6f1748510b0537935e980a26b1 nss-softokn-freebl-3.90.0-7.el9_4.x86_64.rpm 406777813ebfdf93acfbb4acabe98a247f00b329337b191ca036c5367bac3b0a nss-softokn-freebl-devel-3.90.0-7.el9_4.i686.rpm 30ae6a07505120f8788ad9d30ebdcc73ec4c941e5dd398357ddbb5e4146faf11 nss-softokn-freebl-devel-3.90.0-7.el9_4.x86_64.rpm bff7640a5d35d90d4d56682872e72cf0d35157c141862704b56aa520f6c97930 nss-sysinit-3.90.0-7.el9_4.x86_64.rpm 825e160077ef15081bb87dc28f5efe7a8b29a579be3406f60d60e40c04428eab nss-tools-3.90.0-7.el9_4.x86_64.rpm e5ea98329ce0fe6782014eb622fdfa8c09ea5cbc4749aed2c2c04337e91ffe16 nss-util-3.90.0-7.el9_4.i686.rpm 48b74a1590bd8d4c05f20072dd8d863eb168918393f803d1f38de401c1544f0b nss-util-3.90.0-7.el9_4.x86_64.rpm e2fe12e79cd81b05c87c3c589ab71fe39e3d6b073e3ba50360c0111efb8ba0ec nss-util-devel-3.90.0-7.el9_4.i686.rpm f93988f229bc8b5899490357bedb6484044a692f98ae2e210f9864ef7fa5f9c9 nss-util-devel-3.90.0-7.el9_4.x86_64.rpm 32b931be252c026b3892b276ee8ba0a38c07a41f30ef14bb2db84c6ff549ab72 RLSA-2024:2562 Important: golang security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394) * golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290) * golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect (CVE-2023-45289) * golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783) * golang: net/mail: comments in display names are incorrectly handled (CVE-2024-24784) * golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785) * golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms golang-1.21.9-2.el9_4.x86_64.rpm a19c070fe42d179715bedd1a5197be88cffc5b671e89180247a63397f8000214 golang-bin-1.21.9-2.el9_4.x86_64.rpm c3f3320e40ac1922fc60bde63ab166aa859f7e02ab8d3050dc8508aafa9931ac golang-docs-1.21.9-2.el9_4.noarch.rpm 718d0316eca0de8a185a556dad03012571f2d47436d869ecdba2476e4445e1ff golang-misc-1.21.9-2.el9_4.noarch.rpm b7882278474d687f205b3baeb6573632ca32ba57433c0b52fc0ef4888054aa99 golang-src-1.21.9-2.el9_4.noarch.rpm 375661970bb5076d90abec7d1ef8b7dce01091bbf9e3f8e0d756edd482f12d95 golang-tests-1.21.9-2.el9_4.noarch.rpm 037fdf82dde931093600dce75a1515140edf6c12f30520ff2ad1a15312c4eb2b go-toolset-1.21.9-2.el9_4.x86_64.rpm b8f79327f17b24597bc7310b6435790d2391ce948aa2fc236c932c02648fd940 RLBA-2024:2567 aardvark-dns bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for aardvark-dns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The aardvark-dns package is and authoritative DNS server for A/AAAA container records. Bug Fix(es) and Enhancement(s): * Update aardvark-dns to 1.10.0 for 9.4 0day (JIRA:Rocky Linux-33099) rocky-linux-9-x86-64-appstream-rpms aardvark-dns-1.10.0-3.el9_4.x86_64.rpm bb58e7560f283292893c4f8705a75198f4cb532c16637286064a43e4750c0a12 RLSA-2024:2565 Moderate: libreswan security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libreswan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network (VPN). Security Fix(es): * libreswan: Missing PreSharedKey for connection can cause crash (CVE-2024-2357) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libreswan-4.12-2.el9_4.x86_64.rpm b42fea1432a4d5382233cfd82eb10d06d85c62c2680be69a47a937590874ee7e RLSA-2024:2564 Moderate: mod_http2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mod_http2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_h2 Apache httpd module implements the HTTP2 protocol (h2+h2c) on top of libnghttp2 for httpd 2.4 servers. Security Fix(es): * mod_http2: httpd: CONTINUATION frames DoS (CVE-2024-27316) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms mod_http2-2.0.26-2.el9_4.x86_64.rpm 1413a4e111a921f4d0b632da9c00e38fe96a59e2cf3065cabd95759bd92e976b RLSA-2024:2566 Important: pcp security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Performance Co-Pilot (PCP) is a suite of tools, services, and libraries for acquisition, archiving, and analysis of system-level performance measurements. Its light-weight distributed architecture makes it particularly well-suited to centralized analysis of complex systems. Security Fix(es): * pcp: exposure of the redis server backend allows remote command execution via pmproxy (CVE-2024-3019) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms pcp-6.2.0-2.el9_4.x86_64.rpm fa44c07005ec324159056ed889ef90984647ff4135d08053ee4f99a318f312fc pcp-conf-6.2.0-2.el9_4.x86_64.rpm 5948d567e38935059ba9b70703e6a46726a2f8e7a5564f9387a12b580c3f5c0f pcp-devel-6.2.0-2.el9_4.i686.rpm dded1bf57323409ec60cc6c5fb393315098012792c41c07e999e1268361618f6 pcp-devel-6.2.0-2.el9_4.x86_64.rpm e62c5578cc69340f65827e9476ad2a2a0f8efe6557e13404f82398ee473f6fb3 pcp-doc-6.2.0-2.el9_4.noarch.rpm 9904aa28f0a12feac60148243c0130f406a88bbcf9b04ffbb871b98b6bfd2e79 pcp-export-pcp2elasticsearch-6.2.0-2.el9_4.x86_64.rpm bcf2f80c4b5bc65f4786d82a2453ca6603a920e7c14bda47d1d9834dd4c6534f pcp-export-pcp2graphite-6.2.0-2.el9_4.x86_64.rpm d75da034087628f17203484436a916a340d38dad324ba62c2fb69f463980fe69 pcp-export-pcp2influxdb-6.2.0-2.el9_4.x86_64.rpm d5f32b1abdbcbd9efd9543aa564f78cd8d590fb923f4447d08a2a4da3b56358f pcp-export-pcp2json-6.2.0-2.el9_4.x86_64.rpm 60aa1bca05545d9082edd902e4cdb152db8c54b840df19d0df3dc98ff86c2e4c pcp-export-pcp2spark-6.2.0-2.el9_4.x86_64.rpm 522e1c231a524d08a1c8aefbb98b95ac6f25fe9b0c8ae14e1598914ea1c9203c pcp-export-pcp2xml-6.2.0-2.el9_4.x86_64.rpm 66aa4e733ae4be3d8711b0cccd3cddac859b102820ce09afba51eac4bf5ad523 pcp-export-pcp2zabbix-6.2.0-2.el9_4.x86_64.rpm 7864479d459340b76c90812b3887e10ae95f3bc4f115a17b3cabc3d7ef9de4f1 pcp-export-zabbix-agent-6.2.0-2.el9_4.x86_64.rpm a647417d2c22e69116e4b0952cd4553b766e55649bbc9d83234583d3ed100d55 pcp-geolocate-6.2.0-2.el9_4.x86_64.rpm b345a444491f6849279fcca5f2b2b609add1c34d505d5b0057e3df8620d0dd3b pcp-gui-6.2.0-2.el9_4.x86_64.rpm 004f4064fb624a7f0eeb58b74972eee22e6d12c79b76dcf9a26738cebdb03aee pcp-import-collectl2pcp-6.2.0-2.el9_4.x86_64.rpm f2389224a90e6af5ea0eb021649f6cc7455e094b81b12de46622dde1c2f9f0a3 pcp-import-ganglia2pcp-6.2.0-2.el9_4.x86_64.rpm da8564dd1390d0fb8068f15cc50c340a46613f3fdf4f901dc6e039d21c5d8961 pcp-import-iostat2pcp-6.2.0-2.el9_4.x86_64.rpm d84172248850213f41358b88160fc3751f34f215bf2a9db590feab93b4641816 pcp-import-mrtg2pcp-6.2.0-2.el9_4.x86_64.rpm 588a24d7b2374aabeee44217a6fd188f9646dc1ed5965db2b088725eb472ad19 pcp-import-sar2pcp-6.2.0-2.el9_4.x86_64.rpm ec7f56586e2728b00c8e261e2bb52da13ab75a3c96081804be2251f22a133bd3 pcp-libs-6.2.0-2.el9_4.i686.rpm 48cbb79b130eb5c7c0f046c7313a92ba668588e8d3edb1bfc35a04dcef145c9a pcp-libs-6.2.0-2.el9_4.x86_64.rpm 55d503ff4a012ce229ee6b45780c95824bea60cfb5d2f9d3b788cba57908ac36 pcp-libs-devel-6.2.0-2.el9_4.i686.rpm e5247dc61d1cf538e0f5262a12a75c08306adefdbd1827e95c264ffb7303809f pcp-libs-devel-6.2.0-2.el9_4.x86_64.rpm 084cf6ac20c310c8ee16a021dbced7969e3ec40476acab4a5c9b4091fe0942d9 pcp-pmda-activemq-6.2.0-2.el9_4.x86_64.rpm ab405d81c52749418c66a7cecee98712df19eacbbbaf3e3d4d95cc58c1ea24e8 pcp-pmda-apache-6.2.0-2.el9_4.x86_64.rpm f69608de1d216a94eb89259dbf041fa6421d591dc1740d07566cb5ffed3e2c9b pcp-pmda-bash-6.2.0-2.el9_4.x86_64.rpm 2a23436c3908ccae2d11499325a4668b3f82c14e372ff2aec5774c042ef4e57b pcp-pmda-bcc-6.2.0-2.el9_4.x86_64.rpm 06adde62361f8c5320a51ae9ff68c191cca3b195193bcd50670c66e837a87954 pcp-pmda-bind2-6.2.0-2.el9_4.x86_64.rpm 8e6904674ac61d53c9e6d79f09df53a6b84d6cdcfbb1af668e9a058cb97a79e5 pcp-pmda-bonding-6.2.0-2.el9_4.x86_64.rpm fa941b1dc97fded31e57eca4951688105fac9eca8d1fddd02a144b0cdb81f36f pcp-pmda-bpf-6.2.0-2.el9_4.x86_64.rpm 3868252de1e00f757e46ebcebdb985a44f5f520f1c9223322326e3eefc13b448 pcp-pmda-bpftrace-6.2.0-2.el9_4.x86_64.rpm 1c426dcbe13cad16aaf6aae4b67ae56d2d670af08a0573acad88bf888f931b37 pcp-pmda-cifs-6.2.0-2.el9_4.x86_64.rpm b55fb322f5a8489201119506c5d852d306933d84d5907e6d29a56434799d47c6 pcp-pmda-cisco-6.2.0-2.el9_4.x86_64.rpm d14cc1a180de33c2051c4013e33ae72e352354901e6b079343e612cf4096cb8a pcp-pmda-dbping-6.2.0-2.el9_4.x86_64.rpm 43abe10a5ed2e4bc43d41c7c166b0a05999f9b1f7895fc4a3463347ce56f6a5a pcp-pmda-denki-6.2.0-2.el9_4.x86_64.rpm 09f7f66b54f6602ce5e674127a408be9e4e7d186eb79eeabb846c99717d23a15 pcp-pmda-dm-6.2.0-2.el9_4.x86_64.rpm df24c289977983947271d1fc36afd011007b428ab24c18ec59d1ed7872982aad pcp-pmda-docker-6.2.0-2.el9_4.x86_64.rpm b9fe0b9d274160586639b86bfa25a8bc4a0f5e85bcdf1b9ecbd045c3e11720a3 pcp-pmda-ds389-6.2.0-2.el9_4.x86_64.rpm 3c7acc9762ea82f5b03e1d69e45604a334997b8dec48c41a6d13495c7a2e34ed pcp-pmda-ds389log-6.2.0-2.el9_4.x86_64.rpm 0d18ef04429219c559d4838fb928c17e231242e1d7dea975f3e1db9d30f79ee2 pcp-pmda-elasticsearch-6.2.0-2.el9_4.x86_64.rpm e725bb41748e39b0b5759d4f215e195f4f4f1c04ee242605610f014c932705d7 pcp-pmda-farm-6.2.0-2.el9_4.x86_64.rpm ac81f72003a60e6b69c8e7e2dfece1276ac2cf5509603295bf86b181baeeb388 pcp-pmda-gfs2-6.2.0-2.el9_4.x86_64.rpm 515dd10c8db179401bc915664e4a188ca8cf024969a12f042363ff82395a97ca pcp-pmda-gluster-6.2.0-2.el9_4.x86_64.rpm 40c43563e8be95c1fa90ecfb961667c587848fd23fe217e75a2568d3ccac3df8 pcp-pmda-gpfs-6.2.0-2.el9_4.x86_64.rpm 77d920db9d884ae336259e1bda575748caa3b310f09e8adfb99193f61013e5c5 pcp-pmda-gpsd-6.2.0-2.el9_4.x86_64.rpm 3d04c09fe2ba97bc1829304193f023433602d3cb4971d7a5f48446c9f7736c5d pcp-pmda-hacluster-6.2.0-2.el9_4.x86_64.rpm c5c24d867accde6c689d14045bb1633c01cc4456a7799ec1a99f0226cddb776d pcp-pmda-haproxy-6.2.0-2.el9_4.x86_64.rpm 5296cf993faa004b4f84da71f9b036fe749c0af69d71c7462402f20dce540f93 pcp-pmda-infiniband-6.2.0-2.el9_4.x86_64.rpm 073fdcd61d19e581f726d91ad56f9cf0af7fe9272961c18ba925302aa78ea078 pcp-pmda-json-6.2.0-2.el9_4.x86_64.rpm 70bf049517481408068d9911a32eff856fcafa43e00d950e1248ab9106642b17 pcp-pmda-libvirt-6.2.0-2.el9_4.x86_64.rpm 9df2a74e54fcc42a7e7d618c4605fb44dbfd45129456c70edafb157693b9ae86 pcp-pmda-lio-6.2.0-2.el9_4.x86_64.rpm ac13d7fe83e7aace6b5a17479a4315583945a84d5e109f3c257a6c171cf439f8 pcp-pmda-lmsensors-6.2.0-2.el9_4.x86_64.rpm 6815ab8280350cf4707e45c9e0170ea0aa914570fe9e478181587e8f1d6cf150 pcp-pmda-logger-6.2.0-2.el9_4.x86_64.rpm 78940fa3ee09678bafe3a91b745802a638a580aae08ed6222bceb709c9b32436 pcp-pmda-lustre-6.2.0-2.el9_4.x86_64.rpm 362cdc6b90e3a85c80d35b506df550f44de6060a2deef039fc031199d6abad5d pcp-pmda-lustrecomm-6.2.0-2.el9_4.x86_64.rpm 5528eb056d78b9e3a8b02798fca14483204e8e5f5275e5940ce5ab8b7cd4daeb pcp-pmda-mailq-6.2.0-2.el9_4.x86_64.rpm 9c963674ed5df44982ebd7119832f9bc221c9da2bc2f333ec112c4936820064b pcp-pmda-memcache-6.2.0-2.el9_4.x86_64.rpm 9061cf3540230bb78682c5ea5d12c486e9bbc90d1a68e5a499ab47f016478c03 pcp-pmda-mic-6.2.0-2.el9_4.x86_64.rpm e01a4cfc3e52718b025a8250b2f84e4b4a287b1db6860e82d9aa402ca5633577 pcp-pmda-mongodb-6.2.0-2.el9_4.x86_64.rpm 33d336ad9f5cb40e46458cecf1c4a8856424ebdea944c75fc32c17a7fed841f2 pcp-pmda-mounts-6.2.0-2.el9_4.x86_64.rpm bc59ea1ad3896eecc9a38503cc99fa721d6626dc6a7d59d5e4015175bbdd5e97 pcp-pmda-mssql-6.2.0-2.el9_4.x86_64.rpm c93e85e9a85d0c149bc654a9764018df52de44eb5aba37c5dfbfdfdd319bf362 pcp-pmda-mysql-6.2.0-2.el9_4.x86_64.rpm df215afc73de88407c960e0f32d1dc83d7e3bb016d8782c78d1c9460fbaf2546 pcp-pmda-named-6.2.0-2.el9_4.x86_64.rpm 15c35855f72d4864d239c0e2f26ce217fe1d172058ba5dd6c926e3d89811da36 pcp-pmda-netcheck-6.2.0-2.el9_4.x86_64.rpm 146c1c85fb0628c43797743fa29739a296dcdbfe2771a30d7e003556e489cced pcp-pmda-netfilter-6.2.0-2.el9_4.x86_64.rpm 7e46b539c63eb6f4f6e29e9f9029f40214d443d0664499f4f525f11115223aa2 pcp-pmda-news-6.2.0-2.el9_4.x86_64.rpm 34655b0a8418dddb518cc718149d9a2eaaab8c1842c4dfb9a86d5fdcf11b47b6 pcp-pmda-nfsclient-6.2.0-2.el9_4.x86_64.rpm 30e9d05476c7e2802689a27e346a05c69a9c4b8bd92ecb8be09897020827bf0e pcp-pmda-nginx-6.2.0-2.el9_4.x86_64.rpm 66dc374f119f1b3d3b6250c8c1aadbe76d9da5eb9e5e1db7a0dcc9c32af9c21d pcp-pmda-nvidia-gpu-6.2.0-2.el9_4.x86_64.rpm 84f9b6940413e7e32018b4682446906fb1b4f5f7114080b8f0922b10fef83cea pcp-pmda-openmetrics-6.2.0-2.el9_4.x86_64.rpm 82b5327a67ed0f2facd4f8177bbb8ed77240b912acb66c0f6bd881d7477b6da9 pcp-pmda-openvswitch-6.2.0-2.el9_4.x86_64.rpm b5af9e21efd29380f19597dd9ffada0e3d85386d2d8c6eeab0ce20b043b3d31d pcp-pmda-oracle-6.2.0-2.el9_4.x86_64.rpm 163da278aff79d292cb3be2b4f100cc1c42e2ad02bba65c52b43fb5e736d8ca2 pcp-pmda-pdns-6.2.0-2.el9_4.x86_64.rpm 97d7ba3a820c986a422797da081d068afb38ca920e97ec57be8364fc122b9272 pcp-pmda-perfevent-6.2.0-2.el9_4.x86_64.rpm 345a05dd34abb769512be8e9487dfc598c0b979c7cd8d6949590510fdf717425 pcp-pmda-podman-6.2.0-2.el9_4.x86_64.rpm 2a8e4f48216a18f8eaf2ee86286bc5ee7a91f62deb12a99072fb2559d4693ee9 pcp-pmda-postfix-6.2.0-2.el9_4.x86_64.rpm 06eb437ff1ed26e9ef1a0fe267c37999db95222c3447f92f0b42a71217f56872 pcp-pmda-postgresql-6.2.0-2.el9_4.x86_64.rpm a7b9f59607c84ab77ba2c38b1c2d93e4a64b24449f7382354a82ec6a7b8a1a26 pcp-pmda-rabbitmq-6.2.0-2.el9_4.x86_64.rpm 435afc7a90544b15b474e1936891274384c25894e4fb779231dc0413acba540a pcp-pmda-redis-6.2.0-2.el9_4.x86_64.rpm b1d7556eb5b52691b2d78df1c3d48ce144ae0eb55818425c1bab529bf69d0e5b pcp-pmda-resctrl-6.2.0-2.el9_4.x86_64.rpm c6e5d3cb5155116b2309aab1860f69cd245e52815f30a329066a04ffa77488b2 pcp-pmda-roomtemp-6.2.0-2.el9_4.x86_64.rpm cecdb6729832b5e8827b5cc479d4f5454ca2960d7ffede54e6e572995662d1aa pcp-pmda-rsyslog-6.2.0-2.el9_4.x86_64.rpm 827a977fe13b90d308faed5c8559ceff0cabd0d6e3919ecaf7fe142a4fc1dcc7 pcp-pmda-samba-6.2.0-2.el9_4.x86_64.rpm 01b8fce4627e2022994518b034baf45181db02779e840a71f91069a3c4cf7171 pcp-pmda-sendmail-6.2.0-2.el9_4.x86_64.rpm 58c63cca622097aec0266afb1199f2e1a6851fa75825e4fd1c311964d8dadb3f pcp-pmda-shping-6.2.0-2.el9_4.x86_64.rpm 94f0d05e8be8207d431135b304a82b68fc30f685952d1ce591f9c3c9a16b5da1 pcp-pmda-slurm-6.2.0-2.el9_4.x86_64.rpm b58ebac5e7a16d3a1dfe7eaa91ca1c59dec96643f17be2f1396c4800b40af970 pcp-pmda-smart-6.2.0-2.el9_4.x86_64.rpm 3c7d13b69db15a71ac4f0c60013e536ad780daf25f7477d5cb81ff8e9bbcc0ce pcp-pmda-snmp-6.2.0-2.el9_4.x86_64.rpm d7b519b4fa83f7b54ecad45876dd00a78eaa5415a100b7a1e44741e57bd7cf22 pcp-pmda-sockets-6.2.0-2.el9_4.x86_64.rpm 37bb607a31e569f9d44524293c52b2f1a6450d953f85aad55d47fc81c392d263 pcp-pmda-statsd-6.2.0-2.el9_4.x86_64.rpm 8d6333d419f39aaa91e0e1ed02c06688fdeb0c549c3f17bd923dd1d95f832e13 pcp-pmda-summary-6.2.0-2.el9_4.x86_64.rpm 5809c2dbc7efa7c3f12ae8aa0dbfdd71801686a5d84dc2e14d5f16f63fa2a35c pcp-pmda-systemd-6.2.0-2.el9_4.x86_64.rpm 23a93287a2a034dadad100ed2385ea6b5cc883a1054c91eeea11c5dac9bef83d pcp-pmda-trace-6.2.0-2.el9_4.x86_64.rpm 29b99b7d8ccf3d685adf5d60be0d59f30a770a4de8b7a9be4a24b9a81b267be9 pcp-pmda-unbound-6.2.0-2.el9_4.x86_64.rpm f30d8399f79f58b7aa317088a3f5e5f043801f9d32fbaa1876e882c461241955 pcp-pmda-weblog-6.2.0-2.el9_4.x86_64.rpm f9d1fe3b8d7e08ce5dbd2d4cf319e9995556e4fab3d0a9dcb298f395bd3278f0 pcp-pmda-zimbra-6.2.0-2.el9_4.x86_64.rpm c037ac8044a5f2248ae03ab1193eadfb29a926cc82c253728ebff86894ff4a84 pcp-pmda-zswap-6.2.0-2.el9_4.x86_64.rpm 54570dd9a2e826a1e230d62c08fae583cec4286b2a7e40f94090496595a7be0a pcp-selinux-6.2.0-2.el9_4.x86_64.rpm c31732adc527bfa41b2b8c8cc503cc06ba301d1c7a937d4d139b7600201244f6 pcp-system-tools-6.2.0-2.el9_4.x86_64.rpm 1588c060dc26d8ac252843ac9674d69bc7dc42208d07c1c36c7fe1d43a61aa73 pcp-testsuite-6.2.0-2.el9_4.i686.rpm 30c2a1bc9f682d3fbb25cabdb6dcc7b334ca309f4622a575653506eaa3162405 pcp-testsuite-6.2.0-2.el9_4.x86_64.rpm e85f9f95870c66745fd7420e7fac49ec2ee5ed49924155448c02d9e504983a7b pcp-zeroconf-6.2.0-2.el9_4.x86_64.rpm 56811f9031d1f97b11311bb1ef53f838a4bb67a82424227a1e216bcb1a3c0d2c perl-PCP-LogImport-6.2.0-2.el9_4.x86_64.rpm 6e9074da6b62995a03860a62caae68fd25f5e13d190745e22b2ffa25d7e949c4 perl-PCP-LogSummary-6.2.0-2.el9_4.x86_64.rpm eca0ec18445f7dcdc7561877269563f48f2ed7fc8c837bfc8c17b59baf580289 perl-PCP-MMV-6.2.0-2.el9_4.x86_64.rpm d5c40fef2cef125a86e83a02237ed77a2df7043ae0104f5c06a94a3dc1ac678c perl-PCP-PMDA-6.2.0-2.el9_4.x86_64.rpm 61d98112309495836db49b49858f8ccbdadc8b66e1356bc82fdee492a510257c python3-pcp-6.2.0-2.el9_4.x86_64.rpm eda19fc392dc0739479343a1d5f2333450853bfc54bc8779ddcfaa9b03769798 RLSA-2024:2568 Moderate: grafana security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * grafana: golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394) * grafana: vulnerable to authorization bypass (CVE-2024-1313) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-9.2.10-16.el9_4.x86_64.rpm 0d359286f86415f70e39564acdcce57a59fa2ad6db03659465702aa0fc805c1a grafana-selinux-9.2.10-16.el9_4.x86_64.rpm 30d1d434e0728fc4f454e655eced40aed1c1d72dac8834621eabbdc8756b9468 RLSA-2024:2569 Important: grafana-pcp security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list grafana-pcp is an open source Grafana plugin for PCP. Security Fix(es): * grafana-pcp: golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-pcp-5.1.1-2.el9_3.x86_64.rpm 982033ce0dd9ab3c0fb45cd612c689b67251c3775804652fe5599d01f6bf6fc7 RLSA-2024:2616 Important: tigervnc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tigervnc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080) * xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081) * xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms tigervnc-1.13.1-8.el9_4.3.x86_64.rpm 4a42a6d384b74851f7f97aec4f99a63d5da39d488d01e5901f984fa400b4a690 tigervnc-icons-1.13.1-8.el9_4.3.noarch.rpm 23da0f5abe9fe31adb2483bb5a4ab9ae2a374f49e07f5607f81c8bfe34302d7c tigervnc-license-1.13.1-8.el9_4.3.noarch.rpm c1e45b115039fd364994e37063f9243d99e62464a1b72952d19c668ae8560052 tigervnc-selinux-1.13.1-8.el9_4.3.noarch.rpm c672e105567f8253b2e6cb299a70b1242fa8144820032512cbec8523f636290c tigervnc-server-1.13.1-8.el9_4.3.x86_64.rpm a1e7d1be87d4a7242da86ca36dbe196649a037956c71d0e7ffe286926313de13 tigervnc-server-minimal-1.13.1-8.el9_4.3.x86_64.rpm dbd080f0847c5957a71a682a50cfaed447c296f7e5b27ce76e49c1ae4428ceda tigervnc-server-module-1.13.1-8.el9_4.3.x86_64.rpm 09811f39cb86771a4933d09cb2644a4805e5a478b2a524eabbd3408278dae051 RLSA-2024:2724 Important: git-lfs security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for git-lfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288) * golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect (CVE-2023-45289) * golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290) * golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms git-lfs-3.4.1-2.el9_4.x86_64.rpm 3a6b6243c4e6dd743d7d96c3f0d83de92bf34f437433b5354a183e746a651ca6 RLSA-2024:4573 Important: java-21-openjdk security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for java-21-openjdk. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-21-openjdk packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit. Security Fix(es): * OpenJDK: RangeCheckElimination array index overflow (8323231) (CVE-2024-21147) * OpenJDK: potential UTF8 size overflow (8314794) (CVE-2024-21131) * OpenJDK: Excessive symbol length can lead to infinite loop (8319859) (CVE-2024-21138) * OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) (CVE-2024-21140) * OpenJDK: Out-of-bounds access in 2D image handling (8324559) (CVE-2024-21145) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-21-openjdk-21.0.4.0.7-1.el9.x86_64.rpm 66b9432d2f9a2f6c473bed587f3add78449d89d044c6ba37a86992ca62e3b3fe java-21-openjdk-demo-21.0.4.0.7-1.el9.x86_64.rpm 9c5669552d39622e348e6e4b03445c82d5e5d813493b021eec9adc50611705bb java-21-openjdk-devel-21.0.4.0.7-1.el9.x86_64.rpm 936a0743832a80804bd199f72eef9280bf75894c3c5e20fe798457e04e6ac63b java-21-openjdk-headless-21.0.4.0.7-1.el9.x86_64.rpm c3ee0ae4cbfd152f9a96b1976e8d0dd67212ed16df00220c6577b60ea3754be7 java-21-openjdk-javadoc-21.0.4.0.7-1.el9.x86_64.rpm 741cbd552664ddc1de8c525564e4050b8a770b679d4a0498417867ab4e0441c7 java-21-openjdk-javadoc-zip-21.0.4.0.7-1.el9.x86_64.rpm bfc36ea48faa44e1cd1597b8954b4e326f8b2ec105188f1768579c8edfa7a518 java-21-openjdk-jmods-21.0.4.0.7-1.el9.x86_64.rpm 5baf283f9688cac7c0d2aab0cbc60061b80e078a648320b684bf1a3c03b3386e java-21-openjdk-src-21.0.4.0.7-1.el9.x86_64.rpm e30cb1f543112e5a4bd93e9a637c860c259999cfcba4f38df79d623f32ff2d91 java-21-openjdk-static-libs-21.0.4.0.7-1.el9.x86_64.rpm fe0f8ecc177a3c7eccbff2ef19cb2d13886b4813c9ab5a6e1ee6ba6c33f9a610 RLBA-2024:3983 kernel bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Bug Fix(es): * [DELL 9.4 BUG] - Screen shows garbage sometimes [rhel-9.4.z] (JIRA:Rocky Linux-36534) * cifs - Unable to mount CIFS shares after upgrading to Rocky Linux9.4 (JIRA:Rocky Linux-36743) * [Azure][Rocky Linux-9][MANA]System crash at skbuff when set mtu=100 [rhel-9.4.z] (JIRA:Rocky Linux-37622) * selective backport from perf upstream v6.8 to fix AmpereOne and Nvidia support [rhel-9.4.z] (JIRA:Rocky Linux-34991) * [Intel 9.5 FEAT] [SRF] performance: hwmon: (coretemp) Fix core count limitation [rhel-9.4.z] (JIRA:Rocky Linux-35447) * CNB95: dpll: rebase DPLL to upstream v6.8 [rhel-9.4.z] (JIRA:Rocky Linux-36572) * ice: IRQs being moved to isolated CPUs and causing latency issues [rhel-9.4.z] (JIRA:Rocky Linux-38512) * Bluetooth device disappears from the device list after a few minutes with AX211 [rhel-9.4.z] (JIRA:Rocky Linux-38524) * deadlock on dfs_cache_refresh [rhel-9.4.z] (JIRA:Rocky Linux-38904) * [DELL 9.3 BUG]Unexpected message "integrity: Problem loading X.509 certificate -126" occurred on boot screen. [rhel-9.4.z] (JIRA:Rocky Linux-39933) * [rhel9-rt-debug] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:46 ( clocksource_mark_unstable) (JIRA:Rocky Linux-9296) rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-427.22.1.el9_4.x86_64.rpm 562d1356bf3faf117a453db1fe6db6255b7f4f64afd2c02fa91662d54d5a673c kernel-debug-devel-matched-5.14.0-427.22.1.el9_4.x86_64.rpm dbd7c9ef66797ad95b541007ae747777e691b0b3c021dd0b576aa6d24dc49db0 kernel-devel-5.14.0-427.22.1.el9_4.x86_64.rpm 9345292a92521f55ea3cd69602ad13b5007732f7bc47d67bc08ee141418faabf kernel-devel-matched-5.14.0-427.22.1.el9_4.x86_64.rpm d1d340dd587fae9c90054127b0afcf08d233d861cdb5102c67036b2e5ab3964a kernel-doc-5.14.0-427.22.1.el9_4.noarch.rpm 93d09695a1cd4c79b22a17f403fb5ce71ab5da171f7961e07263bdc51de4d9fd kernel-headers-5.14.0-427.22.1.el9_4.x86_64.rpm a405a8705edd313e9f7fc0a683ba27fb87d0cbeb4715819cea77b8c05a70a667 perf-5.14.0-427.22.1.el9_4.x86_64.rpm c2a01cae57bfb52acb9c9e0fe4784d35b14c55e11939f436b5620476d097837a rtla-5.14.0-427.22.1.el9_4.x86_64.rpm 7dc690453c59a17b45c9dd15b62d8e3c5ee438ec3c3bd1cc61b9fb85d8f67f00 rv-5.14.0-427.22.1.el9_4.x86_64.rpm 25140741233ac7238a86de6a0fd520f7a429eb9f2447bf27048cbffcaa052458 RLBA-2024:3982 selinux-policy bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for selinux-policy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es): * selinux prevents qemu-kvm from read access to max_map_count (JIRA:Rocky Linux-36154) * SELinux prevents the qemu-ga processes from reading the /proc/sys/vm/max_map_count file [rhel-9.4.z] (JIRA:Rocky Linux-36291) rocky-linux-9-x86-64-appstream-rpms selinux-policy-devel-38.1.35-2.el9_4.2.0.2.noarch.rpm 1d4ca026702d6f688abe9a103c258df6cc93acefb9f8901ed3d790b8f371e8f3 RLSA-2024:4078 Important: python3.9 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Path traversal on tempfile.TemporaryDirectory (CVE-2023-6597) * python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-devel-3.9.18-3.el9_4.1.i686.rpm b7207e023f5281b37ef31495a7cd4ec2393452fee0a4e559f6f590f7d06b003e python3-devel-3.9.18-3.el9_4.1.x86_64.rpm 85757372f923972992e4d33984cc792bf3c0b7221c6d118cf0f9bbef58e37bdc python3-tkinter-3.9.18-3.el9_4.1.x86_64.rpm 92d2051e9a06749f8e30a30d157f56c70875d5a650b27c1357aea5b5adeb6e5a python-unversioned-command-3.9.18-3.el9_4.1.noarch.rpm d0d68e30a25029016abe57dd40594b0c3c2c3dfd3ec5d3e1562106e010cad0e8 RLSA-2024:3959 Important: flatpak security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for flatpak. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. Security Fix(es): * flatpak: sandbox escape via RequestBackground portal (CVE-2024-32462) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms flatpak-1.12.9-1.el9_4.x86_64.rpm 7c40cea03f21e8e58e9f86bacb756859fa701ee3c84510a36d2b4235875d6d8d flatpak-libs-1.12.9-1.el9_4.i686.rpm 12d1b51e883c648126e29daf5be0a016efa799c4403bc76d69d84eb872ccab28 flatpak-libs-1.12.9-1.el9_4.x86_64.rpm b46e0dd8a3d8537789b21acaa8517c6076fd4007fd56f0203083c043386dd0cd flatpak-selinux-1.12.9-1.el9_4.noarch.rpm 9a8325519721e0d441ddb9fa187921c455f40a48843d8741ef875099ecb78534 flatpak-session-helper-1.12.9-1.el9_4.x86_64.rpm bf0d1c423bf33e94a74f4e36b2a2eb10c0f1e1e4865aadea118f9e66473d4d17 RLSA-2024:3999 Important: ghostscript security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for ghostscript. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed. Security Fix(es): * ghostscript: OPVP device arbitrary code execution via custom Driver library (CVE-2024-33871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms ghostscript-9.54.0-16.el9_4.x86_64.rpm c01f585bbcd706c15531365f37ac5706882907b14edbc0c4b4f6e30d264cfa80 ghostscript-doc-9.54.0-16.el9_4.noarch.rpm 5bef9a89aacc863d3fd54c34036b3bf65cbe90ddad4df175dbe22a4c964075dd ghostscript-tools-dvipdf-9.54.0-16.el9_4.x86_64.rpm 6d5ebff65814817fc7a92721a84fa9c4f0834014e167cfa38a74078e25ce70a6 ghostscript-tools-fonts-9.54.0-16.el9_4.x86_64.rpm 982bcd046298a8188ab97043126952f58c119d5976f23111741e426874472c98 ghostscript-tools-printing-9.54.0-16.el9_4.x86_64.rpm 8aea6fc1dc98b3255fc8ac38c6ca5a44ac76f4a091c2dc7ebc516d57f688f7b1 ghostscript-x11-9.54.0-16.el9_4.x86_64.rpm d0427782ee5ef04a8ba7b5444cbfe9d57d2de65e18cefb83e1543b1f8848d3ba libgs-9.54.0-16.el9_4.i686.rpm 10feedde37a5bcc2c71957f28ad253fd5f3ae380857e25797a0d12c57ed6924e libgs-9.54.0-16.el9_4.x86_64.rpm 39d8388a0dfa268669aeedd85778b3a819cedbf6baa526fcfb40927a482a7787 RLSA-2024:4077 Important: python3.11 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Path traversal on tempfile.TemporaryDirectory (CVE-2023-6597) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-3.11.7-1.el9_4.1.x86_64.rpm 35d7a4ed0fc81ac91fde36b0b4477167b88a86e573056bc739698319bd498e80 python3.11-devel-3.11.7-1.el9_4.1.i686.rpm de289ef779de08de56ada3c2811b00cf47efb746b03d0026d147e059a7ef02be python3.11-devel-3.11.7-1.el9_4.1.x86_64.rpm 69fcfb46b0682cba395fbbf8bb813c977f052fb8d24b06d9090e8767dfd3b72e python3.11-libs-3.11.7-1.el9_4.1.i686.rpm 6f0b436476914b31a7a09626a47365485a9a578b9ddc2e804e7b00370f0b61bb python3.11-libs-3.11.7-1.el9_4.1.x86_64.rpm 6a5d421c27e10741ad2846a2be3990a52df6bd529a5c821328f474b32b632079 python3.11-tkinter-3.11.7-1.el9_4.1.x86_64.rpm 16e9c0a15669da37e4dd9a2604ceeab1b5afe08a41327ecc2c4639ef3992998e RLSA-2024:3955 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.12.0 ESR. Security Fix(es): * firefox: Use-after-free in networking (CVE-2024-5702) * firefox: Use-after-free in JavaScript object transplant (CVE-2024-5688) * firefox: External protocol handlers leaked by timing attack (CVE-2024-5690) * firefox: Sandboxed iframes were able to bypass sandbox restrictions to open a new window (CVE-2024-5691) * firefox: Cross-Origin Image leak via Offscreen Canvas (CVE-2024-5693) * firefox: Memory Corruption in Text Fragments (CVE-2024-5696) * firefox: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 (CVE-2024-5700) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-115.12.0-1.el9_4.x86_64.rpm 77c6a994ebc295bffbc74507f6ec988ac0de0c4a33ddfc748324ba010ec15b28 firefox-x11-115.12.0-1.el9_4.x86_64.rpm a8c43c47eef4ac712086a473f60ad79bae728ed80c36cb0da6d1179cc156e222 RLBA-2024:3995 qemu-kvm bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qemu-kvm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Bug Fix(es): * Qemu hang when quit dst vm after storage migration(nbd+tls) [rhel-9.4.z] (JIRA:Rocky Linux-33754) rocky-linux-9-x86-64-appstream-rpms qemu-guest-agent-8.2.0-11.el9_4.3.x86_64.rpm f3e1427138e901a2438cc1d8a5fe86b7a2e60f9f558279fc3551c30698625d98 qemu-img-8.2.0-11.el9_4.3.x86_64.rpm 574659b5703549ca670e436691f507690d367a1d6ba7300c9d1139ef6a7e0c24 qemu-kvm-8.2.0-11.el9_4.3.x86_64.rpm 25d652cb962064a75caec50b6bd7943b487bf9d9682226130605f8fae071c798 qemu-kvm-audio-pa-8.2.0-11.el9_4.3.x86_64.rpm 548400b68b945ef24950e2a2151261444559bb33b0c75c18dc0d2e76a137bec3 qemu-kvm-block-blkio-8.2.0-11.el9_4.3.x86_64.rpm 8b37357b84326b7f2a4122ce0228e832146ecfa647d8b4b4528f1334020c48d4 qemu-kvm-block-curl-8.2.0-11.el9_4.3.x86_64.rpm fcbf3dfc42f4662e79ab9410a420b22082cff61bc2911ab5cf6bb653ac1afd2a qemu-kvm-block-rbd-8.2.0-11.el9_4.3.x86_64.rpm 18ce5159794a71be72df674e5258f4a8248355721430e9fb85aded7f765d9a84 qemu-kvm-common-8.2.0-11.el9_4.3.x86_64.rpm 273f3aae18909a4bb218873bc7242b168d1bc99c02d341c2474478f325cf937a qemu-kvm-core-8.2.0-11.el9_4.3.x86_64.rpm e0dfa62a33b6827b475d8db55686ded62fbda9cae0ff8639f2e600f508c15a59 qemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4.3.x86_64.rpm 00c8684cff40ffb13b6a6d1a419c2b6508303ed94493429468a2b57f0bcab3eb qemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4.3.x86_64.rpm 109ab37db277be985973d1bff8b77ee7ce26bfe304b3911bc94bda7f282eaa6a qemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4.3.x86_64.rpm a4da8060fbbd9391cb58048ce55f3a0383956696c037b55dadb1850228556f4c qemu-kvm-device-usb-host-8.2.0-11.el9_4.3.x86_64.rpm 0ea1d9192585d4e7502b87b45cf0478656cef5c939d1aee643af3a086d6ed568 qemu-kvm-device-usb-redirect-8.2.0-11.el9_4.3.x86_64.rpm a42079150bb5e31bea464866fdf9c5801d7ae4b68478ad25fc90b49a655a3f50 qemu-kvm-docs-8.2.0-11.el9_4.3.x86_64.rpm 2a2efaf8eb5021bfa0809f46b28646e6c4ff767958f01f541af0384588cc4681 qemu-kvm-tools-8.2.0-11.el9_4.3.x86_64.rpm 14358e878579d712911772b85da130b076606ba6a009930d29421d9e956a0073 qemu-kvm-ui-egl-headless-8.2.0-11.el9_4.3.x86_64.rpm 01fd1283acca94b7b2c316bbdf85b0da446a579d534c5d65e6c942eab78c5efc qemu-kvm-ui-opengl-8.2.0-11.el9_4.3.x86_64.rpm 1e965ef647a593cf2182f787fdc7a94cb9b5a518ecc282f24a7c20178feeb8f9 qemu-pr-helper-8.2.0-11.el9_4.3.x86_64.rpm 69b58a2f7cbb5654f95a06e6c6f10de31504713bbb99fde282b021f5163a5995 RLSA-2024:4002 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.12.1. Security Fix(es): * thunderbird: Use-after-free in networking (CVE-2024-5702) * thunderbird: Use-after-free in JavaScript object transplant (CVE-2024-5688) * thunderbird: External protocol handlers leaked by timing attack (CVE-2024-5690) * thunderbird: Sandboxed iframes were able to bypass sandbox restrictions to open a new window (CVE-2024-5691) * thunderbird: Cross-Origin Image leak via Offscreen Canvas (CVE-2024-5693) * thunderbird: Memory Corruption in Text Fragments (CVE-2024-5696) * thunderbird: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 (CVE-2024-5700) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-115.12.1-1.el9_4.x86_64.rpm 0c802f52d3fde28dd34b1c51d8fcb2d61e9c89b4034c7bbe38cfcd3e4989e3f9 RLSA-2024:4050 Moderate: libreswan security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libreswan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libreswan is an implementation of IPsec and IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks such as virtual private network (VPN). Security Fix(es): * libreswan: IKEv1 default AH/ESP responder can crash and restart (CVE-2024-3652) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libreswan-4.12-2.el9_4.1.x86_64.rpm dabae4f644e4b16947be9d2476a851bffafb9dc57221825aa97ab8b8df2f3a2d RLSA-2024:3619 Moderate: kernel security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735) * kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() (CVE-2024-26993) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-427.20.1.el9_4.x86_64.rpm 628af278ae6ba45e16a38d2e7afa1333eba3ae86ed54d81d054fd42d152c3acf kernel-debug-devel-matched-5.14.0-427.20.1.el9_4.x86_64.rpm 059e2f8de6c421fc96c2c6725a0b9f033de07036fb9cd5ebdcaf8eddc2a1fcd0 kernel-devel-5.14.0-427.20.1.el9_4.x86_64.rpm d0b6c8a572195063442b48af90a3301a6e3ae6c3a54036199c38c53d643ee251 kernel-devel-matched-5.14.0-427.20.1.el9_4.x86_64.rpm 23120b0e425a57351cc60b66c97e06d8657b5ea013e00f8cefaef61630c8a783 kernel-doc-5.14.0-427.20.1.el9_4.noarch.rpm d99616b2822ff0b4626083b178efe574cc9d92e89e18ff6c7d455da5470577a0 kernel-headers-5.14.0-427.20.1.el9_4.x86_64.rpm 8901960c1df3b20fa6c83d7c1a679ce2a7d1c9e5a1b7ef332657d20341bfb350 perf-5.14.0-427.20.1.el9_4.x86_64.rpm 6ad18582e54fa4ac74abf9e3a7113580d49e81e08c56af604942f27af19af64f rtla-5.14.0-427.20.1.el9_4.x86_64.rpm 7cf8d34dee4145bfe90a2bd01e43afea9d8fcdc3770293ea1b604152fe4a1ea4 rv-5.14.0-427.20.1.el9_4.x86_64.rpm 3e7ec6fefc32ab0e7ec3116d1162ca0a971cefa7ee91cc981b6dfc666121b348 RLSA-2024:3339 Important: glibc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for glibc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Out of bounds write in iconv conversion to ISO-2022-CN-EXT (CVE-2024-2961) * glibc: stack-based buffer overflow in netgroup cache (CVE-2024-33599) * glibc: null pointer dereferences after failed netgroup cache insertion (CVE-2024-33600) * glibc: netgroup cache may terminate daemon on memory allocation failure (CVE-2024-33601) * glibc: netgroup cache assumes NSS callback uses in-buffer strings (CVE-2024-33602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms glibc-devel-2.34-100.el9_4.2.i686.rpm 409dc1fc84309846212381084afe162c9a9c06c45a920a877112b605724d57a1 glibc-devel-2.34-100.el9_4.2.x86_64.rpm 4cb2e4d2d97619e5a651fe4e5af4e79c405c72b4183ec218e4a9fa2c73713fc4 glibc-doc-2.34-100.el9_4.2.noarch.rpm fcc55cfb3aba7f9cf7e49f55eaaa357883cf9d18d38c6411e33a2298e0675fd1 glibc-headers-2.34-100.el9_4.2.x86_64.rpm 492cb1100131cfc054bdbac8706138f9965775ebd032983c56b1254ccc3b3286 glibc-locale-source-2.34-100.el9_4.2.x86_64.rpm 569a1cec8cdc2ae5ef9a736b27336fe299eb378195e77e2f3d57b44b5b357c6c glibc-utils-2.34-100.el9_4.2.x86_64.rpm 6b74fb6b0cb7960573912c5adff83f7befa0d058d62f10eee09baeec5be285fa RLSA-2024:4083 Important: git security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for git. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Security Fix(es): * git: Recursive clones RCE (CVE-2024-32002) * git: RCE while cloning local repos (CVE-2024-32004) * git: additional local RCE (CVE-2024-32465) * git: insecure hardlinks (CVE-2024-32020) * git: symlink bypass (CVE-2024-32021) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms git-2.43.5-1.el9_4.x86_64.rpm 8ef59585e996f4957a89eabfb96e9ff7daf2e00293b85d5ec8a358c1083b9a59 git-all-2.43.5-1.el9_4.noarch.rpm 25b84903a2b7def490442e114a2ba1e252d4e4c95e303ad03546bf9d18345a94 git-core-2.43.5-1.el9_4.x86_64.rpm c516549022dae9d79803ef0c947d23bf3d95e3cd590d98de5a6e983daa4937db git-core-doc-2.43.5-1.el9_4.noarch.rpm 47ed10ce165c4988912d2a942b94b3b1a2befd965844c71b2e535c8bee1a9757 git-credential-libsecret-2.43.5-1.el9_4.x86_64.rpm 75689a49a3b63d70caceff22b12fff8b67f78fed7ec5a332f7f2402c87fbde14 git-daemon-2.43.5-1.el9_4.x86_64.rpm ba78c0ba8193726fc2a88267465fc4f58940cb7cd485bebc530f9b43a468a1d1 git-email-2.43.5-1.el9_4.noarch.rpm 2b6e20268b81eb0a5b27593c8d9a844b73090fb1ef0e5704b5fbc5a3ae7c3c28 git-gui-2.43.5-1.el9_4.noarch.rpm 28f7cea34e8a6cefd3ffa8b99874aaf102ee3eac2965f1499a5f68804f551eca git-instaweb-2.43.5-1.el9_4.noarch.rpm 23ce06e42b207d2c5df787ca81cff85f8edf0ab82dfe2cb3e03c78e0834bd132 gitk-2.43.5-1.el9_4.noarch.rpm 77e5c18ea84f4c54a5d0b6b45b465c5956a67f9849ded0a22fa811d8472f857e git-subtree-2.43.5-1.el9_4.x86_64.rpm 799b9497641fde6977e58045fd3530785e68af83879a01ec19ad67d1e49557f9 git-svn-2.43.5-1.el9_4.noarch.rpm a80098af57e692d63058ef33b891732b3ec087b091e36dcc5aa0c5e4ed8c0715 gitweb-2.43.5-1.el9_4.noarch.rpm 0112ebde98f4b70cd1a6d39fb1098d69c2cb93231f92334d1a18c192d96f6e6f perl-Git-2.43.5-1.el9_4.noarch.rpm e0476211bb7e534dcfafc4a6f7efb6537d28fff2c7f31719be75e2be17bfe83c perl-Git-SVN-2.43.5-1.el9_4.noarch.rpm 74af8bc2f2fa67bcf371ea3c05b4c0aeec5b05fff65dc343430b535cd4f40bda RLBA-2024:2841 .NET 6.0 bugfix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dotnet6.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Bug Fix(es) and Enhancement(s): * Update .NET 6.0 to SDK 6.0.130 and Runtime 6.0.30 [rhel-9.4.z] (Rocky Linux-35310) rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-6.0-6.0.30-1.el9_4.x86_64.rpm 9d263debe3ae2bf3dd3ff392ba3b413692a5d56d625cc50d94e8ef3067b728f2 aspnetcore-targeting-pack-6.0-6.0.30-1.el9_4.x86_64.rpm aae18477209542abc73de671d7e4b08440f0e764d3f387f71866891d91bec70b dotnet-apphost-pack-6.0-6.0.30-1.el9_4.x86_64.rpm 198b644f7cbb0ecfe948ecc287edcf7aef28781d99687f9c9f255ce61655121c dotnet-hostfxr-6.0-6.0.30-1.el9_4.x86_64.rpm 123786137ee02939c449cd590da9683c4c0afa782a34687ce4ded60d204395bc dotnet-runtime-6.0-6.0.30-1.el9_4.x86_64.rpm 91aa61241dbebc4f8dcc597aa18c68c20ef18a8326af8562db198373a08ad98a dotnet-sdk-6.0-6.0.130-1.el9_4.x86_64.rpm a645cfcd850689b62ef831a9145ae6439953dba25be870c790e5f49b58aa9574 dotnet-targeting-pack-6.0-6.0.30-1.el9_4.x86_64.rpm 4282be3d6b4f38385148926cd42930c158cf653153c17dd7dd143d6938667754 dotnet-templates-6.0-6.0.130-1.el9_4.x86_64.rpm 6838d7377587875f0b58f8da4f51ce900142c5514bc144d50866a2317177abb2 RLSA-2024:2842 Important: .NET 8.0 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.105 and .NET Runtime 8.0.5. Security Fix(es): * dotnet: stack buffer overrun in Double Parse (CVE-2024-30045) * dotnet: denial of service in ASP.NET Core due to deadlock in Http2OutputProducer.Stop() (CVE-2024-30046) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-8.0-8.0.5-1.el9_4.x86_64.rpm 0b4cbcef947f1c549f610ba00a84c6b699be7fd4d42c5e96571013328e2ce34d aspnetcore-runtime-dbg-8.0-8.0.5-1.el9_4.x86_64.rpm 61adab599088b9981715014cb5ecf842a00116ddfaf3b1b600a68c16ce749384 aspnetcore-targeting-pack-8.0-8.0.5-1.el9_4.x86_64.rpm 02ca27a2b4c83af45bca015b67c813b64cec78feca1af9234e2dea32cc1287c0 dotnet-apphost-pack-8.0-8.0.5-1.el9_4.x86_64.rpm eb9ddafed26d23e64fed6758857685c6f3cb1c31490a74854ecbfd1fa79b6902 dotnet-host-8.0.5-1.el9_4.x86_64.rpm d91e77d16eb31b7522b7e91119783b7acbfc479597fab39739d1cf24a22a6f45 dotnet-hostfxr-8.0-8.0.5-1.el9_4.x86_64.rpm 58ca03d985a3dfab567e687967dca51276074d61355b0f3ed5bbcde5944b9944 dotnet-runtime-8.0-8.0.5-1.el9_4.x86_64.rpm abccd9482ab83340860cfef73462e8a255c00289e09b6200e4afdb64eab8ff8f dotnet-runtime-dbg-8.0-8.0.5-1.el9_4.x86_64.rpm 938318430146ef5ab9f8181c994ecae3cf6a1f0a0eabeffe71896217ab906aad dotnet-sdk-8.0-8.0.105-1.el9_4.x86_64.rpm 4cdc64099d465e5970fe8e8a1e94a45def7dac1be1e3c1e8f2c96b9b24d5a0bb dotnet-sdk-dbg-8.0-8.0.105-1.el9_4.x86_64.rpm 20a43f38dc30d1006539862366bf41a8156439ca961a16bc22f3d5aa93d3cd72 dotnet-targeting-pack-8.0-8.0.5-1.el9_4.x86_64.rpm e5506fd2ed51f1913eb135e06b7b9fd42560937f46cb95f3a9a2119c28701c31 dotnet-templates-8.0-8.0.105-1.el9_4.x86_64.rpm 0c6f122e952b116c84cddf8826319317a1632a2ce629196bd1703e0eb099ea07 netstandard-targeting-pack-2.1-8.0.105-1.el9_4.x86_64.rpm c3a8f14afbb7d230b904571b5eb067ec8b40d9a8421d76d90daa4b42eceb3518 RLSA-2024:4349 Moderate: kernel security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context (CVE-2023-52626) * kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset (CVE-2024-26801) * kernel: crypto: qat - resolve race condition during AER recovery (CVE-2024-26974) * kernel: xen-netfront: Add missing skb_mark_for_recycle (CVE-2024-27393) * kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups (CVE-2023-52667) * kernel: smb: client: fix UAF in smb2_reconnect_server() (CVE-2024-35870) * kernel: net/mlx5: Properly link new fs rules into the tree (CVE-2024-35960) * kernel: net: hns3: do not allow call hns3_nic_net_open repeatedly (CVE-2021-47400) Bug Fix(es): * cifs - kernel panic with cifs_put_smb_ses (JIRA:Rocky Linux-28943) * BUG: unable to handle page fault for address: ff16bf752f593ff8 [rhel-9.4.z] (JIRA:Rocky Linux-35672) * [HPE 9.4 Bug] Request merge of AMD address translation library patch series [rhel-9.4.z] (JIRA:Rocky Linux-36220) * [Rocky Linux9] kernel BUG at lib/list_debug.c:51! [rhel-9.4.z] (JIRA:Rocky Linux-36687) * ice: DPLL-related fixes [rhel-9.4.z] (JIRA:Rocky Linux-36716) * CNB95: net/sched: update TC core to upstream v6.8 [rhel-9.4.z] (JIRA:Rocky Linux-37641) * IPv6: SR: backport fixes from upstream [rhel-9.4.z] (JIRA:Rocky Linux-37669) * [RFE] Backport tmpfs noswap mount option [rhel-9.4.z] (JIRA:Rocky Linux-38252) * Isolated cores causing issues on latest Rocky Linux9.4 kernel and not functioning as desired. [rhel-9.4.z] (JIRA:Rocky Linux-38595) * [ice] Add automatic VF reset on Tx MDD events [rhel-9.4.z] (JIRA:Rocky Linux-39083) * [HPEMC Rocky Linux 9.4 REGRESSION] turbostat: turbostat broken on 10+ sockets. [rhel-9.4.z] (JIRA:Rocky Linux-34953) * bnx2x: fix crashes in PCI error handling, resource leaks [rhel-9.4.z] (JIRA:Rocky Linux-43272) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-427.24.1.el9_4.x86_64.rpm 371fb70f025426aafc1cdcbdfd4de445759f551953c120fb608f857409a51888 kernel-debug-devel-matched-5.14.0-427.24.1.el9_4.x86_64.rpm 43c9137ffa262abd334951055634097fb1d5fc5f38c6195e9d2d54b8274e8252 kernel-devel-5.14.0-427.24.1.el9_4.x86_64.rpm 14df6ff6b3f64e35bf5445e978336da7130bb70ddb079a340612ce2d0d06fa27 kernel-devel-matched-5.14.0-427.24.1.el9_4.x86_64.rpm 039d49474496f66713bc4b27256d55abe392be490e8b8cace882fe1fd288688b kernel-doc-5.14.0-427.24.1.el9_4.noarch.rpm 0901534d845a71bcca65242bf95fd4fb1922842dc91572ab43a0af9b458e2129 kernel-headers-5.14.0-427.24.1.el9_4.x86_64.rpm 4bcfafdbc77b698a74ce5501866c6f15990821120e28a1b86a5d709eb8ab26d3 perf-5.14.0-427.24.1.el9_4.x86_64.rpm 79a14e6efe5e121e99a300e25942692a889dcfebc5e826acf529084cb275cbac rtla-5.14.0-427.24.1.el9_4.x86_64.rpm 37777de8f9781b21ca8be83c1f8c7828d7b481ae7bcddb5a563070316289f1ac rv-5.14.0-427.24.1.el9_4.x86_64.rpm 2dfd6fd87b35efde85d95af3fa33c7483f6fcdb687e709b2c9503ead3b698723 RLSA-2024:3754 Important: ipa security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for ipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * freeipa: delegation rules allow a proxy service to impersonate any user to access another target service (CVE-2024-2698) * freeipa: user can obtain a hash of the passwords of all domain users and perform offline brute force (CVE-2024-3183) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms ipa-client-4.11.0-15.el9_4.x86_64.rpm 88ccaf2b6ba2c05b67c7afdce2b4dc4e5258363dee817d955c91434229c65665 ipa-client-common-4.11.0-15.el9_4.noarch.rpm c88d3f06a90408afbb5e9e3eb91c1557259b57006e4cb71614813a9320abdcc4 ipa-client-epn-4.11.0-15.el9_4.x86_64.rpm 8e1bacc213c0ed5b2c86613d9c17cd0ac6af5e0b5c06b7a13d99df654420eb5f ipa-client-samba-4.11.0-15.el9_4.x86_64.rpm 362ce0c986fedc969c04ebc7f55725b570e92192f196926807bfc716aa7301f6 ipa-common-4.11.0-15.el9_4.noarch.rpm da96d24e6a713a7771f04f8d22d2ab89f63f5c5bfd5a8a414c6a04dad1d6aaf4 ipa-selinux-4.11.0-15.el9_4.noarch.rpm ad28ef184a62cb1060d588a7ede08d45f79aefb0f7e4d4991780c12724214d1f ipa-server-4.11.0-15.el9_4.x86_64.rpm d5b0930e6d6b3d672f6486ce6a41045d7247b59ddf4bf4656bacfa9f51a69e81 ipa-server-common-4.11.0-15.el9_4.noarch.rpm 30ff94b5ed3e5cd07263da992a4930edae271f767571ab1da275cc940b3f1759 ipa-server-dns-4.11.0-15.el9_4.noarch.rpm a8e89a0540046c71954aa4cb5509c6b9cca7f0b5d5a71cea9b65b10ee0763913 ipa-server-trust-ad-4.11.0-15.el9_4.x86_64.rpm ad60d1590d07822c52e12545a6ad56d8b05e80d003e830e521d4b43a9041edb8 python3-ipaclient-4.11.0-15.el9_4.noarch.rpm 927f631377585e090059faa9925728c52d5c88bae3d8c30ad6fbef062bf0d52b python3-ipalib-4.11.0-15.el9_4.noarch.rpm 8b0578eea34d0828f2fc862cd42e15662059b312fceced5f2ad9a7737a30012f python3-ipaserver-4.11.0-15.el9_4.noarch.rpm 3817250edf5fd5e1c7d1d62e87b0d26061159d5ce7e8f2873b25a80128724bc4 RLBA-2024:3832 libvirt bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. Bug Fix(es): * live-migration with NBD TLS fails with "Certificate does not match the hostname " [rhel-9.4.z] (JIRA:Rocky Linux-33781) rocky-linux-9-x86-64-appstream-rpms libvirt-daemon-10.0.0-6.3.el9_4.x86_64.rpm a80767047cd5a12b5e8ed1d68548a7aca133878f52fa377bab52b79f51ec1881 libvirt-10.0.0-6.3.el9_4.x86_64.rpm e02fba627778caa7f66a2ab0c4f4c1a30b3b83efec669feece99b8742a33ac61 libvirt-client-10.0.0-6.3.el9_4.x86_64.rpm 0f75c5ea5c588cf4b43960ea76bfc8e3cca29cec85f08c2d60d30591dbbb255c libvirt-client-qemu-10.0.0-6.3.el9_4.x86_64.rpm 42a30627839702958f0efe309223e6ea47c6f0e2eee66d115be2fb61e81e747f libvirt-daemon-common-10.0.0-6.3.el9_4.x86_64.rpm cfb0156fcf13daa439d57caf3189695ba609496cf5dca32d9e3330aaf55a6bf2 libvirt-daemon-config-network-10.0.0-6.3.el9_4.x86_64.rpm 97c835e1fda1b0abdc31a1527f0bd02dc0ee4f1ec6f4c5369e19b106ef238319 libvirt-daemon-config-nwfilter-10.0.0-6.3.el9_4.x86_64.rpm 965d40f59838ed2d7cb37a80bdb5523dd6dddd29bb40f1be28b307612413ab96 libvirt-daemon-driver-interface-10.0.0-6.3.el9_4.x86_64.rpm cce747693af00605ff319c382e20c1d1e8f1dfb0b48b840ed80c55f036405d00 libvirt-daemon-driver-network-10.0.0-6.3.el9_4.x86_64.rpm c1ea16bda8f6533fc85f9522d19febdbf8e3527c74b47e988b7a4f1cdc086300 libvirt-daemon-driver-nodedev-10.0.0-6.3.el9_4.x86_64.rpm 7e01922b7d41c655d48498d7dd0592baa1f3a6a0ad3a3ec88d54685c9c046eed libvirt-daemon-driver-nwfilter-10.0.0-6.3.el9_4.x86_64.rpm fa5d99a6cdfc62b735aaa983e5364e5ccebb801599d80d2d2663fb1330556b9e libvirt-daemon-driver-qemu-10.0.0-6.3.el9_4.x86_64.rpm c8b5b97938e83484c064ae3d309be160e220da3bc179acfab314f587c277c5db libvirt-daemon-driver-secret-10.0.0-6.3.el9_4.x86_64.rpm 1ae55f0c6dfc0840d2dffa1d88bb0de0837e777c2814660d0526aa3a95282788 libvirt-daemon-driver-storage-10.0.0-6.3.el9_4.x86_64.rpm 5dd40bae105f0dbaab5482b6353b5161905077fda909ca9fb5a4816b59787762 libvirt-daemon-driver-storage-core-10.0.0-6.3.el9_4.x86_64.rpm 3ca81560da7a53dea27392133f26dcb780d16e33240be430b424a4a7baeddf8d libvirt-daemon-driver-storage-disk-10.0.0-6.3.el9_4.x86_64.rpm b9ea42b938447b2cbb5b53dedf857d5f5fa28434649e2c09774b7f57eba125e4 libvirt-daemon-driver-storage-iscsi-10.0.0-6.3.el9_4.x86_64.rpm fb69db0f68b6263e6c910b55dbdcfaa9356d24822949a623b4241d3cdece890e libvirt-daemon-driver-storage-logical-10.0.0-6.3.el9_4.x86_64.rpm cf744fc627fd8a29d7e39e810bc32f03b3b3157e911d34beaaa12779f2fc294e libvirt-daemon-driver-storage-mpath-10.0.0-6.3.el9_4.x86_64.rpm 98963c910f4e797d1e8f20b77f7129fefa881de51ff0c723229c798532d98bd4 libvirt-daemon-driver-storage-rbd-10.0.0-6.3.el9_4.x86_64.rpm db5adf2e9286b828ffbb6b9399b00dca10cace8eb4d4940397577b28d9bfb330 libvirt-daemon-driver-storage-scsi-10.0.0-6.3.el9_4.x86_64.rpm df44a279eb8dc5c37d4717bdfcde6c23c59d56971014e07c99fb1e78e901609f libvirt-daemon-kvm-10.0.0-6.3.el9_4.x86_64.rpm f7a5a81f6667b2603765d63921a49d0a8952e5715bfe53a680fc592d4875519e libvirt-daemon-lock-10.0.0-6.3.el9_4.x86_64.rpm d45e38c335859f9ba7985fe177915ebd5f0608621852317b70713c43aca0eed4 libvirt-daemon-log-10.0.0-6.3.el9_4.x86_64.rpm 28f34157c563d6477b15b6f644e450dca0c7ada145384ad1c47eb54b7565a544 libvirt-daemon-plugin-lockd-10.0.0-6.3.el9_4.x86_64.rpm 1cf083a2206e96ddd6b043286f179d35aa2eb2e64018394ada1fb9e587ede3e1 libvirt-daemon-proxy-10.0.0-6.3.el9_4.x86_64.rpm 52c86057ae80883ee565e03c9216aa9d5a31b67f942a36f492a1b4a3f8690284 libvirt-libs-10.0.0-6.3.el9_4.x86_64.rpm f7fea0921b28774543d6e90422b6fce2c90da05ff7b0efb9deaa1b6afebb8a6c libvirt-nss-10.0.0-6.3.el9_4.x86_64.rpm 9407c56164734c15989fcd434bac81889e3663591a3700063a942bfdc330b7e4 RLSA-2024:3835 Important: libreoffice security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libreoffice. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Security Fix(es): * libreoffice: Improper Input Validation leading to arbitrary gstreamer plugin execution (CVE-2023-6185) * libreoffice: Insufficient macro permission validation leading to macro execution (CVE-2023-6186) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms autocorr-af-7.1.8.1-12.el9_3.noarch.rpm 94f9e0cec1ca72b10c43eb82d1af4837b130fc021da99b9f7b36396ee5cc6737 autocorr-bg-7.1.8.1-12.el9_3.noarch.rpm 163473b51ddacf49f74c8d3a10844c6f1935a7208bf7213a063d51eb29e7b7ce autocorr-ca-7.1.8.1-12.el9_3.noarch.rpm 1e429515d27b8d46eb596ec4aeb76b14cb9d9ed69bcd522dc99a1d691b9773ea autocorr-cs-7.1.8.1-12.el9_3.noarch.rpm ee2c26138e4aff2d4e22320662358aef8f18141e448b02bfea037934ac8000be autocorr-da-7.1.8.1-12.el9_3.noarch.rpm e5dfe29a7d49480cf5e006d92ed746e371a316386d2fe772e3351add58e62d49 autocorr-de-7.1.8.1-12.el9_3.noarch.rpm 63879cc815317120fb2b2ee18b9582ff7377e9fb8f9edc82992bfea659713457 autocorr-dsb-7.1.8.1-12.el9_3.noarch.rpm 07ae9dc7a65596247be3c0258e58731af97dd58f641b505b3bb88f3ae5ba4c55 autocorr-el-7.1.8.1-12.el9_3.noarch.rpm fa052c2d2a1e94fd93797391e10af4070df4473f67b2866a79c38593a7048382 autocorr-en-7.1.8.1-12.el9_3.noarch.rpm 5d2e94fa2ca22e2cb2807c950cd382078e3193c9e255d459db9f1441a1d0a997 autocorr-es-7.1.8.1-12.el9_3.noarch.rpm 75e9fb422a3c9b75c557e21e945fe63918c68fcc0573e07951d541cd63ed72fe autocorr-fa-7.1.8.1-12.el9_3.noarch.rpm ab6bbda545082668e8d2449e0756f47bcbad4c0e26774b46410bb8a047a8bce5 autocorr-fi-7.1.8.1-12.el9_3.noarch.rpm 179ef035afd5c31018182cc14e54aa3bf448e97e98c860df42b6771ea5e7132f autocorr-fr-7.1.8.1-12.el9_3.noarch.rpm 9b634da3e4d85f5365c2eea269ce4394662106d07e472a4bced0a228005e517c autocorr-ga-7.1.8.1-12.el9_3.noarch.rpm fc7ea47f839548859e263bc058de75468c1a4dac235126ad41cb4a7d16376404 autocorr-hr-7.1.8.1-12.el9_3.noarch.rpm 9441f63d543f25369b997f5938320934fd6b74d7219b7004806d5184e2cc697c autocorr-hsb-7.1.8.1-12.el9_3.noarch.rpm 2862bf84cf2736fa47d66e87b75908b865839c267974ec7ac7fc2ab4d7a6876d autocorr-hu-7.1.8.1-12.el9_3.noarch.rpm cebc4ea46ab7f0422650351eef867e1a7be14f170e02f0c3ad8595c34cbafb83 autocorr-is-7.1.8.1-12.el9_3.noarch.rpm ea6ca12f4f181c1078541ba845df7ffd029a29e32b82d71da1c9ddc5eba8c357 autocorr-it-7.1.8.1-12.el9_3.noarch.rpm 8eb4d3a03de2c875d0e1c6464f86c5b47df1d3366ad583e2d109db291ed4450b autocorr-ja-7.1.8.1-12.el9_3.noarch.rpm 3db455447147fee98eca56d66363681636a86c3b9bfd2d1efcfebb7732076493 autocorr-ko-7.1.8.1-12.el9_3.noarch.rpm 62e98583ce9989dd4a1b628435967d3bf2e08ce74da8528a4e478ff6e8252363 autocorr-lb-7.1.8.1-12.el9_3.noarch.rpm a6926333c7260c78897e16ea68178be972934edd56119b3accbc4a9dac4c10c1 autocorr-lt-7.1.8.1-12.el9_3.noarch.rpm cf2490838ac74c029f6593f2091a69386ffeb2b0f5cb00cc05fa58d479ea5ee5 autocorr-mn-7.1.8.1-12.el9_3.noarch.rpm ac038ce405f49a480063278e7d51177f80ea3f6f8dd0b5fb5b71e3443bbc3861 autocorr-nl-7.1.8.1-12.el9_3.noarch.rpm 9bca7076a93dab9bb04dc7104d62db051c12825410560fc0193696e0a794df2b autocorr-pl-7.1.8.1-12.el9_3.noarch.rpm 91949f53be01649a10da5edd1e6c6bc29e5be3428bfa4b469394a864703d0b35 autocorr-pt-7.1.8.1-12.el9_3.noarch.rpm 467ac8d3ca423822bcdc55e28d169ea793f03fcdba50658bbeb338239bb85586 autocorr-ro-7.1.8.1-12.el9_3.noarch.rpm b87668096fbd218eedbb2d26c53bdb9fd1d6b9566be4c5531abe3f2a1475fc38 autocorr-ru-7.1.8.1-12.el9_3.noarch.rpm 66550e8a9199fce27690366f02b74d5ffa2aa236243fa37f27a1566809f7e4fd autocorr-sk-7.1.8.1-12.el9_3.noarch.rpm 4d538b1042dfa4bc00bdccf5b6ed2a87e10f2b0b56f6852857694423eaad05d2 autocorr-sl-7.1.8.1-12.el9_3.noarch.rpm 55bac6609cf887fa267d78faccb246866f1acece95cdcb1555375d9597e0a882 autocorr-sr-7.1.8.1-12.el9_3.noarch.rpm e8edbffc4846a665ffb712cd54cc40bbc910d7dd2bf6bdd86faa6a2267aa91d7 autocorr-sv-7.1.8.1-12.el9_3.noarch.rpm ca46f34bf7c72853f872c58b5a59223696a7f1d163d998312c4b02c8a9b7b331 autocorr-tr-7.1.8.1-12.el9_3.noarch.rpm fc6aef7b93e2989b2203e03f85683bf017319b6b74621fc7b60c364d6a048227 autocorr-vi-7.1.8.1-12.el9_3.noarch.rpm 937080443daf130c539edc539f893d5fde560c1990dcfe03e389543816ea4489 autocorr-vro-7.1.8.1-12.el9_3.noarch.rpm 3c99bf5f39068b22c47ac5467bca4b015fe9b04f285e7a13b9b59f14e147f034 autocorr-zh-7.1.8.1-12.el9_3.noarch.rpm 9e26ba640dfdd78a84a73d5b819d30918293c9ae9f3cc027d7f0eab986edc726 libreoffice-7.1.8.1-12.el9_3.x86_64.rpm 3b007614e5eaa178ae3b2fb7b4e5d52affdcc8ce7b32334af031b4541372c451 libreoffice-base-7.1.8.1-12.el9_3.x86_64.rpm 7a2e37f8b579edf2a0cc268a881d9f3db1e1bab92b2961980529c857f1dc2b4c libreoffice-calc-7.1.8.1-12.el9_3.x86_64.rpm c1a39798dc0e7b7e20854fbff8ccdae8f8c05524f7235678764b29bbef28d314 libreoffice-core-7.1.8.1-12.el9_3.x86_64.rpm defe4837af0860a50f550d583b1baae14a54c40372d80c7edfb2901cbbcb0850 libreoffice-data-7.1.8.1-12.el9_3.noarch.rpm b10822865895307fdf368a8e8155f397a581b0d0ac77d52f25d34d5418d4ced4 libreoffice-draw-7.1.8.1-12.el9_3.x86_64.rpm 6d480226de9426ea7e0a145c03d06b19d5b2c557ebb836d9512f0b00b2c7ef53 libreoffice-emailmerge-7.1.8.1-12.el9_3.x86_64.rpm 67e4b5a25152e114e114b9c5d4bb8f959d1c15582c881a3df01f1e2444e74bd7 libreoffice-filters-7.1.8.1-12.el9_3.x86_64.rpm 872d04fbb4a5291a7e84a15912239f1c0d29f428433e7d6dac741de827d7e42b libreoffice-gdb-debug-support-7.1.8.1-12.el9_3.x86_64.rpm a0f2ab7cf11da3d14c26cd17196c363e8a5251dca195eb15c8e44467e0516dfb libreoffice-graphicfilter-7.1.8.1-12.el9_3.x86_64.rpm b719c941297184f1d4b53ac750fba44d09265c4385b21081fd3b0863aeb51805 libreoffice-gtk3-7.1.8.1-12.el9_3.x86_64.rpm 6ef64505946594c77cfb2a58f82f4aecfe5468fb8d76c81dd493701e1ec2ef01 libreoffice-help-ar-7.1.8.1-12.el9_3.x86_64.rpm edae8ed15813ce9cdb66a8bbc57b97dfb5433153b128e3a35f578ef9a18ee35e libreoffice-help-bg-7.1.8.1-12.el9_3.x86_64.rpm ff411704fefa4fd8ce9637160818aa24b8ec0d27483cf217db3d83281880e44e libreoffice-help-bn-7.1.8.1-12.el9_3.x86_64.rpm 6c9e0ffdf0270aa16b08ae8d050a9bfc9fa923c47f05f8434f42bbaea4edab83 libreoffice-help-ca-7.1.8.1-12.el9_3.x86_64.rpm 6ac84f94f2fb91ad96ee1c44ac13bd8eaa30009b313032906fb466c787d2b723 libreoffice-help-cs-7.1.8.1-12.el9_3.x86_64.rpm 203491ae107d006a937324dfdc32962b9457d202a0b8b9d8197bb0f4eebe7391 libreoffice-help-da-7.1.8.1-12.el9_3.x86_64.rpm 581ee6b92391fe5c13b0fc88d8b11788a115dc67d3a7673573af348cd4c644d4 libreoffice-help-de-7.1.8.1-12.el9_3.x86_64.rpm 87288636830760d45187c312e9182f3c745a27ebccbb671faa5addc174a14516 libreoffice-help-dz-7.1.8.1-12.el9_3.x86_64.rpm c058c80cb044c44d8d81938b8b94d9d9c8a5dd11847706f6c6c89701d5be58be libreoffice-help-el-7.1.8.1-12.el9_3.x86_64.rpm 605c512db8f88336560af12f84062384009fd62110ebfdea14fd7e202d14dfbe libreoffice-help-en-7.1.8.1-12.el9_3.x86_64.rpm 55e335a10351e10cd45a071b74bf7ad354f09522dd01c2b458bfcd225e174b0a libreoffice-help-eo-7.1.8.1-12.el9_3.x86_64.rpm 729bb79cd7ec0f2cf71b9e28f3498efc558b8b8535d6607bfaabe053b791ccd7 libreoffice-help-es-7.1.8.1-12.el9_3.x86_64.rpm 149a86d49f456841d28e15c713c5c07c1e6d1e227167efee781f332220a9cdfe libreoffice-help-et-7.1.8.1-12.el9_3.x86_64.rpm 2efc8d79069a924acbbf0e70bb6e84c545a6207a5ed1f56b48b93898bb22bc3c libreoffice-help-eu-7.1.8.1-12.el9_3.x86_64.rpm 1929b55d48ae4aab894376481d658c186dad56274f4b7709e410d77cc7daa1ab libreoffice-help-fi-7.1.8.1-12.el9_3.x86_64.rpm e6949de4baccefcf1efce15b0bda4ee58ae8d897fb1e225e9a1989ebe9fec204 libreoffice-help-fr-7.1.8.1-12.el9_3.x86_64.rpm 71152131cbe8f194752c89479502fd2611a1bb3228844aa14214c832d1884c19 libreoffice-help-gl-7.1.8.1-12.el9_3.x86_64.rpm 907533153ae0e562798dd75c3e07a973deb1e43377dc9f04ccd120cc1827ccf7 libreoffice-help-gu-7.1.8.1-12.el9_3.x86_64.rpm 14abdcc657c431de56204ba02719b570f289369cb824115657855bad9c4607b7 libreoffice-help-he-7.1.8.1-12.el9_3.x86_64.rpm 77c45ceb9e369e656bbe4cd1c93c4dd895e4ad485d21d0c9c90b2c168546edb4 libreoffice-help-hi-7.1.8.1-12.el9_3.x86_64.rpm 120a49cabcbf1c05cf251b14e62b5b52877141fe97107e7919a0476b1b626d4a libreoffice-help-hr-7.1.8.1-12.el9_3.x86_64.rpm 6934cb6025cdf13855a8fcfbe8704a4ca9d11b03bcb36bcafa380f89f4d98da5 libreoffice-help-hu-7.1.8.1-12.el9_3.x86_64.rpm 9d48ad8562bc5127dbec7f029115f9f50dad01392c448ad2fabaecb13cb06de0 libreoffice-help-id-7.1.8.1-12.el9_3.x86_64.rpm 705dcd1856ffeba4483ae40d8685c64db721d61b2fe4ccb78e5eeb65cd801fec libreoffice-help-it-7.1.8.1-12.el9_3.x86_64.rpm 24af6d4bf1523fb9745c184f57abc17571c134242dc17f883d033fa74138c10b libreoffice-help-ja-7.1.8.1-12.el9_3.x86_64.rpm 8982bced28eb643c7f82e50a07dfa4716ddd25d6b1b2e1a4974022d3ed758e54 libreoffice-help-ko-7.1.8.1-12.el9_3.x86_64.rpm 7398c811ceee906274ed8ed4ba655236db15c22dcd0b043da39013224d79e221 libreoffice-help-lt-7.1.8.1-12.el9_3.x86_64.rpm 26d0b27d3dddeadb15da7c57084bbf7b48c9d54a459ae9749cc60a8be4914806 libreoffice-help-lv-7.1.8.1-12.el9_3.x86_64.rpm 986c8e4a98ffa2501ae6a37138eb4a26c58a28241a171db5bd17763865dbe507 libreoffice-help-nb-7.1.8.1-12.el9_3.x86_64.rpm 61457b58ebe8e41fbbae2519a7cf29c7d87246ffbd72ae2ecfc849381b0f5eb8 libreoffice-help-nl-7.1.8.1-12.el9_3.x86_64.rpm 00967e74c4984057a4e22eae84bcfc15a066853a387b6a982e9f4de0dde01506 libreoffice-help-nn-7.1.8.1-12.el9_3.x86_64.rpm e544721d1f38c85ac6aba372e589ee465bbad9067b074db63d7cc5815aa59ad7 libreoffice-help-pl-7.1.8.1-12.el9_3.x86_64.rpm e4d45852241f749224307e98236b63f08532ba04b12244df7b2567bcf9d93610 libreoffice-help-pt-BR-7.1.8.1-12.el9_3.x86_64.rpm bb9528834fa613f23d08d1e82777960097037d2d995545a3fb2ce11ab2fe2638 libreoffice-help-pt-PT-7.1.8.1-12.el9_3.x86_64.rpm 452d167270c52c99a8c25640c2d8ead4a9b0b2a8f1c1d83e293cc8a17210a9df libreoffice-help-ro-7.1.8.1-12.el9_3.x86_64.rpm ea828a38d0e5c9fc0b4ae7116628c64a4a8353d9d48ee11dcb9c1ed326e76baf libreoffice-help-ru-7.1.8.1-12.el9_3.x86_64.rpm 31657a2f599f1e7286b7cc4bb2eafd6125245f1d6aea83b5ab15c6d741294739 libreoffice-help-si-7.1.8.1-12.el9_3.x86_64.rpm 892aee24ff33c275c10fd728eecf7ac932de0aa589fcfb47e842a9374cba923f libreoffice-help-sk-7.1.8.1-12.el9_3.x86_64.rpm 2c3eca7560b89b470d82f353ee27ed82a19219c19620367d8ed28bc818e25215 libreoffice-help-sl-7.1.8.1-12.el9_3.x86_64.rpm c7c37588be0e709c04dc8c8a301172f3df8c3c8809f9264f54329f9fb1ca3181 libreoffice-help-sv-7.1.8.1-12.el9_3.x86_64.rpm eff99b7115f8d9e13251d2375a2a07a605628729e749d0109c42b2b22332942f libreoffice-help-ta-7.1.8.1-12.el9_3.x86_64.rpm 2cf6165514f7e7fbc17ed4fe85f2b9a3de40c4e844ba7f85e70ffebff92bcdfd libreoffice-help-tr-7.1.8.1-12.el9_3.x86_64.rpm 5ffc530e9dd2e8500a9a6a3947f039de3518b150278007589a87a52d308c9ece libreoffice-help-uk-7.1.8.1-12.el9_3.x86_64.rpm cbcd6bfa60cafb5b4f5b578b8af71eecbdfb5891102e8146632a3eb9599ce03a libreoffice-help-zh-Hans-7.1.8.1-12.el9_3.x86_64.rpm a6f5f71d104150101542d65856c74fd2995c84c83e3830dcd76ce722fdbfdc45 libreoffice-help-zh-Hant-7.1.8.1-12.el9_3.x86_64.rpm d04131a391c93176bca70447e21f2c8c2010499764e4f97426d25495e552387d libreoffice-impress-7.1.8.1-12.el9_3.x86_64.rpm 2bc5920832366c0d025ed7410c86661547e7e14d19c07c85b14e27f2509e622d libreofficekit-7.1.8.1-12.el9_3.x86_64.rpm fb628c10f9b5e589c243078c3cb0b4b2ce95eed26c31dd7f2405e3eaa8497999 libreoffice-langpack-af-7.1.8.1-12.el9_3.x86_64.rpm dd6903527bad534824952550c3645692f8f7cf1be84e54c1aad982ce27123d60 libreoffice-langpack-ar-7.1.8.1-12.el9_3.x86_64.rpm 648d5e7ebc93e0401fac229a1670173c32e0e81c85cd9c1b4ad580ca15f522cc libreoffice-langpack-as-7.1.8.1-12.el9_3.x86_64.rpm 14572dcb3e9ba281b42e26df5a4dd50f69e995ad36b82ff4881fbe287d2de760 libreoffice-langpack-bg-7.1.8.1-12.el9_3.x86_64.rpm ec806b8c1fb72b136595908f40ca61b2239eace212514bb19dc84b3a860c02d4 libreoffice-langpack-bn-7.1.8.1-12.el9_3.x86_64.rpm f1a83fe5390e44010178d2ee5c561142a208793b21915bf8b3190f3af6e0fb06 libreoffice-langpack-br-7.1.8.1-12.el9_3.x86_64.rpm dfb03536f3cd50fb0d570df177e1ddac218913be607cb89d46e50a385b7cc87a libreoffice-langpack-ca-7.1.8.1-12.el9_3.x86_64.rpm 5ab04ead959db79ba526a67335819ee99938707923bab238a215108d6cace824 libreoffice-langpack-cs-7.1.8.1-12.el9_3.x86_64.rpm d9a5488e721ebb79110e8eaf5bdf6701b4f24d7c109d447bacd59b014dcce4e5 libreoffice-langpack-cy-7.1.8.1-12.el9_3.x86_64.rpm 4ba0f191c99b28abf523fdea8aab0e9956fd0ecb35752ec61d7b09bcffa9a84b libreoffice-langpack-da-7.1.8.1-12.el9_3.x86_64.rpm 846cfc9439d2f759a1716d16b799d6dd66954587f6a0d9c885d974f34a548be0 libreoffice-langpack-de-7.1.8.1-12.el9_3.x86_64.rpm 315b66d0dedfc99362ef096b861131b9f040084697468f6839ab0685aa0a35f6 libreoffice-langpack-dz-7.1.8.1-12.el9_3.x86_64.rpm 1e769329b00284a8245a319b1f2c4bc0b91374f374def911cd7191694f44db58 libreoffice-langpack-el-7.1.8.1-12.el9_3.x86_64.rpm 31162f0ba952df5b471c35adf729364c4b2db46d8662aa86e98458126e145628 libreoffice-langpack-en-7.1.8.1-12.el9_3.x86_64.rpm 75d5b44166445959a9ad4fafbf16d7d95f30f49cd83de48fb1489dd68cbcee77 libreoffice-langpack-eo-7.1.8.1-12.el9_3.x86_64.rpm 2cdd452acf0e97a7e5fc83bd4a8f7f5dfcc1e71e0ead6695ccf9c8cce9157402 libreoffice-langpack-es-7.1.8.1-12.el9_3.x86_64.rpm 4cbe590e4a7a475d2d21b1367bbb4ea1916cad174052e1936368642f31b72be2 libreoffice-langpack-et-7.1.8.1-12.el9_3.x86_64.rpm da7abdc97fcebc3a4a34741903ca8c397c1149cab390ee5b35b7af3d0faf9eb7 libreoffice-langpack-eu-7.1.8.1-12.el9_3.x86_64.rpm e8570e8430c17c2e3cadb2abe02c7b7eb2a3478cec8cb26d409ae411b1e86b4c libreoffice-langpack-fa-7.1.8.1-12.el9_3.x86_64.rpm 02704ccf3ab7a5b28cb2dfe422742ad0cfb0d8d18b839d3f172b0f06054e2afb libreoffice-langpack-fi-7.1.8.1-12.el9_3.x86_64.rpm 196c3db1b862f7b5f6171a1d105b5232c075f1f9ed623019036eaada06a7f13b libreoffice-langpack-fr-7.1.8.1-12.el9_3.x86_64.rpm f92ae0215723d0121922417fb50fd0d11d341f81879f4ffa9add8aaf8ec5af80 libreoffice-langpack-fy-7.1.8.1-12.el9_3.x86_64.rpm 7b42d16e9fc31050d25410bcdf713e0f31d8b5606bb387b8be0114e06101d6a0 libreoffice-langpack-ga-7.1.8.1-12.el9_3.x86_64.rpm 005dfa9de5794badb471c6e34f5f7c5aaca9da04679b7a25923117552de83298 libreoffice-langpack-gl-7.1.8.1-12.el9_3.x86_64.rpm c436cf1f51b67d7d4997a07c31fbfc6a6da29d870f78dc84921276b3ff2590b4 libreoffice-langpack-gu-7.1.8.1-12.el9_3.x86_64.rpm f1c4542711028aa490ed4109c50768cbca13600704f9dbdb7f7c8a21febbf962 libreoffice-langpack-he-7.1.8.1-12.el9_3.x86_64.rpm c1a94538c22b46021b9d287aedad9a73870aabe21ff0004a70a320358997e625 libreoffice-langpack-hi-7.1.8.1-12.el9_3.x86_64.rpm 759e0e55f7105462015735d1a7873e435c64d2208ebc73c73e642dc271a0020a libreoffice-langpack-hr-7.1.8.1-12.el9_3.x86_64.rpm cbe336330e236d51ddbfb3853fea61d75b41bf7d2232ae32934116bc55fc0792 libreoffice-langpack-hu-7.1.8.1-12.el9_3.x86_64.rpm cb6253e301cd16faeddec6f0aa53d1346f5dad15f9e62ff649b4f27c1c3899a5 libreoffice-langpack-id-7.1.8.1-12.el9_3.x86_64.rpm 09f9ed7e02b94fac3cfe3bc43df7cf1e7b4205a5ae89dc864ec2249a811a55fe libreoffice-langpack-it-7.1.8.1-12.el9_3.x86_64.rpm 20dfce56504e83a91661bf04eff946b470b573c0c250f60d54e7c28709086737 libreoffice-langpack-ja-7.1.8.1-12.el9_3.x86_64.rpm 0ff735a141830ad0dc60062fbdbe182307988791c90b664f7bce15fdda1fc517 libreoffice-langpack-kk-7.1.8.1-12.el9_3.x86_64.rpm e1a10941dbcd8f04535cf5c6cbc6fbb6f94ddf0d3bb3b2ba0e1d930bd3530aa8 libreoffice-langpack-kn-7.1.8.1-12.el9_3.x86_64.rpm 2cca31cf47ecd15ad2a7a69dfe66a10de5a378b5f6bfca81c7a7689092452951 libreoffice-langpack-ko-7.1.8.1-12.el9_3.x86_64.rpm 6c9e30f870549bca436ec3529b9885e89c2ad27072572dd257bb507674af05e9 libreoffice-langpack-lt-7.1.8.1-12.el9_3.x86_64.rpm f6debf4263ee90e562069aea0fb0046e010cb66a6a1d943896bae4a3a16310e1 libreoffice-langpack-lv-7.1.8.1-12.el9_3.x86_64.rpm e1a1b5a6eedf988f8e46fed9e8df5f6b756e49b92227af60cd2871a6fac2860a libreoffice-langpack-mai-7.1.8.1-12.el9_3.x86_64.rpm cade1ab94c2f7931f0d1bf91a35bcddec0c34b20a333335f4c8188b03b672f6c libreoffice-langpack-ml-7.1.8.1-12.el9_3.x86_64.rpm 0a893756bd9595926c491eacf653940676e35ddaf5259c52571f06ff5bbb221f libreoffice-langpack-mr-7.1.8.1-12.el9_3.x86_64.rpm c7853c306be5d9962c5d9a7f18fa47e8514f07b6b8f697d7d36eb21e4cbd8be6 libreoffice-langpack-nb-7.1.8.1-12.el9_3.x86_64.rpm 8909fdac1b19337ce04cfbc6a2ca8934fe35c1159de7bfe6fb6a49dc8e8500e4 libreoffice-langpack-nl-7.1.8.1-12.el9_3.x86_64.rpm 231cc18b1fe8e285bac2a6df7117d0878b5f20f07f5571c34aa408ba6cbdb5ff libreoffice-langpack-nn-7.1.8.1-12.el9_3.x86_64.rpm a1eaadad92b435047fc20640c2edd5b94cb768b031928a3ba24cc75e6ce4af12 libreoffice-langpack-nr-7.1.8.1-12.el9_3.x86_64.rpm f6f8de0a1e1bb6ba11b7614d9c18251a48a79188771000646542097fa4a9cde4 libreoffice-langpack-nso-7.1.8.1-12.el9_3.x86_64.rpm 23eafa8eaba79c5f4a6a8acc444892b998dd2f75a2f4d5be001ab3a651455910 libreoffice-langpack-or-7.1.8.1-12.el9_3.x86_64.rpm 5bbb9b4f6ce7dde5a942a94011d103cc075ca3426a1582261411f049f674bb6d libreoffice-langpack-pa-7.1.8.1-12.el9_3.x86_64.rpm 57e0b2ce0155b5620d85d7bcfd633418744f61ebbb468ae377ebc3ff6ae1b270 libreoffice-langpack-pl-7.1.8.1-12.el9_3.x86_64.rpm 4d6cc29b8fa5c1853085d4735575dd3c62e5cc8a2e50a50dc2e4a88ec28188f8 libreoffice-langpack-pt-BR-7.1.8.1-12.el9_3.x86_64.rpm 5b4d4ee16c5e66cc6b98e356ea7105c5a0c08aa1dd1bebdb2898d4ce439edbc5 libreoffice-langpack-pt-PT-7.1.8.1-12.el9_3.x86_64.rpm 1b629f66b03552eeeb6a500b46dfecfae76119229c166567ee115c931588ea99 libreoffice-langpack-ro-7.1.8.1-12.el9_3.x86_64.rpm d7af8d5f680d9f502e4ec6ffc75b0a14dc5c1ad377c3679ac455f6c25f6d0355 libreoffice-langpack-ru-7.1.8.1-12.el9_3.x86_64.rpm 8086870fb525f10500696170bc206039c38d6744774b7af4868ec480959a1bf8 libreoffice-langpack-si-7.1.8.1-12.el9_3.x86_64.rpm 7e897171407e7478e36a86ee8ada32ad5a0e0507c23d82f8eee39403a2856fd1 libreoffice-langpack-sk-7.1.8.1-12.el9_3.x86_64.rpm 0adc158e16e36e60c5fc66c8518296bc68e8311bc1686f589567dfd55035d0c3 libreoffice-langpack-sl-7.1.8.1-12.el9_3.x86_64.rpm b99372c73e8bef38b212af800ccba4a22f8efed7bef91a67b7135c17b76bb1e7 libreoffice-langpack-sr-7.1.8.1-12.el9_3.x86_64.rpm c0f212297d79bd172437f73b1f1dfa434aca9d51608b3cfef4c34267086890fd libreoffice-langpack-ss-7.1.8.1-12.el9_3.x86_64.rpm 3332e42f61d80e273d01e9d3cb92f4fca22b5e21afbdc859f9f33c5e0dce3502 libreoffice-langpack-st-7.1.8.1-12.el9_3.x86_64.rpm 030a7d055dae13c3a864cd508367cb27271eca8a7448a3c76a2dedefa3cdea56 libreoffice-langpack-sv-7.1.8.1-12.el9_3.x86_64.rpm 9fc84dcdfab03a640098e930b2c120db8bf37257d9fc35b786ac29d0f977c797 libreoffice-langpack-ta-7.1.8.1-12.el9_3.x86_64.rpm 0fa9a579b7d22488df8f878f691b3914e4294c15d68038db2348c80aecc4cb34 libreoffice-langpack-te-7.1.8.1-12.el9_3.x86_64.rpm d49397b7bb1159ab891a04429fe1468aff45b82a7330e9acbf60fbec1c1cfb6b libreoffice-langpack-th-7.1.8.1-12.el9_3.x86_64.rpm 65e01a398a458afd6745d577d93ccb7d63cf04283c6075866ae24385909460c6 libreoffice-langpack-tn-7.1.8.1-12.el9_3.x86_64.rpm 62759c725760988d9badbcf8a1b967ff8eb8bf9b5fbeac86160d4fb95869d488 libreoffice-langpack-tr-7.1.8.1-12.el9_3.x86_64.rpm 6103bff2a92ea2ec7078068295535cf1f3c326bfaaa382f2adb1cd11924ab824 libreoffice-langpack-ts-7.1.8.1-12.el9_3.x86_64.rpm 7156148d5ada6371f0516ed49f0cbe28b176dcf593aa799f707becdd2461e08f libreoffice-langpack-uk-7.1.8.1-12.el9_3.x86_64.rpm 78f3a777a2c9b488516ca67f58a61a685c927fdb0a36ca57ea368c366b020b2f libreoffice-langpack-ve-7.1.8.1-12.el9_3.x86_64.rpm ee0708bec78003b4b38abeb5bdb7aae014376f04487d541124c103ffbe7180d4 libreoffice-langpack-xh-7.1.8.1-12.el9_3.x86_64.rpm c1ee759578fd5c06a2129d33697feff8bdbf9b8fb320dc06a1ac83f02fb9ca6a libreoffice-langpack-zh-Hans-7.1.8.1-12.el9_3.x86_64.rpm 8e0b913da560599adeb90382895aef66e108953d57cf819db4820e60d3bffa35 libreoffice-langpack-zh-Hant-7.1.8.1-12.el9_3.x86_64.rpm 29a22765289af180eb801eb293454de8fa7b67c46fc76e733d5de8a609659d46 libreoffice-langpack-zu-7.1.8.1-12.el9_3.x86_64.rpm 55d60bbddbb80680ea3927c2a710dca3520c105f8e1f2e1f2d6064d3fcd80ee3 libreoffice-math-7.1.8.1-12.el9_3.x86_64.rpm 267df3773c76b5ce5f5d225d659320c94043189473bd4ba394dc8d198a16aab4 libreoffice-ogltrans-7.1.8.1-12.el9_3.x86_64.rpm eb2f5d842ed71c65cf0fd37000b5a27c846fbcfb1d9b7540714aa8722c0a8d68 libreoffice-opensymbol-fonts-7.1.8.1-12.el9_3.noarch.rpm ae847cd09a50445a3e3afc9d90b65b759bd65f15be0b635dd05dfb85eb9eb1cb libreoffice-pdfimport-7.1.8.1-12.el9_3.x86_64.rpm 678037a00bdc2615f4137c5830326802e6dfb96670ea2cc68faca6c5fff40a09 libreoffice-pyuno-7.1.8.1-12.el9_3.x86_64.rpm 332225a144e36b99b9819e6cf056fea3e25bfbfd29d231d65b110513c98817c2 libreoffice-ure-7.1.8.1-12.el9_3.x86_64.rpm 9d0275c9cf7a9b7500f3a405035517050f78eda7dd06e2f52adbfe86926f5a47 libreoffice-ure-common-7.1.8.1-12.el9_3.noarch.rpm 4a4b6abb3aba4b8c317b19a646fc0bf58cf958c6a436222b7112b3bdf2302f5e libreoffice-wiki-publisher-7.1.8.1-12.el9_3.x86_64.rpm 34258e9883016657df63da8e0c1ca0dbfbc0edfe0294c552e834e2960376edfc libreoffice-writer-7.1.8.1-12.el9_3.x86_64.rpm 30215083d14d035af679fe90544046ea209143f6ea9d1966a9f96682a45003e7 libreoffice-x11-7.1.8.1-12.el9_3.x86_64.rpm 73e149835749d2cb85a7a24934cd902a9e870b1aacc29e8dc4260fc63ef03fbc libreoffice-xsltfilter-7.1.8.1-12.el9_3.x86_64.rpm 34094baed579d9b763243c49b110fe20fbc4e08f2053c6dc940c778cc7fc438d RLSA-2024:3837 Important: 389-ds-base security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for 389-ds-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es): * 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request (CVE-2024-3657) * 389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c (CVE-2024-2199) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms 389-ds-base-2.4.5-8.el9_4.x86_64.rpm b8756f05830f380a313e3d6198721803cb11cda009f2f7dc8a877dad005705cf 389-ds-base-libs-2.4.5-8.el9_4.x86_64.rpm da228036f4e3ac4c0caf048dadbcab01e2f2f8b8f85df9ad256952aa1c2d7a81 python3-lib389-2.4.5-8.el9_4.noarch.rpm 27d33a2d083349a174462ec9dbd80cea7888b4bb05ae832ba2e68564415fc113 RLSA-2024:4457 Moderate: openssh security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for openssh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Security Fix(es): * openssh: Possible remote code execution due to a race condition in signal handling affecting Rocky Linux 9 (CVE-2024-6409) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms openssh-askpass-8.7p1-38.el9_4.4.x86_64.rpm 4abc7dc9030eff016aa999d3c4271c137ad35378b23e5ba452007452affadda8 pam_ssh_agent_auth-0.10.4-5.38.el9_4.4.x86_64.rpm 42750c8004aa10883d9be4606ee2858acfc7f96c0d7d1c911f8f435910eccace RLSA-2024:4450 Important: dotnet8.0 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.107 and Runtime 8.0.7. Security Fix(es): * dotnet: DoS in System.Text.Json (CVE-2024-30105) * dotnet: DoS in ASP.NET Core 8 (CVE-2024-35264) * dotnet: DoS when parsing X.509 Content and ObjectIdentifiers (CVE-2024-38095) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-8.0-8.0.7-1.el9_4.x86_64.rpm aa3629a9ebf6d634e51dc553d8e79526981817373bb4bd54c6888f091f6c3d2d aspnetcore-runtime-dbg-8.0-8.0.7-1.el9_4.x86_64.rpm ffb8f23092899fa008130d9886735847ae2ccd835e6d58fb8b431752877e1cdc aspnetcore-targeting-pack-8.0-8.0.7-1.el9_4.x86_64.rpm ee311689c18434646abba609cda255942f68b0ad9617bae374331ae3559ea5a7 dotnet-apphost-pack-8.0-8.0.7-1.el9_4.x86_64.rpm 0537034f87a8615b3b2e088deefdf7eda27e61795f237b496116c82488913212 dotnet-host-8.0.7-1.el9_4.x86_64.rpm b5bedc3cd8e75e4f336b76e70e5c1d593cc1c115cf807fa9b7a6aa10d819f917 dotnet-hostfxr-8.0-8.0.7-1.el9_4.x86_64.rpm 3e0af25f9f66dc7e3f0f5c129777f9000d552852bf4d91480c2aad3cc401d298 dotnet-runtime-8.0-8.0.7-1.el9_4.x86_64.rpm 04f97ae2baf9a55830cb6c4db8ec20d1004ebc9cdd91619f1d883313ec21a34e dotnet-runtime-dbg-8.0-8.0.7-1.el9_4.x86_64.rpm 0ef25e1a53403455a05ecd32e8fd5fad00e134b1738a98305b3b8e7278c514db dotnet-sdk-8.0-8.0.107-1.el9_4.x86_64.rpm 3a20b5d30605d206553b0cc700a8efda088a028f8b79f2b380fbe0ac930c4d54 dotnet-sdk-dbg-8.0-8.0.107-1.el9_4.x86_64.rpm 93196ff56cd8be2c1d816930f8186c80306626a9a45d8e9959b5e9ad4bb34bf2 dotnet-targeting-pack-8.0-8.0.7-1.el9_4.x86_64.rpm 1659a67f21b644f634fa49ed3b7075608a1fb7244a559dcffabe0220fd8cfc61 dotnet-templates-8.0-8.0.107-1.el9_4.x86_64.rpm 4229ed3b67194e42a0915d6136e24a916ce1ba0ea860b5379cb3287e746c80b4 netstandard-targeting-pack-2.1-8.0.107-1.el9_4.x86_64.rpm 45fe01f765360ec697a0bdf676d29adb3abfa611cad5dccb66305e8527234241 RLBA-2024:3839 ostree bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OSTree is a tool for managing bootable, immutable, versioned file system trees. Bug Fix(es): * [9.4.z] Update ostree to 2024.6 (JIRA:Rocky Linux-36770) rocky-linux-9-x86-64-appstream-rpms ostree-2024.6-1.el9_4.i686.rpm 6629df6cf0d37bcf958d0a8d7d1e8788cc412784418ca699c40a1265aa60bd94 ostree-2024.6-1.el9_4.x86_64.rpm 6b06ed7e922091d161692df8ff681289aabd106adbf006bcaafe9ee623a66da0 ostree-grub2-2024.6-1.el9_4.x86_64.rpm 6eb38ee30f1e37584f0a3182d721f4c0e329a13fa23dfb9b8da538dee985590c ostree-libs-2024.6-1.el9_4.i686.rpm a97ae2035c1880127b8282ec6284448897f8981cd6ad2750a5f6baebd864d01c ostree-libs-2024.6-1.el9_4.x86_64.rpm 52496f99f011314cf21e5543ce8f43a1f34d1594a8d7127c998d17bde64fb835 RLSA-2024:2888 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.11.0. Security Fix(es): * firefox: Arbitrary JavaScript execution in PDF.js (CVE-2024-4367) * firefox: IndexedDB files retained in private browsing mode (CVE-2024-4767) * firefox: Potential permissions request bypass via clickjacking (CVE-2024-4768) * firefox: Cross-origin responses could be distinguished between script and non-script content-types (CVE-2024-4769) * firefox: Use-after-free could occur when printing to PDF (CVE-2024-4770) * firefox: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11 (CVE-2024-4777) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-115.11.0-1.el9_4.x86_64.rpm ddd2d85b5e10080fb2d35273ec7e6561093609cef605cce7b54ff848cf7382ff RLSA-2024:4212 Moderate: golang security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * golang: archive/zip: Incorrect handling of certain ZIP files (CVE-2024-24789) * golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses (CVE-2024-24790) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms golang-1.21.11-1.el9_4.x86_64.rpm fdedf1db97f6b6b756f2fb959a3f2e279548adfbf843f429bba9ae93e0459f12 golang-bin-1.21.11-1.el9_4.x86_64.rpm d03519aa9ab640fad8de224114c31d7543f18d603a5334a311570b1e2cbfdcd1 golang-docs-1.21.11-1.el9_4.noarch.rpm d60529cf51d0b918c63e86e794f92736cb8344e25e37bad6aaf998e39baf8906 golang-misc-1.21.11-1.el9_4.noarch.rpm 8eb46487eaaea0d9fa339fb74bb2a3bede2a2db9eee60ea541981bd40787d10a golang-src-1.21.11-1.el9_4.noarch.rpm 623fbee54cb598e52c68a3b24cf59c9cd01e66466f43e0be238e020163ff1c4b golang-tests-1.21.11-1.el9_4.noarch.rpm f019ebf7d32fc5f45a368baf4babf5ee1b97c51d61a0f95cc19137e6cd802e0c go-toolset-1.21.11-1.el9_4.x86_64.rpm 240aba7e8ee460662b62a1ba327cd143f4941d4a835f34cb23fcc7209a58e880 RLSA-2024:4500 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13 (CVE-2024-6604) * Mozilla: Race condition in permission assignment (CVE-2024-6601) * Mozilla: Memory corruption in thread creation (CVE-2024-6603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-115.13.0-3.el9_4.x86_64.rpm 9be0fbc6ebdab53fdd0e982e8e815c5483092e6277fdfdfeebc863e220d8f203 firefox-x11-115.13.0-3.el9_4.x86_64.rpm 8a8b891796f17aa589eb8fd814d5923b224631243b5954d7be2b841e8058ae1b RLSA-2024:3307 Important: tomcat security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tomcat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es): * Apache Tomcat: HTTP/2 header handling DoS (CVE-2024-24549) * Apache Tomcat: WebSocket DoS with incomplete closing handshake (CVE-2024-23672) Bug Fix(es) and Enhancement(s): * Rebase tomcat to version 9.0.87 (JIRA:Rocky Linux-34815) * Amend tomcat's changelog so that fixed CVEs are mentioned explicitly (JIRA:Rocky Linux-35328) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms tomcat-9.0.87-1.el9_4.1.noarch.rpm 6486789bfcd216dbb9ebdbd11c28bf8d9458d90e8687aeed1235609a8da810a0 tomcat-admin-webapps-9.0.87-1.el9_4.1.noarch.rpm 1277125340b2842599677ece2535b2fb701affd6bf0c4a3f7e6dcf879ab7faeb tomcat-docs-webapp-9.0.87-1.el9_4.1.noarch.rpm 5ce465ed19e7ce0b812c9aea3dcf8fc7b0a82292b0b1ac6e629bd824b028fed5 tomcat-el-3.0-api-9.0.87-1.el9_4.1.noarch.rpm b31abda8887f5894fae36a62c1e7b18a6da44be8bfdf789da4d8c99c01e1b5e1 tomcat-jsp-2.3-api-9.0.87-1.el9_4.1.noarch.rpm b64ccb24a1da24c847f3cc1dd0cc66a2ec7ee73014e8f0010e287c6d8ac5b4c8 tomcat-lib-9.0.87-1.el9_4.1.noarch.rpm 68f1dd7964f37139dc3c4a996aaddc3fce54c1d587908638e92ce05b4497e4e7 tomcat-servlet-4.0-api-9.0.87-1.el9_4.1.noarch.rpm 312fdf6582a67bc6834d115199fbcb524b1559fc114a9691d4a7cb5e4a326429 tomcat-webapps-9.0.87-1.el9_4.1.noarch.rpm cf07d722e87a9c544a5c9197e64818851479efabb085a268033b58296734333f RLBA-2024:3822 qemu-kvm bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qemu-kvm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Bug Fix(es): * qemu-kvm running Vyatta hits assert when doing KVM_SET_GSI_ROUTING [rhel-9.4.z] (JIRA:Rocky Linux-32837) * qemu crash with kvm_irqchip_commit_routes: Assertion `ret == 0' failed if booting with many virtio disks and vcpus [rhel-9.4.z] (JIRA:Rocky Linux-32990) rocky-linux-9-x86-64-appstream-rpms qemu-guest-agent-8.2.0-11.el9_4.2.x86_64.rpm b437690b8d37c52e2e03606e58b909ff76a36be232b5fbc00276988f2916a921 qemu-img-8.2.0-11.el9_4.2.x86_64.rpm 1676b82a9f61270cdfca8fe339eb43abe1e2e39b5648c5d7fa7275b8ee7af2ae qemu-kvm-8.2.0-11.el9_4.2.x86_64.rpm 326109b2fa5e5d11665360c7840188645662a59b389770757509f55a68628c62 qemu-kvm-audio-pa-8.2.0-11.el9_4.2.x86_64.rpm 50219d5301d6d4d338bf79d0e611fb711202c69f8afd8e454e17950ea4055af9 qemu-kvm-block-blkio-8.2.0-11.el9_4.2.x86_64.rpm b1659a62571132bafc073452595f3cd7583e40ded7f439dea5012412fdd730c1 qemu-kvm-block-curl-8.2.0-11.el9_4.2.x86_64.rpm d1da19e9cc5814e5021855b1509c3130409182129d091d13f451120d2e69be9c qemu-kvm-block-rbd-8.2.0-11.el9_4.2.x86_64.rpm 8d211a8d47aa313fcf46a5a28662f1313916402304db6a8e934dfb086a7de702 qemu-kvm-common-8.2.0-11.el9_4.2.x86_64.rpm e6f7b2a81aacea1ee33f708d84ad748f69b11e95ba5f455904da9225028175d8 qemu-kvm-core-8.2.0-11.el9_4.2.x86_64.rpm 3fd06c6f64fefe89657b2a6f171f01a603638594ff5d404e46eeae854dc85207 qemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4.2.x86_64.rpm fc44fafdf7b682a572ca56e0ccbb139dfbaf721afaa430200a85ad6c0de320f2 qemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4.2.x86_64.rpm b8289386c25940b1cebfe1243e1743d8dab51c3965ac183bd3ff4b901a516922 qemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4.2.x86_64.rpm 772eb33d77f4e37cc362359d5824b4f58d1ffa88d046a2ddfa4d524824f96241 qemu-kvm-device-usb-host-8.2.0-11.el9_4.2.x86_64.rpm 76fe5746dc57a543f2bcf39dedf255444b54d5c8516d7bfbfae30f6d7a40138c qemu-kvm-device-usb-redirect-8.2.0-11.el9_4.2.x86_64.rpm a680e2db78e8855601cc4ae78e6b3a8cebcd0edc9046c3874146bc845be4ac6e qemu-kvm-docs-8.2.0-11.el9_4.2.x86_64.rpm 484d567238721ba2c6dcd30a7e1aaa3645bd5790bb812a2c33d0fdd963122e62 qemu-kvm-tools-8.2.0-11.el9_4.2.x86_64.rpm 65c99a08b0f4cacde3fbeda6482edc0d58cd4176f9a6d42d0fd4211d6fd9c95a qemu-kvm-ui-egl-headless-8.2.0-11.el9_4.2.x86_64.rpm 46bc8480b269cbe4bdadcfe5337fe995ea7a2da0c74906f9fcfcf9a9affe1e1f qemu-kvm-ui-opengl-8.2.0-11.el9_4.2.x86_64.rpm 819c7e590fd108a3b5d72aaa9b76339ae57d532c1ff176fe80dbcbc13be9a0c2 qemu-pr-helper-8.2.0-11.el9_4.2.x86_64.rpm 35b64c5267fcb80a991ac54819ca36283abee949b8468af9e2ed823001f11af6 RLBA-2024:3821 socat bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for socat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The socat utility establishes bi-directional byte streams and transfers data between them. The utility can establish streams between a large set of channels, such as files, pipes, devices, and sockets. Bug Fix(es): * socat: Fix peername segfaults in rhel 9.2 EUs/TUS [rhel-9.4.z] (JIRA:Rocky Linux-32914) rocky-linux-9-x86-64-appstream-rpms socat-1.7.4.1-5.el9_4.2.x86_64.rpm 1e10b565cfd9babf425bd1dd43cebfade3218b7b14fa18fcb7dcfa39996b08de RLSA-2024:3820 Moderate: fence-agents security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Security Fix(es): * jinja2: accepts keys containing non-attribute characters (CVE-2024-34064) rocky-linux-9-x86-64-appstream-rpms fence-agents-common-4.10.0-62.el9_4.3.noarch.rpm 48b60682729d7741e5de8aaeab79073b822da42d377024dc132cf6f333b11038 fence-agents-compute-4.10.0-62.el9_4.3.x86_64.rpm 4bf2637c54bbd4082376ddf7037b0bd9a4f87e63ac3beed1c3cbbf452fb9c35b fence-agents-ibm-powervs-4.10.0-62.el9_4.3.noarch.rpm d1355cd60f55f462eaa9bb76a851544563b3ded179c81c0061038d2b77ae543a fence-agents-ibm-vpc-4.10.0-62.el9_4.3.noarch.rpm d82a6e04fdd3284fa972628e3ae020efd00b30fc3969cba40168ef4e4ceb42af fence-agents-kubevirt-4.10.0-62.el9_4.3.x86_64.rpm 3bb6c47d3435168ab44256ffa163d43755c36c96bad30fa37e931beb038e82db fence-agents-virsh-4.10.0-62.el9_4.3.noarch.rpm 227e0a4ec35157579695fdb2fc6d3d8ad425c81c4be9d216d503d9554c124496 fence-virt-4.10.0-62.el9_4.3.x86_64.rpm bcf2145ad6a65935a534cad873a6c22886b86c566dd6f9b7142ff6eb8546ae02 fence-virtd-4.10.0-62.el9_4.3.x86_64.rpm fa9b4b7aa40b1df187568973016eb7a7fd49de3638209c103bd5b7cd1ba6e736 fence-virtd-cpg-4.10.0-62.el9_4.3.x86_64.rpm 95b8fb7ab2e1def4173976b2149b4fae0106b14782cfcae092fe7194598f0981 fence-virtd-libvirt-4.10.0-62.el9_4.3.x86_64.rpm 403e45427354a831e404a31f5b129f3cd61113056b2ac2b3a9a0b1b3525f1f08 fence-virtd-multicast-4.10.0-62.el9_4.3.x86_64.rpm 2035ebfd7b80ee5fc9aa07d23eb6be18b42e92d7195cea48ed3e88c8d1b284b8 fence-virtd-serial-4.10.0-62.el9_4.3.x86_64.rpm 96d8a291a7e7748b75cc1f07dedb9f2b612142b2f8e2817e9200be752b40e29a fence-virtd-tcp-4.10.0-62.el9_4.3.x86_64.rpm 15630f0b919f8a858022bd67544940e31ccac63ea6baf745654cc48e5502a5c1 RLSA-2024:3826 Moderate: podman security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fixes: * podman: jose-go: improper handling of highly compressed data (CVE-2024-28180) * podman: golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290) * podman: jose: resource exhaustion (CVE-2024-28176) rocky-linux-9-x86-64-appstream-rpms podman-4.9.4-4.el9_4.x86_64.rpm c6418c2edbe8e0162dc593eefdc43b471a504f6a6c5a3a058c28eb583eb1e838 podman-docker-4.9.4-4.el9_4.noarch.rpm d0f5ace10efe6e29f1926fee8fc430c205f33949f24a602eb630b920aba772ab podman-plugins-4.9.4-4.el9_4.x86_64.rpm e427810613ad81e0c365511dd3780780be2322d50df950c5db6b4c0353c812ed podman-remote-4.9.4-4.el9_4.x86_64.rpm af6db91d11ada57f24d3caf67cc07662f1f1febdc78592f38d54d8a9e0a31dd0 podman-tests-4.9.4-4.el9_4.x86_64.rpm 2b6c29aa39baf446665a8d441b26c7b4eccea6b99fffb62fbadb09ca79928f9c RLSA-2024:4583 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886) * kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() (CVE-2021-47548) * kernel: net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg (CVE-2021-47596) * kernel: vt: fix memory overlapping when deleting chars in the buffer (CVE-2022-48627) * kernel: can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock (CVE-2023-52638) * kernel: mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index (CVE-2024-26783) * kernel: net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking occurs after populating the metadata_map (CVE-2024-26858) * kernel: netfilter: nf_tables: use timestamp to check for set element timeout (CVE-2024-27397) * kernel: nvme: fix reconnection fail due to reserved tag allocation (CVE-2024-27435) * kernel: net: ena: Fix incorrect descriptor free behavior (CVE-2024-35958) * kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). (CVE-2024-36904) * kernel: lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure (CVE-2024-38543) * kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. (CVE-2024-38586) * kernel: net: micrel: Fix receiving the timestamp in the frame for lan8841 (CVE-2024-38593) * kernel: netfilter: tproxy: bail out if IP has been disabled on the device (CVE-2024-36270) * kernel: octeontx2-af: avoid off-by-one read from userspace (CVE-2024-36957) * kernel: blk-cgroup: fix list corruption from resetting io stat (CVE-2024-38663) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-427.26.1.el9_4.x86_64.rpm de5a1772b9ccc009eb0cac3c3c20015aa4753f56f6ca4f1ecb715c1c0a5de208 kernel-debug-devel-matched-5.14.0-427.26.1.el9_4.x86_64.rpm d4896fc694e10f400c4ec5aff559d0d468c8c485d3bc310db71e064625ac1b06 kernel-devel-5.14.0-427.26.1.el9_4.x86_64.rpm 8132bb198e04dada22e1064302eb234e46515136bae8e1141a3c7a4c820b24bc kernel-devel-matched-5.14.0-427.26.1.el9_4.x86_64.rpm 9d6fedbb917798fe0881920b980d560177812f1df58e07d7565fc388bd1db530 kernel-doc-5.14.0-427.26.1.el9_4.noarch.rpm 929085c2d0686fa032d24108a5e4f8327d5b47bc83412c316c72f6dd7ae3507d kernel-headers-5.14.0-427.26.1.el9_4.x86_64.rpm 3002310b8b878377f46fa03e9f25a72d76614ec5f3e5107d75ee501fb39f5918 perf-5.14.0-427.26.1.el9_4.x86_64.rpm d0d4d76cde216772bf2df9cb57b965b7060b8b503f9c71099f35c127451635e2 rtla-5.14.0-427.26.1.el9_4.x86_64.rpm 010a552c598b2111c2de1a804bba57d0c09f3a6058b405f90dccbc425dd85577 rv-5.14.0-427.26.1.el9_4.x86_64.rpm f1fc9d602df4cc438d200c5a589116323aab342c62bde4916d96a00d79fc6db7 RLSA-2024:3827 Moderate: buildah security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for buildah. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290) * jose-go: improper handling of highly compressed data (CVE-2024-28180) * buildah: jose: resource exhaustion (CVE-2024-28176) rocky-linux-9-x86-64-appstream-rpms buildah-1.33.7-2.el9_4.x86_64.rpm f4fb43e3db04367623d85407d122b4b9f34bd022ebf34b9e78dd6aa4f26bbcbe buildah-tests-1.33.7-2.el9_4.x86_64.rpm 30a08966a0f68effbb28168cd9fe6aaa6bdbf94101873c4954c8afd94fc4c1e8 RLBA-2024:3829 cockpit-machines bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-machines. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Cockpit component for managing virtual machines. If "virt-install" is installed, you can also create new virtual machines. Bug Fix(es): * creates broken external VM snapshots for pool volumes [rhel-9.4.z] (JIRA:Rocky Linux-34569) * [Machines] Can not remove Host devices [rhel-9.4.z] (JIRA:Rocky Linux-35514) rocky-linux-9-x86-64-appstream-rpms cockpit-machines-308.3-1.el9_4.noarch.rpm b761425307dd0d77b2877721044c02a5574433692981b2d3f4b87698c31dad93 RLSA-2024:3830 Moderate: gvisor-tap-vsock security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gvisor-tap-vsock. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A replacement for libslirp and VPNKit, written in pure Go. It is based on the network stack of gVisor and is used to provide networking for podman-machine virtual machines. Compared to libslirp, gvisor-tap-vsock brings a configurable DNS server and dynamic port forwarding. Security Fix(es): * golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290) rocky-linux-9-x86-64-appstream-rpms gvisor-tap-vsock-0.7.3-3.el9_4.x86_64.rpm 28e857489e1e093c8cdcf83a1a0a2852528b9f70e45c7db7efbb740770943936 RLBA-2024:3833 NetworkManager-libreswan bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for NetworkManager-libreswan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This package contains software for integrating the libreswan VPN software with NetworkManager and the GNOME desktop Bug Fix(es): * Implement `rightcert` Support in NetworkManager-libreswan [rhel-9.4.z] (JIRA:Rocky Linux-33372) * [RFE] Support `leftsubnet` in IPSec configuration in NM-libreswan [rhel-9.4.z] (JIRA:Rocky Linux-33376) rocky-linux-9-x86-64-appstream-rpms NetworkManager-libreswan-1.2.18-3.el9_4.x86_64.rpm 980fe0366b02424d8daa107fc1d1d6c1c5a2a7244c96565272687001fc7ba094 NetworkManager-libreswan-gnome-1.2.18-3.el9_4.x86_64.rpm c92e7e88ebd848da29d6f0fdf2fea1c31115b1f179e052ac1f78afd4de8b3c3a RLBA-2024:3840 golang bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Bug Fix(es): * Rebase to 1.21.10 (JIRA:Rocky Linux-35630) * Re-enable CGO for cmd/go [rhel-9.4.z] (JIRA:Rocky Linux-36988) rocky-linux-9-x86-64-appstream-rpms golang-1.21.10-1.el9_4.x86_64.rpm a9551eecba99feb12b592495875bce89164a68107493e7b41282e602ce17a320 golang-bin-1.21.10-1.el9_4.x86_64.rpm bef80d844d5a1c9b3f05a087d653dc43c8c097bae16a052b81b238db44e6a499 golang-docs-1.21.10-1.el9_4.noarch.rpm ff69c8140ae0ecb7677ba476815eb08e50967019b9f9707456800a1178856ddf golang-misc-1.21.10-1.el9_4.noarch.rpm 317b9c72191ac2df4e3595710904b7edb5d079abee7ffa36b8ca258dca472b94 golang-src-1.21.10-1.el9_4.noarch.rpm 56f95700962c794033a17bbd1bc7bb1c6027191b013bc5557c02663f7dd2896d golang-tests-1.21.10-1.el9_4.noarch.rpm caaa23292ec0a5f7b2aa16ef632caf22fe814534538393dbd8455956b679aa25 go-toolset-1.21.10-1.el9_4.x86_64.rpm 39107d2ee75d81d289b463847d8801f182b1131a27df6828aff7cd3acb08f405 RLBA-2024:3841 rpm-ostree bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rpm-ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rpm-ostree tool binds together the RPM packaging model with the OSTree model of bootable file system trees. It provides commands that can be used both on client systems and on server-side composes. The rpm-ostree-client package provides commands for client systems to perform upgrades and rollbacks. Bug Fix(es): * [9.4.z] Backport wrap of kernel-install for scriptlets(JIRA:Rocky Linux-36085) rocky-linux-9-x86-64-appstream-rpms rpm-ostree-2024.3-4.el9_4.x86_64.rpm 010922ba6951d923e19f4f0f31613af4fab0c92784b862cedeb1e6282a44c389 rpm-ostree-libs-2024.3-4.el9_4.i686.rpm 7a257a1d066337d226e16e9f08a39b4ae248b891e2ad62590bf674c1dc65daed rpm-ostree-libs-2024.3-4.el9_4.x86_64.rpm 05d6c8d9fe76ecd4c472287d80e8c49834595b656113fe7851f2b718eff3b552 RLSA-2024:4502 Important: skopeo security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for skopeo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms skopeo-1.14.3-3.el9_4.x86_64.rpm a6e2773b70fe97d9c5ff09b424d07d9c4ed1f5bfc08ec3cbc6bc4eec7c844315 skopeo-tests-1.14.3-3.el9_4.x86_64.rpm e6c7f40a44094466dbf007daed71aa757fdb8c4c0bb4227b16fee4bbeebf7c25 RLSA-2024:4624 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * Mozilla: Race condition in permission assignment (CVE-2024-6601) * Mozilla: Memory corruption in thread creation (CVE-2024-6603) * Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13 (CVE-2024-6604) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-115.13.0-3.el9_4.x86_64.rpm e7b227b02c43ac24f270b229e8ef4a1f81f698d37b21dc459989c1abc1c74827 RLSA-2024:4928 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: block: null pointer dereference in ioctl.c when length and logical block size are misaligned (CVE-2023-52458) * kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() (CVE-2024-26773) * kernel: bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel (CVE-2024-26737) * kernel: dm: call the resume method on internal suspend (CVE-2024-26880) * kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() (CVE-2024-26852) * kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982) * kernel: nfp: flower: handle acti_netdevs allocation failure (CVE-2024-27046) * kernel: octeontx2-af: Use separate handlers for interrupts (CVE-2024-27030) * kernel: icmp: prevent possible NULL dereferences from icmp_build_probe() (CVE-2024-35857) * kernel: mlxbf_gige: call request_irq() after NAPI initialized (CVE-2024-35907) * kernel: mlxbf_gige: stop interface during shutdown (CVE-2024-35885) * kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (CVE-2023-52809) * kernel: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv (CVE-2021-47459) * kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (CVE-2024-36924) * kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up (CVE-2024-36952) * kernel: net: amd-xgbe: Fix skb data length underflow (CVE-2022-48743) * kernel: epoll: be better about file lifetimes (CVE-2024-38580) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-427.28.1.el9_4.x86_64.rpm 7501833feba2e6bca698513d2141caa27abf0f20b5e0403accfb5d967a59b496 kernel-debug-devel-matched-5.14.0-427.28.1.el9_4.x86_64.rpm 0e14d9ed5bcfb245ba21420872a9edcd7423fff0ae6a907971d53d02dd7621b4 kernel-devel-5.14.0-427.28.1.el9_4.x86_64.rpm bfe2b48453bb0f715baa5ef00d0b2f23a01c50c9ea4bbaba84e8668cd14e8509 kernel-devel-matched-5.14.0-427.28.1.el9_4.x86_64.rpm 463908053f203a6261ecd337d17c484b9d3b55e0ee1ae3a07cbf85463dcf3a3a kernel-doc-5.14.0-427.28.1.el9_4.noarch.rpm 30d0217a47f24b057c73f8651c708e256671a9dd6d49f71a6023b4993474c1b8 kernel-headers-5.14.0-427.28.1.el9_4.x86_64.rpm 0d85aa3f0ed601e9eddee93c5d4dfb1929279751986864e6e814a44ecb9c2ccf perf-5.14.0-427.28.1.el9_4.x86_64.rpm 427fba9902f6eb9961417cc81a558a5de0b9316773ebde3c9ccece7ba7f26272 rtla-5.14.0-427.28.1.el9_4.x86_64.rpm 55224ea72e474f20b86397c0a874df34ee43e896b16d8c222c3594402ef5ef24 rv-5.14.0-427.28.1.el9_4.x86_64.rpm dc1af64972f20582ee7f25f2b8d498022b0b1a7cae3d3eea6a1d4b7532e2e12d RLSA-2024:4935 Important: freeradius security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for freeradius. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network. Security Fix(es): * freeradius: forgery attack (CVE-2024-3596) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms freeradius-3.0.21-40.el9_4.x86_64.rpm f5a35bd6b4d283fbf8862f9297fb7faccf775d56b2a4acc3489f37addff35dbb freeradius-devel-3.0.21-40.el9_4.x86_64.rpm 94ca0bdd38e8d854e3fc316e7a8182da5dd64090f582bad233e65d3e99e71d5a freeradius-doc-3.0.21-40.el9_4.x86_64.rpm ac79df76665e46bc722135c901f71fd7be932cb97cf7caa033d5e977a414c2b8 freeradius-krb5-3.0.21-40.el9_4.x86_64.rpm 3f3c7d7e61497d7a11a110389175b91905e4c2ef1b5e3dc03bef3c2343cfd0aa freeradius-ldap-3.0.21-40.el9_4.x86_64.rpm 745fd6260692b4a089efab61d4f593dff93c7e93ab7cd73bac89d4e2047ec191 freeradius-utils-3.0.21-40.el9_4.x86_64.rpm 3dbd993003ccc4b80d1a2dbbecbe74b63f27f1415d6f50ee114dddfb25c0d0f1 python3-freeradius-3.0.21-40.el9_4.x86_64.rpm 448a7bcf3a342aefa48b48a10995db03d38fc331862b9ea88b64890bb5b334e9 RLSA-2024:4726 Important: httpd security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475) * httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474) * httpd: null pointer dereference in mod_proxy (CVE-2024-38477) * httpd: Potential SSRF in mod_rewrite (CVE-2024-39573) * httpd: Encoding problem in mod_proxy (CVE-2024-38473) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms httpd-2.4.57-11.el9_4.x86_64.rpm ee724ab3fad6fb81cc1f645732dcc1e89b4e96ed927e86ad6cda125f57cbdab3 httpd-core-2.4.57-11.el9_4.x86_64.rpm bf2890e7bf8258e0377940241abd78c9f2bca45ef6a88976e4f73fc13e740593 httpd-devel-2.4.57-11.el9_4.x86_64.rpm 5806e6d3cfe80bec36ca6fb19f0a5c1fb9eb9d47f111a23904c6085f8f29bdd1 httpd-filesystem-2.4.57-11.el9_4.noarch.rpm 6ee4fd465f8a04ff1f6b25dde11311958b7e888572b8cc5c0cb0be722e3b538e httpd-manual-2.4.57-11.el9_4.noarch.rpm 21c834b5a13e6545517db4c24c5ca7a8abdb869a0ac7e4193e26603d16be1bc0 httpd-tools-2.4.57-11.el9_4.x86_64.rpm b5a77a636d359989d6c5d887fa2db62965e4d911abc9bb071187da1ea13fda6d mod_ldap-2.4.57-11.el9_4.x86_64.rpm f9533f85660c52750d0880f2f72a547df4d22f4fc1d0f3823a8864b6dd7b8b44 mod_lua-2.4.57-11.el9_4.x86_64.rpm 027f30aa3f4159e357cf5518c715c2f8fb0cfff25d7e078a68c877bea55ed1e9 mod_proxy_html-2.4.57-11.el9_4.x86_64.rpm a790a42c69be63cd768a2e7cb1111d3c3dc0f094f17a6c4f3cc5cd800c0f3888 mod_session-2.4.57-11.el9_4.x86_64.rpm 42c25e43fdcc3f1a6d964999497a7054f9d4adbdc339ee82885604359e83e9cb mod_ssl-2.4.57-11.el9_4.x86_64.rpm e51f98dccd9c53f572fa80f87d05a6ea1429ec0a64bcb76a83bc833edc334e2b RLSA-2024:4861 Moderate: squid security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for squid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: vulnerable to a Denial of Service attack against Cache Manager error responses (CVE-2024-23638) * squid: Out-of-bounds write error may lead to Denial of Service (CVE-2024-37894) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms squid-5.5-13.el9_4.x86_64.rpm 6ba51b15b2a79583aa793268b25ec5b852e0f62075d26dd5a09368b25ec92205 RLBA-2024:5811 scap-security-guide bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scap-security-guide. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es) and Enhancement(s): * [Rocky Linux8.7/SCAP/Rsyslog] Rainier syntax not valid for cron and netstreamdriver parameters (JIRA:Rocky Linux-1816) * CIS Server Level 1 installation can be started with "Server with GUI" (JIRA:Rocky Linux-23852) * Journald is not configured correctly after openscap remediation profile CIS Server Level 1 is applied (JIRA:Rocky Linux-38531) * Authselect rules hardening wipes already active features (JIRA:Rocky Linux-39383) * ANSSI-BP-028 (intermediary) breaks password changes (JIRA:Rocky Linux-44983) * CIS Rocky Linux 9 Benchmark for Level 2 scan fails on "Ensure all users last password change date is in the past" rule (JIRA:Rocky Linux-47129) * Rebase scap-security-guide to the 0.1.74 version (JIRA:Rocky Linux-53865) * Rebase scap-security-guide to the 0.1.74 version [rhel-8.10.z] (JIRA:Rocky Linux-53913) * ANSSI-BP-028 (intermediary) breaks password changes [rhel-8.10.z] (JIRA:Rocky Linux-54390) rocky-linux-9-x86-64-appstream-rpms scap-security-guide-0.1.74-1.el9_4.rocky.1.1.noarch.rpm f34b33940a6d5a41c8264dedd6af9f212713a982f811aacaa9f38b3a721c99d7 scap-security-guide-doc-0.1.74-1.el9_4.rocky.1.1.noarch.rpm a0a33fcb089c7dee91759382d6f75952b021b9b732a5f1af88c1b543cab8b747 RLSA-2024:5363 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Errata Tool Automation could not update the description because it is longer (4803) than ET limit of 4000 characters. (OSCI-6058) Please update the description manually. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-427.31.1.el9_4.x86_64.rpm 2362c0e985fc0974c3ca33399a42076d70f6837f6dd4925d56f0d3e01d67b1d6 kernel-debug-devel-matched-5.14.0-427.31.1.el9_4.x86_64.rpm af3a29fb91446ccd8dadc5f411ce8f11c59a121c7261c14e8ee62cb4bb02fb5a kernel-devel-5.14.0-427.31.1.el9_4.x86_64.rpm 2f7782b3ff9d49d799111e9181bf8797d35b977a6714f9bc5a4bb98dbbdad707 kernel-devel-matched-5.14.0-427.31.1.el9_4.x86_64.rpm 2d4349833e75cf661ac3fbcdaf77549fa7ce179a8a29c46be95ea4f382453548 kernel-doc-5.14.0-427.31.1.el9_4.noarch.rpm 2051df1527b042b66548e19007a94e6db537e3f7dbd4af41238f65e4e2ac5a92 kernel-headers-5.14.0-427.31.1.el9_4.x86_64.rpm 274dff5b9c627945586c3187f3e425ffe95137753bc8d3e0ed9ac65fd851a606 perf-5.14.0-427.31.1.el9_4.x86_64.rpm 5195f51a1a3976de01a82fd22a846ca82ec2704a807d754bd1f5f282d59e6130 rtla-5.14.0-427.31.1.el9_4.x86_64.rpm adde14f31219d606b35c685b316d84fb045363c81c6652524b6e5e552aea7ee0 rv-5.14.0-427.31.1.el9_4.x86_64.rpm 580a87ef2f15fb5494bf8fd2afb16d2c85649a7b6f3d04eb30d2ae4939b0b748 RLSA-2024:5192 Moderate: 389-ds-base security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for 389-ds-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es): * 389-ds-base: Malformed userPassword hash may cause Denial of Service (CVE-2024-5953) * 389-ds-base: unauthenticated user can trigger a DoS by sending a specific extended search request (CVE-2024-6237) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms 389-ds-base-2.4.5-9.el9_4.x86_64.rpm bce9ff04c0d3135dec9157ed64caac4076feeddebce7e334353d65e18462e1f5 389-ds-base-libs-2.4.5-9.el9_4.x86_64.rpm 1125c4507b053175a378cad9d75c6e19dc9ecb4e65e63f508a31a6559c9bdde7 python3-lib389-2.4.5-9.el9_4.noarch.rpm a3f42f9edcf53706f06e92172efa0483385d7bd6e0710d82da84231f6945f963 RLSA-2024:5231 Important: bind and bind-dyndb-ldap security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for bind-dyndb-ldap, bind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam (CVE-2024-1737) * bind9: bind: SIG(0) can be used to exhaust CPU resources (CVE-2024-1975) * bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content (CVE-2024-4076) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms bind-9.16.23-18.el9_4.6.x86_64.rpm 40dc2f7dd9a6820ae46c80c2dd30151a4378c327ffa70c076b3d88744825adf0 bind-chroot-9.16.23-18.el9_4.6.x86_64.rpm ce6b07e1042cfa92866ed514bfa884a80dccb911884785d2de12e4b3cab36888 bind-dnssec-doc-9.16.23-18.el9_4.6.noarch.rpm 16c7b39d7ecb5ba88a994ed9680042995db178b1ba6126b222cd976d12e79f9f bind-dnssec-utils-9.16.23-18.el9_4.6.x86_64.rpm b0e6550b4394eff5b64102b652ec8fd7e09e94d8897c0d98416ba137f7ca0138 bind-dyndb-ldap-11.9-10.el9_4.x86_64.rpm 73905fe6df833f30c3a28df5ef303130574c9f0a62d171ef7f0c2676e7707d0a bind-libs-9.16.23-18.el9_4.6.x86_64.rpm 265de3564184c21bb273ba841f6a1bdee830439225087aa033529b536f29020f bind-license-9.16.23-18.el9_4.6.noarch.rpm d7d1e7b91c5e721bfd9e93071a85cde039007382f1fbcb84160f37fdbea192db bind-utils-9.16.23-18.el9_4.6.x86_64.rpm d7def451e48f6f40e7722a5a63812c3c8499ebe71ebc79d2cd2bf594cc95c05d python3-bind-9.16.23-18.el9_4.6.noarch.rpm 144c2218b46f1bccbb2cd6686aa032ffd373527fd56193d70fe9cc143ce1a2a4 RLBA-2024:9256 opentelemetry-collector bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for opentelemetry-collector. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms opentelemetry-collector-0.107.0-10.el9_5.x86_64.rpm a8bd9ad015c01c8c32ccf5870343f8f6c57ad49b283d8a5c62065fb564e976a5 RLBA-2024:5463 virt-v2v bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-v2v. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The virt-v2v package provides a tool for converting virtual machines to use the KVM (Kernel-based Virtual Machine) hypervisor or Rocky Enterprise Software Foundation Enterprise Virtualization. The tool modifies both the virtual machine image and its associated libvirt metadata. Also, virt-v2v can configure a guest to use VirtIO drivers if possible. Bug fixes: * qemu-guest-agent not being installed at first boot in Windows Server 2022 (Rocky Linux-54150) * Uninstalling vmware-tools from windows guest sometimes fails with exit code 1618 or exit code 1603 (Rocky Linux-54151) * Allow --mac gw and len fields to be optional (Rocky Linux-54152) rocky-linux-9-x86-64-appstream-rpms virt-v2v-2.4.0-3.el9_4.x86_64.rpm 2b36c2ac4d84e2e180b2d9344ac16a169fa9e9eb464c42a1aeb031858d15940b virt-v2v-bash-completion-2.4.0-3.el9_4.noarch.rpm c7d02ea81b02613ae254616a3af388d61be7c048933a58ce6f754571d0f95280 RLSA-2024:5533 Important: python3.12-setuptools security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.12-setuptools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Setuptools is a collection of enhancements to the Python 3 distutils that allow you to more easily build and distribute Python 3 packages, especially ones that have dependencies on other packages. This package also contains the runtime components of setuptools, necessary to execute the software that requires pkg_resources. Security Fix(es): * pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-setuptools-68.2.2-3.el9_4.1.noarch.rpm 377365ee95abd045fb9c876c5d355938a809c5c22c846dfcae648d74a6715d37 RLSA-2024:5138 Important: httpd security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Security issues via?backend applications whose response headers are malicious or exploitable (CVE-2024-38476) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms httpd-2.4.57-11.el9_4.1.x86_64.rpm e2fc806a5f99cff9ab328d83871a326cceecd5dd08042124c1bce6f08c1646e6 httpd-core-2.4.57-11.el9_4.1.x86_64.rpm 2c16142ab81ce85193dcedb81a0620badb0c499c1cd5b1737f84b9272b3e5601 httpd-devel-2.4.57-11.el9_4.1.x86_64.rpm c478e339f43ff26f9d6db0368f48b08fcd5cb248d2cb3d20fda3e00740c1004b httpd-filesystem-2.4.57-11.el9_4.1.noarch.rpm 424e10e81c95deb9f77499ef52aa78ab677d8f99c0f2a2f37bd4b3ba76f5c69e httpd-manual-2.4.57-11.el9_4.1.noarch.rpm aeef24b41d955cb4b8dcd5fb9d95e5954e6b906018c28886e6d79538595d1fff httpd-tools-2.4.57-11.el9_4.1.x86_64.rpm 932cb0d7629c69cdfd4967e4fb9e54fe5525fd374875ba2ee1e120495b675ebc mod_ldap-2.4.57-11.el9_4.1.x86_64.rpm f15e65ee8661840f8830649cfeef84fdd34ebc15a0a4782a62f3b33be5811001 mod_lua-2.4.57-11.el9_4.1.x86_64.rpm dbb968ce25509f2eb0dfda6aaa81a174a32aacd2b69290bb86d193edbf1c346f mod_proxy_html-2.4.57-11.el9_4.1.x86_64.rpm d0c70d2e9b3504db5fe117639415d48d3a7c837d8e6fc91fcfc00fe9d0f80b9a mod_session-2.4.57-11.el9_4.1.x86_64.rpm 8d1fb47f10c6a4c77c988639d6d01f6ebd370988be4e011d236592013f710338 mod_ssl-2.4.57-11.el9_4.1.x86_64.rpm 6e045d16afe5d6758b25ed33f5fb95b027b07eb8babeceb2515cd1ab122e17fd RLSA-2024:5279 Important: python3.11-setuptools security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.11-setuptools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Setuptools is a collection of enhancements to the Python 3 distutils that allow you to more easily build and distribute Python 3 packages, especially ones that have dependencies on other packages. This package also contains the runtime components of setuptools, necessary to execute the software that requires pkg_resources. Security Fix(es): * pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-setuptools-65.5.1-2.el9_4.1.noarch.rpm 82188a2a6550cbf1e870cddc088f7c42bbb12f58281ff307ffee805fb4b57766 python3.11-setuptools-wheel-65.5.1-2.el9_4.1.noarch.rpm 75a83fc726278275e32d8eedea32f8809431b4babd374b8acb1f183976f2ecee RLSA-2024:6567 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463) * kernel: nfsd: fix RELEASE_LOCKOWNER (CVE-2024-26629) * kernel: mm: cachestat: fix folio read-after-free in cache walk (CVE-2024-26630) * kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again (CVE-2024-26720) * kernel: Bluetooth: af_bluetooth: Fix deadlock (CVE-2024-26886) * kernel: kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address (CVE-2024-26946) * kernel: KVM: SVM: Flush pages under kvm-&gt;lock to fix UAF in svm_register_enc_region() (CVE-2024-35791) * kernel: mm: cachestat: fix two shmem bugs (CVE-2024-35797) * kernel: x86/coco: Require seeding RNG with RDRAND on CoCo systems (CVE-2024-35875) * kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (CVE-2024-36000) * kernel: iommufd: Fix missing update of domains_itree after splitting iopt_area (CVE-2023-52801) * kernel: net: fix out-of-bounds access in ops_init (CVE-2024-36883) * kernel: regmap: maple: Fix cache corruption in regcache_maple_drop() (CVE-2024-36019) * kernel: usb-storage: alauda: Check whether the media is initialized (CVE-2024-38619) * kernel: net: bridge: mst: fix vlan use-after-free (CVE-2024-36979) * kernel: scsi: qedf: Ensure the copied buf is NUL terminated (CVE-2024-38559) * kernel: xhci: Handle TD clearing for multiple streams case (CVE-2024-40927) * kernel: cxl/region: Fix memregion leaks in devm_cxl_add_region() (CVE-2024-40936) * kernel: net/sched: Fix UAF when resolving a clash (CVE-2024-41040) * kernel: ppp: reject claimed-as-LCP but actually malformed packets (CVE-2024-41044) * kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() (CVE-2024-41055) * kernel: PCI/MSI: Fix UAF in msi_capability_init (CVE-2024-41096) * kernel: xdp: Remove WARN() from __xdp_reg_mem_model() (CVE-2024-42082) * kernel: x86: stop playing stack games in profile_pc() (CVE-2024-42096) * kernel: Revert &#34;mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again&#34; (CVE-2024-42102) * kernel: mm: avoid overflows in dirty throttling logic (CVE-2024-42131) * kernel: nvme: avoid double free special payload (CVE-2024-41073) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-427.35.1.el9_4.x86_64.rpm 2708f1af281f5179ec45a989769de8bdc33c35b548d65a98bf5a647561350e3b kernel-debug-devel-matched-5.14.0-427.35.1.el9_4.x86_64.rpm b0271e0bd1d54297942e7b79367af6816814505894e7927d377b4fa0d446edbc kernel-devel-5.14.0-427.35.1.el9_4.x86_64.rpm 24d02923fec85b0a96f4ee0882075707e2d55134507b6d8982e8fcea2c9be1f8 kernel-devel-matched-5.14.0-427.35.1.el9_4.x86_64.rpm cdaec8f1b606cfd5df4539339687464c3f457419a3b10d1c6820094d2361070a kernel-doc-5.14.0-427.35.1.el9_4.noarch.rpm c4095a1ac3f67b5c3ee8f64512726c55c21c7b17de10c5101894876f5f1ca2a3 kernel-headers-5.14.0-427.35.1.el9_4.x86_64.rpm fcb8b1335323494f0c6a4ef2b3088536ad94c7fbec405064b9831adcdc468894 perf-5.14.0-427.35.1.el9_4.x86_64.rpm 37d304c0cc6e93772d744970477b878d8ecec22db0f268b5ad93f8a073e04813 rtla-5.14.0-427.35.1.el9_4.x86_64.rpm 1f83539e941ca8fce9241fc5b4a753478d1fcdbe72b60c8a5caaa4da674f7532 rv-5.14.0-427.35.1.el9_4.x86_64.rpm 28fe72241d609d466a970fe26216869c4295574211481bfe19e8ab3fcb179ca8 RLSA-2024:6464 Moderate: glib2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for glib2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * glib2: Signal subscription vulnerabilities (CVE-2024-34397) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms glib2-devel-2.68.4-14.el9_4.1.i686.rpm 8a72a79ada8b4c30ef44147f64f41876ecdd1e4fee00a0cbd3f7d9e5d7c27abb glib2-devel-2.68.4-14.el9_4.1.x86_64.rpm 7ef4a75f6a1295bacda881215c3f4eeead21913140ea02819aa882745dc301f7 glib2-doc-2.68.4-14.el9_4.1.noarch.rpm d0571b256dbcadbbd6dd7cb2af8b9691897050828cb9aee276fe242e68581b3e glib2-tests-2.68.4-14.el9_4.1.x86_64.rpm d48d3f9ad7ae76aa39ea1aa620a03d9596551e5154651d4a40aa60c3c4b0803b RLSA-2024:5999 Important: postgresql security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for postgresql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL (CVE-2024-7348) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms postgresql-13.16-1.el9_4.x86_64.rpm 3134e2e1f66599bec78f9253fb3b89548d78dbfa29349ae6cdf74035394e84ee postgresql-contrib-13.16-1.el9_4.x86_64.rpm 4e203afc1a165afdb33b1eae11691d4f4b9b485184ae421b319c6e480917f8c1 postgresql-plperl-13.16-1.el9_4.x86_64.rpm 2e8ca1c831a8090e2793687ec95e78fab91ebb818dbba47064bf2ce60da44840 postgresql-plpython3-13.16-1.el9_4.x86_64.rpm 9af349f8a12763c6440b4e8709c690d53c5762fe142b905f7d963a79f8ddb8ae postgresql-pltcl-13.16-1.el9_4.x86_64.rpm bdc31de3e0a3a9dfc4f6237627b5523c2feb9ab733891122ac5a58dfaa93e771 postgresql-private-libs-13.16-1.el9_4.x86_64.rpm 2edd85939b4eb7e948b9a0ced4a3cb78c0412ab238961c426020f36e40793f68 postgresql-server-13.16-1.el9_4.x86_64.rpm d23761e5c7d995ab0c8bf9376ee8858d005e2e5dcc8f3d383d9b7505fce523cf postgresql-upgrade-13.16-1.el9_4.x86_64.rpm cd0c20e58bd73356d9552544365ea84ef238c0357df8ceb03f25ef43446a2730 RLBA-2024:6143 virt-v2v bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-v2v. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution forLinux on numerous hardware platforms. The virt:rhel module contains packageswhich provide user-space components used to run virtual machines using KVM.The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix(es) and Enhancement(s): * [RFE] Bundle and support virt-v2v-in-place for MTV warm migrations scenarios [rhel-9.4.z] (JIRA:Rocky Linux-55823) * Re-enable Windows disks post-live migration [rhel-9.4.z] (JIRA:Rocky Linux-55837) rocky-linux-9-x86-64-appstream-rpms virt-v2v-2.4.0-4.el9_4.x86_64.rpm 4a545de48c795bf2cc8c674dfaf8d60d466c2b746ba92e07d4805088edce18de virt-v2v-bash-completion-2.4.0-4.el9_4.noarch.rpm afbab338005883a80746c3f0ce3b42e02ce58f1a33559a90b661e3a611137b94 RLSA-2024:6146 Moderate: python3.12 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the "python3.12" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the "python3.12-" prefix. Security Fix(es): * cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection (CVE-2024-6923) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-3.12.1-4.el9_4.3.x86_64.rpm 9b1bf1bbfbc00d253a2a2f0867f77d66ea1f956d4bba4aa468c1912b2d94b957 python3.12-devel-3.12.1-4.el9_4.3.i686.rpm 78c890086949848e1ce4acfcd417822d90b3fcc4a48deaaded9d5e0180e947b4 python3.12-devel-3.12.1-4.el9_4.3.x86_64.rpm 451720fc2129c1a353676958acbc3317545753837dcce250f1950e03ea78ae62 python3.12-libs-3.12.1-4.el9_4.3.i686.rpm cc1e5ec4ee57ec4a6bcb79e653561d2ea11858d946cd6fac42ded2ad6fb849be python3.12-libs-3.12.1-4.el9_4.3.x86_64.rpm 60317b70b17a41d31ace3582458e3147c5ccae23143060ff3d6b36d2ab57b63f python3.12-tkinter-3.12.1-4.el9_4.3.x86_64.rpm 521bf8f238f75fb0cbad0f70ff2760b63e55ac65f3a6c5e6e26f154f09bc6798 RLBA-2024:6287 libguestfs bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libguestfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libguestfs packages contain a library used for accessing and modifying virtual machine disk images. Bug Fix(es) and Enhancement(s): * sgdisk fails with "Invalid partition data!" for win2019, win2022, win2025 guests with three additional online disks [rhel-9.4.z] (JIRA:Rocky Linux-56697) rocky-linux-9-x86-64-appstream-rpms libguestfs-1.50.1-8.el9_4.x86_64.rpm 74a042a83610f58bb2b3c966aeb8d11ccb61fe5064d6c00f73c22effebfbeb8b libguestfs-appliance-1.50.1-8.el9_4.x86_64.rpm f127b2812bbb77218e3d6186c15af49c68b9252c547af9a85c6971d86e6ae42c libguestfs-bash-completion-1.50.1-8.el9_4.noarch.rpm f808fa5130ab9d2b5f71388bf4ef4852ae8f2a5c5a8bd8fbcacfcbc5317241c9 libguestfs-inspect-icons-1.50.1-8.el9_4.noarch.rpm fa3557be8af2ac8b12b518db5fc9039fa29daf8f656aa934fe5612f10a24902d libguestfs-rescue-1.50.1-8.el9_4.x86_64.rpm 751a9426e4b5d91ae19659c2e106639b0b52a7f796b7d2d575043c437487e7ba libguestfs-rsync-1.50.1-8.el9_4.x86_64.rpm ff6ba0a98b6cc3a808d566d0bf9f9dea0c8dbde70773c426bae7895e040265ee libguestfs-xfs-1.50.1-8.el9_4.x86_64.rpm 7a34ad8fab91174715265c7fc3263b0bd8da1a891c3adf4308476700f6ef2e64 perl-Sys-Guestfs-1.50.1-8.el9_4.x86_64.rpm 6a938bb942415112cf1a2701da4e57af1681c354df9cad91e25b3246f0c91072 python3-libguestfs-1.50.1-8.el9_4.x86_64.rpm 7b83765493b55b0ef0fe84a2c41ce10804b7042401bcfe3a6103548bd6efaded RLBA-2024:6416 augeas bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for augeas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Augeas is a configuration editing tool. It parses configuration files in their native formats and transforms them into a tree. Configuration changes are made by manipulating this tree and saving it back into native config files. Bug Fix(es) and Enhancement(s): * libguestfs pops up error when ?there is a trailing comma after character like nosuid in guest /etc/fstab [rhel-9.4.z] (JIRA:Rocky Linux-56992) rocky-linux-9-x86-64-appstream-rpms augeas-1.13.0-6.el9_4.x86_64.rpm ba47d317f491e35066efe9f0d595f5d7c74570baadced9ec3f07ae4fe8180af6 augeas-libs-1.13.0-6.el9_4.i686.rpm 38eb60c7d70e6f35e1a7c62da881b0baf1a7a1316b24dfe08d5dc1ebf11bcf59 augeas-libs-1.13.0-6.el9_4.x86_64.rpm 2ac9a5e626ea70d1890d5ecc64937eeb9fa9c701b38722476f0e5419d3967fe9 RLSA-2024:6529 Moderate: dovecot security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for dovecot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Dovecot is an IMAP server for Linux and other UNIX-like systems, written primarily with security in mind. It also contains a small POP3 server, and supports e-mail in either the maildir or mbox format. The SQL drivers and authentication plug-ins are provided as subpackages. Security Fix(es): * dovecot: using a large number of address headers may trigger a denial of service (CVE-2024-23184) * dovecot: very large headers can cause resource exhaustion when parsing message (CVE-2024-23185) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms dovecot-2.3.16-11.el9_4.1.x86_64.rpm e2296f5adc2a56c9cc094aed17981b010ae294bc7739d64b227c4de13d85ecb2 dovecot-mysql-2.3.16-11.el9_4.1.x86_64.rpm 5d7749a0c30972971e68510b8c7b6b5526851da4ea63e1229f15bb81b33b005e dovecot-pgsql-2.3.16-11.el9_4.1.x86_64.rpm 58a3790e60ac7814543450287d37e0a04cfc6e38a0c398d5fbba59cf731fadc5 dovecot-pigeonhole-2.3.16-11.el9_4.1.x86_64.rpm c3c683af6946abcaffd4816513df5c2661d65461f1ee574f4c3c3190a8a61471 RLBA-2024:6669 libvirt bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution forLinux on numerous hardware platforms. The virt:rhel module contains packageswhich provide user-space components used to run virtual machines using KVM.The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix(es) and Enhancement(s): * Opening a vpx:// URL fails if the backing VMX file has a "*" character in any key [rhel-9.4.z] (JIRA:Rocky Linux-58676) rocky-linux-9-x86-64-appstream-rpms libvirt-10.0.0-6.7.el9_4.x86_64.rpm 7cb4ebd8b1c7dcd4bd307e3e6dc1b9512876423a1517ea9eba7d909059ec443b libvirt-client-10.0.0-6.7.el9_4.x86_64.rpm bd234ff2c4b9ab12d30439a4946c99933b655b43aa45d35a9e473719bf9a744f libvirt-client-qemu-10.0.0-6.7.el9_4.x86_64.rpm 0a7f5487bb13e13e9a0f0a3be4246e0b91ef78ef7e4c9af469401b5f4ab7bc95 libvirt-daemon-10.0.0-6.7.el9_4.x86_64.rpm b8ec58633eacf662b3ca629b7401c79e9b71cfa20380f89d36f6a164e36c8082 libvirt-daemon-common-10.0.0-6.7.el9_4.x86_64.rpm 552d8ab60605861dc53ae0a640af5376d7517c9be281ee32009280e49db0dbc8 libvirt-daemon-config-network-10.0.0-6.7.el9_4.x86_64.rpm c4db64802f93b48a9a271beb2f387eb377adfc4ece86be633e3e4a5e38edb7bf libvirt-daemon-config-nwfilter-10.0.0-6.7.el9_4.x86_64.rpm 00f59979dc52de395e3ff8fa58a303dcbfedbf7276862911af24fd48d87c1f44 libvirt-daemon-driver-interface-10.0.0-6.7.el9_4.x86_64.rpm 29512716d6fe50d3ee46f32eaff497986639d46cefc8f82bda82a46f4bcbe5cb libvirt-daemon-driver-network-10.0.0-6.7.el9_4.x86_64.rpm d3a2c4b8ed2510e4713e1e727094b9d766cf5eed5cdfa4b8e4eebad8db90107c libvirt-daemon-driver-nodedev-10.0.0-6.7.el9_4.x86_64.rpm 5b8ddb5bfd0fe5a6eebead1fa075e6e81a5e0d4bd7f61104b21b5efe8f58efba libvirt-daemon-driver-nwfilter-10.0.0-6.7.el9_4.x86_64.rpm 7a4369ec37f99094efb854a1d07156b0b9f3a5b7301f30bbf9186c0ca9f0c166 libvirt-daemon-driver-qemu-10.0.0-6.7.el9_4.x86_64.rpm 270bd729f6a9caf047b05d20fa8ef405af91c98aa8a4649bf75dd46b75b76d6f libvirt-daemon-driver-secret-10.0.0-6.7.el9_4.x86_64.rpm 52851bc81e41ccbe4514d19aaa701e54bdad1044a1a8f029d21020f54fd19112 libvirt-daemon-driver-storage-10.0.0-6.7.el9_4.x86_64.rpm f0d602e6e2df3ee47b3366af524bde998b0b0706e953bb8215fa3e74010502db libvirt-daemon-driver-storage-core-10.0.0-6.7.el9_4.x86_64.rpm 6d65a0ffc8735ac493a0940a0f59dac83b68fbd67bb7055d090838dd3e6d5a07 libvirt-daemon-driver-storage-disk-10.0.0-6.7.el9_4.x86_64.rpm fd3190ac41aa56c387515b8f209e09e9f2c40762341447bab318e69f3d05e7a6 libvirt-daemon-driver-storage-iscsi-10.0.0-6.7.el9_4.x86_64.rpm 9a133db155bb05ce3bdf73ee1585a98d350253675702132c9d92455833f9f890 libvirt-daemon-driver-storage-logical-10.0.0-6.7.el9_4.x86_64.rpm 3b05fa93b1494c3b5f54889c6d0b98105baba6542c1c0e61db09ee5da2b14edf libvirt-daemon-driver-storage-mpath-10.0.0-6.7.el9_4.x86_64.rpm 6d67a693e72cae9ec81925399e524b36692cb343fbb9472d65d81aea62d77e04 libvirt-daemon-driver-storage-rbd-10.0.0-6.7.el9_4.x86_64.rpm d846f0815621d8fce2d762221232455596b068ffbbc3b824b869f11b6b42356a libvirt-daemon-driver-storage-scsi-10.0.0-6.7.el9_4.x86_64.rpm 6285bcce416632139dca76828863b7d136f9efa17f7857963b7b6fba32b5312e libvirt-daemon-kvm-10.0.0-6.7.el9_4.x86_64.rpm 5843eb92fbcc41bf8479590cef5423693f92f267745a3389a335f887ea555829 libvirt-daemon-lock-10.0.0-6.7.el9_4.x86_64.rpm c0a498b29f8aae2b1e6f0c5e5e4950babb5ac31c178f9fd1e7e4a8f8d3762834 libvirt-daemon-log-10.0.0-6.7.el9_4.x86_64.rpm 00c9ed0b5e598dd3014efbff54befbb6903106e20c78515d8158159f82bd12ca libvirt-daemon-plugin-lockd-10.0.0-6.7.el9_4.x86_64.rpm 3be61fd531157e009a229a426df344c654916be543a08e256c12ce5c0b3a4c52 libvirt-daemon-proxy-10.0.0-6.7.el9_4.x86_64.rpm b75f11d831a214ddc25619e709cab46130a81857e52ca5115914f2bc2861ec03 libvirt-libs-10.0.0-6.7.el9_4.x86_64.rpm da255b1fc06e941516bd7c5e7b45bebd767e4aec5944e2f63925c1a315fddb91 libvirt-nss-10.0.0-6.7.el9_4.x86_64.rpm a6d3fb6c765bc0732efd06f09010a4ebb2aa0768684bc8211ef2dea9e3362874 RLSA-2024:5693 Important: tomcat security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tomcat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es): * tomcat: Improper Handling of Exceptional Conditions (CVE-2024-34750) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms tomcat-9.0.87-1.el9_4.2.noarch.rpm 86e2b506ce80f6694357f69a310824336abd89da58fcb884a7472ccc27c457c4 tomcat-admin-webapps-9.0.87-1.el9_4.2.noarch.rpm 60684fa05e5906fc04006ab34a27ddf06ead3379a9c73d4bd8e73c8f11dc5996 tomcat-docs-webapp-9.0.87-1.el9_4.2.noarch.rpm b2db5fbedcd1b74219683f09ed03c5151e30773e1f9bc9caa9604501b116bf9a tomcat-el-3.0-api-9.0.87-1.el9_4.2.noarch.rpm 9e4fd3d3907a6a56b9cdca13639fde93202592b952ae0d1d4e1a249689b75e6a tomcat-jsp-2.3-api-9.0.87-1.el9_4.2.noarch.rpm 043d008cad3e0f4e3ae140257bf288dd1065b01496b3b40cdf1dd6889461c341 tomcat-lib-9.0.87-1.el9_4.2.noarch.rpm 76bb272aec2e0afe13b47eda30435595309c384ab42ee3a42b517add621f3f9a tomcat-servlet-4.0-api-9.0.87-1.el9_4.2.noarch.rpm 70464fd366b6ea55028cb9a5e83f4d3d8c62186495a69d6b6a4905420f867c77 tomcat-webapps-9.0.87-1.el9_4.2.noarch.rpm 4a96e549feb5b49081f0cc4e0cc5e1c7e34a13e93b5cdaa0c1cda7e4399e2527 RLBA-2024:6469 net-snmp bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for net-snmp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Bug Fix(es): * Getting "systemstats_linux: unexpected header length in /proc/net/snmp. 237 != 224" when starting snmpd service (JIRA:Rocky Linux-40403) * [BUG]snmpd segfaults with error on subcontainer 'ifTable container' remove (-1) [rhel-9.4.z] (JIRA:Rocky Linux-46039) rocky-linux-9-x86-64-appstream-rpms net-snmp-5.9.1-13.el9_4.2.x86_64.rpm 8b54d7d80061818c2878d03266abedabca9fd21470de7e016595fdee8314a178 net-snmp-agent-libs-5.9.1-13.el9_4.2.i686.rpm e558417f5609e91b7f211d92910216dfb6f6145f2e05c4651c8abf2e7ce91ca7 net-snmp-agent-libs-5.9.1-13.el9_4.2.x86_64.rpm 927be1e8f5de6a41a4fddbbbdb888034795d9ac2538725b6ed8dcc593ac73948 net-snmp-devel-5.9.1-13.el9_4.2.i686.rpm 360f32cb5dd05b3c0bf442eca04cbcf74d0df06523cd1b0dfe3f95f041470bc8 net-snmp-devel-5.9.1-13.el9_4.2.x86_64.rpm ac464f0cf40688ef6655e69d0282b013faf1eacbe174dfa7257637d02a0d3267 net-snmp-libs-5.9.1-13.el9_4.2.i686.rpm da24b5413d3bb11b444483296294504900da939214880d7fffbf2a89db10ae85 net-snmp-libs-5.9.1-13.el9_4.2.x86_64.rpm ed2bcef68a27a781e845df17c7b197e34f2af16edc06cd4ce3cae0dedacf21d5 net-snmp-perl-5.9.1-13.el9_4.2.x86_64.rpm 2a818ac03894cbf20b7da781cbd21dbe11333ea16bc64d7137124d200f544b2a net-snmp-utils-5.9.1-13.el9_4.2.x86_64.rpm 4b75b03163582179f21e5536787b22f9d346d9728e098b3a30dde411747d8c6d python3-net-snmp-5.9.1-13.el9_4.2.x86_64.rpm 117c24bf0b309dc9aa4edda95e294419d6453f15c82b1f580fef86ce06d16e4f RLBA-2024:6679 nss bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Bug Fix(es) and Enhancement(s): * Rebase NSS to 3.101 for Firefox (JIRA:Rocky Linux-46851) * nss: Mozilla: Memory corruption in NSS (JIRA:Rocky Linux-47122) * Rebase NSS to 3.101 for Firefox [rhel-9.4.z] (JIRA:Rocky Linux-46852) * nss: Mozilla: Memory corruption in NSS [rhel-9.4.z] (JIRA:Rocky Linux-47123) * NSS: cannot decrypt PKCS#12 with MD5 HMAC, not even with allow=ALL (JIRA:Rocky Linux-49803) * drop DSA self-tests in FIPS from nss (JIRA:Rocky Linux-5212) * freebl/softoken ppcle64 needs renable INIT_SUPPORT. (JIRA:Rocky Linux-6198) * nss: PK11_Encrypt using CKM_CHACHA20 can reveal plaintext on Intel Sandy Bridge machines [rhel-9.4.z] (JIRA:Rocky Linux-53578) rocky-linux-9-x86-64-appstream-rpms nspr-4.35.0-14.el9_4.i686.rpm e6e4d8c8d1a67be5d789475269692b7c1a03fd5ee62cb5784599568550f193ac nspr-4.35.0-14.el9_4.x86_64.rpm fce32babfcf598a75e01e80786626dd4d616d16a60f0bdf360112f94ba729601 nspr-devel-4.35.0-14.el9_4.i686.rpm c748d6cfd0021349d46ac4c88a2562fcf3cfc6426d83b662a13e7fffe7dfb301 nspr-devel-4.35.0-14.el9_4.x86_64.rpm 81cf4876a4f59f09bed4ee67482ea42ce1559087311aef336a2361ef34113b60 nss-3.101.0-7.el9_4.i686.rpm 864a84dd0f376180300c93212a67fe542d291fe1c71a8dc93a1a27382ac1cf83 nss-3.101.0-7.el9_4.x86_64.rpm 0ce9c005fd04cacda4ed01cf607910265f062f75a313cc52415b926803c66dcc nss-devel-3.101.0-7.el9_4.i686.rpm 29504d3424ef0ac0d900a311211f6b23626e1ee3c59531c943ea7cdebfc75f38 nss-devel-3.101.0-7.el9_4.x86_64.rpm 552628ce550730ede80af664fd1dafbcada27666f8f3b9ad22c0a019ff1e8cab nss-softokn-3.101.0-7.el9_4.i686.rpm 4a4dab1a01243373256c923d791786ca388f2504da4a0b65c67e3e2ec3797213 nss-softokn-3.101.0-7.el9_4.x86_64.rpm a8af3e5d885decd9b8160f0bb4ba22f241b559acf95c3f939e9dd885dc696f15 nss-softokn-devel-3.101.0-7.el9_4.i686.rpm e161222b6fa92658a51c867acc8410fb294db205a7a66124e360a8404310ff75 nss-softokn-devel-3.101.0-7.el9_4.x86_64.rpm 3a9dc7e163487fd7523c81dd230b0a808cf5c404869a0e845990e1af42b4f9ed nss-softokn-freebl-3.101.0-7.el9_4.i686.rpm 2d530c667fcc09f4a6d545ec75714694b9865e8459848fb68f9292d3d718c9fe nss-softokn-freebl-3.101.0-7.el9_4.x86_64.rpm ba13cb0716b92181938144c3869f0181664e6a89e3c92d3f51fd4eaaa66a7488 nss-softokn-freebl-devel-3.101.0-7.el9_4.i686.rpm 03d28172c7c15675f705768e256902a8a123f733cffc232f55483444eef3edfd nss-softokn-freebl-devel-3.101.0-7.el9_4.x86_64.rpm 4f0ee5de3273693b017cd818ecded8b921891ce9d48acc3e90144d595936bc06 nss-sysinit-3.101.0-7.el9_4.x86_64.rpm 05650d77a5b450c320a5b8ac1e1e1150bccc82baacce35c2ec063ae81dd70539 nss-tools-3.101.0-7.el9_4.x86_64.rpm 468bbb8e3f739008ce621b64a430cd831247a80bec778c7783488daa181a4187 nss-util-3.101.0-7.el9_4.i686.rpm 57ccfe83152a5d61ca83a7683c384145b2e02cb57c2f2e14742befc539379425 nss-util-3.101.0-7.el9_4.x86_64.rpm da8f3365471c5337af04eb9de452aae274c18e74fe50361a5e2776f95fa98183 nss-util-devel-3.101.0-7.el9_4.i686.rpm 80a43d609d6d5a6fd7c9d91cd6eaed0f29bee512018ceda4ecfcc6ed43907423 nss-util-devel-3.101.0-7.el9_4.x86_64.rpm 04d375ec84aed61bd7eb0a1e2f27417b30b4c7c37f227feccd6aa6103db2c5a9 RLSA-2024:6754 Moderate: expat security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for expat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * libexpat: Negative Length Parsing Vulnerability in libexpat (CVE-2024-45490) * libexpat: Integer Overflow or Wraparound (CVE-2024-45491) * libexpat: integer overflow (CVE-2024-45492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms expat-devel-2.5.0-2.el9_4.1.i686.rpm 2bb54e0647b4a92a7dfc2111e19f8c3b526fdfa45412cc8ac4c617b5bf2fb2c7 expat-devel-2.5.0-2.el9_4.1.x86_64.rpm e76a937e51189b76c1dd05916febffbe396f5654ff1de6e371a8b927241ce3f8 RLSA-2024:6783 Moderate: openssl security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for openssl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: Possible denial of service in X.509 name checks (CVE-2024-6119) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms openssl-devel-3.0.7-28.el9_4.i686.rpm 8dd5aea3afbca424ae1d3ded19d5e7809984e2874e2df6cc8e1f97d55bcc372a openssl-devel-3.0.7-28.el9_4.x86_64.rpm ce8b8dff9b8b57fe7d7a0fd13ea755d1c5a54ac596b744f02bb29eee356eb78c openssl-perl-3.0.7-28.el9_4.x86_64.rpm 1342e88e5cf3cc72514ab0ec0cf0c68c0e5789ca941b7f7e23744b48e90f29a2 RLSA-2024:6757 Moderate: libnbd security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libnbd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Network Block Device (NBD) is a protocol for accessing Block Devices (hard disks and disk-like devices) over a Network. The libnbd is a userspace client library for writing NBD clients. Security Fix(es): * libnbd: NBD server improper certificate validation (CVE-2024-7383) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libnbd-1.18.1-4.el9_4.i686.rpm 8c7eeeeb78ec849476fcadacaa53df1ba518ad261ddc893a4004195c344ced22 libnbd-1.18.1-4.el9_4.x86_64.rpm 17f793943719191a6026854e28dc9340a616a895345030a510aa5959b07e1669 libnbd-bash-completion-1.18.1-4.el9_4.noarch.rpm 521dbf12fbb3f20accfa8c0b724f5d4c127f91a36998501a7c9c6350ee454912 nbdfuse-1.18.1-4.el9_4.x86_64.rpm 1cd2277466e539edc10b75129e20c9eda3d0cdb9d76da269462ca13c7b49ab1b python3-libnbd-1.18.1-4.el9_4.x86_64.rpm d36175ab081eb00c9094e6f8d3b3df085f95d12859a5cfe46efd3a9b1098f7f9 RLSA-2024:7346 Important: cups-filters security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for cups-filters. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently. Security Fix(es): * cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source () * cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076) * cups: libppd: remote command injection via attacker controlled data in PPD file () For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms cups-filters-1.28.7-17.el9_4.x86_64.rpm d5dbaa7ad7969c98e7c6cb505518c8f481aff0a0c2d6a08c7eb1ae9f47a18904 cups-filters-libs-1.28.7-17.el9_4.i686.rpm ff5293b83d61306b7607876443e3a40047d505647422de599146ec3273738ab3 cups-filters-libs-1.28.7-17.el9_4.x86_64.rpm fe1ac3119116b3caab42a4e81905731421575228ed39fdbf97f843597818d158 RLSA-2024:6681 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: 115.15/128.2 ESR () * mozilla: Type confusion when looking up a property name in a &quot;with&quot; block (CVE-2024-8381) * mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran (CVE-2024-8382) * mozilla: Firefox did not ask before openings news: links in an external application (CVE-2024-8383) * mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions (CVE-2024-8384) * mozilla: WASM type confusion involving ArrayTypes (CVE-2024-8385) * mozilla: SelectElements could be shown over another site if popups are allowed (CVE-2024-8386) * mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 (CVE-2024-8387) * mozilla: Type Confusion in Async Generators in Javascript Engine (CVE-2024-7652) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-128.2.0-1.el9_4.0.1.x86_64.rpm aa10a07a87c2fbe578b2be7bd8a669cefbbbc1014602052d6db673827bf91e0d firefox-x11-128.2.0-1.el9_4.0.1.x86_64.rpm 7bef68692434e518a30de00fc287f9abd3bc2323e3af5d8f0ee919d4dbdc5c1d RLSA-2024:6683 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * thunderbird: 115.15/128.2 () * mozilla: Type confusion when looking up a property name in a &quot;with&quot; block (CVE-2024-8381) * mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran (CVE-2024-8382) * mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions (CVE-2024-8384) * mozilla: WASM type confusion involving ArrayTypes (CVE-2024-8385) * mozilla: SelectElements could be shown over another site if popups are allowed (CVE-2024-8386) * mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 (CVE-2024-8387) * thunderbird: Crash when aborting verification of OTR chat (CVE-2024-8394) * mozilla: Type Confusion in Async Generators in Javascript Engine (CVE-2024-7652) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-128.2.0-1.el9_4.0.1.x86_64.rpm 6385865ee8d444bd8af8e8bb118b925abe7883cbf5db18e0a157923023fbf927 RLSA-2024:6726 Important: fence-agents security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Security Fix(es): * pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms fence-agents-common-4.10.0-62.el9_4.5.noarch.rpm b069b687314fa883defca1e082876df6cc4c4c182e26b5ddec86ffcf85812c00 fence-agents-compute-4.10.0-62.el9_4.5.x86_64.rpm b7b88e7bba93aa7b63bd1e4618b4de73488157658ba057e71fc9ddb2fa40eab7 fence-agents-ibm-powervs-4.10.0-62.el9_4.5.noarch.rpm bae90478d1d19967e0f9458ff6a2ef3c338e64224b302243214528867168f918 fence-agents-ibm-vpc-4.10.0-62.el9_4.5.noarch.rpm a03eff80500f943dd0e26ee70761005688912b863f52fb4875ce7569ec912ba1 fence-agents-kubevirt-4.10.0-62.el9_4.5.x86_64.rpm 9ace2d8439cc3bc3b87967adfa32018337db7fd7bc3c2a9ca1a5553f1e8ebf7a fence-agents-virsh-4.10.0-62.el9_4.5.noarch.rpm 0cc96fe09eedcddb9e2ac8f221d4f8b50bdc47226d8478565c27e32256f0c042 fence-virt-4.10.0-62.el9_4.5.x86_64.rpm 3069f0d0f2141a44f2bcc2c37b55aed08b12375c9a40b4ee4c289c8853231e9e fence-virtd-4.10.0-62.el9_4.5.x86_64.rpm 5b63942be9278f3684ed57c6bfeeb93d6293f27508dbad7ea30f440ae56ec76c fence-virtd-cpg-4.10.0-62.el9_4.5.x86_64.rpm 255e180aaefeb274f89a7ebc9a44c90485eab6e45546df3b0d80e77b22621483 fence-virtd-libvirt-4.10.0-62.el9_4.5.x86_64.rpm 1d7e8c499566e7fcee25decf9840c04312b501a10e78f65cf31bf0271cf6afd9 fence-virtd-multicast-4.10.0-62.el9_4.5.x86_64.rpm b3e7a621325b9f3a9d16252cb4c0963743fecff7d8fcf88f11c83e71455f6be5 fence-virtd-serial-4.10.0-62.el9_4.5.x86_64.rpm 16955ef28501e1255eb6c90d0c28ec9906c8cc889450c59119f7202939f36276 fence-virtd-tcp-4.10.0-62.el9_4.5.x86_64.rpm f9d665b6be593708752d07430e4b166a9e3a2f9b1f7224f1514ca5801facc1e1 RLBA-2024:6728 greenboot bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for greenboot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Generic Health Check Framework for systemd. Bug Fix(es) and Enhancement(s): * R4E 9.4 installation failing due to bootloader (JIRA:THEEDGE-4006) rocky-linux-9-x86-64-appstream-rpms greenboot-0.15.6-1.el9_4.x86_64.rpm e807daff1c14b919ac7f7c4524ec53cf0c013b966c148cee63d63aca1d16dac5 greenboot-default-health-checks-0.15.6-1.el9_4.x86_64.rpm ccc3f689978a39700d799d96fb0f7b780ec03bd368faeff31a1cb5b05fcedacf RLSA-2024:6848 Important: pcp security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Performance Co-Pilot (PCP) is a suite of tools, services, and libraries for acquisition, archiving, and analysis of system-level performance measurements. Its light-weight distributed architecture makes it particularly well-suited to centralized analysis of complex systems. Security Fix(es): * pcp: pmpost symlink attack allows escalating pcp to root user (CVE-2024-45770) * pcp: pmcd heap corruption through metric pmstore operations (CVE-2024-45769) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms pcp-6.2.0-5.el9_4.x86_64.rpm 95e2eb4a8a6d8cb0901130dd6105a93a6903ce3d0e73921783dc9ae51a950527 pcp-conf-6.2.0-5.el9_4.x86_64.rpm 5b3c45733e5150bfe3e8b68b87f58648df28b54e7b5bfd53f0f710e083553838 pcp-devel-6.2.0-5.el9_4.i686.rpm 08b0738c53fc35ff4038013a6b1f6363996d8f6f059817547443fa5d8918e9f0 pcp-devel-6.2.0-5.el9_4.x86_64.rpm e2e615293b7e4fa8523b5c64808d829bda4101ed20d6d8e84a2fd9ade9017465 pcp-doc-6.2.0-5.el9_4.noarch.rpm eaf354aaf12011a48a03dbd5c409f2f8bb5c6034395fe4fbf4adbc02f2215d43 pcp-export-pcp2elasticsearch-6.2.0-5.el9_4.x86_64.rpm d23756ff8d3166b9fec6a76ab917449526f11e728f5623e2f7c1d6e7dbaeceed pcp-export-pcp2graphite-6.2.0-5.el9_4.x86_64.rpm 77bada175493bbcfd323afdeb577422e4334bb7483048b4713bcbac3c3f14304 pcp-export-pcp2influxdb-6.2.0-5.el9_4.x86_64.rpm 3d5a661b5157cab345207a386351c6da9045fe15c25668d86be810b219527c08 pcp-export-pcp2json-6.2.0-5.el9_4.x86_64.rpm 3fc46c349e7256336aa0e419420f38f02b9fc78397f2a822cb61a404484eb36c pcp-export-pcp2spark-6.2.0-5.el9_4.x86_64.rpm 86a97d4afb6c7774a8518fd780fef319dfe4eb25dca9aa2b230c8d6646d4f4f3 pcp-export-pcp2xml-6.2.0-5.el9_4.x86_64.rpm 353cc81934003682b258323d2c7175321fcc3fa1366b3b389c4b944afa9bafad pcp-export-pcp2zabbix-6.2.0-5.el9_4.x86_64.rpm 20f126099f135447ad630a0b364b6d8b5c0be6c39f8713eaf1ef5770563763cb pcp-export-zabbix-agent-6.2.0-5.el9_4.x86_64.rpm bb33a9d8d667945a2364aed38e04fdf933610e9e7248153c1a7e8ad97bd61721 pcp-geolocate-6.2.0-5.el9_4.x86_64.rpm b87dd79883d3a1b65b6ffe3c0cceeabda3e6a154bae0655c3314a4a9267f84a4 pcp-gui-6.2.0-5.el9_4.x86_64.rpm 5a2ce3a6288d72751f2aa005a0489e0c18b80dd7d00889e8459233c519997460 pcp-import-collectl2pcp-6.2.0-5.el9_4.x86_64.rpm 229b42ef0b30a6c3d8c7d7ff3e9898d26d854a4bfa4c03bc43fdf5c805f8481c pcp-import-ganglia2pcp-6.2.0-5.el9_4.x86_64.rpm df56fb63843e0e440f920778987e025164a4d7bab8dd1955d62ba1e43fc97f5e pcp-import-iostat2pcp-6.2.0-5.el9_4.x86_64.rpm 0c323e42cc9e31fd028c67be97606ae8de0b6da098bf978c7c8877b48956bf5f pcp-import-mrtg2pcp-6.2.0-5.el9_4.x86_64.rpm 9dbc1d0996c78b1df80d801866802187b4763346be768186233653ac3c1afbd2 pcp-import-sar2pcp-6.2.0-5.el9_4.x86_64.rpm fbb7f5d22e950a1192e9c30ee4794442efc55c13af16ab891b539955c127f87a pcp-libs-6.2.0-5.el9_4.i686.rpm 63d37d4e8206a28023fceefc9d2c85a6cf9115ca3c7c0909f2fb6dff2a2383d3 pcp-libs-6.2.0-5.el9_4.x86_64.rpm 7a268c6ef51744c6a960b4e46ee215abb339659a70038d82902fc64da299822a pcp-libs-devel-6.2.0-5.el9_4.i686.rpm 3d39bbb18f9ae60975c254e30760cc3206f97d9fcfa7fa5ac7f43be50e28b16c pcp-libs-devel-6.2.0-5.el9_4.x86_64.rpm bcd2b064564a7aae636515d350f39813d43cd22b48b48dcfcb688b9174e8250f pcp-pmda-activemq-6.2.0-5.el9_4.x86_64.rpm 7be476238c82cff028100415c659a641b93f2223d9912a4723e27906acb442f7 pcp-pmda-apache-6.2.0-5.el9_4.x86_64.rpm 68176354f2f34b7b0fa71b501e8a1dbcf415789d5cc4cfafa1d76d567791ccbe pcp-pmda-bash-6.2.0-5.el9_4.x86_64.rpm 208009cf7a5d9f8b1ae1513aec3c0a4843bce97de40c9ecabb0db9a48e1f30a5 pcp-pmda-bcc-6.2.0-5.el9_4.x86_64.rpm e4c4f41fc69a713d5af0280fffbb39bea35018b51a919ca18644b06f2704d16d pcp-pmda-bind2-6.2.0-5.el9_4.x86_64.rpm d33b8075590a7bf08051ce7574f5ae8d974568184971d4fbc1bfa950afe69b43 pcp-pmda-bonding-6.2.0-5.el9_4.x86_64.rpm 015068ef9c51d4e85bd2df05a911ea02f177dfd9f422ab5bcc7e384bac6780a0 pcp-pmda-bpf-6.2.0-5.el9_4.x86_64.rpm 1db22bac38b56be211c9fa9f552a762474123f28d053d24a6d12752684d1770b pcp-pmda-bpftrace-6.2.0-5.el9_4.x86_64.rpm ccae4078728cf70a7df2b6a482470f2863ed839494dacd25527c82005f7f204b pcp-pmda-cifs-6.2.0-5.el9_4.x86_64.rpm 02bb6cf32eab91ec45e9bbd86e2b2414d318f5df7769aaf27ed8e5d0e4e6c62b pcp-pmda-cisco-6.2.0-5.el9_4.x86_64.rpm aebb5a23b9491c22b574195a7082e0323efdd22745d6e6b91a60aaf18e58e0fb pcp-pmda-dbping-6.2.0-5.el9_4.x86_64.rpm d5e8666f1d32271433ccf8a626ebaf2e596ec6e8a4d00b526a4a290a5a5dfaa2 pcp-pmda-denki-6.2.0-5.el9_4.x86_64.rpm 20ee43b434c3771c82f9a1e9971f17814052ffefd71747ab4408cce3bdaa4a06 pcp-pmda-dm-6.2.0-5.el9_4.x86_64.rpm 1fe7510357e3d42aada1a55f69f775404076fa664bcc1d4af105ae83655b1342 pcp-pmda-docker-6.2.0-5.el9_4.x86_64.rpm cd2127bf8e914958e3232f0480d72e232882f8164aeded5e7f60f2a67f0d3d77 pcp-pmda-ds389-6.2.0-5.el9_4.x86_64.rpm 935d9a21d76ddd8d9f99671f8d5399a94b21f4a934d503ea920b547f6f9f0dfb pcp-pmda-ds389log-6.2.0-5.el9_4.x86_64.rpm c68c73bbb42862b78e6308d7df8ff5ae0cd64b9707b794ebccd4b54d3e270185 pcp-pmda-elasticsearch-6.2.0-5.el9_4.x86_64.rpm 913c6ba1ddf15d5a313e395fe0f8f72ba81e27fee137d862e2a720ec13ca7056 pcp-pmda-farm-6.2.0-5.el9_4.x86_64.rpm 75538855892dea361282c593d1bdfbc1ecd67ad417516339200f4f8d08d341a8 pcp-pmda-gfs2-6.2.0-5.el9_4.x86_64.rpm 104c847cd258a703e0358a7e104b3e61eea7f097e415cdda277f4ba1bd69eefb pcp-pmda-gluster-6.2.0-5.el9_4.x86_64.rpm 97cb6c3d2a85dfefc3fff1aff9a163c555512598c3aa417bb7cbaa3b13e0efea pcp-pmda-gpfs-6.2.0-5.el9_4.x86_64.rpm d2bbabbbf41773232c30c73f0463708d000d3c025cac270e05878036268a5ee1 pcp-pmda-gpsd-6.2.0-5.el9_4.x86_64.rpm 3c8653bab07eaa98fc26ed90223cc7bfb7597b1bd9269287e475cbd679e539e7 pcp-pmda-hacluster-6.2.0-5.el9_4.x86_64.rpm 440954fd3f3eaad8fd08036633433c217a92b056bc6a9d4d717e3714d6bd0534 pcp-pmda-haproxy-6.2.0-5.el9_4.x86_64.rpm 4d08255569e309d5eb06ced8c396c73f0df8f412a15b22f3ab114662fac2d2d0 pcp-pmda-infiniband-6.2.0-5.el9_4.x86_64.rpm 08d76cb9328506e21de1d4f700bbfad56de226bdc50d1c4149819909570e9ad7 pcp-pmda-json-6.2.0-5.el9_4.x86_64.rpm 5c06591238f77d6e6257ef5cdabd02ead370a426b9e2ab86df14851d5cb09956 pcp-pmda-libvirt-6.2.0-5.el9_4.x86_64.rpm e2f9b4472aeeb10a5f06753e50462b3c7cb4c7694d0f7ef70a0793647c673788 pcp-pmda-lio-6.2.0-5.el9_4.x86_64.rpm 41e879dc32a671bb1b35a74e7a4fb28c89807525d3635adbae98d6a15d94ac2b pcp-pmda-lmsensors-6.2.0-5.el9_4.x86_64.rpm 84600b9235fa912cc565eecfc0f86ae0687c00fbbb9060a4fc49091778777284 pcp-pmda-logger-6.2.0-5.el9_4.x86_64.rpm d2ab6a560a6e8c57e60a904f627e0fee3c497a462c56f37d70f0f016f3ba1843 pcp-pmda-lustre-6.2.0-5.el9_4.x86_64.rpm 8be95878b8bf09b0a69fe2e8d95bd024ce6dcffe6f0a9b200fcd4ce039017640 pcp-pmda-lustrecomm-6.2.0-5.el9_4.x86_64.rpm 311334d881886aec77f6b9248bfda2dbcd75aff8c62b6faaf30a478a100a1090 pcp-pmda-mailq-6.2.0-5.el9_4.x86_64.rpm 0732ecef13043b182ff4dde104b982bf4e37531c10a7e7943a08337b7362d260 pcp-pmda-memcache-6.2.0-5.el9_4.x86_64.rpm b0806ea65e4ade863a028ec9b10568bdf2bb382025b61a121f97bf0a801eea44 pcp-pmda-mic-6.2.0-5.el9_4.x86_64.rpm 39d7d9c3266b02d62cda5d8b94d5ea869fe3ccfcce52023b9e2df1231c2a7027 pcp-pmda-mongodb-6.2.0-5.el9_4.x86_64.rpm f676d0fcf43744ff847f98af1ad8f61de5f5a6969063616d6b2825789f2664c6 pcp-pmda-mounts-6.2.0-5.el9_4.x86_64.rpm 02f6739bde87abf361015547b701bd8eb2ada3a41e408a63628e0f57b5de8aee pcp-pmda-mssql-6.2.0-5.el9_4.x86_64.rpm 5c42d8b3aadf436b82cc1c2016d8981b1ac16b13135564187d3331361f3d1e1b pcp-pmda-mysql-6.2.0-5.el9_4.x86_64.rpm 1605afff673741ebbb996da1efbd565f4e50938ebf2de7c9b92b780c390fc3a6 pcp-pmda-named-6.2.0-5.el9_4.x86_64.rpm 0f52aac9aa861f2f24e8d06114b5b4fdf6ce91eea5368de42b89ab722a3b4de0 pcp-pmda-netcheck-6.2.0-5.el9_4.x86_64.rpm b6ebf28de31631c8cd06ef189bc24be33be75a64062d52c73382c893fc4cd52d pcp-pmda-netfilter-6.2.0-5.el9_4.x86_64.rpm 40ea03e7b1a5de0b8d6a550f28fd1d0764623d772790cd66cbd0055de6a7f425 pcp-pmda-news-6.2.0-5.el9_4.x86_64.rpm fe6b77a365e4fca41344cdea00ac57c43f3632e68debdff3e7360b518c551980 pcp-pmda-nfsclient-6.2.0-5.el9_4.x86_64.rpm 2a69190df90b7fe892248fb441daa26d937ddf187a08634f8158b4f4ab89be50 pcp-pmda-nginx-6.2.0-5.el9_4.x86_64.rpm 307fe3c7fe953ef53c6a7e33294f76dcfa299cd055f36874bf131acc9684cf59 pcp-pmda-nvidia-gpu-6.2.0-5.el9_4.x86_64.rpm 8a024ffdc716cc6af3b510b65fb3d812b5f2a3081e83c846a7dc4f2ded1db650 pcp-pmda-openmetrics-6.2.0-5.el9_4.x86_64.rpm 59fc862b2a1080251b8915d25f0a1bfaad585fa7a05587adc5de4c81727394a4 pcp-pmda-openvswitch-6.2.0-5.el9_4.x86_64.rpm c91296591ebac5c564d4d5ad8e13f739504998e33a566596f4f092f035a2d6e0 pcp-pmda-oracle-6.2.0-5.el9_4.x86_64.rpm d26758b972cefad2b7d3af104a69d98abb5ae979d8bd6b0770b50bb9eeb26005 pcp-pmda-pdns-6.2.0-5.el9_4.x86_64.rpm cba906b7128842ecc106427741d5448fc22691596ac4853b23ef5c3e487889db pcp-pmda-perfevent-6.2.0-5.el9_4.x86_64.rpm 23fd4ef98bcbcf7582ff6282d5a0ca599736121416ad2feff8b51ecaed679147 pcp-pmda-podman-6.2.0-5.el9_4.x86_64.rpm d5b742aaea57ef9b68361ec69eb9040c528bf56ae03e69f07f893e68deb11c07 pcp-pmda-postfix-6.2.0-5.el9_4.x86_64.rpm 6d63dff2d9fae4d4ee20d555dc5c4ed1136a4ab653b9c95f6ee50f1062a329fe pcp-pmda-postgresql-6.2.0-5.el9_4.x86_64.rpm 031882d9290bc707d034e9f6e10af0599cccd7f408008cae321c464f7f722f21 pcp-pmda-rabbitmq-6.2.0-5.el9_4.x86_64.rpm f90a7067827937c581d1ccda2b57852f8551a543b1ad5019b87e2a599879cec8 pcp-pmda-redis-6.2.0-5.el9_4.x86_64.rpm 4f5d8a6f07a6998c01a4e7a753d78bccbe1183049324597502d4508a42b843af pcp-pmda-resctrl-6.2.0-5.el9_4.x86_64.rpm 8ff4efd94d5f3b63e851bc83463cbaf9f2a14e925d89ffef2a61493b0d52c9a2 pcp-pmda-roomtemp-6.2.0-5.el9_4.x86_64.rpm 039948f74b521159fd1c77cd507cfd0d6d2d547860cea98b2541bce27369ea73 pcp-pmda-rsyslog-6.2.0-5.el9_4.x86_64.rpm 3b8eac12eb9f5358dc36fe2216f7cc8f04f23967e8b9a8fc927744947c027424 pcp-pmda-samba-6.2.0-5.el9_4.x86_64.rpm e3c7e6408dac9bc305b56e5e496fb7038e4e612ca99a9cf34bd2cf8e3e6610ca pcp-pmda-sendmail-6.2.0-5.el9_4.x86_64.rpm cfa087c363f94f53d51ebdd2e1dacf9b50af6cc68782c2eca5d14ac64d053b88 pcp-pmda-shping-6.2.0-5.el9_4.x86_64.rpm a94b75ced0b217c067af3c17e3443d4479e44dde929ceca1ecb26943e04ac6ec pcp-pmda-slurm-6.2.0-5.el9_4.x86_64.rpm ca1831bf13effd0dce52047cb86388a4671049834f7de64b99eb835244f2cd27 pcp-pmda-smart-6.2.0-5.el9_4.x86_64.rpm 25b90c74ed5119afad4492e2a344b3bb96a3331939681699d3ed8f26aee60886 pcp-pmda-snmp-6.2.0-5.el9_4.x86_64.rpm 6284294d60ae8548044fc87cf56dc3130af894fcecfd42e1ab6dedbb484976f5 pcp-pmda-sockets-6.2.0-5.el9_4.x86_64.rpm 265b8891eaf75808613949f1e0910d456424ff820276cf23d4abbe8712f641ad pcp-pmda-statsd-6.2.0-5.el9_4.x86_64.rpm dbd140f1353fe17dfebcf045d63ceb65f7d4d6d5ba5e5fbf6587de83a1efeb31 pcp-pmda-summary-6.2.0-5.el9_4.x86_64.rpm 1d78091d50815c2303ec70e6226cfcea989b1da060e1b8dd8fe55cb74d4eb815 pcp-pmda-systemd-6.2.0-5.el9_4.x86_64.rpm e9962da2b073cb21fede3f230c2d95441add177d0ebad4f662802238f2bfe6e3 pcp-pmda-trace-6.2.0-5.el9_4.x86_64.rpm 27b4518887d2215c6bb29841b4bf74427e0ffb72edcf8304f7761b3dd7f65e77 pcp-pmda-unbound-6.2.0-5.el9_4.x86_64.rpm 45f5c9ae82ced3964ebdf62440fbb0c1d0bd01a74fd92e81e8ae8f86ee4c8cd5 pcp-pmda-weblog-6.2.0-5.el9_4.x86_64.rpm 73fa50b4b9707a9498cf1241650d434a3b812f1647d53891b09db8c6a507dc33 pcp-pmda-zimbra-6.2.0-5.el9_4.x86_64.rpm 2df06f6b4a3f6b766584a099dd8030e29d0f38de7d647a4afc2946ba9b9c371f pcp-pmda-zswap-6.2.0-5.el9_4.x86_64.rpm 03ca4bc7556c503c39a17e987806c86294178da811ff5f91f5ff2b49939ea646 pcp-selinux-6.2.0-5.el9_4.x86_64.rpm 5eb4bf342ac3d6817ace960c5fb2e9b25d6e29bcfb9387b749192bc2c7084fe7 pcp-system-tools-6.2.0-5.el9_4.x86_64.rpm d9cd6452a7c1a90ee17b86176e74dac09c0149233b6a6c94e55472d625daa7d0 pcp-testsuite-6.2.0-5.el9_4.i686.rpm 30d64f45ab4029fa18dc45e3e01a1e663bdd137aef07c7edf505cddd4edb48a3 pcp-testsuite-6.2.0-5.el9_4.x86_64.rpm aeb6992a493c09468010c49aa56ca4ebb039f3f7b2e88ac2e60630c1ee4e706c pcp-zeroconf-6.2.0-5.el9_4.x86_64.rpm fd4b5ab0af3b254d55216e1cba87e947ac427d79cab199e009f1645b11e83aa2 perl-PCP-LogImport-6.2.0-5.el9_4.x86_64.rpm 9430cdda860ec33c0b821afdec0521d310f4e7c5ce52cecf199480935627028e perl-PCP-LogSummary-6.2.0-5.el9_4.x86_64.rpm e7666a0cf013bea619cf637c54df22329b6f60d05e63ee4e01bb08cb8c49c64b perl-PCP-MMV-6.2.0-5.el9_4.x86_64.rpm b36dfcd60eb5ed42617d1a3967e4b1a2f6b706e86ec7de75b0c7f412057d60cf perl-PCP-PMDA-6.2.0-5.el9_4.x86_64.rpm 321119f5720f9ab2b7a3ce43ec609a964400586c336d91e191aa5e61c19141fb python3-pcp-6.2.0-5.el9_4.x86_64.rpm 824b7c765e48beea24a55c6fe0e65148d5a335a5f268d6e060f298c5b5d93daa RLSA-2024:6913 Important: golang security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * net/http: Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791) * go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155) * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) * go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms golang-1.21.13-3.el9_4.x86_64.rpm 30dfc6e546a9f207e64fe2629b9a0dda933a0722adedebf082fa6adac6ca67da golang-bin-1.21.13-3.el9_4.x86_64.rpm c03827502d8b14fc84a22c887b847b3872e6bb077db90730fdcd7bd2fda343cb golang-docs-1.21.13-3.el9_4.noarch.rpm 27abd6bd8c1aee99e3900819c28e57c714f2ae71eb51fb8ad3edd38e7bafb588 golang-misc-1.21.13-3.el9_4.noarch.rpm 5dc9c3f58f2f5e25943d806df78a7a9ba853320c5051bef16699318fde73ca9f golang-src-1.21.13-3.el9_4.noarch.rpm a8d7c976e90684101579617a711b37c530a288f4253a2f30027633d0ccd4c0df golang-tests-1.21.13-3.el9_4.noarch.rpm a81e26d473eeedc7198881e8206f69b1ceed550fada24e0c10ff0c3ca624e58d go-toolset-1.21.13-3.el9_4.x86_64.rpm ecf7f1520c100486d32c28a04c2c7155ff1b88bcff398fb1d7ee269a118455a6 RLSA-2024:6946 Important: grafana-pcp security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-pcp-5.1.1-3.el9_4.x86_64.rpm d7526c2b31dbf4411bf5d62790dcc1cda8d7daa4ffa23a3e1b060ceb6e4f29db RLSA-2024:6947 Important: grafana security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-9.2.10-17.el9_4.x86_64.rpm 8a9b7eb6a15b0d7763ccad1fccd9d4e7aa8c3dd731fa5e3d5f406a5b9def9847 grafana-selinux-9.2.10-17.el9_4.x86_64.rpm 736a5c204c9ab9c03a435691f0b98f96175ab9b5e973e0aaedef45afd48c939b RLSA-2024:7136 Important: git-lfs security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for git-lfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms git-lfs-3.4.1-4.el9_4.x86_64.rpm d0a765603b67060773cbec2fee35d6065c751bd8fc32c5d8df55823671a45aab RLSA-2024:7204 Important: osbuild-composer security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for osbuild-composer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Besides building images for local usage, it can also upload images directly to cloud. It is compatible with composer-cli and cockpit-composer clients. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms osbuild-composer-101-2.el9_4.rocky.0.6.x86_64.rpm 64d370217664a21c571e0d6793d7d181366d475309766616d9b7643dd5876ba7 osbuild-composer-core-101-2.el9_4.rocky.0.6.x86_64.rpm 439277676386420280e2b7a1a9a4673d12d0bfdfad74f112cfa424c3f8ddf4fe osbuild-composer-worker-101-2.el9_4.rocky.0.6.x86_64.rpm dfd913342c0d8200da1820386c4cf85ba9310e57fd55e6b76fd9b2966a68fbcf RLSA-2024:7260 Moderate: net-snmp security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for net-snmp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Security Fix(es): * net-snmp: A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access. (CVE-2022-24805) * : net-snmp: Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously (CVE-2022-24806) * net-snmp: A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access (CVE-2022-24807) * net-snmp: A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference. (CVE-2022-24809) * net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference (CVE-2022-24808) * net-snmp: A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference. (CVE-2022-24810) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms net-snmp-5.9.1-13.el9_4.3.x86_64.rpm 58358d6b3541c8135397fcec624d7a46c4db23189580b11368561f8eba8fe24d net-snmp-agent-libs-5.9.1-13.el9_4.3.i686.rpm 1b40b0adb59dbe8c590f98d95bcb855f686a9267a074cc134ddbc8132da37c58 net-snmp-agent-libs-5.9.1-13.el9_4.3.x86_64.rpm c2d763881d95f22283bd7d15afa237c1d7245d30222892244435d7dd2f1fa3e9 net-snmp-devel-5.9.1-13.el9_4.3.i686.rpm dace726d840ee7ac73ac3b66f45f894c41ab77f7f16fa888445cff7c1e4b28fd net-snmp-devel-5.9.1-13.el9_4.3.x86_64.rpm 2442bc29bd63e0b5adadcfb07c9e8efcb7c48a945866429f76ab426edaf697d1 net-snmp-libs-5.9.1-13.el9_4.3.i686.rpm 1216bb0751c3c1343262465e66515c70be1067baabf03813c57ac775e8d9a0c1 net-snmp-libs-5.9.1-13.el9_4.3.x86_64.rpm 150b7a4fa241bc04ec3f246249d7c24c37bf89321c97ff6d2fb5e9aac7627fba net-snmp-perl-5.9.1-13.el9_4.3.x86_64.rpm ae335e375eb8932c9a3848856640385381a29a0511558d0e778c1b72ba5fd1cf net-snmp-utils-5.9.1-13.el9_4.3.x86_64.rpm e3fcf81b898469639996e08448a0685922ad4c88136dc8f948e08f96585aa652 python3-net-snmp-5.9.1-13.el9_4.3.x86_64.rpm 9a4069302f4f864d0ec5dc5c11af68d27e92c274b752b1155d4d1a7a18e16eaa RLSA-2024:8121 Moderate: java-11-openjdk security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-11-openjdk. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161) * JDK: Array indexing integer overflow (8328544) (CVE-2024-21210) * JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208) * JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217) * JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-11-openjdk-11.0.25.0.9-2.el9.x86_64.rpm e74c3155c99a81423ce7dfbd6cb7fd97df9a1a94d73d518a0ad28b4eb81d67b6 java-11-openjdk-demo-11.0.25.0.9-2.el9.x86_64.rpm acf5410cb94395316222888b8b97a7c5bb7e5d10e6bd8d9247c37d940bc19c56 java-11-openjdk-devel-11.0.25.0.9-2.el9.x86_64.rpm 97ccb138c41425bb5bb4a28f80431592c6cae3f18dd6cbbcea2a40ca2829d017 java-11-openjdk-headless-11.0.25.0.9-2.el9.x86_64.rpm 71f8e9461d7435e2be857bbf688df1bc127409cf3a743ee97f5ba680288f98be java-11-openjdk-javadoc-11.0.25.0.9-2.el9.x86_64.rpm 7bf34092aa2432d2959e8880353b7a2ff58d21997cd292e6e1e40addf51fb831 java-11-openjdk-javadoc-zip-11.0.25.0.9-2.el9.x86_64.rpm 50a5b666682329d4fcd9153541f9d5a2f1aed43811243fa5d5ea0425bd54e21f java-11-openjdk-jmods-11.0.25.0.9-2.el9.x86_64.rpm 3586c7f355b68e7b6ae40ac1fb600714b0cc240405bf3465316ee57174807d72 java-11-openjdk-src-11.0.25.0.9-2.el9.x86_64.rpm 723cfbd63b51308e739581a7624582e54f309d61b9b5798633e558353ca88027 java-11-openjdk-static-libs-11.0.25.0.9-2.el9.x86_64.rpm 984b18d5b12733d502e17e89282c35cd4ad01951c77cbdf7d550314231612bcd RLSA-2024:8127 Moderate: java-21-openjdk security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-21-openjdk. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenJDK 21 runtime environment. Security Fix(es): * giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161) * JDK: Array indexing integer overflow (8328544) (CVE-2024-21210) * JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208) * JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217) * JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-21-openjdk-21.0.5.0.10-3.el9.x86_64.rpm c258bcd8f2041349b5e7d24ade4b6fc7f451f813f93d07e5d9ff908f4a0b1d85 java-21-openjdk-demo-21.0.5.0.10-3.el9.x86_64.rpm db6ab1620beee99de9ed64d9ce69ef1d6aeb188142e9b67c0e23b094376041dd java-21-openjdk-devel-21.0.5.0.10-3.el9.x86_64.rpm 28bca40b98b1bbf314d61a3f7ba1b844e820e84853a693e6bd108c74c9bb5991 java-21-openjdk-headless-21.0.5.0.10-3.el9.x86_64.rpm e0c77892fe58624521fe04fc409d98fddaea20aa20c8ad31d35e0d1672547acd java-21-openjdk-javadoc-21.0.5.0.10-3.el9.x86_64.rpm 8ed46e3b6862bf2677bcd4f7747c3ebccd9da831ee326affe5fc9a4984fc85ee java-21-openjdk-javadoc-zip-21.0.5.0.10-3.el9.x86_64.rpm 0626ed87ddc285ced1ffe8367f8e0f93ad3d349625e0ad1d2b3502c46d95c7e1 java-21-openjdk-jmods-21.0.5.0.10-3.el9.x86_64.rpm fe8d357854d0177c049fb5396016643a8acbaafa35a1db915b10ff0b72d8e2d6 java-21-openjdk-src-21.0.5.0.10-3.el9.x86_64.rpm 253e8d154fd69bfb6fd4d77aa327119f3981629c62d982a5d8a2ce84111d35ef java-21-openjdk-static-libs-21.0.5.0.10-3.el9.x86_64.rpm 0d1899ea73eb683a09f53e66e4b9b6f7da2af039dc02cbc025b3e8b18a5cac23 RLSA-2024:8124 Moderate: java-17-openjdk security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-17-openjdk. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix(es): * giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161) * JDK: Array indexing integer overflow (8328544) (CVE-2024-21210) * JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208) * JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217) * JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-17-openjdk-17.0.13.0.11-3.el9.x86_64.rpm 5b727362c5f1ccd95478e877654ef4ad3fc8f386efb886db4f29089ee9cf8061 java-17-openjdk-demo-17.0.13.0.11-3.el9.x86_64.rpm ff0c38a7ea5ecdb749cb4b25fc9142d4381b13f5ad92eb1b5716e0d02de6686d java-17-openjdk-devel-17.0.13.0.11-3.el9.x86_64.rpm 14efe0c25699c773be7632880c050af48a193dd8efa9373cb34acce8b07643a9 java-17-openjdk-headless-17.0.13.0.11-3.el9.x86_64.rpm 959d84d025e2db8ecf677fb227f648fcef886f3c85fc870222b5e05139a49755 java-17-openjdk-javadoc-17.0.13.0.11-3.el9.x86_64.rpm 36b994facfcf0f9e51d74d51c534a40bec69235ceb59c2c8f8e553c12cf08351 java-17-openjdk-javadoc-zip-17.0.13.0.11-3.el9.x86_64.rpm 12d86fc67a834257f812af6540386c29da196bef63758f59591e669e2479791e java-17-openjdk-jmods-17.0.13.0.11-3.el9.x86_64.rpm 824aa01737a648551a651e4ac4338e7c9cb737d1b16d208311cc4d335c238a5f java-17-openjdk-src-17.0.13.0.11-3.el9.x86_64.rpm 0e78b64be07c4a312e526ab017005850c9c481ff4cfb7eb19908c09ec5da691c java-17-openjdk-static-libs-17.0.13.0.11-3.el9.x86_64.rpm 737dd9c131f8021b57d4fb209d2abfcd2dc3eb01b2f614fa22b8afe0043a5b11 RLSA-2024:8117 Moderate: java-1.8.0-openjdk security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function (CVE-2023-48161) * JDK: Array indexing integer overflow (8328544) (CVE-2024-21210) * JDK: HTTP client improper handling of maxHeaderSize (8328286) (CVE-2024-21208) * JDK: Unbounded allocation leads to out-of-memory error (8331446) (CVE-2024-21217) * JDK: Integer conversion error leads to incorrect range check (8332644) (CVE-2024-21235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-1.8.0-openjdk-1.8.0.432.b06-2.el9.x86_64.rpm ce1e777cc2f9a0187220603c0fe3426ef7b54d1e5330167aa207bca9192858ec java-1.8.0-openjdk-demo-1.8.0.432.b06-2.el9.x86_64.rpm af1ae314a71d8a452c4bb27f026494e59e6f8c4a3f77ed58e8637fcb110b451b java-1.8.0-openjdk-devel-1.8.0.432.b06-2.el9.x86_64.rpm bb131c97224763c8d9eb5231d5c9f76739fa0be2d131e37b3a781fec4ed18e3c java-1.8.0-openjdk-headless-1.8.0.432.b06-2.el9.x86_64.rpm 3264b27a14d9c151b6c850e295692a0c7283f6f034dc4c3f62ea9aecabedc4cf java-1.8.0-openjdk-javadoc-1.8.0.432.b06-2.el9.noarch.rpm 0ff0a0c54d894f4dc8e040fbf787fdb3ea6106973bf778f78a1839da43c81b77 java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-2.el9.noarch.rpm 8883cac0b1882789ae7497ee0c75c432c28a4cf46b11d724b9e87103a497beec java-1.8.0-openjdk-src-1.8.0.432.b06-2.el9.x86_64.rpm e773b35af46ae94b8ac9217835575db9df393cb9430a513c885ba7e58881b079 RLSA-2024:8162 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Local information disclosure on Intel(R) Atom(R) processors (CVE-2023-28746) * kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow (CVE-2024-27403) * kernel: Revert &#34;net/mlx5: Block entering switchdev mode with ns inconsistency&#34; (CVE-2023-52658) * kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (CVE-2024-35989) * kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field (CVE-2021-47385) * kernel: mptcp: ensure snd_nxt is properly initialized on connect (CVE-2024-36889) * kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (CVE-2024-36978) * kernel: net/mlx5: Add a timeout to acquire the command queue semaphore (CVE-2024-38556) * kernel: KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked (CVE-2024-39483) * kernel: ionic: fix use after netif_napi_del() (CVE-2024-39502) * kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (CVE-2024-40959) * kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush (CVE-2024-42079) * kernel: sched: act_ct: take care of padding in struct zones_ht_key (CVE-2024-42272) * kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error (CVE-2024-42284) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-doc-5.14.0-427.40.1.el9_4.noarch.rpm 1e2fdc90bda20eb0783619c58ab182b0e7556c0d864781672b24e54aab08d1f8 kernel-debug-devel-5.14.0-427.40.1.el9_4.x86_64.rpm a8f925a196819b4e9507ba828d0bbd4ff5f1a4495ea690f5e8b637b9604d35fe kernel-debug-devel-matched-5.14.0-427.40.1.el9_4.x86_64.rpm f7a081feec37d1a0c25c82987b7e2e3b52133f3312d482915506352fa53d53f2 kernel-devel-5.14.0-427.40.1.el9_4.x86_64.rpm 3ff1485deb6f8b9625882bee0f3ded0dc3d2ea854aee47a855ba66e197ce7d8e kernel-devel-matched-5.14.0-427.40.1.el9_4.x86_64.rpm 2679c2621e2eb427c1174729354a1a439d18f111be7d55b86f4f99b721dffa72 kernel-headers-5.14.0-427.40.1.el9_4.x86_64.rpm 8d750fa408ae7d4a4932e9c641594e99b28b73ea7b01a9062f9491925f544268 perf-5.14.0-427.40.1.el9_4.x86_64.rpm 070fe9141732806190b9f3bd69ec6aa6226b4864d3fe1543f87521900fac2de6 rtla-5.14.0-427.40.1.el9_4.x86_64.rpm 2b9e99d306fc390fd58e6071b685418c5e138214156aacc0d55a2f2560f9aa9f rv-5.14.0-427.40.1.el9_4.x86_64.rpm dede22950bfc9fceeb765c881c972b0f09f9cd42ab152dc2ac6d232d2ad87646 RLBA-2024:7448 glibc bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for glibc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Bug Fix(es) and Enhancement(s): * glibc: Previously used TLS sometimes incorrectly reverted to initial state after dlopen [rhel-9.4.z] (JIRA:Rocky Linux-46763) rocky-linux-9-x86-64-appstream-rpms glibc-devel-2.34-100.el9_4.4.i686.rpm 21d8d58700be77c4293ba2f131c6439e7c1a3af676c40c0d6d3702b889dcbfa0 glibc-devel-2.34-100.el9_4.4.x86_64.rpm b6e6d5d30da16bb5f1d863daa4b861a03f6fe96f519a4238580f1331df43ddc4 glibc-doc-2.34-100.el9_4.4.noarch.rpm fb09c926ec3e7e54b98148fb15c0aebf72c072d6210b2514790e22e66b1ac23e glibc-headers-2.34-100.el9_4.4.x86_64.rpm afd1d1d82cb42390c76c0d38dd62cdcb520c660cfb7ab0a79d71d99fb5f5086b glibc-locale-source-2.34-100.el9_4.4.x86_64.rpm 132d1818a9fa90e1eaaf892bd1d0fffd5bd30e0046fab97c1a21ca3086cc9e22 glibc-utils-2.34-100.el9_4.4.x86_64.rpm 1244b0d16a28a26efceb9420fc56a349af55c97c8d58fa6ddf44472b1b751592 RLSA-2024:8446 Moderate: python3.9 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-devel-3.9.18-3.el9_4.6.i686.rpm 7aa19cbdf9f8e79c2b4986e22ddec8bbf8b673197168114eab39be1a2098ccdc python3-devel-3.9.18-3.el9_4.6.x86_64.rpm 9c60777d7715807eb5c12dc60fd8e5405ff4af18d7ceb8906953dee36d8c0de4 python3-tkinter-3.9.18-3.el9_4.6.x86_64.rpm d731e644f823934ba3418ece1ef8ff85eb6c3cd4b25d2a5d128e72653dabe845 python-unversioned-command-3.9.18-3.el9_4.6.noarch.rpm b009c2f2e6827e3b0b1c251d7bda3958f09448b73878303249887f38fd4b02c8 RLSA-2024:7867 Important: .NET 6.0 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dotnet6.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 6.0.135 and .NET Runtime 6.0.35. Security Fix(es): * dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList (CVE-2024-43484) * dotnet: Denial of Service in System.Text.Json (CVE-2024-43485) * dotnet: Multiple .NET components susceptible to hash flooding (CVE-2024-43483) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Security Fix(es): * dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList (CVE-2024-43484) * dotnet: Multiple .NET components susceptible to hash flooding (CVE-2024-43483) * dotnet: Denial of Service in System.Text.Json (CVE-2024-43485) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-6.0-6.0.35-1.el9_4.x86_64.rpm 9e479dd5d9fb3793fcf314095da1c7e519ebdd9349f4c55adb2e3a2dc9ea6d47 aspnetcore-targeting-pack-6.0-6.0.35-1.el9_4.x86_64.rpm 618189f354fde1e7301cb5a203366e6e185061bc3f0b78662bc20926e1df2cfe dotnet-apphost-pack-6.0-6.0.35-1.el9_4.x86_64.rpm 66a26d09d82af313a6c93d25abb8497c50a801f8f20afffd4ac703ce6c3bedf0 dotnet-hostfxr-6.0-6.0.35-1.el9_4.x86_64.rpm c5446406e5c8471c90c65935685fdd62e96c3bbbf08f26a6c702e8e5e0e88e5e dotnet-runtime-6.0-6.0.35-1.el9_4.x86_64.rpm 89d2a661a5a364d09de5cab12ff4bb247e0559d45da56c2699bd7f297ba8be27 dotnet-sdk-6.0-6.0.135-1.el9_4.x86_64.rpm 1cff8f8755e3e46c049762693b674302cd9c78ad34b7eaaf8bae298652c5374f dotnet-targeting-pack-6.0-6.0.35-1.el9_4.x86_64.rpm c4c008e1ad042c7f3717b6b45a88045cdb1492fd876eae2342881286105d9142 dotnet-templates-6.0-6.0.135-1.el9_4.x86_64.rpm 2c895ac2c95e245baaedd40a4e3008709375c6dcaff07535dd0db20aef115c01 RLSA-2024:7869 Important: .NET 8.0 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.110 and .NET Runtime 8.0.10. Security Fix(es): * dotnet: kestrel: closing an HTTP/3 stream can cause a race condition and lead to remote code execution (CVE-2024-38229) * dotnet: Multiple .NET components susceptible to hash flooding (CVE-2024-43483) * dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList (CVE-2024-43484) * dotnet: Denial of Service in System.Text.Json (CVE-2024-43485) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Security Fix(es): * dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList (CVE-2024-43484) * dotnet: Multiple .NET components susceptible to hash flooding (CVE-2024-43483) * dotnet: Denial of Service in System.Text.Json (CVE-2024-43485) * dotnet: kestrel: closing an HTTP/3 stream can cause a race condition and lead to remote code execution (CVE-2024-38229) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms aspnetcore-runtime-8.0-8.0.10-1.el9_4.x86_64.rpm be151023dd28b0cd0421ad25b15cd5ddeffdde5b05b28de2061414f3fac46ae0 aspnetcore-runtime-dbg-8.0-8.0.10-1.el9_4.x86_64.rpm 661ee0fde3558ac9b4755a502179ed2e73591e838e6597239d71db948c9aeb64 aspnetcore-targeting-pack-8.0-8.0.10-1.el9_4.x86_64.rpm cc80a7a866615159f4c2d8bc2a99674f0092a0e12ae53cfcc60bda76e8b3105e dotnet-apphost-pack-8.0-8.0.10-1.el9_4.x86_64.rpm 5803f0250a4dbeb489b438985286d16dcaba6e57ff6473359a166f72b173670f dotnet-host-8.0.10-1.el9_4.x86_64.rpm 08c8f2ff860959bc098af13b7cdce21b42c47d5a72397ef780c337f95510caef dotnet-hostfxr-8.0-8.0.10-1.el9_4.x86_64.rpm 09f0c3ba32576068bef49516b4ff8e60f89f91d6077c855fdac65098980af0b5 dotnet-runtime-8.0-8.0.10-1.el9_4.x86_64.rpm 387f61294b40249e08677a4874ac9bdc543109359e4ac49365793a79278214ee dotnet-runtime-dbg-8.0-8.0.10-1.el9_4.x86_64.rpm c524c782ae1d79ddd579d41694856341d7346e4f1d8aca0de4ac92844bb347dd dotnet-sdk-8.0-8.0.110-1.el9_4.x86_64.rpm be2cc6b6a51c04665f692e6b309357c0fe8ee241f6aeb49294ab24d3786161f2 dotnet-sdk-dbg-8.0-8.0.110-1.el9_4.x86_64.rpm 16f7d67ac6945cf2bb4d39a1374ed78fa0d5719fe03bbde5e591776d6efdd7cf dotnet-targeting-pack-8.0-8.0.10-1.el9_4.x86_64.rpm 347ebc4a467a57d53ebdbc7618d0fd09106021675f64fa39d50d9992055e089c dotnet-templates-8.0-8.0.110-1.el9_4.x86_64.rpm 3fe134cc1abcf2ac9e8ae822038985beaa3dfe4b7f88feeb3298b0a26b33ad79 netstandard-targeting-pack-2.1-8.0.110-1.el9_4.x86_64.rpm f584f4afe2376105f17dcbe926a267cdcc693d837bca5424869d1c74747bd173 RLSA-2024:8037 Moderate: OpenIPMI security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for OpenIPMI. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenIPMI packages provide command-line tools and utilities to access platform information using Intelligent Platform Management Interface (IPMI). System administrators can use OpenIPMI to manage systems and to perform system health monitoring. Security Fix(es): * openipmi: missing check on the authorization type on incoming LAN messages in IPMI simulator (CVE-2024-42934) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms OpenIPMI-2.0.32-5.el9_4.i686.rpm fd6824d6d3d447f1961b06fbccd7688e78fbe15b2448697574cc05bd2f171d26 OpenIPMI-2.0.32-5.el9_4.x86_64.rpm 413ec9745f7f5bb7ed06f2b35a10b622bd0be1f2cef062bf92e2ccd2f2dd8fd0 OpenIPMI-lanserv-2.0.32-5.el9_4.i686.rpm 2907e983d1a07edb393239cbe58d4f3f73d330b7e962246d187693fe902ac341 OpenIPMI-lanserv-2.0.32-5.el9_4.x86_64.rpm e1a4ffc01f8f0b044c5fe7a631097cd635b62b95ad4a3afd27b43d3ed415b320 OpenIPMI-libs-2.0.32-5.el9_4.i686.rpm 75b7ac015cea1afa223d343268ebf66bb29bc6654a9635db5782874e948a5859 OpenIPMI-libs-2.0.32-5.el9_4.x86_64.rpm 53ba60a0be214d00f10a3d72cffafd993599a23206c9da9b110f463b9e2dddef RLSA-2024:8374 Moderate: python3.11 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-3.11.7-1.el9_4.6.x86_64.rpm c1c33c56f90e51077a08f0bca9d973d32aa21051e49a10fe6aec8bfb688ab434 python3.11-devel-3.11.7-1.el9_4.6.i686.rpm 2aad327b7d6c4e1033d93811dd69d7834bd67bab6341c4052a8e6b22508eb40c python3.11-devel-3.11.7-1.el9_4.6.x86_64.rpm 3b41c9ece9f07e6469ff63c33cb31a3dd04e29d470cd1a4e8a7fd123480eb2ce python3.11-libs-3.11.7-1.el9_4.6.i686.rpm ae7f52bb0b5589aac2b938985b2e09090bd32463c3ce570123776336f3d630b8 python3.11-libs-3.11.7-1.el9_4.6.x86_64.rpm b7a42414456ba29605df122346083dcbf859e65d0556a093a156a105665bba70 python3.11-tkinter-3.11.7-1.el9_4.6.x86_64.rpm cb066effdc0e14e9672b9aed13ac2e5a9e1b8c4200056d571a510b5685e16b13 RLSA-2024:8447 Moderate: python3.12 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the "python3.12" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the "python3.12-" prefix. Security Fix(es): * python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-3.12.1-4.el9_4.4.x86_64.rpm 11e7e536215c93f44bf5ea791820457a8f9b66b35f4abca01a46594be03f3d36 python3.12-devel-3.12.1-4.el9_4.4.i686.rpm c200f11e1ca17829daaa8b9089147b6c9756dcc9a7cb43b213826f65ab8c36e1 python3.12-devel-3.12.1-4.el9_4.4.x86_64.rpm 63779c05ee1e17ab367d38b24afc9a746cd780a46c5eece748d940bce5542790 python3.12-libs-3.12.1-4.el9_4.4.i686.rpm 8f44ff2118f4815a207c8eb7edc2701137903460355017a01b40d23771f60da9 python3.12-libs-3.12.1-4.el9_4.4.x86_64.rpm b466d1216de4364000b3318e063a7c5edb1948cdc58a89f3eef1c444c0b6710f python3.12-tkinter-3.12.1-4.el9_4.4.x86_64.rpm e0888355357ea56e884cc1cf80947995490f93bd86164f240f78748492b4337a RLSA-2024:7550 Moderate: golang security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * golang-fips: Golang FIPS zeroed buffer (CVE-2024-9355) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms golang-1.21.13-4.el9_4.x86_64.rpm d6e1b36afa4d9c93e4765e7aa6055759b1bc7da4039dcf60b56f30ee83b9f0ff golang-bin-1.21.13-4.el9_4.x86_64.rpm 1ed482e0e591ad06e97d88cc73efc1c143dd3e52cd3defb27135c3955f775a1c golang-docs-1.21.13-4.el9_4.noarch.rpm 1c1a237dc9f5b2265584de5fe1e7f5fa63987ca8311b8fd271757fe01fcbf6e1 golang-misc-1.21.13-4.el9_4.noarch.rpm f32e6525a60ad978a78e789922dc56e77e866a36472e89bba3ebfe57d7845c8e golang-src-1.21.13-4.el9_4.noarch.rpm 754710a01bf5c86b04b9bc8105d470f4462a51b9d8382f21319aeed587ed34f3 golang-tests-1.21.13-4.el9_4.noarch.rpm 4c886bcd0a3881247afe3a3017c11cbe592569d38dd0be2f477d371ffbf5f054 go-toolset-1.21.13-4.el9_4.x86_64.rpm ba48844137ce6297b67d271937b3485e768dae6554ef0cc0219296e1037ffff4 RLSA-2024:7958 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) (CVE-2024-9680) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-128.3.1-2.el9_4.x86_64.rpm fb8e557d6a380bab8aeb9e01f6009221bbcc8323c46dfcaa96e2ca70ded193b8 firefox-x11-128.3.1-2.el9_4.x86_64.rpm 281c92cade9fa06dc3dc01db2d6c020993f7dc9660173868c9b4588077a79bf2 RLSA-2024:8025 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) (CVE-2024-9680) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-128.3.1-1.el9_4.x86_64.rpm 38fe9ff8cbacbeaae029de336f8870ede005b440c3a443ee35fc10cf7841ed7f RLSA-2024:8039 Important: podman security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155) * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) * go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158) * Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library (CVE-2024-9341) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms podman-4.9.4-13.el9_4.x86_64.rpm a933f4656be7f0de80c573403258070f5bbe5a2151bf576d0e10c2b0047747a1 podman-docker-4.9.4-13.el9_4.noarch.rpm 657ab93d37122a7e279fa5993d845d8657537734bc8b39ad7a34cf0ebaee6549 podman-plugins-4.9.4-13.el9_4.x86_64.rpm 6ba01ef67374906c57f56aeda8a83c799a4e82c166d76ef5b2c8a076d6e59b59 podman-remote-4.9.4-13.el9_4.x86_64.rpm 9d794996585ee6757c4a565f6da46da9853908d0ebb42c2bf2d829431c66a182 podman-tests-4.9.4-13.el9_4.x86_64.rpm fc985ec70b2556802b1761957aac9c20e1e980da0e21bdddde19ac2e20192696 RLSA-2024:8110 Important: containernetworking-plugins security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for containernetworking-plugins. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms containernetworking-plugins-1.4.0-6.el9_4.x86_64.rpm abab1cdb45a76b5c849198c08651e8329ddd5f1fd6e681c2c49abefa5f722c71 RLSA-2024:8111 Important: skopeo security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for skopeo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms skopeo-1.14.5-2.el9_4.x86_64.rpm 4eaa276c0ea97dfd33c5310ce925b111e331a3afe06d10b2a74a25afaec7a64b skopeo-tests-1.14.5-2.el9_4.x86_64.rpm 2016d0e2ddd311949c7169e2b5b67fab890b26f1722a89ba2c9b6e55daa80cd5 RLSA-2024:8180 Important: webkit2gtk3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776) * webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789) * webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780) * webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779) * webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782) * webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866) * webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271) * webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820) * webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838) * webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851) * webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.46.1-2.el9_4.i686.rpm 27448036a8ef8219981856c7ed68a2462dbfd0b0f5bf47c204343e7146a9bdbd webkit2gtk3-2.46.1-2.el9_4.x86_64.rpm 41c9ca8f3cce181db4ac0c76798a5bf90dfb87c251916d5ca0079d7dea422ab6 webkit2gtk3-devel-2.46.1-2.el9_4.i686.rpm 698ee76d436b84b07a45696b3f1dfa9d3eb7303b44dfecbee82db592b87d1016 webkit2gtk3-devel-2.46.1-2.el9_4.x86_64.rpm 02fe4ad21b73b197e7f017aba38ce60bc758ebe0bda5cbd55995a445faa783a3 webkit2gtk3-jsc-2.46.1-2.el9_4.i686.rpm 9a0d365826aa16462d95a309fc9740badc15192424d917ebb20a0331ac350460 webkit2gtk3-jsc-2.46.1-2.el9_4.x86_64.rpm 7bf4bd07f566835900a681f802a855062cfe25d28abbbdea2d8cd73414af412a webkit2gtk3-jsc-devel-2.46.1-2.el9_4.i686.rpm 0deb9b3590549494806ac89f6a11487ab20c4adf7e647201d6c010d671c95a90 webkit2gtk3-jsc-devel-2.46.1-2.el9_4.x86_64.rpm d2f03f916d6e99edc5c1bfe629bd2273cadc36e04f431d2d879ac45fccf414c8 RLBA-2024:8454 rpm-ostree bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rpm-ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rpm-ostree tool binds together the RPM packaging model with the OSTree model of bootable file system trees. It provides commands that can be used both on client systems and on server-side composes. The rpm-ostree-client package provides commands for client systems to perform upgrades and rollbacks. Bug Fix(es): * Rocky Linux for Edge build with image is failing - error: Writing commit: While writing rootfs to mtree: Not a regular file or symlink: zero [rhel-9.4.z] (JIRA:Rocky Linux-62651) rocky-linux-9-x86-64-appstream-rpms rpm-ostree-2024.3-6.el9_4.x86_64.rpm 31118a3865e97283a4b78cc5ac1d216662b8ded3c34d825850b2c8e6f62e1139 rpm-ostree-libs-2024.3-6.el9_4.i686.rpm db76108196bb0698ea697f84c6ce224a1688f68e94c8e86a361cdbad84f93ba0 rpm-ostree-libs-2024.3-6.el9_4.x86_64.rpm d33fa8522f9107d0de9012736fa1a9ead33cbcddd73c4d896f0546c216af62ed RLSA-2024:8617 Moderate: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * hw: cpu: intel: Native Branch History Injection (BHI) (CVE-2024-2201) * kernel: tcp: add sanity checks to rx zerocopy (CVE-2024-26640) * kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826) * kernel: af_unix: Fix garbage collector racing against connect() (CVE-2024-26923) * kernel: mac802154: fix llsec key resources release in mac802154_llsec_key_del (CVE-2024-26961) * kernel: scsi: core: Fix unremoved procfs host directory regression (CVE-2024-26935) * kernel: tty: Fix out-of-bound vmalloc access in imageblit (CVE-2021-47383) * kernel: net/sched: taprio: extend minimum interval restriction to entire cycle too (CVE-2024-36244) * kernel: xfs: fix log recovery buffer allocation for the legacy h_size fixup (CVE-2024-39472) * kernel: netfilter: nft_inner: validate mandatory meta and payload (CVE-2024-39504) * kernel: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (CVE-2024-40904) * kernel: mptcp: ensure snd_una is properly initialized on connect (CVE-2024-40931) * kernel: ipv6: prevent possible NULL dereference in rt6_probe() (CVE-2024-40960) * kernel: ext4: do not create EA inode under buffer lock (CVE-2024-40972) * kernel: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery (CVE-2024-40977) * kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (CVE-2024-40995) * kernel: ext4: fix uninitialized ratelimit_state-&gt;lock access in __ext4_fill_super() (CVE-2024-40998) * kernel: netpoll: Fix race condition in netpoll_owner_active (CVE-2024-41005) * kernel: xfs: don&#39;t walk off the end of a directory data block (CVE-2024-41013) * kernel: xfs: add bounds checking to xlog_recover_process_data (CVE-2024-41014) * kernel: block: initialize integrity buffer to zero before writing it to media (CVE-2024-43854) * kernel: netfilter: flowtable: initialise extack before use (CVE-2024-45018) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-427.42.1.el9_4.x86_64.rpm b42da7717444c98699b41efa7db6ee2018b3cef59f7e746e5ae4b701772c2918 kernel-debug-devel-matched-5.14.0-427.42.1.el9_4.x86_64.rpm 17936d83e1f5efa48e557511afcbd75059254972c646c784874796dbcf6c5d43 kernel-devel-5.14.0-427.42.1.el9_4.x86_64.rpm c9114ff7e5481ca1c478e9de6c455d25f6b416164447eadc1c8d530558ec79f5 kernel-devel-matched-5.14.0-427.42.1.el9_4.x86_64.rpm 7b23fdd5d5d2c215d1bb9b3be9c360513f049369cafdd937ea6411b2c1f2a689 kernel-doc-5.14.0-427.42.1.el9_4.noarch.rpm 5108aa97c06944a0af22d535ff70b4d08b50be9bcb693de40ce79507634def42 kernel-headers-5.14.0-427.42.1.el9_4.x86_64.rpm d0a8b4934b535c79bff19f87c2540a299e96bddf5a10f07893436be627342c09 perf-5.14.0-427.42.1.el9_4.x86_64.rpm 034ea3536c77a0a9712793d5bc6fc5e07abb9114ef69d7750806026a1c81530b rtla-5.14.0-427.42.1.el9_4.x86_64.rpm 1b1a336ae8060dbff5b55c3589f3e9a1bdd369c2f13ce66e15ba34cded9a0c93 rv-5.14.0-427.42.1.el9_4.x86_64.rpm f14fd33c1c6ca31d8ba8e122ac194cac979dda899d90aa6e95bbfb967a97d8d6 RLSA-2024:8800 Important: openexr security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for openexr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenEXR is an open-source high-dynamic-range floating-point image file format for high-quality image processing and storage. This document presents a brief overview of OpenEXR and explains concepts that are specific to this format. This package containes the binaries for OpenEXR. Security Fix(es): * OpenEXR: Heap Overflow in Scanline Deep Data Parsing (CVE-2023-5841) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms openexr-3.1.1-2.el9_4.1.x86_64.rpm a15c09469b452c2873f7832cad1d02b4894850fbf81dd37d4d80e52a0795cfd5 openexr-libs-3.1.1-2.el9_4.1.i686.rpm 405e1722c4c8fa35a98486397949ed37ee6a364fd651d73bec6b0de3aeb6d7ab openexr-libs-3.1.1-2.el9_4.1.x86_64.rpm 2ef6b71f86446bc448e3a5d2942246dbffc18ea0db6080fc5a13694f9df36e1d RLSA-2024:8914 Moderate: libtiff security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libtiff. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: NULL pointer dereference in tif_dirinfo.c (CVE-2024-7006) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libtiff-4.4.0-12.el9_4.1.i686.rpm 01ac8e4ebb906f14e83ebdab4bd003124562561720a342e57080d074bf3c6b3f libtiff-4.4.0-12.el9_4.1.x86_64.rpm d760a963c5b275793109894ef139967f9a168ccf57cf844cc7c96f32d9c4a3d5 libtiff-devel-4.4.0-12.el9_4.1.i686.rpm 81cd421c0d481c28773cb83095eb71a50326385af678c0394eb0b00df35d7a14 libtiff-devel-4.4.0-12.el9_4.1.x86_64.rpm 97309d185e3c813e7328588e4e4eea46be1546ba90b2cfef0cf19ef7b8cf377e RLSA-2024:8935 Moderate: edk2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for edk2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. Security Fix(es): * openssl: Possible denial of service in X.509 name checks (CVE-2024-6119) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms edk2-ovmf-20231122-6.el9_4.4.noarch.rpm 01c5a535b13fcaa13e5d134ca94d118368f1d15fe2f030b6d9b1a1644d773c7b RLBA-2024:9107 qatlib:24.02.0 module bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qatlib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Intel QuickAssist Technology (Intel QAT) provides hardware acceleration for offloading security, authentication and compression services from the CPU, thus significantly increasing the performance and efficiency of standard platform solutions. Its services include symmetric encryption and authentication, asymmetric encryption, digital signatures, RSA, DH and ECC, and lossless data compression. This package provides user space libraries that allow access to Intel QuickAssist devices and expose the Intel QuickAssist APIs. Bug Fix(es) and Enhancement(s): * [Intel 9.5 FEAT] [SPR][EMR] qatlib: Add RAS/HB/VFF features (JIRA:Rocky Linux-20174) rocky-linux-9-x86-64-appstream-rpms qatlib-24.02.0-1.el9_4.x86_64.rpm e03575d24572e10d5919879963e1f3df5fcb995b5a996501fe4158f436cb5b06 qatlib-service-24.02.0-1.el9_4.x86_64.rpm 20273dfe3465437abe002819320da9a7771c46006976334bb3a719c9ca41b9e4 RLSA-2024:8563 Important: buildah security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for buildah. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * buildah: Buildah allows arbitrary directory mount (CVE-2024-9675) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms buildah-1.33.10-1.el9_4.x86_64.rpm 8a6b806c1385c7b99aef8b70856fcecee00ad74811ed6c8ad240fb388beeb5f1 buildah-tests-1.33.10-1.el9_4.x86_64.rpm 454ef8265911f74ba1a38023abd213ddc35ab5d13d08945c7cf87f52ffafba27 RLSA-2024:8678 Important: grafana security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * golang-fips: Golang FIPS zeroed buffer (CVE-2024-9355) * dompurify: nesting-based mutation XSS vulnerability (CVE-2024-47875) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-9.2.10-19.el9_4.x86_64.rpm 779e5ffaf315ac66b3d0a35ed68d81c510e072bdf99939e3fc43e9f8ba8513f1 grafana-selinux-9.2.10-19.el9_4.x86_64.rpm 7ddee198960050b5fd3a6410f814b6f39cd3f7448bbc27a7e9478efc670d49ee RLSA-2024:8680 Low: mod_http2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for mod_http2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_h2 Apache httpd module implements the HTTP2 protocol (h2+h2c) on top of libnghttp2 for httpd 2.4 servers. Security Fix(es): * mod_http2: DoS by null pointer in websocket over HTTP/2 (CVE-2024-36387) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms mod_http2-2.0.26-2.el9_4.1.x86_64.rpm 93718ddf0a2fc81c2e556534c06e0f29905cf33b1c3421430f4a7cc3a20b8ead RLSA-2024:8726 Moderate: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser (CVE-2024-10464) * firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response (CVE-2024-10461) * firefox: thunderbird: Permission leak via embed or object elements (CVE-2024-10458) * firefox: thunderbird: Use-after-free in layout with accessibility (CVE-2024-10459) * firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 (CVE-2024-10467) * firefox: thunderbird: Clipboard "paste" button persisted across tabs (CVE-2024-10465) * firefox: DOM push subscription message could hang Firefox (CVE-2024-10466) * firefox: thunderbird: Cross origin video frame leak (CVE-2024-10463) * firefox: thunderbird: Origin of permission prompt could be spoofed by long URL (CVE-2024-10462) * firefox: thunderbird: Confusing display of origin for external protocol handler prompt (CVE-2024-10460) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-128.4.0-1.el9_4.x86_64.rpm e81198c0fc7c842c382c38ee6c8dc3e6fa7fe71f27780c3f089ec9293a6734d0 firefox-x11-128.4.0-1.el9_4.x86_64.rpm d76dc9f8ce5abcbb243711e99bc67c6c0804826cb38e6a059318389a04dcc156 RLBA-2024:9279 augeas bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for augeas. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms augeas-1.13.0-6.el9_4.x86_64.rpm ba47d317f491e35066efe9f0d595f5d7c74570baadced9ec3f07ae4fe8180af6 augeas-libs-1.13.0-6.el9_4.i686.rpm 38eb60c7d70e6f35e1a7c62da881b0baf1a7a1316b24dfe08d5dc1ebf11bcf59 augeas-libs-1.13.0-6.el9_4.x86_64.rpm 2ac9a5e626ea70d1890d5ecc64937eeb9fa9c701b38722476f0e5419d3967fe9 RLBA-2024:9284 postgresql bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for postgresql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms postgresql-13.16-1.el9_4.x86_64.rpm 3134e2e1f66599bec78f9253fb3b89548d78dbfa29349ae6cdf74035394e84ee postgresql-contrib-13.16-1.el9_4.x86_64.rpm 4e203afc1a165afdb33b1eae11691d4f4b9b485184ae421b319c6e480917f8c1 postgresql-plperl-13.16-1.el9_4.x86_64.rpm 2e8ca1c831a8090e2793687ec95e78fab91ebb818dbba47064bf2ce60da44840 postgresql-plpython3-13.16-1.el9_4.x86_64.rpm 9af349f8a12763c6440b4e8709c690d53c5762fe142b905f7d963a79f8ddb8ae postgresql-pltcl-13.16-1.el9_4.x86_64.rpm bdc31de3e0a3a9dfc4f6237627b5523c2feb9ab733891122ac5a58dfaa93e771 postgresql-private-libs-13.16-1.el9_4.x86_64.rpm 2edd85939b4eb7e948b9a0ced4a3cb78c0412ab238961c426020f36e40793f68 postgresql-server-13.16-1.el9_4.x86_64.rpm d23761e5c7d995ab0c8bf9376ee8858d005e2e5dcc8f3d383d9b7505fce523cf postgresql-upgrade-13.16-1.el9_4.x86_64.rpm cd0c20e58bd73356d9552544365ea84ef238c0357df8ceb03f25ef43446a2730 RLSA-2024:9548 Important: openexr security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for openexr. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenEXR is an open-source high-dynamic-range floating-point image file format for high-quality image processing and storage. This document presents a brief overview of OpenEXR and explains concepts that are specific to this format. This package containes the binaries for OpenEXR. Security Fix(es): * OpenEXR: Heap Overflow in Scanline Deep Data Parsing (CVE-2023-5841) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms openexr-3.1.1-2.el9_4.1.x86_64.rpm a15c09469b452c2873f7832cad1d02b4894850fbf81dd37d4d80e52a0795cfd5 openexr-libs-3.1.1-2.el9_4.1.i686.rpm 405e1722c4c8fa35a98486397949ed37ee6a364fd651d73bec6b0de3aeb6d7ab openexr-libs-3.1.1-2.el9_4.1.x86_64.rpm 2ef6b71f86446bc448e3a5d2942246dbffc18ea0db6080fc5a13694f9df36e1d RLSA-2024:8793 Moderate: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser (CVE-2024-10464) * firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response (CVE-2024-10461) * firefox: thunderbird: Permission leak via embed or object elements (CVE-2024-10458) * firefox: thunderbird: Use-after-free in layout with accessibility (CVE-2024-10459) * firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 (CVE-2024-10467) * firefox: thunderbird: Clipboard "paste" button persisted across tabs (CVE-2024-10465) * firefox: DOM push subscription message could hang Firefox (CVE-2024-10466) * firefox: thunderbird: Cross origin video frame leak (CVE-2024-10463) * firefox: thunderbird: Origin of permission prompt could be spoofed by long URL (CVE-2024-10462) * firefox: thunderbird: Confusing display of origin for external protocol handler prompt (CVE-2024-10460) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-128.4.0-1.el9_4.x86_64.rpm f2060ec5918c5e6d4e47f10c05187ecb14a3448004865f1f4adcf187ff1e47f6 RLSA-2024:9051 Important: podman security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * Buildah: Podman: Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction (CVE-2024-9407) * buildah: Buildah allows arbitrary directory mount (CVE-2024-9675) * Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) (CVE-2024-9676) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms podman-4.9.4-16.el9_4.x86_64.rpm b3551c832b05016948833ba5e0ee9473ff37926db32e6f422c916f0798334849 podman-docker-4.9.4-16.el9_4.noarch.rpm 45b183910b93c9d5565be00d2f22b2b20b7cab00bf5e320cfea56d690e8390be podman-plugins-4.9.4-16.el9_4.x86_64.rpm 43b9c53f1e3b12c4f1d44e34aec04e1a4006b804d8876df3221bfdc2e24f2109 podman-remote-4.9.4-16.el9_4.x86_64.rpm 57860fd4c0d139bf22e0891d83d98aa3dae26b57a708fa85c17ee338ec542149 podman-tests-4.9.4-16.el9_4.x86_64.rpm d51eed2da23c222aaa60285d91fd100b63444fbeaad4b5bc990ccc0e54b0bf63 RLBA-2024:9112 qatengine:1.6.0 module bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qatengine. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This package provides the Intel QuickAssist Technology OpenSSL Engine (an OpenSSL Plug-In Engine) which provides cryptographic acceleration for both hardware and optimized software using Intel QuickAssist Technology enabled Intel platforms. Bug Fix(es) and Enhancement(s): * [Intel 9.5 FEAT] [SPR][EMR][SRF][GNR] Update QATEngine (JIRA:Rocky Linux-20176) rocky-linux-9-x86-64-appstream-rpms qatengine-1.6.0-1.el9_4.x86_64.rpm a882fefc905d5f18e055a8fe6d3c89689229486d25e39772fe94b08de35ad378 RLBA-2024:9146 grafana-pcp bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for grafana-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms grafana-pcp-5.1.1-3.el9_4.x86_64.rpm d7526c2b31dbf4411bf5d62790dcc1cda8d7daa4ffa23a3e1b060ceb6e4f29db RLBA-2024:9186 gcc-toolset-13-gcc bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-13-gcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-13-gcc-13.3.1-2.1.el9_4.x86_64.rpm 1465aa86aa652caea9d27af902f6c2c6dcb3695b85dd56d15d9610006d7adcba gcc-toolset-13-gcc-c++-13.3.1-2.1.el9_4.x86_64.rpm f3cd2056921f918f5550a412659e8350004ac1cd4836aebb08a6e9aab4237c2a gcc-toolset-13-gcc-gfortran-13.3.1-2.1.el9_4.x86_64.rpm 79959ebb7f255a57c4b36303cb89301ebd265d85523ed9a686df539638d7bfc4 gcc-toolset-13-gcc-plugin-annobin-13.3.1-2.1.el9_4.x86_64.rpm a2ad5239ec3f4070e1e1b68e21730edd0464d2a7cfe6ca51bc48e95515c575ed gcc-toolset-13-gcc-plugin-devel-13.3.1-2.1.el9_4.i686.rpm bd109149f28c4a5d18c0181186f306bbf914dee6886a053595a1bd51b578fbbb gcc-toolset-13-gcc-plugin-devel-13.3.1-2.1.el9_4.x86_64.rpm a2225fc807afcc58842af1b09540d587bd1fa4263967c1f0639268ba7d74d3fa gcc-toolset-13-libasan-devel-13.3.1-2.1.el9_4.i686.rpm 5c60bd86136c862ca19c6d4286b7144f827bce5446545270449f37cf144777a5 gcc-toolset-13-libasan-devel-13.3.1-2.1.el9_4.x86_64.rpm ab334600ff4ce45cbf3dfff3dd8131a8255160d4c9cf3007ec6c1ecccabbd139 gcc-toolset-13-libatomic-devel-13.3.1-2.1.el9_4.i686.rpm e0dfb9115da466e6a6ce566a3e2fc6eebba04cd1cf85a10b3d562fb75009af19 gcc-toolset-13-libatomic-devel-13.3.1-2.1.el9_4.x86_64.rpm 3194790775ead29e37b5ff098d49406d34d4de623510bfc552cddf44b4c195c9 gcc-toolset-13-libgccjit-13.3.1-2.1.el9_4.i686.rpm 203d95f6364f16d3b9f9273f9e32953a300a7292426f77c692f3ff3c3c02b950 gcc-toolset-13-libgccjit-13.3.1-2.1.el9_4.x86_64.rpm 17fff10b3718179cd5805a19a655991791f49078af0899310e3a2104454f3ceb gcc-toolset-13-libgccjit-devel-13.3.1-2.1.el9_4.i686.rpm 03dd9a984697fd8c1ae32405ff4e58ad748b3f8ce719260249e50b72ca50ed31 gcc-toolset-13-libgccjit-devel-13.3.1-2.1.el9_4.x86_64.rpm 995e4fdc0af853c35522e118963c12a9ab820beec2ac9317153717c5484290e0 gcc-toolset-13-libitm-devel-13.3.1-2.1.el9_4.i686.rpm d3453f4ef022af3bcfa56b85b43dc107de72cd7380b79e1c674093ccb30f9dee gcc-toolset-13-libitm-devel-13.3.1-2.1.el9_4.x86_64.rpm 15ff144d59a1d656e331204c37ac13bfa7f12dcaa92768092d91115c2a107d0e gcc-toolset-13-liblsan-devel-13.3.1-2.1.el9_4.x86_64.rpm 9afc99c78b2ac38939aebf367bdb9ada3497a23de6c92e5c5947d460363f4d69 gcc-toolset-13-libquadmath-devel-13.3.1-2.1.el9_4.i686.rpm e1e5cb7a2c82dc895287f622542fc97f4bf1818e7b37278fc7eed24ee88e1ac1 gcc-toolset-13-libquadmath-devel-13.3.1-2.1.el9_4.x86_64.rpm 784a6ddaaa6058e39344af633afac1f813816f3e598a7437968b8b720f883dd2 gcc-toolset-13-libstdc++-devel-13.3.1-2.1.el9_4.i686.rpm 22789092f67f2bc34d4ce619b2aba1ef554076b08de454f2b945dca5294e4e83 gcc-toolset-13-libstdc++-devel-13.3.1-2.1.el9_4.x86_64.rpm 4da283c9291cd3f1bb3607d6d832992458c769ef8f9eca65e664562b60739f0f gcc-toolset-13-libstdc++-docs-13.3.1-2.1.el9_4.x86_64.rpm 33dcdfb8438ac8b8aecb0a069cb1eb7ada11e89145478638b9b18388f28b4418 gcc-toolset-13-libtsan-devel-13.3.1-2.1.el9_4.x86_64.rpm b6d05d0aadf761b09f90c03e7d0a1b25d049109ab0bccdb1b996026c0863f937 gcc-toolset-13-libubsan-devel-13.3.1-2.1.el9_4.i686.rpm 8243cfee5b5b4585b37138d109df713d17d1557583c87b11c7138eab7e3b3c55 gcc-toolset-13-libubsan-devel-13.3.1-2.1.el9_4.x86_64.rpm acbf918634d8fb824c7d82055411bcb843c036cd985f82e4ce36445b3dcb1799 gcc-toolset-13-offload-nvptx-13.3.1-2.1.el9_4.x86_64.rpm 9f755a062b5869e53d09c0d65fa86c641b0e11f7570ac7f70ade7cf904b520b3 RLBA-2024:9211 containers-common bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for containers-common. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms containers-common-1-91.el9_4.x86_64.rpm eff1ddc99c483dd29413211b68cccc739a89cd48ec9d00edaaf4f81109ca9b99 RLSA-2024:9302 Moderate: emacs security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for emacs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news. Security Fix(es): * emacs: Gnus treats inline MIME contents as trusted (CVE-2024-30203) * emacs: LaTeX preview is enabled by default for e-mail attachments (CVE-2024-30204) * emacs: Org mode considers contents of remote files to be trusted (CVE-2024-30205) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms emacs-27.2-10.el9_4.x86_64.rpm fa3ed83a9b3d607e31b4d53f344a3afd7a2623bef184395c2293972180b63c57 emacs-common-27.2-10.el9_4.x86_64.rpm bc6c711fa255e8cf751dfb3cba72917deca8fc645ef87d0d13af6b64577b299b emacs-filesystem-27.2-10.el9_4.noarch.rpm 85b21bc3342ea2403a9e5d7ad3df352d2948f93efef23c52a922a67fb5a24ba3 emacs-lucid-27.2-10.el9_4.x86_64.rpm 911bd89bfa1eae35a08f4d4618049f5e0ce331e1ca1387918ab76d6f0d8852a9 emacs-nox-27.2-10.el9_4.x86_64.rpm a10cd0d4af98ad6648340b2bb8efffe84a654e0904bd5aee9cc339b0d86f926e RLBA-2024:9308 bind and bind-dyndb-ldap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bind-dyndb-ldap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bind-dyndb-ldap-11.9-10.el9_4.0.1.x86_64.rpm fa51a4fd9d6c35845930d299fd93726d09efb98906951735c39b4b7ccdf8ef3f RLBA-2024:10833 scap-security-guide bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for scap-security-guide. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. For detailed information on changes in this release, see the SCAP Security Guide release notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms scap-security-guide-0.1.75-1.el9.rocky.1.1.noarch.rpm 6b20bfed967ba99e1c29cfc95ad91e3c71638efdba0186a13735a6e757c9aa31 scap-security-guide-doc-0.1.75-1.el9.rocky.1.1.noarch.rpm bbef87912d5bd58cfc400695c3d51c8dafa204ed386aceb7eab2aeb23583f98b RLBA-2025:1104 tzdata bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. Bug Fix(es) and Enhancement(s): * Update to tzdata-2025a [Rocky Linux 8] (JIRA:Rocky Linux-74309) * Update to tzdata-2025a [Rocky Linux 7] (JIRA:Rocky Linux-74311) * Update to tzdata-2025a [rhel-9.5.z] (JIRA:Rocky Linux-76432) rocky-linux-9-x86-64-appstream-rpms tzdata-java-2025a-1.el9.noarch.rpm ec47b067903f046c7fd625b1ef96d5c7b27a1f0992fc8783752a34caf36bc2ea RLEA-2024:11248 tzdata bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tzdata. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. Bug Fix(es) and Enhancement(s): * Update to tzdata-2024b [rhel-9.5.z] (JIRA:Rocky Linux-57794) rocky-linux-9-x86-64-appstream-rpms tzdata-java-2024b-2.el9.noarch.rpm 2257e7ce68b1f585192959ecc5346b52cc69a44bc129031e50d5a3d953fcce21 RLSA-2025:0426 Moderate: java-21-openjdk security update for Rocky Linux 8.10, 9.4 and 9.5 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-21-openjdk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenJDK 21 packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit. Security Fix(es): * JDK: Enhance array handling (CVE-2025-21502) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-21-openjdk-21.0.6.0.7-1.el9.x86_64.rpm 143d5d4534cb105790f758eede6c958da3d7857fef970e0c0a450dcd3c5cbef2 java-21-openjdk-demo-21.0.6.0.7-1.el9.x86_64.rpm c086c7ce1f236ec987f381f26a855ec1c8c8259536e0ed713b988012bf466ae5 java-21-openjdk-devel-21.0.6.0.7-1.el9.x86_64.rpm 5fcf7a120a36c99abff3a637a42d72c99e8c5bcf1e0e4d372a19bacc8dcd00cc java-21-openjdk-headless-21.0.6.0.7-1.el9.x86_64.rpm 10d5aece80d2dffd3c33e31ff6735341bea9cb66f3880bb19e705fc40ec7cea3 java-21-openjdk-javadoc-21.0.6.0.7-1.el9.x86_64.rpm 60c8e4af0d498327f1bb679c703bbcf0dcb49e131a4aa310a1c3886bc14cdbd2 java-21-openjdk-javadoc-zip-21.0.6.0.7-1.el9.x86_64.rpm 11dcb16f6176441929607447b4000462d516d85ad6a5a5247ef02dce3b853f15 java-21-openjdk-jmods-21.0.6.0.7-1.el9.x86_64.rpm d3022079ee536e74a1b84b250073e0748e496a7306ecebfa07badb1ebbee53cd java-21-openjdk-src-21.0.6.0.7-1.el9.x86_64.rpm f6659cddd5b78ef960bee368bf9f8e6f441ae36ec515df647d2ce8ca50ca89da java-21-openjdk-static-libs-21.0.6.0.7-1.el9.x86_64.rpm 3353aa449f481b17e6a83803ee866322e5a13c7f4697d88df79b728f97d049d7 RLSA-2024:10384 Important: tuned security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tuned. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tuned packages provide a service that tunes system settings according to a selected profile. Security Fix(es): * tuned: `script_pre` and `script_post` options allow to pass arbitrary scripts executed by root (CVE-2024-52336) * tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method (CVE-2024-52337) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms tuned-gtk-2.24.0-2.el9_5.noarch.rpm 6c47c658828f0518c6b112f2e9c021089cca4026e70a8ec35c75ad75316edaf8 tuned-ppd-2.24.0-2.el9_5.noarch.rpm 0338eb57401aeb49caa95931728048ddf7952484187bc74a82f0cbe23b6ee1a6 tuned-profiles-atomic-2.24.0-2.el9_5.noarch.rpm 5ca5290cb79e39ca7ed2f6ad66bc4cf86223a5a21091158af885d81af9055ee5 tuned-profiles-mssql-2.24.0-2.el9_5.noarch.rpm d083f4d1f2b1ad216dfc7d755193db2e7e0d1710bb7f0dd51b5725f844f87179 tuned-profiles-oracle-2.24.0-2.el9_5.noarch.rpm 8ef961e41ffb93d5c4c28107cdc7e5bdb23f5afad800b5ffd662aba82c2819e7 tuned-profiles-postgresql-2.24.0-2.el9_5.noarch.rpm c17802d666befac62640385fa52e5a67338f12ce122aa56bde01dac80c089653 tuned-profiles-spectrumscale-2.24.0-2.el9_5.noarch.rpm 983eb34db971315d8551b483b4274d87b52957a5ba5176fdd1b34541422a7ba8 tuned-utils-2.24.0-2.el9_5.noarch.rpm f018576481ce6921afdca59f415a297b38985bcce273d2e0d79298cae7ab6ae0 RLSA-2025:0673 Important: git-lfs security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for git-lfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * git-lfs: Git LFS permits exfiltration of credentials via crafted HTTP URLs (CVE-2024-53263) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms git-lfs-3.4.1-4.el9_4.x86_64.rpm d0a765603b67060773cbec2fee35d6065c751bd8fc32c5d8df55823671a45aab RLSA-2024:9325 Low: cockpit security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for cockpit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Cockpit enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, SELinux troubleshooting, interactive command-line sessions, and more. Security Fix(es): * cockpit: Authenticated user can kill any process when enabling pam_env's user_readenv option (CVE-2024-6126) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-packagekit-323.1-1.el9_5.noarch.rpm e1b7287af6aabbb101f9d113ab910885fcb82fdb685d919d36076a2264fa52e7 cockpit-pcp-323.1-1.el9_5.x86_64.rpm 16c2300303b4b56a6e085bbba909f77488859d9c9fc023f00b9a5c9fea3bbefc cockpit-storaged-323.1-1.el9_5.noarch.rpm e6a36f5432ea9871e970a5f407fc394ee6d85ce03589fc61938e718591cfb939 RLBA-2024:9336 rsync bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rsync. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rsync-daemon-3.2.3-20.el9.noarch.rpm 369fb0f9ac262f87400bc5018409566e82b495effcbf7bfaa3df3a5fd58bac34 RLSA-2024:9333 Low: openssl and openssl-fips-provider security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for openssl-fips-provider, openssl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: Unbounded memory growth with session handling in TLSv1.3 (CVE-2024-2511) * openssl: Excessive time spent checking DSA keys and parameters (CVE-2024-4603) * openssl: Use After Free with SSL_free_buffers (CVE-2024-4741) * openssl: SSL_select_next_proto buffer overread (CVE-2024-5535) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openssl-devel-3.2.2-6.el9_5.1.i686.rpm 82fd93d7f932e24813b9fbfc854a7b27c3a5fa2e32f75d5ed4f46161b32c8df6 openssl-devel-3.2.2-6.el9_5.1.x86_64.rpm 027505056b21615587a77642bcb545497d8ac4c4eb1473517a0a3075cca68cde openssl-perl-3.2.2-6.el9_5.1.x86_64.rpm 6f667ce95a37c91683455f25e25986e6ef7b641aa5db5fa400b181e4f950a283 RLBA-2024:9337 selinux-policy bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for selinux-policy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms selinux-policy-devel-38.1.45-3.el9_5.noarch.rpm 3000e1493ba0f20c4811ec309074f80f4f4c8b28bb4770c47328001921379921 RLBA-2024:9342 libnvme bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnvme. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-libnvme-1.9-3.el9.x86_64.rpm 0c61b4357868b03e93303025e98526313a3861637523bdf71d98763086f5681e RLBA-2024:9344 systemd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for systemd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms systemd-boot-unsigned-252-46.el9_5.2.0.1.x86_64.rpm 1931b2c6c2f0ac888ae36d1d2c8ea62d72a0dd7bc14d7198199184ae70201f6b systemd-devel-252-46.el9_5.2.0.1.i686.rpm c89f03f678385cb69c90cd2eeb5489209a091bd7f8ee52f6c253cecb96a0dbb8 systemd-devel-252-46.el9_5.2.0.1.x86_64.rpm acbed4865022279e75512e1e9ccae1af3dc7e062a971cae75db1a25ae6266f65 systemd-journal-remote-252-46.el9_5.2.0.1.x86_64.rpm 8c322df2ae2041a92800d73b60178c0325f1db3b0d52d431463797fa5c31c2de systemd-ukify-252-46.el9_5.2.0.1.noarch.rpm 8807b637004b846e74df9a9d8b21787a524c7aeeed823461df245bb9e48533e9 RLBA-2024:9350 evolution-mapi, openchange, and samba bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openchange, evolution-mapi, samba. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms evolution-mapi-3.40.1-7.el9.x86_64.rpm 217db50b4c9ddb535405d615ae30fba046addd1a7cdabc6ee0f786ad5f87702c evolution-mapi-langpacks-3.40.1-7.el9.noarch.rpm d0a78e069bf02a8120540f56eb184fcd76adc5c17345b117953d43e7cf87e326 openchange-2.3-42.el9.i686.rpm 6d85ebe9d34fe254014979ef8260d957d021c618152106139006b68569520045 openchange-2.3-42.el9.x86_64.rpm 6e8fd648e9273c16d53c6a7abec67a4f5b16bdf3c94882b698fc28ae45f701d5 samba-client-4.20.2-2.el9_5.x86_64.rpm 80143b8c6fc53512165975878a0e91a635ffaf2006b3234c9518c1e65bcc4126 samba-gpupdate-4.20.2-2.el9_5.x86_64.rpm 94c3dd820a44f58d297d3e3ab7c38fe3616644176dcbf0279d22b9c7847c3f60 samba-krb5-printing-4.20.2-2.el9_5.x86_64.rpm ffcfe90fbcb155ab9a1588dee832e723ab32fb3e29254c942f92b768bd592868 samba-vfs-iouring-4.20.2-2.el9_5.x86_64.rpm a547d8822545961b927e24e0b8bdeafe816e164a07415cc01a26f57cb5e618fd samba-winbind-clients-4.20.2-2.el9_5.x86_64.rpm b6a0598fd64019aebdce19e052bebe2a4bda12eccadc05452d1915828b77d660 samba-winbind-krb5-locator-4.20.2-2.el9_5.x86_64.rpm d6b4d11eebad5dffed82babb50d0a0b70db759551bb98375ba63162964682ba0 samba-winexe-4.20.2-2.el9_5.x86_64.rpm 9e297169bf906eb597ab07403bf18c15f17c994e004063746197af2ae6911636 RLBA-2024:9351 sssd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sssd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms sssd-idp-2.9.5-4.el9_5.4.x86_64.rpm ca72fdb1bc964e29a6b73e71bf825b93026f007d7256f783634b16a9b4d73e20 RLBA-2024:9352 elfutils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for elfutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms elfutils-debuginfod-0.191-4.el9.x86_64.rpm 91edf911d7d4b1d6db58c25070ac994c7f81199c9c3fea357e530c59ddd07ff9 elfutils-debuginfod-client-devel-0.191-4.el9.i686.rpm ab7a3cda4d2236b596ebf6d1d375ef7112f3f34b6bba4a29daa5a015c8d5e657 elfutils-debuginfod-client-devel-0.191-4.el9.x86_64.rpm 1158314d339d38e04e3a6aa76ac88dd2f400ec03c61532c8ef4d15ab99cb0098 elfutils-devel-0.191-4.el9.i686.rpm 5f27de4f9b2bcb119ebc7349139445000633c4793eeb441e1dd656cb8f90921a elfutils-devel-0.191-4.el9.x86_64.rpm a75629f2947cb562dd8d499f2f3d22983039050447a46ec9c964358e4547ac69 elfutils-libelf-devel-0.191-4.el9.i686.rpm 322e60eeaa424fe4be390c1282effbb91204058fd411cc19cc77bbd001bd428a elfutils-libelf-devel-0.191-4.el9.x86_64.rpm 4852566a0e15039e7f5bd51c2537fe787576f0f8b5a7181e855763d6b621e460 RLBA-2024:9357 dnf-plugins-core bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dnf-plugins-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-dnf-plugin-leaves-4.3.0-16.el9.noarch.rpm a53891be9a911bf8930eb23511c355a6c5a1900e03cfd5803c91ef5b29ebe102 python3-dnf-plugin-modulesync-4.3.0-16.el9.noarch.rpm 203a598c71df38aa8bfbd666dfd5922aebd0b86d2d5cc501038eaa4b445dc5a5 python3-dnf-plugin-show-leaves-4.3.0-16.el9.noarch.rpm ce5a21a469189b7b6bd22395a4c25d7d16ef59cbcbbeeeebf3dbbb87b51cff80 RLBA-2024:9359 rdma-core bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rdma-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ibacm-51.0-1.el9.i686.rpm aae755f209dd5d0d2b6cc1d5ac569d3e61267e45430f17a7e796cb880c4217f8 infiniband-diags-51.0-1.el9.i686.rpm 69c8bf71b0c3a353e19ca2422f97d07e9f18c7d1a58d9d8c5cbe5f412b50252c infiniband-diags-51.0-1.el9.x86_64.rpm 160b391236759b96e4e8a2bc380a55c5d92a67618830a628d44c6b6085036f3d python3-pyverbs-51.0-1.el9.x86_64.rpm 441be845bb94cf1f55ba2aaa0841442423c2881284192ebd9a534b852205f7da rdma-core-devel-51.0-1.el9.i686.rpm fef3c99e7ba10125cb4a6e097d95a4cb8ee1c214aba15a40d249d9cacf603db3 rdma-core-devel-51.0-1.el9.x86_64.rpm 8a8fd778367e825484e231d93dcbd4dfe7bfaa584b0acb3438648a2e741f09c0 RLBA-2024:9362 xfsprogs bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xfsprogs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xfsprogs-devel-6.4.0-4.el9.i686.rpm 9ffb02f2a95daf9b0baf3857ed378bfabe81073ba490f983201d1b57cf0f4aac xfsprogs-devel-6.4.0-4.el9.x86_64.rpm c618b064e54dd2ee57ab99d6324414914c5b7784b5c6bdc331412386d85cde5b xfsprogs-xfs_scrub-6.4.0-4.el9.x86_64.rpm df241a65efba7c3e0a132f31f54c12f55873b7866b4ffa577432b3ad6f8c5e07 RLBA-2024:9367 rpm bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rpm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rpm-apidocs-4.16.1.3-34.el9.0.1.noarch.rpm 7156f848480afdb16a5bfac0a87f568cde5fde52a3e0a5717ca65e9562e5b259 rpm-build-4.16.1.3-34.el9.0.1.x86_64.rpm b8f6abc253d962187052415eb1aea13e1158bc64756774c555fd80431761a600 rpm-cron-4.16.1.3-34.el9.0.1.noarch.rpm 679265d930bd3358e6ee4fe343672412e20ac04f45b2954031a3179380d84837 rpm-devel-4.16.1.3-34.el9.0.1.i686.rpm a27406920abc3f165158e83e203406534d918ee34a25548b06b2951b5dea5023 rpm-devel-4.16.1.3-34.el9.0.1.x86_64.rpm de34fade0466c69db0fe78376d7f80e0076de0d8248ea09fc878955dc2b2f109 rpm-plugin-fapolicyd-4.16.1.3-34.el9.0.1.x86_64.rpm 52bee7fea14b9d91a3d82d73f5c7530c2a787b6a471303ae33eab0dcdaecfba3 rpm-plugin-ima-4.16.1.3-34.el9.0.1.x86_64.rpm c12eb62bf5dc578476dd4f91277bc56479b8c6346abd76630470f26bd6cfc2d9 rpm-plugin-syslog-4.16.1.3-34.el9.0.1.x86_64.rpm 89925253337864666bb2230e12743e15d4158b1fa51cea6d4a7e1cb3ebd54077 rpm-plugin-systemd-inhibit-4.16.1.3-34.el9.0.1.x86_64.rpm 6fb40c9ce0573ff6a83a303103d012838f9e03a2258757d0d4a9486a99078081 RLBA-2024:9365 openssh bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openssh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openssh-askpass-8.7p1-43.el9.x86_64.rpm 38adf7037510d75ccb4f2792fd725c6b3f14a27ccf248609843c1d120650ca54 pam_ssh_agent_auth-0.10.4-5.43.el9.x86_64.rpm 65055ccf0044e5e2c4851c95b4f8b79d61dd92588a6ebf9d46298a5ff4dda11f RLBA-2024:9374 cifs-utils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cifs-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pam_cifscreds-7.0-5.el9.x86_64.rpm a9aa3e3e659ad2795c69fc9eb23968dd79dd8ec93d8f8c156470f333c9b3a8b2 RLBA-2024:9376 nfs-utils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nfs-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nfs-utils-coreos-2.5.4-27.el9.x86_64.rpm 0ef2448adde158ac4fb32a1376100864880ac4028b4d3e3d125874dcf67d5f80 nfsv4-client-utils-2.5.4-27.el9.x86_64.rpm 44affb658fd9e221b695315a94e4d1b6b70b13b2da3af77fe8bc9406a1af6b70 RLBA-2024:9377 libdb bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libdb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libdb-devel-5.3.28-54.el9.i686.rpm 6f462101ef9194d6979a085413127a957b63bec5cd962d395018f40a50819d49 libdb-devel-5.3.28-54.el9.x86_64.rpm b0ae7c0fe86db1b885605ab6c697b3a5e848f251564e7289baadf42576175fc4 libdb-utils-5.3.28-54.el9.x86_64.rpm dc055b3b13ff65ef7931ca96961a1072c73c88a69dcfd6b47ea5dc91d26a409a RLBA-2024:9384 binutils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for binutils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms binutils-devel-2.35.2-54.el9.i686.rpm e667ac0d57fec3f0a591986cce5ddeabed3bfb2c433e7adacc67761d81cb6ae5 binutils-devel-2.35.2-54.el9.x86_64.rpm 0a9cc5905ed4074255292ab5b6f8035c633875ab62bc32e1b28e1b7d2b303387 RLBA-2024:9395 quota bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for quota. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms quota-doc-4.09-2.el9.noarch.rpm 1ae5b46ed8b7d2f435e76518aa0f34cfaf257c9ade984221b1ae0a701030d2b9 quota-nld-4.09-2.el9.x86_64.rpm 9594208a83f093163378c90d2d53635ffd706cec042af05b2a9786782ab69117 quota-rpc-4.09-2.el9.x86_64.rpm 5824d6df10a7a2261671cc87a3241043e7fe6d4bd88364b4dc64c3f342bcfba4 quota-warnquota-4.09-2.el9.x86_64.rpm a9322d29d75b7b7c2ff4017453a08717bf933c693fa60dc5bc6f31a56c4f395e RLBA-2024:9394 lvm2 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for lvm2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lvm2-dbusd-2.03.24-2.el9.noarch.rpm e0ebaa66ba3db8385d87e680f04115a0c9973628f157232bfcb51b87678f3e77 lvm2-lockd-2.03.24-2.el9.x86_64.rpm 48eb9245d134d14929d82ec73d0a7806973f94b44541e711d9ab2d57c031e463 RLSA-2024:9405 Low: vim security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for vim. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: heap-based buffer overflow vulnerability (CVE-2021-3903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms vim-common-8.2.2637-21.el9.x86_64.rpm 6d10b80fd9b8d92dded3a5893aaf3bb96e72cff5a2182f1055904ac0180910b7 vim-enhanced-8.2.2637-21.el9.x86_64.rpm a12154b376e90db585728c54f971924e78ce6f30b3923ce395262dfb98ac8086 vim-X11-8.2.2637-21.el9.x86_64.rpm 6c762244d6a5ce7ce8f1345443ad9a9f23cfcdce98261848ea91e82e36529b29 RLBA-2024:9408 usermode bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for usermode. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms usermode-gtk-1.114-5.el9.x86_64.rpm 3f2e0ded7aa2e97af952d9ff7652133512f2ad295234225500680896fb4894e3 RLBA-2024:9407 audit bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for audit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms audit-libs-devel-3.1.5-1.el9.i686.rpm fb31b9d1562d964d4800b8d25b1dd4335c9e25db375fde79678764995d9c49d8 audit-libs-devel-3.1.5-1.el9.x86_64.rpm dcd0621ee8a49d2a4b379d97f8ecee3e33ade8ab07fd55ad354b400881de9dd8 python3-audit-3.1.5-1.el9.x86_64.rpm c8466f6cbe2b1e793df5c8981daf82e5fb1ddd88e509ed7dce7c2ad3ee80a399 RLSA-2024:9413 Moderate: bluez security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for bluez. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The bluez packages contain the following utilities for use in Bluetooth applications: hcitool, hciattach, hciconfig, bluetoothd, l2ping, start scripts (Rocky Enterprise Software Foundation), and pcmcia configuration files. Security Fix(es): * bluez: unauthorized HID device connections allows keystroke injection and arbitrary commands execution (CVE-2023-45866) * BlueZ: Audio Profile AVRCP Improper Validation of Array Index Remote Code Execution Vulnerability (CVE-2023-27349) * bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability (CVE-2023-51596) * bluez: OBEX library out-of-bounds read information disclosure vulnerability (CVE-2023-51594) * bluez: audio profile avrcp parse_media_folder out-of-bounds read information disclosure vulnerability (CVE-2023-51592) * bluez: audio profile avrcp parse_media_element out-of-bounds read information disclosure vulnerability (CVE-2023-51589) * bluez: avrcp_parse_attribute_list out-of-bounds read information disclosure vulnerability (CVE-2023-51580) * bluez: AVRCP stack-based buffer overflow remote code execution vulnerability (CVE-2023-44431) * bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability (CVE-2023-50230) * bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability (CVE-2023-50229) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bluez-cups-5.72-2.el9.x86_64.rpm 50ff1173bc6297e01e1222d45f65aff5f4c263094f3b9aca4f47689f4d4a12c8 bluez-obexd-5.72-2.el9.x86_64.rpm 9884ffe5a5c47d416f33f3a24bc83bb45adb00bf7748f9affca648479ee1c02f RLBA-2024:9412 s390utils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for s390utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms s390utils-2.33.1-2.el9.x86_64.rpm deb78656406b225e4b9fc1078ec423be4b6363376811dada4ceac262bd6123fe s390utils-se-data-2.33.1-2.el9.noarch.rpm 6272b2fe18f3db58671e6ba1b4b874693f03f65fce643501166f327e695a3ae4 RLBA-2024:9416 dracut bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dracut. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dracut-caps-057-70.git20240819.el9.x86_64.rpm e72145b94a2023e82edc8f9d37659284ce7b45370a21b25fc4a4594ed4994c3c dracut-live-057-70.git20240819.el9.x86_64.rpm d266362692efb43a9102aa262afdc79bdd888feac0ecb5101bc57cfa1e7e1520 RLBA-2024:9431 util-linux bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for util-linux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libblkid-devel-2.37.4-20.el9.i686.rpm 78d3e9c923832ddf3da3ce84f1f6eba6b24a7ff2d06cf23e21eb163a87e7f298 libblkid-devel-2.37.4-20.el9.x86_64.rpm b22f7cb3e26c29e7566a851e59b46e10413034ea9c5a353c86a046da0d6dc8f6 libmount-devel-2.37.4-20.el9.i686.rpm df19a7faeb6e7ed7ab3bb5cc2bf9da1b2bb0f873d9adbf00112a32163f74e2ac libmount-devel-2.37.4-20.el9.x86_64.rpm 91b1d625fa6165900ce9fc260d5f221565ab723164174a94d9f9b04464262cbf libuuid-devel-2.37.4-20.el9.i686.rpm 6ecef49bde69399c88b33843f80c8ee401fcd0d2218a147e1b1b50541b04dd0f libuuid-devel-2.37.4-20.el9.x86_64.rpm f6fc19d10e54bf1d7a52343e2341bfc6dc9433aac0a396549d1d6083011aef96 python3-libmount-2.37.4-20.el9.x86_64.rpm f061bc3dcb00f3b0f3a80fd7327480680fb43b2ddc108e485123926f56308bac uuidd-2.37.4-20.el9.x86_64.rpm 89bd6d54e9f2a6d7e1bd031dab09d712592f7a37a2210a50f2094cbd81b0b6f4 RLBA-2024:9434 avahi bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for avahi. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms avahi-autoipd-0.8-21.el9.x86_64.rpm 80d654f44b68ed277bbb8081fd0e24915fbe5c53f6f1a2a3535805d39b216f4f avahi-glib-0.8-21.el9.i686.rpm ffa77624afb5bb1673bfd888f361e5a302d473b7a589a46cb69b902c3f554f29 avahi-glib-0.8-21.el9.x86_64.rpm f20bc28aec19f70091a2aed8f5206e37d5ac83206edb161a941f436a90fbccbe avahi-tools-0.8-21.el9.x86_64.rpm cff0a0b19ae81b8b2300e608b2e26f5e86396dbeeaba5cae8680f614fd86afb6 RLBA-2024:9437 numactl bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for numactl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms numactl-devel-2.0.18-2.el9.i686.rpm a1b1ca1675cd9cc9dd865216a4e0748711f2d3306cfa26aba1a9776dd8dfb949 numactl-devel-2.0.18-2.el9.x86_64.rpm ebb02768cbc58da6812a084c7d39bebe7a9b7057e04e624e2bbb40a6083bb9e3 RLBA-2024:9438 chkconfig bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for chkconfig. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ntsysv-1.24-1.el9_5.1.x86_64.rpm 2897817748c79b52ca48cf9c5a0470561d915361b1a693a081cc429c45719648 RLSA-2024:9470 Low: cups security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for cups. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: libppd: remote command injection via attacker controlled data in PPD file () For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms cups-2.3.3op2-31.el9_5.x86_64.rpm aad3736f03a0b73f46ce08419121079ac5fb2c87cf41acbbcd79139f6cf58863 cups-client-2.3.3op2-31.el9_5.x86_64.rpm 2a0e28eb92125d3e8cc874aa0d536223ddb6d6bb2649f4d1979cb89e72baaf53 cups-devel-2.3.3op2-31.el9_5.i686.rpm 8555eb36114665c5623567847754746856efe403f9bdd85ccaa57a6735d14ca7 cups-devel-2.3.3op2-31.el9_5.x86_64.rpm 0fa2c92973fbb3e07be1e38ea4215d8b27790a38ede2972410ef448f46d1a6ba cups-filesystem-2.3.3op2-31.el9_5.noarch.rpm a2a82e0a75e86442df57101ffbdd941fbfb8a94732777c1ce27f410edfef22dd cups-ipptool-2.3.3op2-31.el9_5.x86_64.rpm a5063f02264ef89196d219b789d6adf73706b06c3c0c040a0ae85477e8599ef7 cups-lpd-2.3.3op2-31.el9_5.x86_64.rpm 6e9201b2a638a0f23e67c0ae114572efa9f3ba56faf3e4c10e8e6d6a6e1d68d5 cups-printerapp-2.3.3op2-31.el9_5.x86_64.rpm 6863d39ad08b50bef04fa41c17d07b224f8f18bd863c21cc68c2b4b47bf9d41b RLBA-2024:9471 samba bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for samba. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Bug Fix(es): * smbd-notifyd O(n*n) performance issue ( https://bugzilla.samba.org/show_bug.cgi?id=14430 ) [rhel-9.5.z] (JIRA:Rocky Linux-59912) * Package certs directories in samba-common for gpupdate [rhel-9.5.z] (JIRA:Rocky Linux-59913) rocky-linux-9-x86-64-appstream-rpms samba-client-4.20.2-2.el9_5.x86_64.rpm 80143b8c6fc53512165975878a0e91a635ffaf2006b3234c9518c1e65bcc4126 samba-gpupdate-4.20.2-2.el9_5.x86_64.rpm 94c3dd820a44f58d297d3e3ab7c38fe3616644176dcbf0279d22b9c7847c3f60 samba-krb5-printing-4.20.2-2.el9_5.x86_64.rpm ffcfe90fbcb155ab9a1588dee832e723ab32fb3e29254c942f92b768bd592868 samba-vfs-iouring-4.20.2-2.el9_5.x86_64.rpm a547d8822545961b927e24e0b8bdeafe816e164a07415cc01a26f57cb5e618fd samba-winbind-clients-4.20.2-2.el9_5.x86_64.rpm b6a0598fd64019aebdce19e052bebe2a4bda12eccadc05452d1915828b77d660 samba-winbind-krb5-locator-4.20.2-2.el9_5.x86_64.rpm d6b4d11eebad5dffed82babb50d0a0b70db759551bb98375ba63162964682ba0 samba-winexe-4.20.2-2.el9_5.x86_64.rpm 9e297169bf906eb597ab07403bf18c15f17c994e004063746197af2ae6911636 RLSA-2024:9474 Important: krb5 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for krb5. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * freeradius: forgery attack (CVE-2024-3596) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms krb5-devel-1.21.1-4.el9_5.i686.rpm 488b467b9db5fd9b338c9e1c1199554c6827339d3019e2d2ba156bae86f9cc13 krb5-devel-1.21.1-4.el9_5.x86_64.rpm d20f63e1703ae6720e799b5ce5407e32ad423bab8bcef3ad5b71f62b22e27ca1 RLSA-2024:10244 Important: pam:1.5.1 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for pam. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication. Security Fix(es): * pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass (CVE-2024-10963) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms pam-devel-1.5.1-22.el9_5.i686.rpm 511352c9f2e2efd5888704c22e2dba5cc71dff1febf76cef995151cd034f02e4 pam-devel-1.5.1-22.el9_5.x86_64.rpm d9bbc29d818f48787ea50216e21c54d69c7c16bcca599895361ef015bb70cdb6 pam-docs-1.5.1-22.el9_5.x86_64.rpm 80601fe4ab8034f601898f55d7a2a0a6b89662d22e51f334393ad9e7ce9b5192 RLSA-2024:10983 Moderate: python3.9:3.9.21 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.9. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Virtual environment (venv) activation scripts don't quote paths (CVE-2024-9287) * python: Improper validation of IPv6 and IPvFuture addresses (CVE-2024-11168) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-devel-3.9.21-1.el9_5.i686.rpm 2e40f536bf9840012af0c8ca034b95e0e01cedb7f624455e4c2a4daa75dd601e python3-devel-3.9.21-1.el9_5.x86_64.rpm 866c542b431bad92660f395cd656220c716e53c53587cba82d95fa7cce766fbe python3-tkinter-3.9.21-1.el9_5.x86_64.rpm 6c1e7c689f4ba924df3fc32bf96f9e4c2aaf443ed7659e7e954593950c9945f7 python-unversioned-command-3.9.21-1.el9_5.noarch.rpm 3209b97f006f84a85b39590198f389318c199000f54831c66f9b46859fccad2a RLBA-2024:11247 iputils bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iputils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iputils packages contain basic utilities for monitoring a network, including ping. Bug Fix(es): * unable to ping via a VRF IP [rhel-9.5.z] (JIRA:Rocky Linux-63060) rocky-linux-9-x86-64-appstream-rpms iputils-ninfod-20210202-10.el9_5.x86_64.rpm d02902d97910e6ae09e693cae6397aaefc3726362d747c57fe0061f566655973 RLSA-2025:0324 Important: rsync security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for rsync. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Security Fix(es): * rsync: Info Leak via Uninitialized Stack Contents (CVE-2024-12085) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms rsync-daemon-3.2.3-20.el9_5.1.noarch.rpm 7b6da89731b2aa4bfb0c5f0cb870c77e8f0cd62a1e46142235a11708d9e6e1b9 RLSA-2025:0377 Moderate: Security and bug fixes for NetworkManager Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for NetworkManager. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Security and bug fix(es): * Routes in table different to main are not deleted on reapply [rhel-9.5.z] (JIRA:Rocky Linux-73013) * Route to VPN server not stored in routing table that is specified by ipv4.route-table [rhel-9.5.z] (JIRA:Rocky Linux-73166) * VPN connections do not support ipv4.routing-rules settings [rhel-9.5.z] (JIRA:Rocky Linux-73167) * CVE-2024-3661 NetworkManager: DHCP routing options can manipulate interface-based VPN traffic [rhel-9.5.z] (JIRA:Rocky Linux-64726) rocky-linux-9-x86-64-appstream-rpms NetworkManager-cloud-setup-1.48.10-5.el9_5.x86_64.rpm fb0d1d4aafbb72857ac897b67203dc776bf132c2ced87e154b6f482edc97fe85 NetworkManager-config-connectivity-redhat-1.48.10-5.el9_5.noarch.rpm ec77b2f49b4a951326633c32806b63130578eef6e98551076c9fc1279530942d NetworkManager-dispatcher-routing-rules-1.48.10-5.el9_5.noarch.rpm 7ae76f8e715f8e9767f7930f815e7d2585136b0d0870be97d05f5c8e62b63835 NetworkManager-ovs-1.48.10-5.el9_5.x86_64.rpm 12133083d8e0391337b1e5a9d8e2b07edf37bc2d9932abb22a5783ecd025b8a7 NetworkManager-ppp-1.48.10-5.el9_5.x86_64.rpm 2e697f958b2a12f1811de6429ae99d262e1347ce5199817f2671ee63450f65c5 RLBA-2022:6583 WALinuxAgent bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for WALinuxAgent. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Windows Azure Linux Agent supports provisioning and running Linux virtual machines in the Microsoft Windows Azure cloud. The WALinuxAgent package has been upgraded to upstream version 2.7.0.6 in order to fulfil the minimal requirements of Microsoft Azure. (BZ#2110415) rocky-linux-9-x86-64-appstream-rpms WALinuxAgent-2.7.0.6-10.el9.rocky.0.noarch.rpm 7101638a6dc88da1bf41342eb01413acc1abbb78260757ee08b011661b734148 WALinuxAgent-udev-2.7.0.6-10.el9.rocky.0.noarch.rpm f1f43f8696b93c8135bab2f386ff40bdecb1ba69ec9b21958e47d2f6275bd3a1 RLSA-2024:9088 Moderate: edk2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for edk2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. Security Fix(es): * mysql: openssl: POLY1305 MAC implementation corrupts vector registers on PowerPC (CVE-2023-6129) * openssl: Excessive time spent checking invalid RSA public keys (CVE-2023-6237) * openssl: denial of service via null dereference (CVE-2024-0727) * edk2: Temporary DoS vulnerability (CVE-2024-1298) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms edk2-ovmf-20240524-6.el9_5.3.noarch.rpm fc0caf09a366d9af2744b360332c131580cca70d734a06cc6db99a13300aff34 RLSA-2024:9093 Moderate: xorg-x11-server-Xwayland security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for xorg-x11-server-Xwayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080) * xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081) * xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-server-Xwayland-23.2.7-1.el9.x86_64.rpm 90752a30273b1c7ee096e697f38017b5bd7bfe60b50a55e1d31e7fed84043868 RLBA-2024:9118 anaconda bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for anaconda. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms anaconda-34.25.5.9-1.el9.rocky.0.3.x86_64.rpm 655e28c4795fd0b1086c7c5d34798b8725e841a4b51c9f5692d107a068aec220 anaconda-core-34.25.5.9-1.el9.rocky.0.3.x86_64.rpm 6c8b44f6feed1dd8d0f45735109f8838557ef7fc96f25e1694b74e5bef6ce1b6 anaconda-dracut-34.25.5.9-1.el9.rocky.0.3.x86_64.rpm 021675bce56ddc637310537fb1509d916874dfeb0f1c08e561f452b23a72b786 anaconda-gui-34.25.5.9-1.el9.rocky.0.3.x86_64.rpm 553cf7275d49e51987cbeaceb051f16c3dfa75805721d279b48954808114d785 anaconda-install-env-deps-34.25.5.9-1.el9.rocky.0.3.x86_64.rpm 0e983d00202a59e7d9ee42d7c83a5b1f98408d98a3c61ed7e36b607157cdb668 anaconda-install-img-deps-34.25.5.9-1.el9.rocky.0.3.x86_64.rpm c9a863548fefda6cf5821050e7f94d941b2b486d9455580904b405c006cb861c anaconda-tui-34.25.5.9-1.el9.rocky.0.3.x86_64.rpm 149552465ebb09cce3acd64aca625628dc2be8e9d565b9eeed69021fc3e538b4 anaconda-widgets-34.25.5.9-1.el9.rocky.0.3.i686.rpm 99cae5c51d8ee872ad6eb687fcb54858b3dd4444a8d9b24bfe6ab4f135413323 anaconda-widgets-34.25.5.9-1.el9.rocky.0.3.x86_64.rpm 0f36357e0377358d6caf826a4686a539ade1093afb3664f248e2de2404ee7ee0 RLSA-2024:9122 Moderate: xorg-x11-server security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for xorg-x11-server. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080) * xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081) * xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xorg-x11-server-common-1.20.11-26.el9.x86_64.rpm 001a40a96c381fe59d90decd592da9abcfb7d29ce4315d06dc4288ebe06a81e3 xorg-x11-server-Xdmx-1.20.11-26.el9.x86_64.rpm 6d5127ddbcd57ea9a9db40af7b8c79d0da6f12617b2f11688a966470694e6a88 xorg-x11-server-Xephyr-1.20.11-26.el9.x86_64.rpm 2540fecaa4ed18d4bf1d38633055a20c07a8030e19c0699325010c6eadf151fb xorg-x11-server-Xnest-1.20.11-26.el9.x86_64.rpm 97651b1799835e2b94b367f1311c6305cfa97129d852fad72102c24c9021177d xorg-x11-server-Xorg-1.20.11-26.el9.x86_64.rpm e4d144118702e7ad76239aee7e01b0f4f95617f44c422b424bf72bacd9532ed8 xorg-x11-server-Xvfb-1.20.11-26.el9.x86_64.rpm dcca88e032ba55b8f9f855b1dffa89ac7ae6ba88df0ef6338d54cb6573c23c2d RLSA-2024:9128 Moderate: libvirt security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libvirt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution forLinux on numerous hardware platforms. The virt:rhel module contains packageswhich provide user-space components used to run virtual machines using KVM.The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix(es): * libvirt: Crash of virtinterfaced via virConnectListInterfaces() (CVE-2024-8235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libvirt-10.5.0-7.4.el9_5.x86_64.rpm 69faaeba13ca7a3564d0764701f751f5c8ccf001106345e7860e66fdf5eb3e6a libvirt-client-10.5.0-7.4.el9_5.x86_64.rpm bbfd07fda35c8d24f5e3589900c7d5415fe73becebeb1e15760034971c750416 libvirt-client-qemu-10.5.0-7.4.el9_5.x86_64.rpm b57086d51e0a2aec4567d2b5782fddeaa8ec3a4408198818596ca055b023b536 libvirt-daemon-10.5.0-7.4.el9_5.x86_64.rpm 1b5765652def7b5374e947deddb83cf790ffa0cfb69e9115b198fcfed5eea7ab libvirt-daemon-common-10.5.0-7.4.el9_5.x86_64.rpm f423416553a6f719059b83be635d8a0698806c4ab5c0ccc311d40dfe16e080c8 libvirt-daemon-config-network-10.5.0-7.4.el9_5.x86_64.rpm b4a3e98d878a7b3c21951e9b00b4d02a96d6fc4e659a1e2ec4fc6d04e04fe8a6 libvirt-daemon-config-nwfilter-10.5.0-7.4.el9_5.x86_64.rpm 6f2987a12c837db7a25b6043f28c816015c1718c337761e0f7a2cf6c4f35f654 libvirt-daemon-driver-interface-10.5.0-7.4.el9_5.x86_64.rpm fbae450b95f9809744cf29ebb85a79ca3152848cfafa3e1752cbb7c3ee7dd167 libvirt-daemon-driver-network-10.5.0-7.4.el9_5.x86_64.rpm 51263d3e004bf5f25d7fb546f9e2bd5d24aa319d297d8f1c9f04b47c0900ffbb libvirt-daemon-driver-nodedev-10.5.0-7.4.el9_5.x86_64.rpm 8f9a49cf4fc476de98d178005c6b839900c199d45e27914e4ddba9bcf040ab74 libvirt-daemon-driver-nwfilter-10.5.0-7.4.el9_5.x86_64.rpm 2011f25c2817d3f7c5bb6e4030bf24c35a4f1dad12233d7b68e4d63bd207a544 libvirt-daemon-driver-qemu-10.5.0-7.4.el9_5.x86_64.rpm cd0ca10e762d099d8906d375819f06ed150814668f9cbe328052e6303412027c libvirt-daemon-driver-secret-10.5.0-7.4.el9_5.x86_64.rpm a800c9f4a7305d1e0663c6b22a188387cc080f4198a816150c7bc3d9df38f839 libvirt-daemon-driver-storage-10.5.0-7.4.el9_5.x86_64.rpm 44243c5a06e826bea9f0830ce35deb47a92c203b5710aa5c31f15c64109b6066 libvirt-daemon-driver-storage-core-10.5.0-7.4.el9_5.x86_64.rpm dd1bca8c933752e83d4166a70e6546fb65c564a443f50aabbac2003b6fced9f3 libvirt-daemon-driver-storage-disk-10.5.0-7.4.el9_5.x86_64.rpm 9842df083d0a14f0109a857564a88bed573bef7665574efcf7d50bbdd5921f30 libvirt-daemon-driver-storage-iscsi-10.5.0-7.4.el9_5.x86_64.rpm e0cd6da97cd8a33fb70f13be72be69b70bb12482626dadd9060659c5776b49d3 libvirt-daemon-driver-storage-logical-10.5.0-7.4.el9_5.x86_64.rpm 723d0ef7ed0a3c379f160222f72cffaf254a10e4cf81bae70be92ad0fd204bff libvirt-daemon-driver-storage-mpath-10.5.0-7.4.el9_5.x86_64.rpm c8e734fe320d5fbe7f27649ea12eeeccfbb97156dbe887c3ee571fd61fb977b5 libvirt-daemon-driver-storage-rbd-10.5.0-7.4.el9_5.x86_64.rpm 90294c2c96d41af958699c1d3d6371078ed56b17f0100c3bee32be4ea5bd4725 libvirt-daemon-driver-storage-scsi-10.5.0-7.4.el9_5.x86_64.rpm 9d2c18c9ac3a2d4a2ec21f61dd274b98a7dd70e07a75cff5df2eb09251e6bef2 libvirt-daemon-kvm-10.5.0-7.4.el9_5.x86_64.rpm 871b3c6244618e0ca3408f5898e952bfb28646839ffd17c9f52db037a6b9086e libvirt-daemon-lock-10.5.0-7.4.el9_5.x86_64.rpm e709a3c77f61592c560b4119122057bcd6fd53d611752a49fe83cfe23f1bb5fa libvirt-daemon-log-10.5.0-7.4.el9_5.x86_64.rpm 811f06778582a166c95702038958337b20d1714400a861bb321057c926607da2 libvirt-daemon-plugin-lockd-10.5.0-7.4.el9_5.x86_64.rpm c939a08f664c3dc180e971c7066c60a65947ad8d66dcc9830ac16c242f4697d6 libvirt-daemon-proxy-10.5.0-7.4.el9_5.x86_64.rpm cbe3ee28c55177e82450b7df60ae0c0140f3e4d9dbb4e8b19b3592424f7ae6b4 libvirt-libs-10.5.0-7.4.el9_5.x86_64.rpm dc0cfea0b556881d68d99cba023e190ebcdb3999279786434699a3d64d61ee94 libvirt-nss-10.5.0-7.4.el9_5.x86_64.rpm 91e775175843b383e0c97e1c03de135b359d17bba686262f5094108e5fcbe4cf libvirt-ssh-proxy-10.5.0-7.4.el9_5.x86_64.rpm 32a7ae669662bed0eca9851c7851ba324a6798d0fcfd81e60fe1b0fea125b93f RLBA-2024:9131 nbdkit bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nbdkit. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nbdkit-1.38.3-1.el9.x86_64.rpm 2e90570fc7a79107acf5384e1c8e963fdf2b19d32d685d975f60a6a6c31260af nbdkit-bash-completion-1.38.3-1.el9.noarch.rpm 86f312106dc565af59774279c61f7be9724bff8f361293885b5a628622b698ac nbdkit-basic-filters-1.38.3-1.el9.x86_64.rpm 2f25489cbed3b130fc9100e4f23edfb61afe8411523b5e5bcf39c8cfcbca56f0 nbdkit-basic-plugins-1.38.3-1.el9.x86_64.rpm 30be7a454a1f1c944cff132d1d36828b5cbf3a5bc88e548a0188c5ebe36177e9 nbdkit-curl-plugin-1.38.3-1.el9.x86_64.rpm 06d6d8e9c401a0d46ee45867dfeed3ee78dea8ec23655d8b8db7b013976354e8 nbdkit-gzip-filter-1.38.3-1.el9.x86_64.rpm d59b5adcdb33979b575f065beb3f791f03bdd58a03447d7c58b05164597d73af nbdkit-linuxdisk-plugin-1.38.3-1.el9.x86_64.rpm e738332c2d9390ed8eb00afab306d701b1725b4cf6ce6dfbcf11af7bd5f1a16f nbdkit-nbd-plugin-1.38.3-1.el9.x86_64.rpm c65600101dca40ceb7b06bd6e0e4529db50ee7b7607a2f1d8d85884e144a56c5 nbdkit-python-plugin-1.38.3-1.el9.x86_64.rpm d743f0f1f2448e622fc0135ed13eebe7b30ebb03f95c213448993459cbf153c5 nbdkit-selinux-1.38.3-1.el9.noarch.rpm 3456ee61fb57165f4580828ec36875c42b375ae0fc3b5d4f71f3455287986bc3 nbdkit-server-1.38.3-1.el9.x86_64.rpm 97b3e945f798bb5a033d1d18a3d2bc7d4c973719de23d7cacbf1bf1b50001940 nbdkit-ssh-plugin-1.38.3-1.el9.x86_64.rpm a9735f26249346268c544ff367e86744264e151529d3c83e7c22ba0651456508 nbdkit-tar-filter-1.38.3-1.el9.x86_64.rpm 56f87dbd7634e634aba50d2b44dc8b0ab5071efb35ba1952717d0af748114799 nbdkit-tmpdisk-plugin-1.38.3-1.el9.x86_64.rpm 25505da6cf4f85d0b1776630cb6c2d9231fb7a6a95f01d3a42d755c13396f1fd nbdkit-vddk-plugin-1.38.3-1.el9.x86_64.rpm c57b442c110aecce9b611302cd774f4bc8bb3c5c950600185a30831911c0a3e7 nbdkit-xz-filter-1.38.3-1.el9.x86_64.rpm 3acc1043bb7e0a2d3b27f203aa7b89b3eed349f4d1d6eae47fe96dfad9196dbc RLBA-2024:9147 ipa bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ipa-client-4.12.2-1.el9_5.4.x86_64.rpm ad68dfbcc60bc941214fed5b58cfd8be2325563aa852fcaaeae5135e53e088fa ipa-client-common-4.12.2-1.el9_5.4.noarch.rpm 84ebd08d75e5e3cdd33e554e93d0e256a7c8fab3b6b7df8277ce0107efd8f4c4 ipa-client-epn-4.12.2-1.el9_5.4.x86_64.rpm 5acd3bee384607d33a1273676fc51913ee889e593d8ee05065e51096f92a904e ipa-client-samba-4.12.2-1.el9_5.4.x86_64.rpm ebadfb136d57fbf665b2e947612deb5ca60c531a25eaa1475e6881106ed18b92 ipa-common-4.12.2-1.el9_5.4.noarch.rpm 36bc5b2ca5d6de7f0b8a52fe4efe795f297326a1b9b410771bd820016e00c705 ipa-selinux-4.12.2-1.el9_5.4.noarch.rpm cf6d389e91a69944af34e235fda1c04439ae59d3599e328184270549488afc26 ipa-selinux-luna-4.12.2-1.el9_5.4.noarch.rpm d3ba6c5ef96fd7e1528b13e9265517b82c7a2040583c1119bca9f7cc661c6d3a ipa-selinux-nfast-4.12.2-1.el9_5.4.noarch.rpm 8bc622a45ab8f46f39e5d5734ecdf50fe8da7399556151c10e5dbbd2840d3037 ipa-server-4.12.2-1.el9_5.4.x86_64.rpm bdb694b073494c919c1cc9f8a57a3e15754618fd934b138a7d78fa493714dbc5 ipa-server-common-4.12.2-1.el9_5.4.noarch.rpm 3e875618b8f03d2df4ab3918e0e6ae7af8b4d36869ea235099af66171fb28700 ipa-server-dns-4.12.2-1.el9_5.4.noarch.rpm 2bd6f8005121eaef2478ed7093f8ad99c5ab8d11d6a3e8d3a5a2721ffc060547 ipa-server-trust-ad-4.12.2-1.el9_5.4.x86_64.rpm ad08b2754469eee2fd7d272d2a778660e6d81d520133e79526a6dcaebf1cfaeb python3-ipaclient-4.12.2-1.el9_5.4.noarch.rpm f4f88ac0f0d20c9f469687d2a201ef65ec864e4c30afdbc16bad458c4ef889dc python3-ipalib-4.12.2-1.el9_5.4.noarch.rpm 1197b3f96d436b48d0a40e79461d0a3d721ec71b62eb71c6cdddbff2cb3784ac python3-ipaserver-4.12.2-1.el9_5.4.noarch.rpm bb6bfa214aecdf41fd358340dbe7643f44b7bccff12ed70039003321801031c3 RLBA-2024:9151 libnbd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnbd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libnbd-1.20.2-2.el9.i686.rpm a5c14b9284b034114631d2e097e536c0b8a00294fd7621c9e4651172f0cdcbcc libnbd-1.20.2-2.el9.x86_64.rpm 32ab5685280ea117ac36ef28e10da4cbda24907293fa6706a7876b7d87832570 libnbd-bash-completion-1.20.2-2.el9.noarch.rpm abf0cb7b1ffc31d9869ff0d254cb510cbefdfff9adbb82b7525154543f06103d nbdfuse-1.20.2-2.el9.x86_64.rpm d6092e996a8180f299c722c05b1bcd796c308eae35ef592c1ec431cd914e428e python3-libnbd-1.20.2-2.el9.x86_64.rpm 29469502d5515667311118cba063c2c3f4f2805ce3489a61a79afe7c56b274af RLBA-2024:9155 WALinuxAgent bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for WALinuxAgent. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms WALinuxAgent-2.7.0.6-10.el9.rocky.0.noarch.rpm 7101638a6dc88da1bf41342eb01413acc1abbb78260757ee08b011661b734148 WALinuxAgent-udev-2.7.0.6-10.el9.rocky.0.noarch.rpm f1f43f8696b93c8135bab2f386ff40bdecb1ba69ec9b21958e47d2f6275bd3a1 RLBA-2024:9157 egl-wayland bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for egl-wayland. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms egl-wayland-1.1.9-3.el9.i686.rpm d5726263c77217cdc490a388045d2d47f90c3757310747656f2c58e691ead204 egl-wayland-1.1.9-3.el9.x86_64.rpm 383ba8f7c8f885855c011265ab67d3ff503761154e7bdeaba4afd7a0e440535b RLBA-2024:9165 crash bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crash. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms crash-8.0.5-1.el9.x86_64.rpm 7280d2d9fac6edf3f732ca4c5902f5b65c4878885be497c8aeca6d4766672a34 RLBA-2024:9179 glslang, shaderc, spirv-tools, vulkan-headers, vulkan-loader, vulkan-tools, vulkan-utility-libraries, vulkan-validation-layers, and vulkan-volk bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for vulkan-utility-libraries, vulkan-validation-layers, vulkan-headers, vulkan-tools, spirv-tools, vulkan-volk, vulkan-loader, glslang, shaderc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms glslang-14.2.0-3.el9.x86_64.rpm c807fb2b7a55a300724d6119b5ea2d3dd2c364215aca5e39b8fdcb4c03441cb7 glslc-2024.0-1.el9.x86_64.rpm 37de97adba307e39706fb556a0567e1d2bea1bedf77ef8b78a4521a7b5d55309 libshaderc-2024.0-1.el9.i686.rpm d84454c7dab4d2b788e9b72df994d691b6860fb9362d46aadfa861a774046621 libshaderc-2024.0-1.el9.x86_64.rpm df9493279c4a94d8761931ef74c75e4cb8044b918bded949a5d91db7accca180 spirv-tools-2024.2-1.el9.x86_64.rpm 5a585f08d78423ea1e0f74de03c71f159e3b4bc93a79f9bf4af8e1babf48ecb7 spirv-tools-libs-2024.2-1.el9.i686.rpm 4e371ef8e9337fc313ebc886c21372b3529e87ef7a6486e5f0d730a6c1de663b spirv-tools-libs-2024.2-1.el9.x86_64.rpm fc8b5729b0e3569742dfae2ab856afaf634e46f2c0fa685487a58b16057184a0 vulkan-headers-1.3.283.0-1.el9.noarch.rpm 601121cfad5f1b52648f7a100cde8414d822f62d12343c4c59e3905e2ced23aa vulkan-loader-1.3.283.0-1.el9.i686.rpm d0913e8b9e1df6d095941304a26cb6f5720d60657a20bc5a097de608b345a4f4 vulkan-loader-1.3.283.0-1.el9.x86_64.rpm b3857f4c53bbd5d6f6ded9cbb327cd79f14970b919f9e48349ec7b7d5d8a9ecb vulkan-loader-devel-1.3.283.0-1.el9.i686.rpm f4215ae279f079e14db033da3172d6ee0c0db2f676aedfb37b6e6b9662c623e1 vulkan-loader-devel-1.3.283.0-1.el9.x86_64.rpm 48e775ad62936af22e3da34fec6dd1e849570a89600be30c579e42fdef11bd4c vulkan-tools-1.3.283.0-1.el9.x86_64.rpm 3ccd475dc7def6546027158a540b23208fb77eff7491d33e3effa86dd5fe430d vulkan-validation-layers-1.3.283.0-1.el9.x86_64.rpm 64a7881829b1c9011152b156405bc1d3d2c7e0f67be2a5e69e6305e19f10c652 vulkan-volk-devel-1.3.283.0-1.el9.i686.rpm 0645da9baa144c28481c4deb872195692e288cdf5ef3738daa46f0cc0d5d811a vulkan-volk-devel-1.3.283.0-1.el9.x86_64.rpm 9956446eec8c9307fde5f7046b6285701dd902bcb86a852fa33645772803bbf0 RLSA-2024:9190 Moderate: python3.12 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the "python3.12" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the "python3.12-" prefix. Security Fix(es): * python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450) * python: incorrect IPv4 and IPv6 private ranges (CVE-2024-4032) * python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service (CVE-2024-8088) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-3.12.5-2.el9_5.2.x86_64.rpm 13068b3d2d159d3dd79bb8bd9292ab441e3cedec06a856108ed41b17671415ee python3.12-devel-3.12.5-2.el9_5.2.i686.rpm 27835d17dc8d471df1aa98464c3aaa5f64b080af59fa82f00b74d98f35eb05a5 python3.12-devel-3.12.5-2.el9_5.2.x86_64.rpm 2e85915155d7a00d0d450f43bd77e9af1b7fdafc06df10046080177f9a640ac5 python3.12-libs-3.12.5-2.el9_5.2.i686.rpm df823df61d3ea03fe21b4c12f67e7a0b92cd20c758e161773dc08ac626103295 python3.12-libs-3.12.5-2.el9_5.2.x86_64.rpm 734619b3748242eb68db1a140490d525d5816efa5f99e8b80768d6c4a6f2cf31 python3.12-tkinter-3.12.5-2.el9_5.2.x86_64.rpm 4dbf4922fa735cb19eb96909e1e999dd739f648fcd606b79af80e1faec8e8bf5 RLSA-2024:9192 Moderate: python3.11 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450) * python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service (CVE-2024-8088) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-3.11.9-7.el9_5.2.x86_64.rpm 4102b3d8fa4c7e88d42bb789af82f5eff01363fdbbc2c8e857e9007e17c1be14 python3.11-devel-3.11.9-7.el9_5.2.i686.rpm 9e0849fba38aba89b912d4d5772d7cbc27b911c0c3ef339534c2402656148ce6 python3.11-devel-3.11.9-7.el9_5.2.x86_64.rpm 9bf5ef11ab19ddbcb5a3b23314aad46ba40ee883bebd4c8e41dc4f3c2ae2e4df python3.11-libs-3.11.9-7.el9_5.2.i686.rpm 954b9a12254755d9652ffb9c600448812f8b842ad7b9f470ffef1c72d8a57d43 python3.11-libs-3.11.9-7.el9_5.2.x86_64.rpm d397384c6b20308123b4da6baf43e9b3b753482b69fc5c54e71204697ed9f1b3 python3.11-tkinter-3.11.9-7.el9_5.2.x86_64.rpm a7b6a3cb91a3e93d0ec42711d8ac6a0339538aa1672bd43ddd1150ddf32bae78 RLBA-2024:9202 mesa bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mesa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mesa-dri-drivers-24.1.2-3.el9.i686.rpm f3257db32ae55c146dda3a586e72188a96a64bc66c0a25a7471a9fce98fc4f0a mesa-dri-drivers-24.1.2-3.el9.x86_64.rpm 3a3da202dc1e6d32fcec0bc684684a9991e329180635c724aa5c445464068d2a mesa-filesystem-24.1.2-3.el9.i686.rpm ebbd9ef2cd03af560c0187c69622d3276a5a734b7e0b9fb4f3b2ed06c4222873 mesa-filesystem-24.1.2-3.el9.x86_64.rpm 98f35d76801a651cc85e1981e87021221c22c4fff060c7520f7ecb5109fcb92d mesa-libEGL-24.1.2-3.el9.i686.rpm 4e2317e068ad37131a042c866a7896693a70f2245d29e3382eecc3f7bc8a1da5 mesa-libEGL-24.1.2-3.el9.x86_64.rpm 49d769cbcb60e4bdeb58579f18f8bd29d4e66873c48b2a8ccf10ff6ffc4c020a mesa-libEGL-devel-24.1.2-3.el9.i686.rpm 373b1e2d1cb41403260297e36626ad1a11c473d5869d4f3d2996bde480ca2ac5 mesa-libEGL-devel-24.1.2-3.el9.x86_64.rpm dd6a30918a61e1c44003a28cc5eae171d84386a963e9122241ed37f0fa66e575 mesa-libgbm-24.1.2-3.el9.i686.rpm c44a100cb79f67defe5e8dda63775bb2d3bc92a9570da28f0a32638ff6b352cf mesa-libgbm-24.1.2-3.el9.x86_64.rpm 7e594ffc889a99526c0962e59a61a042afb1d3887c95d96729e11e9607af36a7 mesa-libgbm-devel-24.1.2-3.el9.i686.rpm bd4624f5994aef2876b375f4b1311b0084daf3db7ce77b48ec1fa8076c2c9a74 mesa-libgbm-devel-24.1.2-3.el9.x86_64.rpm 49217541294fe91a81a39eaa03b9d9fba2201c8d0f32a37911ef17391782e778 mesa-libGL-24.1.2-3.el9.i686.rpm 7d1a7126304326bb15cb7829052ee5fc8bccdb27942e15fcc55274feadde63ac mesa-libGL-24.1.2-3.el9.x86_64.rpm 3d3b41f45a1bbb80fc21ff82e55d04745d7237a9115b6f94b0c95b2deaef1104 mesa-libglapi-24.1.2-3.el9.i686.rpm b45044aa430630b23c6cbcfa72dda5a49f75ebc2275de6f5faa623bfc4f413b2 mesa-libglapi-24.1.2-3.el9.x86_64.rpm 08a8f468aa02c2ec44fa12f4a182f08599460c42a7747f8429619a02d569f55b mesa-libGL-devel-24.1.2-3.el9.i686.rpm de698354a38dfb1aa56ed0c7c27ebe2836f1c7f470f7bab8c01c757c13859dd4 mesa-libGL-devel-24.1.2-3.el9.x86_64.rpm 0c0cc0f8fc731981a120ac3a1b79d124ae87ba1ecef8cc0cb208aaf5174ad07b mesa-libxatracker-24.1.2-3.el9.i686.rpm 08bebeec3a0dd7afe9446a9f42dca99c36f4f411fe0303609d050b0dcff4c440 mesa-libxatracker-24.1.2-3.el9.x86_64.rpm 8757b5ed0b8d577278f9f6328a744adeeb88d70d680d2fda9011a4af02a342dd mesa-vulkan-drivers-24.1.2-3.el9.i686.rpm 5986785258ae1cd61f7ea3557349b6a6f1586ec458b991b1fa503bd507f34f6d mesa-vulkan-drivers-24.1.2-3.el9.x86_64.rpm e26dec7c9dc4a0f985d23f2197d690850c3210df850ec6f3986e00b9b1aeeb88 RLBA-2024:9208 bind9.18 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bind9.18. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bind9.18-9.18.29-1.el9_5.1.x86_64.rpm 01675a7a1f0c7fc392673e4b042cd86edd01f482b313eac735bd2f6e98a88d6e bind9.18-chroot-9.18.29-1.el9_5.1.x86_64.rpm e5ab34561a296d37914f352154c49e2f82bca2e87f3755d57675df9b9e70dd67 bind9.18-dnssec-utils-9.18.29-1.el9_5.1.x86_64.rpm c944af447d7755750ca3c66653452d5eb9196100b5890ec2b9a46745a729247f bind9.18-libs-9.18.29-1.el9_5.1.x86_64.rpm 2a3aa8c8bdf987e778187c892ce5eda9ac9bbad78a10faffacc5c9c38109e0c7 bind9.18-utils-9.18.29-1.el9_5.1.x86_64.rpm 99a331b6d6d78f2050a583123205336d1d50218adcad3e0565133f65781cbb99 RLBA-2024:9217 corosync bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for corosync. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms corosynclib-3.1.8-2.el9.i686.rpm de0d63b4e975c51ff003d297e04708ced032aa5415c292c34d8e21ef664766bc corosynclib-3.1.8-2.el9.x86_64.rpm 01a5b510f35fa57470bc081c090e2b4cda9575eb6f0d754a1c70a18f15c267ec RLBA-2024:9221 gdm bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gdm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gdm-40.1-27.el9.i686.rpm ff7d599815696dedebc949ca752bd50e9a3512a766f7495ac6f6cf39d9c0b85f gdm-40.1-27.el9.x86_64.rpm 4588505dc56cab8c420c7034dddffb3debcc9bf63937032c8679bb95d4e7b629 RLBA-2024:9227 qt5-qttools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qt5-qttools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qt5-assistant-5.15.9-5.el9.x86_64.rpm bc597b1b02bd06940b82b7e8464f819834dbf26bde91ef7e1f747ea235a84876 qt5-designer-5.15.9-5.el9.x86_64.rpm 1077d1f97c04ed763ef7912d4b1af93182269c8ef5191dff229b5e321b225ffc qt5-doctools-5.15.9-5.el9.x86_64.rpm d3b8706296c64d36bed748173ab64b5b8ec2dc659ba9121d2ab266360f1835aa qt5-linguist-5.15.9-5.el9.x86_64.rpm 55c4bb9b2fbbf4e461cce1c17dba186d7a8a37608b560526d958cfeaec8f94eb qt5-qdbusviewer-5.15.9-5.el9.x86_64.rpm ccf3ce50c721ad5cc6b75b144eaf6d5a06be52ea56b0d44fcdb3d0b032aee188 qt5-qttools-5.15.9-5.el9.x86_64.rpm 1b8400c7aae0f1932d733bd01ad97044ed2ea5fe0d4a469c5762f1deec69470c qt5-qttools-common-5.15.9-5.el9.noarch.rpm 4edf61dc600d99ef490b13b19853435fb65e83beb28310bea31777e0f815e449 qt5-qttools-devel-5.15.9-5.el9.i686.rpm 153f79dc158ad0555e8a71333f0942e91df4538aee3403f204cb89164a9e74e4 qt5-qttools-devel-5.15.9-5.el9.x86_64.rpm 8bab02972dba4f7c665106d634afad6dfe4fc25f00574ae26102f12175dd49cb qt5-qttools-examples-5.15.9-5.el9.i686.rpm 69e779fc501c7dc7e5464089ba1174f1f8a0380fb126b0fb5bce228e3413078a qt5-qttools-examples-5.15.9-5.el9.x86_64.rpm 6d18270690c0ae0f9b65cb5251cb4361dfcd3bc9538cefff6a1c3b424f2ad648 qt5-qttools-libs-designer-5.15.9-5.el9.i686.rpm 3a91a9eb23412817b5f84c20f6fb9f1cd9346c552b976f5e43097a46b085e285 qt5-qttools-libs-designer-5.15.9-5.el9.x86_64.rpm ff3f632343480bc61c2fdd2a07cc8afa0afacf0baccf0d32645952a9f9e370e6 qt5-qttools-libs-designercomponents-5.15.9-5.el9.i686.rpm e75aa47355887e3662b9d587351deea89153fa412e1d411ad795c39f4ded5b4d qt5-qttools-libs-designercomponents-5.15.9-5.el9.x86_64.rpm c1fdbf520c254f57d9ad806ab51eca75ae7cfc9b1fa6503b888d3acb2103d52e qt5-qttools-libs-help-5.15.9-5.el9.i686.rpm b9932dcd424903f7490276be825680890d069c787a4d33f06d8b74885562f96e qt5-qttools-libs-help-5.15.9-5.el9.x86_64.rpm 144261840fb75f7a9d0bb756c323ec1d703677a5417bdf307b850132ab760f0d RLBA-2024:9266 cups-filters bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cups-filters. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cups-filters-1.28.7-18.el9_5.x86_64.rpm 3dbd95ce375f12ea388505c45df78637de2b858c9371be884a728ab44ff038b2 cups-filters-libs-1.28.7-18.el9_5.i686.rpm 9c4388d416123c31f3e5342984d125002745c28994b2d94a9febcf1aac7f05fe cups-filters-libs-1.28.7-18.el9_5.x86_64.rpm 597b1f6ff698429b3c7ae9a5367f2f66d27c41d7f20e7cd767a5943e9ed5f7d4 RLBA-2024:9267 dovecot bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for dovecot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms dovecot-2.3.16-14.el9.x86_64.rpm d6a5c65025d667980e27c918cdb1e3fe2b873d5afaddca22048f1fcdfbff6650 dovecot-mysql-2.3.16-14.el9.x86_64.rpm ba625dc96aeabcdd19fb029b7d15c340b00d44f177483cb96352c7c4f8b4455f dovecot-pgsql-2.3.16-14.el9.x86_64.rpm ae6092f14caf44b8082151ece9412453a35d18d5869d3b4156e5e104592818cf dovecot-pigeonhole-2.3.16-14.el9.x86_64.rpm 0f499470397080858ef5a615f117d7e3fccb30873f5bf685a4e8e282da67bf80 RLBA-2024:9289 sanlock bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sanlock. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-sanlock-3.9.3-2.el9.x86_64.rpm ed7afffa626d1b79d12f3adf599d18ede917c26d1f4123b8d452a4ddbb8cbc90 sanlock-3.9.3-2.el9.x86_64.rpm 564686f82ed32ff936f8e0c1f6b42e0ad0fbfde7a6e10d806a34226522e8a11a sanlock-lib-3.9.3-2.el9.i686.rpm b2f03dbb8a164065db96d22a95f7e5616772026df0e57104cc8e3e18bd1926b2 sanlock-lib-3.9.3-2.el9.x86_64.rpm 3b452368909e36c87ec46e85d6f7e16ff37a8116943e2d25aab46631e33be54b RLBA-2024:9294 varnish bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for varnish. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms varnish-6.6.2-6.el9.i686.rpm bef00aa960db7e0e4634a66213de2a477ec4976670e7ac58b45f6f4599fc915d varnish-6.6.2-6.el9.x86_64.rpm 7bf1164396396e5260728ce850f7cf3a2262493add7967e9ab575fb07824c10a varnish-docs-6.6.2-6.el9.x86_64.rpm 8834cfc37486bdb6b93746a93dc29a2d40835d8065c65282b6f70b7b425656b2 RLBA-2024:9291 nginx bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nginx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nginx-1.20.1-20.el9.0.1.x86_64.rpm 6a85c56594eba915335e384ae5a05d105b41459fdb630482667da603b5da2404 nginx-all-modules-1.20.1-20.el9.0.1.noarch.rpm 3adf5ad07ffe60ba5499482ba564e6992aa36bb8e72ac93eff5e53e18996697f nginx-core-1.20.1-20.el9.0.1.x86_64.rpm ae61c8c146c688dada925739c58bd0e8bb06e75629d91299701f2b048f2ba3ea nginx-filesystem-1.20.1-20.el9.0.1.noarch.rpm 73805e893b600e14b42dba7626e6fa2ae072b3da578f31036dcaee05ff0f51a5 nginx-mod-http-image-filter-1.20.1-20.el9.0.1.x86_64.rpm b12e5be7bee4df5468bde5352a94ecc49e08887d906318ea38a3cdf33c2fc3e2 nginx-mod-http-perl-1.20.1-20.el9.0.1.x86_64.rpm 087c35e6476963aaa185ceed9681a44cb7be402decf842a75e68e5ba849f7dd4 nginx-mod-http-xslt-filter-1.20.1-20.el9.0.1.x86_64.rpm a174497a84c8c3b24e4630406f1eed4aeab4ff17410d2ddde837f743a44bbb02 nginx-mod-mail-1.20.1-20.el9.0.1.x86_64.rpm 368b2986c1e023d5e11652ce0fd2f29b80186d3adc7b0bef334ae235508d6840 nginx-mod-stream-1.20.1-20.el9.0.1.x86_64.rpm dfa18435d9b5e0307cd810401d1a5105b0ddda31c844f0c44d9110e5a383f764 RLEA-2024:9296 libguestfs bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libguestfs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libguestfs-1.50.2-1.el9.x86_64.rpm a866f46919aa0cf7be464e521a30e71b221ee469021fc08ebe34e825a596c155 libguestfs-appliance-1.50.2-1.el9.x86_64.rpm 297558e5b2f758256ff68667314d3c3cd2329cfb639404f6330d062fd714e9fa libguestfs-bash-completion-1.50.2-1.el9.noarch.rpm 60a63adc6b59746e0591ee0d83af4a2d45369b6b28ff7b4b0c32c381fd524094 libguestfs-inspect-icons-1.50.2-1.el9.noarch.rpm 3fdfe6d60883a9956619e00f1d359b7a5db195f39d0dfedce1df89ea1540c30e libguestfs-rescue-1.50.2-1.el9.x86_64.rpm 1630dc6120d0fd34d3090e3daed59617fd2eb8094ccb8c78716b18ba77e242f9 libguestfs-rsync-1.50.2-1.el9.x86_64.rpm 441d8b0377080290b1d2aaf092b3210f7124da78ec294ba95e68288fc0ba153b libguestfs-xfs-1.50.2-1.el9.x86_64.rpm 8e55d427eda97781986250896bb4c0737e45367484ec44c0cf914542be29cbd7 perl-Sys-Guestfs-1.50.2-1.el9.x86_64.rpm 251582f57ad9fdf17c8bc4d3675d585cf94b2b6783423fa6d4adcbbed8db1f22 python3-libguestfs-1.50.2-1.el9.x86_64.rpm d57c371368c4a0dd4cb009b16a9b090ed0bee60a50c588ac9a43d9036ab38bfb RLEA-2024:9448 OpenJDK 11 is no longer the default system-wide version of Java on Rocky Linux 9 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for java-11-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The 11.0.25 release is the last release of Rocky Enterprise Software Foundation build of OpenJDK 11 that Rocky Enterprise Software Foundation plans to fully support. The full support for Rocky Enterprise Software Foundation build of OpenJDK 11 ends on 31 October 2024. As a consequence, Rocky Enterprise Software Foundation build of OpenJDK 17 will be the default system-wide Java version on Rocky Linux 9 after 31 October 2024. Please refer to the Release Notes for Rocky Enterprise Software Foundation Build of OpenJDK 11.0.25 [1] for more details, including the Extended Life Cycle Support (ELS) phase for Rocky Enterprise Software Foundation build of OpenJDK 11 and for migration instructions. See [2] for instructions on configuring Rocky Enterprise Software Foundation build of OpenJDK 17 on Rocky Linux and selecting the default Rocky Enterprise Software Foundation build of OpenJDK version to use system wide. [1] https://docs.redhat.com/en/documentation/red_hat_build_of_openjdk/11/html/release_notes_for_red_hat_build_of_openjdk_11.0.25/endfullsupport [2] https://docs.redhat.com/en/documentation/red_hat_build_of_openjdk/17/html-single/configuring_red_hat_build_of_openjdk_17_on_index rocky-linux-9-x86-64-appstream-rpms java-11-openjdk-11.0.25.0.9-3.el9.x86_64.rpm 7fe0faf5fe7227258379926610e0ec4a04cc1837b6f5cf9a3503e58e68bd5921 java-11-openjdk-demo-11.0.25.0.9-3.el9.x86_64.rpm f172b098f4a4971d31b52ff2f5a8f1ee81d1a346e55ea325fa2ce2614126f9dd java-11-openjdk-devel-11.0.25.0.9-3.el9.x86_64.rpm 25327f5caf2f2994b85e821f3304d7f3250037ab4ff68f8079a20441d8d8ce64 java-11-openjdk-headless-11.0.25.0.9-3.el9.x86_64.rpm c3c3fd483ed65034e36dbd2a6b023c3953b89cd5e65487304dd22751957eaeb6 java-11-openjdk-javadoc-11.0.25.0.9-3.el9.x86_64.rpm 65865d90d7f620b215ac234c4b510e3686d834b688ec6d01713fe88eabb25a59 java-11-openjdk-javadoc-zip-11.0.25.0.9-3.el9.x86_64.rpm 07ef90f6790172217a394fb16b2f664b80bfc5ea596d20cad130aeb6b09a568f java-11-openjdk-jmods-11.0.25.0.9-3.el9.x86_64.rpm d5130c74036bc078a2708f175f7fd31fc9199659a66012e107a0ff937760cb1a java-11-openjdk-src-11.0.25.0.9-3.el9.x86_64.rpm a95c7e5f1dd2ed0448f2193f8f23fda47f855af6a48d7e983d5bc9f818bae614 java-11-openjdk-static-libs-11.0.25.0.9-3.el9.x86_64.rpm 78d2e07917f942b6173125feb978465d8474cb197d34fe3b93388bceafba6d85 RLEA-2024:9463 OpenJDK 17 is now the default system-wide version of Java on Rocky Linux 9 Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for java-17-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The 11.0.25 release is the last release of Rocky Enterprise Software Foundation build of OpenJDK 11 that Rocky Enterprise Software Foundation plans to fully support. The full support for Rocky Enterprise Software Foundation build of OpenJDK 11 ends on 31 October 2024. As a consequence, Rocky Enterprise Software Foundation build of OpenJDK 17 will be the default system-wide Java version on Rocky Linux 9 after 31 October 2024. Please refer to the Release Notes for Rocky Enterprise Software Foundation Build of OpenJDK 11.0.25 [1] for more details, including the Extended Life Cycle Support (ELS) phase for Rocky Enterprise Software Foundation build of OpenJDK 11 and for migration instructions. See [2] for instructions on configuring Rocky Enterprise Software Foundation build of OpenJDK 17 on Rocky Linux and selecting the default Rocky Enterprise Software Foundation build of OpenJDK version to use system wide. [1] https://docs.redhat.com/en/documentation/red_hat_build_of_openjdk/11/html/release_notes_for_red_hat_build_of_openjdk_11.0.25/endfullsupport [2] https://docs.redhat.com/en/documentation/red_hat_build_of_openjdk/17/html-single/configuring_red_hat_build_of_openjdk_17_on_index rocky-linux-9-x86-64-appstream-rpms java-17-openjdk-17.0.13.0.11-4.el9.x86_64.rpm 0f34cc3c03baf4609e8beb46b19b530bd7f95185f3030d6edd781735861107c4 java-17-openjdk-demo-17.0.13.0.11-4.el9.x86_64.rpm aa9351db4ef2da5dfd3e679a7abba1f6564d33283b39c4cbfd19f14b1153ab77 java-17-openjdk-devel-17.0.13.0.11-4.el9.x86_64.rpm 95aa82574310a99ef1101eb55ea8eb48286e21ebef42858213063fb29c55f7b2 java-17-openjdk-headless-17.0.13.0.11-4.el9.x86_64.rpm dde484b81487f168886e46cb5d6697d293c0a756dfae23429b1ab6cf5c67b807 java-17-openjdk-javadoc-17.0.13.0.11-4.el9.x86_64.rpm dcdb1d02117f00e2a1086e6eda9267da93c4b46bbdcff1dc69f25c11e82bd37b java-17-openjdk-javadoc-zip-17.0.13.0.11-4.el9.x86_64.rpm f001d3124c67e71ecdbe3b01a9a60941e0b7a1e19e96518a54e7892d39e5d0d6 java-17-openjdk-jmods-17.0.13.0.11-4.el9.x86_64.rpm f6a664db19e3beaedb7a9de327aa104bd389c1ec915542a8d8b5f5a3b51e00aa java-17-openjdk-src-17.0.13.0.11-4.el9.x86_64.rpm 35fbf9b9632cb508a77abb7df66eb2a4fff70a9ccc00b04644cd05b8b4d11369 java-17-openjdk-static-libs-17.0.13.0.11-4.el9.x86_64.rpm 873199af165780ad77c52c5ab7a6c58db329234547b1936fd3b14fa7286891ba RLBA-2024:9464 java-1.8.0-openjdk bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Rocky Linux 9.5 GA release was prepared with the most recent release of OpenJDK 8 at that time, which was OpenJDK 8u422, released on 16 July 2024. OpenJDK 8u432 was subsequently released on 15 October 2024, with existing Rocky Linux 9 releases (9.0, 9.2, and 9.4) being updated at that time. This update now brings OpenJDK 8u432 to Rocky Linux 9.5. For more information about the changes in OpenJDK 8u432, see the release notes listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-1.8.0-openjdk-1.8.0.432.b06-3.el9.x86_64.rpm ae049e84e292fafa8aece776476a02166b6424257e786786ba1e1c692617f401 java-1.8.0-openjdk-demo-1.8.0.432.b06-3.el9.x86_64.rpm 814da7badf40313a19a542a951bc8f7d1952999c1d732fb1791e7652d552ebb2 java-1.8.0-openjdk-devel-1.8.0.432.b06-3.el9.x86_64.rpm 0dacf837cc717624c80cf2e4ce59f52df41c5a2be248dcded4e6d7040bc7961f java-1.8.0-openjdk-headless-1.8.0.432.b06-3.el9.x86_64.rpm 4309baf39c9aa719fdef04345ebe835332976207eefeadea83c40631fb42b9e2 java-1.8.0-openjdk-javadoc-1.8.0.432.b06-3.el9.noarch.rpm 1cc278c3e7938bd05849a810f1909cfb1c1a6bc42967e2834065b271c2bfc4e7 java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-3.el9.noarch.rpm feb4595ca7a86329b65f4bc2617333aabf1b0883353f601c9c30f9d0b5301a58 java-1.8.0-openjdk-src-1.8.0.432.b06-3.el9.x86_64.rpm 890b418360b10ee129231e12a51d4cbe38fcea6036778d94a7045143a81d780d RLBA-2024:9466 mutter bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mutter, gnome-shell. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mutter is a compositing window manager that displays and manages desktop through OpenGL. It combines the window-management logic inherited from the Metacity window manager with a display engine that uses the Clutter toolkit. Bug Fix(es): * gnome-shell crash on wl_copy [rhel-9.5.z] (JIRA:Rocky Linux-62993) * gnome-shell crash on ctrl-alt-shift -left/right shortcuts [rhel-9.5.z] (JIRA:Rocky Linux-62997) * Some application popups switch workspaces and steal focus on Xorg sessions [rhel-9.5.z] (JIRA:Rocky Linux-63000) rocky-linux-9-x86-64-appstream-rpms gnome-shell-40.10-22.el9_5.x86_64.rpm 67f548570067015241f3f04ff2d3824767616cf59bce24acf4ac02ca88769ea1 mutter-40.9-22.el9_5.i686.rpm 1f800f43706f43d1f2e2c0f2c7b0cc4106b6ee24af1ef1c674eff3b55ddf2fe6 mutter-40.9-22.el9_5.x86_64.rpm e67c6c431932c34cde6b5bdfb30753bdc88c9c7259fe6f14ecfa7634bf8f35cc RLBA-2024:9465 java-21-openjdk bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for java-21-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Rocky Linux 9.5 GA release was prepared with the most recent release of OpenJDK 21 at that time, which was OpenJDK 21.0.4, released on 16 July 2024. OpenJDK 21.0.5 was subsequently released on 15 October 2024, with existing Rocky Linux 9 releases (9.0, 9.2, and 9.4) being updated at that time. This update now brings OpenJDK 21.0.5 to Rocky Linux 9.5. For more information about the changes in OpenJDK 21.0.5, see the release notes listed in the References section. rocky-linux-9-x86-64-appstream-rpms java-21-openjdk-21.0.5.0.11-2.el9.x86_64.rpm e45ad6858bb16e74479b2c7abac707c894563df32f05c75ddb49134da3733c4d java-21-openjdk-demo-21.0.5.0.11-2.el9.x86_64.rpm 3abab1b17cda454a706a79d18b70c3bc63c49acff20de863c610bb72973afad5 java-21-openjdk-devel-21.0.5.0.11-2.el9.x86_64.rpm b1de8c72ec3ac660398ac6ac5a06e3256923bd9d75d670e697fa3979ea2c6cd3 java-21-openjdk-headless-21.0.5.0.11-2.el9.x86_64.rpm 41a25fdf7b5fb65ff4631425257d4d28e5ce3da9726ceba2566364cef42ae7e0 java-21-openjdk-javadoc-21.0.5.0.11-2.el9.x86_64.rpm 8289d34e18c4f4f65bf8f2abf76a50efe619733919ff158e795026f13ab84f3a java-21-openjdk-javadoc-zip-21.0.5.0.11-2.el9.x86_64.rpm 2450a2cc54b812b1f694f37e5ac6fe918afe6c7073274c1babe164f97c565ce5 java-21-openjdk-jmods-21.0.5.0.11-2.el9.x86_64.rpm 8a4e36ae86da885f778175d99ba42a5b94e37f1177cb8eda887eb365aa08b731 java-21-openjdk-src-21.0.5.0.11-2.el9.x86_64.rpm 072bebcee32bdda1c3d5283d95092c3c5e3489913e7149960efe2ffb943f378b java-21-openjdk-static-libs-21.0.5.0.11-2.el9.x86_64.rpm 06205b801dcf25ae7242dd7e671da453ed4ad3d0b4a1e0d14e1488dab5f2b00f RLBA-2024:9683 evolution bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for evolution. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality. Bug Fix(es): * WebKitGTK 2.46.1: Middle mouse button inserts primary clipboard twice [rhel-9.5.z] (JIRA:Rocky Linux-62680) rocky-linux-9-x86-64-appstream-rpms evolution-3.40.4-10.el9_5.1.x86_64.rpm d6f2e51cc80592c3cf2651b0462feba05a9475b5d21cea1899da61af12725859 evolution-bogofilter-3.40.4-10.el9_5.1.x86_64.rpm 52f1faf66655a2b7999f631d9e6d7d4be1fad3b914f7038f15db9c0972b4d439 evolution-help-3.40.4-10.el9_5.1.noarch.rpm 0b54cac31f654fcac4f363a6a1f6523c97112f70b41e86a2da0fcc1acc214db6 evolution-langpacks-3.40.4-10.el9_5.1.noarch.rpm 1f82734bd3ef4790afb5754d186f24697258d96a7116afd45148963ec67e9c04 evolution-pst-3.40.4-10.el9_5.1.x86_64.rpm 3691d678f6873cda347ad212725b53239db1ae7b4e86f54e2cadd66c4d85f865 evolution-spamassassin-3.40.4-10.el9_5.1.x86_64.rpm bd1e802bf0f9c1413ab66e5df3bf0d8c979078dda49267564c034d02041bde87 RLSA-2024:10858 Important: ruby security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for ruby. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * rexml: REXML ReDoS vulnerability (CVE-2024-49761) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms ruby-3.0.7-163.el9_5.i686.rpm 9a25cd85c8d81643d7732acff97c2920430c680d8903fd6341ea8364736966c4 ruby-3.0.7-163.el9_5.x86_64.rpm 29ac14e9bcffd87508de7856c193b53f0e22636b39d89af59c975467926d51a2 ruby-default-gems-3.0.7-163.el9_5.noarch.rpm a5c350c852d7f09343cfbe00900acf0b8c3ffe3937b786bbf5ca8309e6bcd07c ruby-devel-3.0.7-163.el9_5.i686.rpm 77f612e37e230ca0878f33f0e376b390d0f49b8f95e696d7b0603ae32fdf5449 ruby-devel-3.0.7-163.el9_5.x86_64.rpm 3db34b30524335f93655071eaead8b517840fce9f7f4b4af51df9633d637e4c0 rubygem-bigdecimal-3.0.0-163.el9_5.x86_64.rpm e3e15f80ecd59b2ca60e189263d7b4865372bd6c8320cee10f57e1e82b30dd74 rubygem-bundler-2.2.33-163.el9_5.noarch.rpm cdfc451d598da39186c365b98deb0e32a2948788aaba4e2d5752aa6b07f2e116 rubygem-io-console-0.5.7-163.el9_5.x86_64.rpm 29100317f2d18dab4c88fc157bc62aaf6f5820c4d1e2d95b28e37996db6870a8 rubygem-irb-1.3.5-163.el9_5.noarch.rpm 0cc27955063cd72afe8f4ffd573b57441e21d3140963c94a868fcbddd095b091 rubygem-json-2.5.1-163.el9_5.x86_64.rpm 812cfe7e839cfda9a273b74c212929c4fb1c9790a28a179efa277c9226f92187 rubygem-minitest-5.14.2-163.el9_5.noarch.rpm 6a6d491aced2d193ca00652dfbc2311ae9ba58f57e690a054bd55bc03df37b60 rubygem-power_assert-1.2.1-163.el9_5.noarch.rpm 6013de5e545c1b1ef87c3ad43e767673a6996f4b6c72143d8cf345fb520e0d6e rubygem-psych-3.3.2-163.el9_5.x86_64.rpm 9b9347efd0e1b13fe5af28848cb1bdcc5d148f6e5db9a756184cb8caaa5e7267 rubygem-rake-13.0.3-163.el9_5.noarch.rpm 519259da5ce23051e8ca382266b33c3245dccc8161a4499c273b82421ec6125d rubygem-rbs-1.4.0-163.el9_5.noarch.rpm d48255cca59db9adf5dd6beea6976e73ca03c0dd4e8fe6739afc9ccd7341251d rubygem-rdoc-6.3.4.1-163.el9_5.noarch.rpm 80e2e46213e999645c89ed3d47c633a909a2dd5e8f2994ca4b439d5689227f8a rubygem-rexml-3.2.5-163.el9_5.noarch.rpm e5887f5549ec4cbcc6aa75d30269c144a50b0aea9295883e374633b1657110b6 rubygem-rss-0.2.9-163.el9_5.noarch.rpm 3e2b82f2cf471d15f60f18485dc81f26f76b07a1336a9f44452b1f8938bd783c rubygems-3.2.33-163.el9_5.noarch.rpm 8cd280f68721ff773c87942525c71c135fc03283351831d1b5cbfeb0f6a6d842 rubygems-devel-3.2.33-163.el9_5.noarch.rpm 065382cc4ebf7923bcfd27aabb0539cb86f1ae78a65b8c40de9f7bbd68e9828d rubygem-test-unit-3.3.7-163.el9_5.noarch.rpm b859d3f1fa8ed72ae753e4f01176b4f737d92e2aa5e428d5f68ac6e1d8506ce2 rubygem-typeprof-0.15.2-163.el9_5.noarch.rpm 66bfc80c06ea5babd07692fd86d680b1c1f001b691429c6c65186d55965e5501 ruby-libs-3.0.7-163.el9_5.i686.rpm c9819a8286cbb452528cbb9d3a093a94f885d807236695a0f44f57bfc7ee7836 ruby-libs-3.0.7-163.el9_5.x86_64.rpm 738cead901fa2df5f68daa3758dcc3cefa4e8ee4838f03d7eb3b3b7e476132a8 RLSA-2024:10978 Important: python3.12 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python3.12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Virtual environment (venv) activation scripts don't quote paths (CVE-2024-9287) * python: Unbounded memory buffering in SelectorSocketTransport.writelines() (CVE-2024-12254) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-3.12.5-2.el9_5.2.x86_64.rpm 13068b3d2d159d3dd79bb8bd9292ab441e3cedec06a856108ed41b17671415ee python3.12-devel-3.12.5-2.el9_5.2.i686.rpm 27835d17dc8d471df1aa98464c3aaa5f64b080af59fa82f00b74d98f35eb05a5 python3.12-devel-3.12.5-2.el9_5.2.x86_64.rpm 2e85915155d7a00d0d450f43bd77e9af1b7fdafc06df10046080177f9a640ac5 python3.12-libs-3.12.5-2.el9_5.2.i686.rpm df823df61d3ea03fe21b4c12f67e7a0b92cd20c758e161773dc08ac626103295 python3.12-libs-3.12.5-2.el9_5.2.x86_64.rpm 734619b3748242eb68db1a140490d525d5816efa5f99e8b80768d6c4a6f2cf31 python3.12-tkinter-3.12.5-2.el9_5.2.x86_64.rpm 4dbf4922fa735cb19eb96909e1e999dd739f648fcd606b79af80e1faec8e8bf5 RLSA-2024:11111 Moderate: python3.11 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Virtual environment (venv) activation scripts don't quote paths (CVE-2024-9287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-3.11.9-7.el9_5.2.x86_64.rpm 4102b3d8fa4c7e88d42bb789af82f5eff01363fdbbc2c8e857e9007e17c1be14 python3.11-devel-3.11.9-7.el9_5.2.i686.rpm 9e0849fba38aba89b912d4d5772d7cbc27b911c0c3ef339534c2402656148ce6 python3.11-devel-3.11.9-7.el9_5.2.x86_64.rpm 9bf5ef11ab19ddbcb5a3b23314aad46ba40ee883bebd4c8e41dc4f3c2ae2e4df python3.11-libs-3.11.9-7.el9_5.2.i686.rpm 954b9a12254755d9652ffb9c600448812f8b842ad7b9f470ffef1c72d8a57d43 python3.11-libs-3.11.9-7.el9_5.2.x86_64.rpm d397384c6b20308123b4da6baf43e9b3b753482b69fc5c54e71204697ed9f1b3 python3.11-tkinter-3.11.9-7.el9_5.2.x86_64.rpm a7b6a3cb91a3e93d0ec42711d8ac6a0339538aa1672bd43ddd1150ddf32bae78 RLBA-2024:11218 nmstate bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nmstate. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Nmstate is a library with an accompanying command line tool that manages host networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a northbound declarative API and multi provider support on the southbound. Bug Fix(es) and Enhancement(s): * Disabling ipv6 on ovs-interface is failing due to verification error [rhel-9.5.z] (JIRA:Rocky Linux-60242) * nmstatectl gc mode does not support blackhole routes [rhel-9.5.z] (JIRA:Rocky Linux-58666) * nncp route-rules applied breaks br-ex connectivity [rhel-9.5.z] (JIRA:Rocky Linux-60261) * nmstate: Connectivity issue with a configuration has `ipv4 dhcp: true` and `ipv6 enabled: false`. [rhel-9.5.z] (JIRA:Rocky Linux-61899) * Pod interface removed [rhel-9.5.z] (JIRA:Rocky Linux-65031) rocky-linux-9-x86-64-appstream-rpms nmstate-2.2.39-1.el9_5.x86_64.rpm 91797a2c427d42023af2a7b9c3da1576a399f16103985b2c2efd6a27dbee594e nmstate-libs-2.2.39-1.el9_5.i686.rpm b0b34daa24bef8bc12c31203930372cacb228a6738c64514db325f3290d1fe9e nmstate-libs-2.2.39-1.el9_5.x86_64.rpm 2e4bb5b3a04834495df52ad55c6e2d9eac5d95778ae5e6c36e9e3884cb1e6634 python3-libnmstate-2.2.39-1.el9_5.x86_64.rpm 2079ab9ad2767aed2515064f21822116efa3d65f969bb2c4ffaf6733f728a152 RLSA-2024:11219 Moderate: edk2:20240524 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for edk2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. Security Fix(es): * edk2: Integer overflows in PeCoffLoaderRelocateImage (CVE-2024-38796) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms edk2-ovmf-20240524-6.el9_5.3.noarch.rpm fc0caf09a366d9af2744b360332c131580cca70d734a06cc6db99a13300aff34 RLBA-2024:11223 javapackages-tools bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for javapackages-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The javapackages-tools packages provide macros and scripts to support Java packaging. Bug Fix(es): * javapackages-tools: Make OpenJDK 17 default JRE/JDK [rhel-9.5.z] (JIRA:Rocky Linux-62403) * javapackages-tools: Include java-21-headless in generated auto-requires [rhel-9.5.z] (JIRA:Rocky Linux-62409) rocky-linux-9-x86-64-appstream-rpms javapackages-filesystem-6.0.0-7.el9_5.noarch.rpm a888ded88c325405d7bb3edeef9e1da54543f018eeb815c1505ec156310def9a javapackages-tools-6.0.0-7.el9_5.noarch.rpm 19596e1a8e86530a7a8e7614fc9413f51ebc3f2661a13dcf8d7f6cc6c8defe20 RLBA-2024:11224 ostree bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OSTree is a tool for managing bootable, immutable, versioned file system trees. Bug Fix(es): * [9.5] ostree Backport https://github.com/ostreedev/ostree/pull/3300 (JIRA:Rocky Linux-62772) * [rhel-9.5.z] Rebase ostree to 2024.9 (JIRA:Rocky Linux-68351) rocky-linux-9-x86-64-appstream-rpms ostree-2024.9-1.el9_5.i686.rpm fb7ab56eb742f2bb7c815b3b81d9b17e4598d74ddc31762835621aec8953763c ostree-2024.9-1.el9_5.x86_64.rpm da76a6c72e048a96795048b2a121e84e3836c058c40a092d1a83844112b8caa4 ostree-grub2-2024.9-1.el9_5.x86_64.rpm 97a1e8fbadd7e27c4e41b71d8e0cf6bd0decd739d966a9edf0ba31397809f5ab ostree-libs-2024.9-1.el9_5.i686.rpm bfc9ef78f9af89c68c968d63621d5f7992564bd87d9963e4b453f9660d29f0a6 ostree-libs-2024.9-1.el9_5.x86_64.rpm 39465a886eb548b4e6588b945882d3217cc3eeb7a3dc516e9f95d4a9d991b28c RLBA-2024:11228 bcc bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list BPF Compiler Collection (BCC) is a toolkit for easier creation of efficient kernel tracing and manipulation programs. BCC uses the extended Berkeley Packet Filter (eBPF) tool. Bug Fix(es): * The bcc-tools 'bio*' does not run as expected on Rocky Linux 9.4 [rhel-9.5.z] (JIRA:Rocky Linux-65192) rocky-linux-9-x86-64-appstream-rpms bcc-0.30.0-7.el9_5.x86_64.rpm 997bbef1ec36898140473c80662a11bcbcd5362fccba5a97065c9f272aff5c88 bcc-tools-0.30.0-7.el9_5.x86_64.rpm b4bb4c9beddf04080adff014cdc893f8be40a6946f372897680fdd2754271487 libbpf-tools-0.30.0-7.el9_5.x86_64.rpm 449b823363c9afbc98e996fb22be564886c50ff9cb3316feae31c445a6e949f4 python3-bcc-0.30.0-7.el9_5.noarch.rpm dca9c4ef964bd159a3ffab66aa8ac17e2450a305ff1ea772911b725a57d1732d RLSA-2024:11232 Moderate: unbound:1.16.2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for unbound. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. Security Fix(es): * unbound: Unbounded name compression could lead to Denial of Service (CVE-2024-8508) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-unbound-1.16.2-8.el9_5.1.x86_64.rpm 63d604946e0315e41ac915ae62a46a0cb5780feefdc9e783e633e28982274c62 unbound-1.16.2-8.el9_5.1.x86_64.rpm 759adfb91086882c1ece12f110c97b10836e34ed5fe53249f3fb1f0a557f1ee9 unbound-libs-1.16.2-8.el9_5.1.i686.rpm aba7529f4ac1d0284d87bfe2dcd32c8effefd9e089786d461adab50e0c3c5653 unbound-libs-1.16.2-8.el9_5.1.x86_64.rpm b0547915c6918dfbf0d0d21db6c6de8633a65c106a8afe4191f509e077869a53 RLSA-2024:11237 Moderate: libsndfile:1.0.31 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libsndfile. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libsndfile is a C library for reading and writing files containing sampled sound, such as AIFF, AU, or WAV. Security Fix(es): * libsndfile: Segmentation fault error in ogg_vorbis.c:417 vorbis_analysis_wrote() (CVE-2024-50612) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libsndfile-1.0.31-8.el9_5.2.i686.rpm 7767650e71fa0c4e60a1ebafbdda829bf5dd8b4377c5ed3e93d6c6a74851042c libsndfile-1.0.31-8.el9_5.2.x86_64.rpm ff30d83abd19537a9c052d588451755e8b1d8fb0dd82529ef71dc19f1fa28bc7 libsndfile-utils-1.0.31-8.el9_5.2.x86_64.rpm c0e96773576e9439b7fec11c42cd95d50c50761db79389c776ee6e3be3a6ac7c RLBA-2024:11241 seabios bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for seabios. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The seabios packages contain an open-source legacy BIOS implementation that can be used as a coreboot payload. They implement the standard BIOS calling interfaces that a typical x86 proprietary BIOS implements. Bug Fix(es): * amdgpu failed to initialize when multiple AMD MI210 GPUs assigned and firmware is seabios [rhel-9.5.z] (JIRA:Rocky Linux-68955) rocky-linux-9-x86-64-appstream-rpms seabios-1.16.3-2.el9_5.1.x86_64.rpm e99001e25c9dd6ef4a0336ff2c1701e444892ad6dc4a7c5c4ff345623292bf99 seabios-bin-1.16.3-2.el9_5.1.noarch.rpm 8928d209011e99e7f23d8c3a0053bc3e0a6c6c6e9a68251e2c7ef0125f288c3e seavgabios-bin-1.16.3-2.el9_5.1.noarch.rpm e34541684cb8c726bc494c91ef3fc57c134d841f496834823fcf68c7b696b125 RLBA-2025:0915 389-ds-base bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for 389-ds-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Bug Fix(es): * Wrong set of entries returned for some search filters [rhel-9.5.z] (JIRA:Rocky Linux-65775) * deadlock during cleanAllRuv [rhel-9.5.z] (JIRA:Rocky Linux-66138) * cleanallruv consums CPU and is slow [rhel-9.5.z] (JIRA:Rocky Linux-67163) * Freelist ordering causes high wtime [rhel-9.5.z] (JIRA:Rocky Linux-70257) * Some nsslapd-haproxy-trusted-ip values are discarded upon a restart. [rhel-9.5.z] (JIRA:Rocky Linux-74350) rocky-linux-9-x86-64-appstream-rpms 389-ds-base-2.5.2-5.el9_5.x86_64.rpm f1e37499168fbe013568f78443996b34453bc9327df36bf103440dbf58f6c0e9 389-ds-base-libs-2.5.2-5.el9_5.x86_64.rpm 4f935010f4e0c1222ec95cd23defc6b0fe97e24b67fba638aa24ac279602cc5d 389-ds-base-snmp-2.5.2-5.el9_5.x86_64.rpm 2949bc42fc13e91dd30c17b8562b6488df2b9ba70b7c893b1e4a5f58eb408269 python3-lib389-2.5.2-5.el9_5.noarch.rpm dd44408b0b595fffda8f1accda4d4000156e4f3cdf2e8b225fe6f0c07c19a7eb RLBA-2025:0924 ipa bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es): * kinit with external idp user is failing [rhel-9.5.z] (JIRA:Rocky Linux-76011) rocky-linux-9-x86-64-appstream-rpms ipa-client-4.12.2-1.el9_5.4.x86_64.rpm ad68dfbcc60bc941214fed5b58cfd8be2325563aa852fcaaeae5135e53e088fa ipa-client-common-4.12.2-1.el9_5.4.noarch.rpm 84ebd08d75e5e3cdd33e554e93d0e256a7c8fab3b6b7df8277ce0107efd8f4c4 ipa-client-epn-4.12.2-1.el9_5.4.x86_64.rpm 5acd3bee384607d33a1273676fc51913ee889e593d8ee05065e51096f92a904e ipa-client-samba-4.12.2-1.el9_5.4.x86_64.rpm ebadfb136d57fbf665b2e947612deb5ca60c531a25eaa1475e6881106ed18b92 ipa-common-4.12.2-1.el9_5.4.noarch.rpm 36bc5b2ca5d6de7f0b8a52fe4efe795f297326a1b9b410771bd820016e00c705 ipa-selinux-4.12.2-1.el9_5.4.noarch.rpm cf6d389e91a69944af34e235fda1c04439ae59d3599e328184270549488afc26 ipa-selinux-luna-4.12.2-1.el9_5.4.noarch.rpm d3ba6c5ef96fd7e1528b13e9265517b82c7a2040583c1119bca9f7cc661c6d3a ipa-selinux-nfast-4.12.2-1.el9_5.4.noarch.rpm 8bc622a45ab8f46f39e5d5734ecdf50fe8da7399556151c10e5dbbd2840d3037 ipa-server-4.12.2-1.el9_5.4.x86_64.rpm bdb694b073494c919c1cc9f8a57a3e15754618fd934b138a7d78fa493714dbc5 ipa-server-common-4.12.2-1.el9_5.4.noarch.rpm 3e875618b8f03d2df4ab3918e0e6ae7af8b4d36869ea235099af66171fb28700 ipa-server-dns-4.12.2-1.el9_5.4.noarch.rpm 2bd6f8005121eaef2478ed7093f8ad99c5ab8d11d6a3e8d3a5a2721ffc060547 ipa-server-trust-ad-4.12.2-1.el9_5.4.x86_64.rpm ad08b2754469eee2fd7d272d2a778660e6d81d520133e79526a6dcaebf1cfaeb python3-ipaclient-4.12.2-1.el9_5.4.noarch.rpm f4f88ac0f0d20c9f469687d2a201ef65ec864e4c30afdbc16bad458c4ef889dc python3-ipalib-4.12.2-1.el9_5.4.noarch.rpm 1197b3f96d436b48d0a40e79461d0a3d721ec71b62eb71c6cdddbff2cb3784ac python3-ipaserver-4.12.2-1.el9_5.4.noarch.rpm bb6bfa214aecdf41fd358340dbe7643f44b7bccff12ed70039003321801031c3 RLBA-2025:1512 virt-v2v bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-v2v. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The virt-v2v package provides a tool for converting virtual machines to use the KVM (Kernel-based Virtual Machine) hypervisor or Rocky Enterprise Software Foundation Enterprise Virtualization. The tool modifies both the virtual machine image and its associated libvirt metadata. Also, virt-v2v can configure a guest to use VirtIO drivers if possible. Bug Fix(es): * Migration Plan / vddk pod cannot remove open-vm-tools in case of dependencies [rhel-9.5.z] (JIRA:Rocky Linux-78842) * CentOS 9 Migration from VMWare to Openshift Virt fails [rhel-9.5.z] (JIRA:Rocky Linux-78844) rocky-linux-9-x86-64-appstream-rpms virt-v2v-2.5.6-8.el9_5.x86_64.rpm 92b38043a527eb79ef3d5965bbf1375f0794f4bebcf8d6d9695970d415bcd5fa virt-v2v-bash-completion-2.5.6-8.el9_5.noarch.rpm b8669fb849e05a6db73a8af36178cad0cd4a71997a956d8f443dc03dd74a098f RLSA-2025:1670 Important: bind9.18 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for bind9.18. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly. Security Fix(es): * bind: bind9: Many records in the additional section cause CPU exhaustion (CVE-2024-11187) * bind: bind9: DNS-over-HTTPS implementation suffers from multiple issues under heavy query load (CVE-2024-12705) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms bind9.18-9.18.29-1.el9_5.1.x86_64.rpm 01675a7a1f0c7fc392673e4b042cd86edd01f482b313eac735bd2f6e98a88d6e bind9.18-chroot-9.18.29-1.el9_5.1.x86_64.rpm e5ab34561a296d37914f352154c49e2f82bca2e87f3755d57675df9b9e70dd67 bind9.18-dnssec-utils-9.18.29-1.el9_5.1.x86_64.rpm c944af447d7755750ca3c66653452d5eb9196100b5890ec2b9a46745a729247f bind9.18-libs-9.18.29-1.el9_5.1.x86_64.rpm 2a3aa8c8bdf987e778187c892ce5eda9ac9bbad78a10faffacc5c9c38109e0c7 bind9.18-utils-9.18.29-1.el9_5.1.x86_64.rpm 99a331b6d6d78f2050a583123205336d1d50218adcad3e0565133f65781cbb99 RLSA-2025:1681 Important: bind security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for bind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: bind9: Many records in the additional section cause CPU exhaustion (CVE-2024-11187) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms bind-9.16.23-24.el9_5.3.x86_64.rpm fb11ef35fa96b1fa61a798ac856c4c996711d5a1546136a5a45af7b77d63a9ab bind-chroot-9.16.23-24.el9_5.3.x86_64.rpm 1fbfa8a427dcbd478fe3f59bf1e173747d6f37ebb4c7f7d1b05af7a6b72bc459 bind-dnssec-doc-9.16.23-24.el9_5.3.noarch.rpm f571985b61f890be72f6f070cfb42cf642c8dca0a5303f438f9e2d4435142613 bind-dnssec-utils-9.16.23-24.el9_5.3.x86_64.rpm 057b77bd05909e3810d31a6487b6860c244d82c6e6e5993a9e1eaec431be1533 bind-libs-9.16.23-24.el9_5.3.x86_64.rpm c1e198fc362a6cdbc2f3a00f671d9e80c34292930f94763fab99d611a8695bf5 bind-license-9.16.23-24.el9_5.3.noarch.rpm c4c4c242889fa4d75748628e15265b7dbc19d40115679b4ee2355f2663cf12e6 bind-utils-9.16.23-24.el9_5.3.x86_64.rpm 33f70dd2375726850c715c06b2481250774d0923176142f50dc7d82b2e6f6254 python3-bind-9.16.23-24.el9_5.3.noarch.rpm 454965885e9940851b833d59a8f15dace7d3f6042aaba3862b9f1142c362816d RLBA-2024:9087 ignition bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ignition. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ignition-2.19.0-3.el9_5.x86_64.rpm 345045a8c337f8b8a06234d99fd1871f6b831aac3fed3c4d19023397a89514a1 ignition-edge-2.19.0-3.el9_5.x86_64.rpm 6d544d0718315ac7bf674f22931d68f021cf99b4388057d6a4a8ed18a0b9b60a ignition-validate-2.19.0-3.el9_5.x86_64.rpm 5e4a9003e298c464a397a35a54d06229212e801523f8bcf08c78a94e8c4469e0 RLBA-2024:9085 cockpit-composer, osbuild, and osbuild-composer bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-composer, osbuild. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-composer-52-1.el9.rocky.0.1.noarch.rpm 3d09ee06a9bd28bc891131bc5b06080d7a29bade513ebc978e245448f81bb2d9 osbuild-126-1.el9.rocky.0.2.noarch.rpm 1fa656fbf4780993db7ac95e247429b95fcb63e047378fd79401e16f6043027e osbuild-depsolve-dnf-126-1.el9.rocky.0.2.noarch.rpm 2ae11a9f0238550c58be634d78ebccabd5b2cadd3cece80197914af53a96d4c5 osbuild-luks2-126-1.el9.rocky.0.2.noarch.rpm 3b285f6931f5d6c3ad53286385b41db641cb54bfb923ccccc3c915afc19b7aa5 osbuild-lvm2-126-1.el9.rocky.0.2.noarch.rpm e2175ba6c078ab43f2a4bb8040d4a7eed96494f7576c58c19aa34467a3758907 osbuild-ostree-126-1.el9.rocky.0.2.noarch.rpm 37118f31799de9e0c1fb9320d5d9a6a17341ad8df8d4ced58603ae5718cfce3b osbuild-selinux-126-1.el9.rocky.0.2.noarch.rpm 1b21c0509ac41008e07701e845672cff53d46e54742a5d6fc0d0c35381e3bae0 python3-osbuild-126-1.el9.rocky.0.2.noarch.rpm 44a894b74e38807473ae47cd8397c3f80f74a91d2c06ee2a136648b9aab6e3eb RLBA-2024:9090 container-selinux bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for container-selinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms container-selinux-2.232.1-1.el9.noarch.rpm 7d4b02ee61a19c7b18ada3d509fcab9a677124155bfbc92731c2d48a4b11eac8 RLBA-2024:9094 fence-agents bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fence-agents-common-4.10.0-76.el9_5.1.noarch.rpm 13c57d0c0179a22f20094d3999e4ededfeb1ccdd5c58b41b6921832be3139ffb fence-agents-compute-4.10.0-76.el9_5.1.x86_64.rpm 1cebfa38f6802d639582bc993e76663aa6d2d3d96b4a0bdf573932156df6a392 fence-agents-ibm-powervs-4.10.0-76.el9_5.1.noarch.rpm c718900a74741da9541eb30c1dacb6e9fa1fabc20d9aa8113b10bdb7142b62bb fence-agents-ibm-vpc-4.10.0-76.el9_5.1.noarch.rpm 979972ccc0dc6371ed7aa5888cb810c7c4d3a1ac6be3cfb2eb9e6a6ee382e704 fence-agents-kubevirt-4.10.0-76.el9_5.1.x86_64.rpm 8e7a84e36d56b29c115ef6ff1ce914bc9feba4c2fea9f60a73869c82fade5b1b fence-agents-virsh-4.10.0-76.el9_5.1.noarch.rpm 90370d312da6f5a01fc3e683fd266accce5313b03cf938eac11a6e3ea8c3e073 fence-virt-4.10.0-76.el9_5.1.x86_64.rpm 408112bfa50d8d99a3a1081008428254532c7964c4bac5aa220f0f8455c4ff43 fence-virtd-4.10.0-76.el9_5.1.x86_64.rpm b42a2c3b074f0f14241c9e798f32469351f236f93049f3d984bae92db82923ba fence-virtd-cpg-4.10.0-76.el9_5.1.x86_64.rpm 24d4dfb0ea048c3ddc63b9fad0265ef8dc5d69740dbc47dffd73ed9ae8d092b6 fence-virtd-libvirt-4.10.0-76.el9_5.1.x86_64.rpm 3d16376833af531b2e8c6ca168370b539486e5199c3ec3ccb848d612288ec4f9 fence-virtd-multicast-4.10.0-76.el9_5.1.x86_64.rpm 3a42cbf09e1a2e1cf984a0df6412c8a5a0d2fcabd8697b8dafcc2605b82672dd fence-virtd-serial-4.10.0-76.el9_5.1.x86_64.rpm 1b6d159a4422a8015a506059e74865c51ff848e0936a8af5bd6c6fc22e2242f4 fence-virtd-tcp-4.10.0-76.el9_5.1.x86_64.rpm fe5accd323eadead37a910fb95b5b0572500cb76231d54cd5459fd27dcc35c03 RLBA-2024:9099 crun bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for crun. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms crun-1.16.1-1.el9.x86_64.rpm 11367280a1264c51a93f4294ceef6cd8a50b06e85953c45d530946042c597faa RLSA-2024:9102 Moderate: podman security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * podman: Symlink error leads to information disclosure (CVE-2022-4122) * containers/image: digest type does not guarantee valid type (CVE-2024-3727) * golang: archive/zip: Incorrect handling of certain ZIP files (CVE-2024-24789) * net/http: Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms podman-5.2.2-13.el9_5.x86_64.rpm 776a1adad50d599bbb42e73a7238f4dba5625ea1a8eeabc9bdd0467ab83c8ac2 podman-docker-5.2.2-13.el9_5.noarch.rpm 53a17c32228850d8b47eaf0963d2fca734f437054f5448e67495b496f7152cb4 podman-plugins-5.2.2-13.el9_5.x86_64.rpm 6475de32f2e34ea1cb53d6f5bf38d3cb841cd218577bd2e275e30247e3458d91 podman-remote-5.2.2-13.el9_5.x86_64.rpm dfb5d2ac5934ec5f86f766c9f13016e8562ca7379de9e78d3f6d73794c7369cf podman-tests-5.2.2-13.el9_5.x86_64.rpm 0a01a3fa387d5267fe206918dfeee547fa4905c18c0b95aa6f65be29c2cee344 RLBA-2024:9108 python-podman bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-podman-5.2.0-1.el9.noarch.rpm 6a8a0886b35552581b34d1a218fe592ce4963af02d7c3c45165815666870b931 RLSA-2024:9114 Moderate: gnome-shell and gnome-shell-extensions security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gnome-shell-extensions. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME Shell acts as a compositing manager for the desktop, and displays both application windows and other objects. It provides core interface functions like switching windows, launching applications, and notifications. It takes advantage of the capabilities of modern graphics hardware and introduces innovative user interface concepts. Security Fix(es): * gnome-shell: code execution in portal helper (CVE-2024-36472) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-classic-session-40.7-19.el9.noarch.rpm 9d56ad1efffb0505aef270d16fa10b925d4c464437446f9545372dfe8f74de3c gnome-shell-extension-apps-menu-40.7-19.el9.noarch.rpm 04befb8843268be3768c13590e97ed0156d70f1d63f9290686936c1b10f2794e gnome-shell-extension-auto-move-windows-40.7-19.el9.noarch.rpm 2aae479e0529020808288a9ff57b5071e086885e130a0c0b59dca6eb3e41ad3f gnome-shell-extension-classification-banner-40.7-19.el9.noarch.rpm 748abdbc93f1a3be0252c7c979efd04aa01b15a32b27278520813dd025a43461 gnome-shell-extension-common-40.7-19.el9.noarch.rpm c0ed95b34ce76e52d1f7c56d574c5c17a55743ad8cd8d96a93a8f3c431f9e2ba gnome-shell-extension-custom-menu-40.7-19.el9.noarch.rpm d18c87bc15410b9149a48a2ff0167bd92d1c5dd81842cfbc7041c5d3326bd65f gnome-shell-extension-dash-to-dock-40.7-19.el9.noarch.rpm c583fc900fd4cb149cf77c1a6b7772553afa6acd6b56b65525134bea03eb1b63 gnome-shell-extension-dash-to-panel-40.7-19.el9.noarch.rpm e969204ecfb677284ed522e5e87f41eb3ee720bbcc7e0f18bb16e83f60cf03c7 gnome-shell-extension-desktop-icons-40.7-19.el9.noarch.rpm fd7fff23154a2ebe2d3ec3f00fef1f39a18e4bca9014145a0608b71852a516ff gnome-shell-extension-drive-menu-40.7-19.el9.noarch.rpm 2154c9b1458a62d39bc71dab882216aaea1016d5be0bc8d06e7a612298de4561 gnome-shell-extension-gesture-inhibitor-40.7-19.el9.noarch.rpm f6bd4aaf4af84094c78ad1d20e98c4cb80dbea0b296aaae38f328badfc7c0d52 gnome-shell-extension-heads-up-display-40.7-19.el9.noarch.rpm e2eeef07eddabeeb2617cd5dc93ef46fd28cd92c0b08c1751eb8b29a4e63257d gnome-shell-extension-launch-new-instance-40.7-19.el9.noarch.rpm 994db90c66c3279e7abd3f2b3d202b1c5f1a38e6f8b9f080441e5d904e0dcc4a gnome-shell-extension-native-window-placement-40.7-19.el9.noarch.rpm ee5b542877d939baad1e3e8db0421002e3efa7efd8d998223cf68f8adddd23b4 gnome-shell-extension-panel-favorites-40.7-19.el9.noarch.rpm d320c5c9978c03b4ad39efc47d79899bbf6949e9a35e42d5aa8faffad8ed160d gnome-shell-extension-places-menu-40.7-19.el9.noarch.rpm 6254ccc209b2c418c8056ba388644fe3074e1abc3fa32982ee7a0a55771df904 gnome-shell-extension-screenshot-window-sizer-40.7-19.el9.noarch.rpm 1e349076d56ae439a25f867bdeb575a5965e6299973d3c4d7233fc278c1a84be gnome-shell-extension-systemMonitor-40.7-19.el9.noarch.rpm 72b58c32acd2639980f9724e2aee789175da2270c0e29f3237bad5fab63825bc gnome-shell-extension-top-icons-40.7-19.el9.noarch.rpm 9053ddb883f3f6fe8754c1812e45a33572399612d819a27b493c6cc60d031aa2 gnome-shell-extension-updates-dialog-40.7-19.el9.noarch.rpm b435739929319521700a5baad9137e65d455c35be9816f41f09163be71e6bb79 gnome-shell-extension-user-theme-40.7-19.el9.noarch.rpm 9cb0658cf8e14a4ac58208b349b1de89ffdbf6ec26281e4c849f8cd2651441d6 gnome-shell-extension-window-list-40.7-19.el9.noarch.rpm 4d06f40f88f8ee5c3d8c4702b5fac5f2350908c090cfb748e5f6dc1003917ffb gnome-shell-extension-windowsNavigator-40.7-19.el9.noarch.rpm 6b46eff306b622851fc92b5262f5495fcc4a69aa4f8eebc098d51d394439733d gnome-shell-extension-workspace-indicator-40.7-19.el9.noarch.rpm 97301e4b2a2cf09b2fd89e531318105ecd4d64581009defdd327002b9ff23a8a RLEA-2024:9119 rhel-system-roles bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rhel-system-roles. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rhel-system-roles-1.88.9-0.1.el9_5.noarch.rpm db22cba6eaab627bc6e9d7530c533316da5cde071fee75a01da30d06bfbcfb1e RLBA-2024:9117 delve and golang bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for delve. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms delve-1.22.1-1.el9.x86_64.rpm 3eeb63858fdc51f679879469021cc0723f1e74f44c43d7c5d50c44349edf3391 RLBA-2024:9121 gnome-settings-daemon bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-settings-daemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-settings-daemon-40.0.1-17.el9.rocky.0.1.x86_64.rpm ef53ea2bccdc294ecb70c04dd6b2b4762636b71d90106abb366caf9404cb516a RLBA-2024:9127 cockpit-machines bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-machines. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-machines-318.1-1.el9_5.noarch.rpm 65b8ace4816f2b5748d2bc504a8b5dd2ba3a2ac369020770a4c08e235330fea4 RLBA-2024:9129 cockpit-ostree bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-ostree-204-1.el9.noarch.rpm 8d9e7f519c13956642bdbfea9b2c3c882f7d3e4c125e88009015e15e8442c298 RLBA-2024:9133 mingw-qemu-ga-win bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mingw-qemu-ga-win. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mingw-qemu-ga-win-108.0.2-1.el9.noarch.rpm 98cf624f95171cbbfdad921fb95be8c075aab7970ab1a85c5ce0ff22e134b500 RLBA-2024:9132 open-vm-tools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for open-vm-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms open-vm-tools-12.4.0-2.el9.x86_64.rpm 7e67f61e4e4aae18fab276fb30cbddaf974d1db95139f4d79eb2886186f6108f open-vm-tools-desktop-12.4.0-2.el9.x86_64.rpm b28927f0d32b1e61e6495397cbad12dcbce54f00d1a20264cc0d3aeec4550a30 open-vm-tools-salt-minion-12.4.0-2.el9.x86_64.rpm 9a80dd662605247fea513e34d0ef5ec7ce944e88b6a22f4b2db7c60baa99dc24 open-vm-tools-sdmp-12.4.0-2.el9.x86_64.rpm 0c945acce76390476ec3a19fa98d0c965c34f3ccbb4e9823687e98a341496e19 open-vm-tools-test-12.4.0-2.el9.x86_64.rpm 4175f66a35d2f04e3682b91c006b7fa42298aa0a17ebdf3b9935180137708468 RLBA-2024:9130 cloud-init bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cloud-init. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cloud-init-23.4-19.el9_5.4.0.2.noarch.rpm 8ad84a9132fc354eef1e7305650b2dede0aef01d9d448e7268489768683e21fe RLBA-2024:9134 cockpit-podman bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-podman-93.1-1.el9_5.noarch.rpm 3e2b3a6a2f195881971b73c84b6236a4f23b9865e5b0c4e4c02caaa9951aebcc RLSA-2024:9135 Moderate: toolbox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for toolbox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Toolbox is a tool for Linux operating systems, which allows the use of containerized command line environments. It is built on top of Podman and other standard container technologies from OCI. Security Fix(es): * golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290) * golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785) * golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788) * net/http: Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms toolbox-0.0.99.5-5.el9.rocky.0.2.x86_64.rpm 1522beed2040e6819cbf586a99fe0d67edf4eeef5d83702bdb6d7746b33b6b89 toolbox-tests-0.0.99.5-5.el9.rocky.0.2.x86_64.rpm ab54c664f4493fbc1b186dffcaba6abb12f30e729b7b9769b3d994cd1633cdba RLSA-2024:9136 Moderate: qemu-kvm security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for qemu-kvm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Security Fix(es): * QEMU: SR-IOV: improper validation of NumVFs leads to buffer overflow (CVE-2024-26327) * QEMU: virtio: DMA reentrancy issue leads to double free vulnerability (CVE-2024-3446) * QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure (CVE-2024-7409) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms qemu-guest-agent-9.0.0-10.el9_5.2.x86_64.rpm b6aec138968abfb9748361a2ee14487aeb62569ce67bbffbb0150808d34f6a83 qemu-img-9.0.0-10.el9_5.2.x86_64.rpm 3bee7bf4b9fc4bb6df430a11508d46e97ca144e113be6bb016ff09e8eaf6d9e0 qemu-kvm-9.0.0-10.el9_5.2.x86_64.rpm d697468f7fe4a63bf40176a79c2556e2d40916afbe6e27b417503807992fb45c qemu-kvm-audio-pa-9.0.0-10.el9_5.2.x86_64.rpm e0ad9f64e4e8c7a8a404a5486438c3e5e1a20bfb6f74bb9c443292713b78bb59 qemu-kvm-block-blkio-9.0.0-10.el9_5.2.x86_64.rpm 9b624993d16687dc6fea42574d7eda74856ed3e4cbb0b09ca5924b663e61be3e qemu-kvm-block-curl-9.0.0-10.el9_5.2.x86_64.rpm c03ede6b75808402bcfc3e4ce42284f27d9b4e390fb844c7c5aa086793b5f088 qemu-kvm-block-rbd-9.0.0-10.el9_5.2.x86_64.rpm 212fcbf408dd454c22ff13fca6e36d30bdc2b8820020c78a95cc62b1c94eaaf8 qemu-kvm-common-9.0.0-10.el9_5.2.x86_64.rpm 74bd4f43a2e51ab2d7ce1701f75a9ee369d1e766e1f360c4f1d6c48aef95283e qemu-kvm-core-9.0.0-10.el9_5.2.x86_64.rpm 446815c893e0ceb4b73f9e33f8caa6a28c6ebc93659e50f0bfe11c66ad039163 qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9_5.2.x86_64.rpm e77624bff0f5e1c9be0f819ad738ff99c3abd1ab00c36f0f9138e35ed2c2a1fa qemu-kvm-device-display-virtio-gpu-pci-9.0.0-10.el9_5.2.x86_64.rpm 0c046c01a1c8bb36c0dea865dcb8e57560afdd69308ae1f8de756de6cc29a036 qemu-kvm-device-display-virtio-vga-9.0.0-10.el9_5.2.x86_64.rpm af8cc83dea4eaf9cbc28016a75d3244b4094ac3358846f0524eb61f29667e8b6 qemu-kvm-device-usb-host-9.0.0-10.el9_5.2.x86_64.rpm 8f1f3c95590603101ac05cd8eb0c41315a0f950418380bbb28c410092ec348e8 qemu-kvm-device-usb-redirect-9.0.0-10.el9_5.2.x86_64.rpm 0a44ad51f2feee3a4261c115a0e4ec99180f4ebd104f58e78b45b27c63634e2d qemu-kvm-docs-9.0.0-10.el9_5.2.x86_64.rpm 6cbf058372af85d5ff38d4de8fde6d1b7eeec673da2f7a3b8b16c98586644d18 qemu-kvm-tools-9.0.0-10.el9_5.2.x86_64.rpm c97c7e26bcb5d96ac998a4963b72018a6834380317efad52e24053460fe88bfb qemu-kvm-ui-egl-headless-9.0.0-10.el9_5.2.x86_64.rpm a01a9a177bce335c7fd3934cbc9b0a572ac9c81c1b5a40543f2e2b192b048799 qemu-kvm-ui-opengl-9.0.0-10.el9_5.2.x86_64.rpm 11706725eb43cdc64f6464da7392576e4ec67ea42ed90a58aac87fc19efc2db3 qemu-pr-helper-9.0.0-10.el9_5.2.x86_64.rpm 234cdffe2fba47d414152b3599084508be0c3846af8d205a736b669e74901183 RLBA-2024:9142 stratisd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stratisd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms stratisd-3.6.7-1.el9.x86_64.rpm 2390fc766e22716be1ee571590df5870d7dacb51a47107aff2c4dff7972324e0 stratisd-dracut-3.6.7-1.el9.x86_64.rpm d14acfd4a9124e68310e88744b335e86127e539302d7b3dc7896938fabb71438 stratisd-tools-3.6.7-1.el9.x86_64.rpm f73727e6a23795525451577b667f10bb67a552a85e78106b7e697be4aa6bf4c1 RLBA-2024:9139 gcc-toolset-14-annobin bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-14-annobin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-14-annobin-annocheck-12.70-2.el9.x86_64.rpm b69d3046fea69870c25fcb1b353e671703d0c18bd1f461232e7c696640447000 gcc-toolset-14-annobin-docs-12.70-2.el9.noarch.rpm 23d3588d75639f77eff14c4a329dd57dc748e4c120c1a4a621f237f9308cff8e gcc-toolset-14-annobin-plugin-gcc-12.70-2.el9.x86_64.rpm a75d319bbd2e9067686fccacefd96202d7eb9e095d3660c15841cad4b0f0c974 RLBA-2024:9143 valgrind bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for valgrind. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms valgrind-3.23.0-4.el9.i686.rpm f6dc6e2238b09dce250f7dea03bc9f797521fb9a162af583b2af46b41f7b20e7 valgrind-3.23.0-4.el9.x86_64.rpm 56dcf322f638cf994884316a13dbaca1108e8663bacc4b74d94145cd76401b7a valgrind-devel-3.23.0-4.el9.i686.rpm 04861c89ca0e7be1756f0850435a0109c2b2ba6ce3662b20e0b67d6fb293e1bf valgrind-devel-3.23.0-4.el9.x86_64.rpm ed1b02d83fef6f7d1c74bb932a2bc0cf065df1096a83bfa4555314c6d9ca0a14 RLSA-2024:9150 Moderate: python-jinja2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python-jinja2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-jinja2 package contains Jinja2, a template engine written in pure Python. Jinja2 provides a Django inspired non-XML syntax but supports inline expressions and an optional sandboxed environment. Security Fix(es): * jinja2: accepts keys containing non-attribute characters (CVE-2024-34064) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-jinja2-2.11.3-6.el9.noarch.rpm 9e34d88c9835f11c7dfcd46b16021461f2b659808f1ff36fcbf893e5128f7c64 RLBA-2024:9149 slirp4netns bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for slirp4netns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms slirp4netns-1.3.1-1.el9.x86_64.rpm 8bec68ec0bf3354410e0320f93948a188e77562eea9fb810af22cf44a84be405 RLBA-2024:9154 systemtap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for systemtap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms systemtap-5.1-4.el9_5.x86_64.rpm 3f002362833e84b06a9fbaedf98b6aec7a62bc24848742cc4e3091a76d081f6c systemtap-client-5.1-4.el9_5.x86_64.rpm bbf31a59d68154f864601dee5a8fddec14c68f68bcff34ef4e851acde274bf7b systemtap-devel-5.1-4.el9_5.i686.rpm 4b66db72ed0148ad9d3eb48bb53886a549237c9ebe8da48df33100254ade4c4e systemtap-devel-5.1-4.el9_5.x86_64.rpm f9fbb8f3812af1ebb073fd73e61f2fba3a1c4a8d590d6ee86c251bfb80738710 systemtap-exporter-5.1-4.el9_5.x86_64.rpm f193e1dbbe5a7de467856d2ddac42d11717dacc178d5fee1fcbb65dcaba37363 systemtap-initscript-5.1-4.el9_5.x86_64.rpm 18c66a364cf7d07abab645b201250b8adf3135a38d75469746f63433444133a4 systemtap-runtime-5.1-4.el9_5.x86_64.rpm 7a113e6f500881d43f8d03b12fca710819679ed9a0a06dc4b7d815c66505b92b systemtap-runtime-java-5.1-4.el9_5.x86_64.rpm 0c5628837cd645f635254f94d2e9ed349edb55000a0d11a53e209e8722f68afb systemtap-runtime-python3-5.1-4.el9_5.x86_64.rpm fb6708f24dc36e6fef85008041806cfd73c3a3c35a46af926a020eb126d5240d systemtap-runtime-virtguest-5.1-4.el9_5.x86_64.rpm 0dc1f6657b586f915c064d54ce5eae46b355d62d525a549b330b1071d23148d1 systemtap-runtime-virthost-5.1-4.el9_5.x86_64.rpm 5bd3fb7d3090391ed74862c582d67eb42414516f300e2f16444e2e960bf6a4a8 systemtap-sdt-devel-5.1-4.el9_5.i686.rpm c55b3e43a7fe5cf05021ac525a0869eaa54e1c8b97c6d2f9defc37a88118dd4e systemtap-sdt-devel-5.1-4.el9_5.x86_64.rpm 386fc1ad0c54f0735dce2d0fa9691181088d2d154812c0f15f17aae428e621ec systemtap-server-5.1-4.el9_5.x86_64.rpm 9c68c4301b865a7dfd3b43e44381ede633c356ac9fc11a580bf36fb707faed17 RLBA-2024:9153 realtime-tests bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for realtime-tests. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms realtime-tests-2.7-2.el9.x86_64.rpm 6b9d051a627bbadc29edde6986a5f6825a9292bd09653a727348d3e1db60ed20 RLSA-2024:9158 Moderate: lldpd security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for lldpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list LLDP is an industry standard protocol designed to supplant proprietary Link-Layer protocols such as EDP or CDP. The goal of LLDP is to provide an inter-vendor compatible mechanism to deliver Link-Layer notifications to adjacent network devices. Security Fix(es): * lldp/openvswitch: denial of service via externally triggered memory leak (CVE-2020-27827) * lldpd: out-of-bounds read when decoding SONMP packets (CVE-2021-43612) * lldpd: CDP PDU Packet cdp.c out-of-bounds read (CVE-2023-41910) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms lldpd-1.0.18-4.el9.i686.rpm db41286c4c121a0a0c7a1ca8980be57b8ebc8995ecd9e8f2f687a5bacdf24090 lldpd-1.0.18-4.el9.x86_64.rpm fe16f4cc9e0f243bb80c0ad556ee9bf6a4c9290fdb401daac4147f0392d3275f lldpd-devel-1.0.18-4.el9.i686.rpm 75ce7b75f56328095c7f874f5a45d390a0c0574a8cd4e97725563263b43e997c lldpd-devel-1.0.18-4.el9.x86_64.rpm e84740ddd7068671edea44cb679a01999456e76c4d29622f80d2ef12ce4a039c RLBA-2024:9162 squid bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for squid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms squid-5.5-14.el9_5.3.x86_64.rpm 336441636ff36a801486627f8f871a61ed2dfbb2ab5d6ffd0ba04f4da471283c RLBA-2024:9161 python-drgn bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-drgn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms drgn-0.0.24-4.el9.x86_64.rpm 9d6b29de8641ae710983ac98a83442502c859667fcf295fa0a9789c649acf7f0 RLBA-2024:9160 gnome-control-center bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-control-center. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-control-center-40.0-31.el9.x86_64.rpm 70da1d97b6417c7e05aa65ff82cb3ec5de1a9295c5b5594ec28d622bf2b9dca1 gnome-control-center-filesystem-40.0-31.el9.noarch.rpm 01917ebf7ab4e08fefbd174574cd14bce91704fde1db1d5ff66d44192bf68516 RLBA-2024:9168 aide bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for aide. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms aide-0.16-102.el9.x86_64.rpm 2ec5193a89507cebe05f502bae1377da3278336753c2cab12a46bb78370063ce RLBA-2024:9172 python-blivet bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-blivet. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms blivet-data-3.6.0-17.el9.noarch.rpm aea9cff1f9498d2ddfa55e6e8f14e447e9434d6e62a92b1e863cda32d07be76e python3-blivet-3.6.0-17.el9.noarch.rpm 5f6e1375d14694ccdebf1a93b7e91e7f58b7d08108fb0528b206c65f7e83bc11 RLBA-2024:9169 clevis bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for clevis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms clevis-20-200.el9.x86_64.rpm 1736d8d36f62c07eef6d2866ee7aafa016d85d7461d7f1a46b282cf79a6c95f4 clevis-dracut-20-200.el9.x86_64.rpm 0f33f53d48dbb55fc04143658d3870d125e79a3c9ad843282cc4b8209b28fe39 clevis-luks-20-200.el9.x86_64.rpm 4599a20dc3efd85204f2da5d11a4b6b94d348f4a01c33e0cfa59a0180369815f clevis-systemd-20-200.el9.x86_64.rpm 51dd39ecd922b324f270af6b2a9fb18e785c08aa587f9e68c629fe3932f067e7 clevis-udisks2-20-200.el9.x86_64.rpm f9fade07fae4f4ae6914eac133b80a2e9f3405b714d24acd57642851e195c53e RLBA-2024:9171 ansible-core bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ansible-core-2.14.17-1.el9.x86_64.rpm 941b4674260cdedeab5bd193cb0b778c5d17318d219667ccc70c42693e798253 ansible-test-2.14.17-1.el9.x86_64.rpm c201eea040f7ff5e28e8e10290d653a9bd7e436267c3e4f22c0c3e9428ec3322 RLBA-2024:9170 rust-bootupd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-bootupd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bootupd-0.2.19-1.el9.x86_64.rpm 621cc59f4e4d35ce054597cb843708e6337aed473c2571e5afb36ce48abb5dec RLBA-2024:9174 boom-boot bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for boom-boot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms boom-boot-1.6.1-2.el9.noarch.rpm 1d4d369b8686b76607d292faa0a1cc99aa0cf3404c6d63a294881554d0118410 boom-boot-conf-1.6.1-2.el9.noarch.rpm 15a439be3b6a5620837cfebb64819c64b5afb8675879d19a62dc3940f3833403 python3-boom-1.6.1-2.el9.noarch.rpm 537e99d5d5da0f1e59644592fd27e41010688c1ad54766dd6266d41c376bd803 RLBA-2024:9175 libvma bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvma. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libvma-9.8.51-1.el9.x86_64.rpm 537a8954346e1d80fd1cf15bee2f13c6e7354615dfe370545ee41798a3bf4d4d libvma-utils-9.8.51-1.el9.x86_64.rpm 03761320f01916456a7c82f39275e66cfc500079cad573f8b4cf86472b5a10a4 RLBA-2024:9177 stress-ng bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stress-ng. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms stress-ng-0.17.08-2.el9.x86_64.rpm 8f6d07e17fb434476142a9286a466724cc51c51d4286290cf7cda18f558249e6 RLSA-2024:9180 Moderate: mod_auth_openidc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mod_auth_openidc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. Security Fix(es): * mod_auth_openidc: DoS when using `OIDCSessionType client-cookie` and manipulating cookies (CVE-2024-24814) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mod_auth_openidc-2.4.10-1.el9.x86_64.rpm d7a0783d76a8f689283f2e5be00ae668156a663e0048fcd3986f6c8a0def590b RLBA-2024:9182 libdrm bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libdrm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libdrm-2.4.121-1.el9.i686.rpm 3a593b96f0abcc023baff88aad48e486786d55dba70e3c8ea8d48269625a0591 libdrm-2.4.121-1.el9.x86_64.rpm ec1a97284d190c7efe4fbbc23480fe68d06f8d9c84a2ed30ad1c840e83f4f979 libdrm-devel-2.4.121-1.el9.i686.rpm e20850dc8a9d6aa992fce1aafbfd1cfa53d8522a73fc468d6c9a2f41deb80d8a libdrm-devel-2.4.121-1.el9.x86_64.rpm 1aed8cbfad9a0b8e7792a7fdb4bb8e87dda234d7a1fa043637b8a60e51f66296 RLBA-2024:9183 netavark bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for netavark. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms netavark-1.12.2-1.el9.x86_64.rpm 7718230c7bd867887bd35f048109ee9091f258a603d75be37a5d6dafd0893dd2 RLSA-2024:9185 Moderate: iperf3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for iperf3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Iperf is a tool which can measure maximum TCP bandwidth and tune various parameters and UDP characteristics. Iperf reports bandwidth, delay jitter, and data-gram loss. Security Fix(es): * iperf3: possible denial of service (CVE-2023-7250,ESNET-SECADV-2023-0002) * iperf3: vulnerable to marvin attack if the authentication option is used (CVE-2024-26306) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms iperf3-3.9-13.el9_5.1.i686.rpm a87e81f2ffbf3bc1dd8a4f56d4330d16e03c2e31d7de92526907c6ab7135358c iperf3-3.9-13.el9_5.1.x86_64.rpm 1b622b64bfe74b11ae8e2eea032fe02e3935811aa6eac7569332f00b59c90153 RLSA-2024:9188 Low: bpftrace security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for bpftrace. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list BPFtrace is a high-level tracing language for Linux enhanced Berkeley Packet Filter (eBPF) available in recent Linux kernels (4.x). BPFtrace uses LLVM as a backend to compile scripts to BPF-bytecode and makes use of BCC for interacting with the Linux BPF system, as well as existing Linux tracing capabilities: kernel dynamic tracing (kprobes), user-level dynamic tracing (uprobes), and tracepoints. The BPFtrace language is inspired by awk and C, and predecessor tracers such as DTrace and SystemTap Security Fix(es): * bpftrace: unprivileged users can force loading of compromised linux headers (CVE-2024-2313) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms bpftrace-0.21.1-1.el9.x86_64.rpm 48699b70edc61e55465bff69eaa62721ca2158bddf0f5967fce1cda7b6401864 RLEA-2024:9191 butane bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for butane. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms butane-0.21.0-1.el9.x86_64.rpm 003c266168b8d95a05e880a16e863dcfc0fb02e4b9ea4e4be5dc0349fae970f7 RLSA-2024:9195 Moderate: cyrus-imapd security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for cyrus-imapd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cyrus-imapd packages contain a high-performance mail server with IMAP, POP3, NNTP, and SIEVE support. Security Fix(es): * cyrus-imapd: unbounded memory allocation by sending many LITERALs in a single command (CVE-2024-34055) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cyrus-imapd-3.4.8-1.el9.x86_64.rpm 7bbd025530a822c1f01c9cac198e1e11ca5c96190b8985bf7350468ecfdc6c6a cyrus-imapd-libs-3.4.8-1.el9.i686.rpm a7ceff4e3e525445386188cae9c411838c78a7ea71ec126e45e975762c24dc61 cyrus-imapd-libs-3.4.8-1.el9.x86_64.rpm 8b5815420dcd052e1ffb9f73350af12f31efea2b850808ee4934f96c69bbbeda cyrus-imapd-utils-3.4.8-1.el9.x86_64.rpm e399ae41e7cb48368cae9d9dda208361c39977a16f0271f73485617486d0790b perl-Cyrus-3.4.8-1.el9.x86_64.rpm 3cc9133cfe5c09bc3503fb06c4824a2ca0da824e932fdd0286449c415addf651 RLSA-2024:9200 Moderate: runc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for runc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime. Security Fix(es): * golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms runc-1.1.13-4.el9.x86_64.rpm 54327ec4197f58638f293d876927cc3a8d7add804f8bff9ff5c04890121dad7a RLEA-2024:9201 gdb bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gdb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gdb-14.2-3.el9.x86_64.rpm efc3a39b1747ba62852827facc06821c5288795c0c64ade4cf75cf9292034495 gdb-doc-14.2-3.el9.noarch.rpm b3182d00ec1bcc4a3beef5d98e502ba539ce7dc4c793904d45e17d3e6a48aab5 gdb-gdbserver-14.2-3.el9.x86_64.rpm ff840f6ca80512e9644a1e1468f892382cb23466982b68cd1c268fdda7466832 gdb-headless-14.2-3.el9.x86_64.rpm 72f9104b7f3102ff2f4be7839158f75127d0d907ebb94045baeabaf864a31a57 gdb-minimal-14.2-3.el9.x86_64.rpm fa7ecd713b0cb7d42ea3715db88635837e438550f90a832d36535dca14b3e19e RLBA-2024:9203 xalan-j2 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for xalan-j2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms xalan-j2-2.7.2-11.el9.noarch.rpm 5b432a1c50e11aeb4f8b863e64a5afafbb76b87b68a9fb3bc97f1d2b91c8dc0f RLBA-2024:9205 libvirt-python bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libvirt-python. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-libvirt-10.5.0-1.el9.x86_64.rpm e185b00895708101ac4da58896f66f551981cca59a845dc16fe617cf931acb9e RLEA-2024:9212 rust-afterburn bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-afterburn. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms afterburn-5.6.0-1.el9.x86_64.rpm 6b5c4b0fecbae6d79ab8dea29bcb3da1ea9670b7c4001bd1b35a294a1e4d58c5 afterburn-dracut-5.6.0-1.el9.x86_64.rpm 0ca50af1b28f2a2a808ce12bba9ca5e68445afc415cea4497098a597f876f35b RLBA-2024:9213 gnome-online-accounts bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gnome-online-accounts. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gnome-online-accounts-3.40.0-7.el9.i686.rpm d10e8d0110f858e8f5979568a666aa9000a61d2e6f3891e7a4440bbe714364f3 gnome-online-accounts-3.40.0-7.el9.x86_64.rpm 171415c7c37720a2c2f02bc63febf205dec7e745b61be14477f3adeac88e8300 gnome-online-accounts-devel-3.40.0-7.el9.i686.rpm fc737da48e465d792d17a0b96e3aa344a7d5ac7f49210474bf5addc9b4efbe61 gnome-online-accounts-devel-3.40.0-7.el9.x86_64.rpm 528fe031c40114c0d24e85aff95b61fdb4703962e6f9210fae1b9ffc1ec07a2f RLBA-2024:9218 alsa-lib bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-lib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms alsa-lib-1.2.12-1.el9.i686.rpm d2e9961069c999fea3e45a171120e6c84684ce4b72e657e887a72faa4c506992 alsa-lib-1.2.12-1.el9.x86_64.rpm 12e71303e6c59d10f1ff9f4490d92ec50b5653a6d86cab0d6642f80c3466ead0 alsa-lib-devel-1.2.12-1.el9.i686.rpm 36a50bd294e6d35b11bcff177d0649df53e9e080fa40ba467a1880e5ee6e3347 alsa-lib-devel-1.2.12-1.el9.x86_64.rpm 4c1934ce998cad36e4539da9a74e399b17f672ce19fac200e6c2a272a5913f84 alsa-ucm-1.2.12-1.el9.noarch.rpm 6b906970bbe4e45d4c0e661e76cb5958bd1e699f4ba3bbf74e7252eec8dbaf08 RLBA-2024:9216 ansible-freeipa bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-freeipa. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ansible-freeipa-1.13.2-1.el9.noarch.rpm 73a3a573e19d436b782269e2d995a75488de1ff60c1e8b24713aa1d41d19e88a ansible-freeipa-collection-1.13.2-1.el9.noarch.rpm 1bfcbb0dbc7dac5d53bcbfc22aa4c8991808832149630044c4dab5bcccd0411a ansible-freeipa-tests-1.13.2-1.el9.noarch.rpm c31aadb7a0f923114ba68e7aec8651736f4054c56128209bcfffc2642352ba33 RLBA-2024:9219 pki-core bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pki-core. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms idm-pki-acme-11.5.1-1.el9.noarch.rpm 8602ae265875c43ac837b6f249ba227d8eeb1aa8b5e5afbd4599943ba78dbb61 idm-pki-base-11.5.1-1.el9.noarch.rpm f0807009ec76c37c84caffdb8d8963a100f494c27e699d61f03e54ed057f0209 idm-pki-ca-11.5.1-1.el9.noarch.rpm 2d1e179b96697613e4147e5968a0c86cdf8b8410973000eeac9294784a22df34 idm-pki-est-11.5.1-1.el9.noarch.rpm 036dafcd640cf1ccc8a554281d379d33e053283f05b4519f9726078942a23775 idm-pki-java-11.5.1-1.el9.noarch.rpm 2106627a855e3519945a5109a5edd104689790155356c863f018ac407007c280 idm-pki-kra-11.5.1-1.el9.noarch.rpm 4b5e1cad6cff6b725ef046a808199f7995619829ad9b46831fdf61b048d4d123 idm-pki-server-11.5.1-1.el9.noarch.rpm fc0358cf26d488bc403c33964a667265cebe02e4370b62bf7182b0d8dc60a704 idm-pki-tools-11.5.1-1.el9.x86_64.rpm 631069217d2d1ad089d7f07090098cb0371aaf0bf5c5e586dd4adfa3e92adc94 python3-idm-pki-11.5.1-1.el9.noarch.rpm 37c3d6831e995c8bf0b1c70e6e76f6ddd3eac0239b6b0cd11effd809cb52463c RLBA-2024:9226 mstflint bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mstflint. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mstflint-4.26.0-2.el9.x86_64.rpm 567a6880f5c753f49e791c28a434f9f5f8885a5729c3a7d546f569878cfca98a RLBA-2024:9228 python-virt-firmware bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-virt-firmware. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-virt-firmware-24.7-1.el9.noarch.rpm 4f36a38a5aedc7a8fa6147bd6660ca71589d5f3e74e8f0ef6885634fd07a0a55 uki-direct-24.7-1.el9.noarch.rpm afd47dbc675187b73cd5686629c6b876a7060d4ca9f878d24f2d12b3018dfa04 RLBA-2024:9229 cockpit-files bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cockpit-files. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cockpit-files-6-1.el9.noarch.rpm 67fb67b09d32a4cf5088b05949d173a0e8ed2970318b8a5d3b5504f4956ec450 RLBA-2024:9234 virtiofsd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virtiofsd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virtiofsd-1.11.1-1.el9.x86_64.rpm 38b9908a0400a17179a13ad3fff0a8968e3d3249ea150e1d719919682c114f1a RLBA-2024:9246 redhat-rpm-config bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for redhat-rpm-config. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms redhat-rpm-config-208-1.el9.noarch.rpm 2eb40f56065ca479c4e9404c9e27fe3b9a9823f19bf0d1ec791260ca5830c96b RLEA-2024:9250 annobin bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for annobin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms annobin-12.65-1.el9.x86_64.rpm 753e376946474deb51a5c7cdf490b14048cd4400b88d9b4f7b7ab98ce9bedaaf annobin-annocheck-12.65-1.el9.i686.rpm 391fc07da7f5349eadfe44138878d469e4c48320d92017280fdc7bf392eeea97 annobin-annocheck-12.65-1.el9.x86_64.rpm a0e657bc615ccc540dc92daba5feace1af6328ab5d422601bcb42bebc02adb52 RLBA-2024:9251 gcc-toolset-13-annobin bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gcc-toolset-13-annobin. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-13-annobin-annocheck-12.69-1.el9.x86_64.rpm 9b99947e4fac85b00f9d8e9a796cec21feb5d936cbb5da97b81f2ba8aada9b9c gcc-toolset-13-annobin-docs-12.69-1.el9.noarch.rpm 6b626e255444ca214a452c2dc08d2b80fdd705367c8028d7ab7690ca07d24bc9 gcc-toolset-13-annobin-plugin-gcc-12.69-1.el9.x86_64.rpm 1d81a1293a8976dabe541867d24d347380a8199b3cd3234bc713557059893a8e RLEA-2024:9259 rust-coreos-installer bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust-coreos-installer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms coreos-installer-0.22.1-1.el9.x86_64.rpm 85770f887c09f61acf1ff2039639e203c84226660435f96ba377a9b7ffad9472 coreos-installer-bootinfra-0.22.1-1.el9.x86_64.rpm a47b07324400d8e26e2a38964a5d0337487bca111050ac64af67870d66d2d3ff coreos-installer-dracut-0.22.1-1.el9.x86_64.rpm 1c4a0141163c11b8674dc6a942f58dfa9123225360cc10f496e823e206ec5e49 RLBA-2022:2328 new packages: pipewire Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pipewire. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pipewire-0.3.47-2.el9.i686.rpm 5959f4c9795565db471cb48285baa8cedb1523edb0a49a85fc24e5e0f9fdf932 pipewire-0.3.47-2.el9.x86_64.rpm 3de3a83596a47b935d33bdc0bd66090295b02239b0cb1bea4cccf3958d3f6df8 pipewire-alsa-0.3.47-2.el9.i686.rpm 306f3e302d86f97336fc3ce58c941c65156c20afc2df2053945494a6dea290ca pipewire-alsa-0.3.47-2.el9.x86_64.rpm fe6b1e032263d0d7c4aaaec9eeb4913b24d03794de30f40bf88e6d2d8e443f47 pipewire-devel-0.3.47-2.el9.i686.rpm 803c0900add1cc0bdf16964d4d42a74ca9bfe1db88ba897741640618b4a30768 pipewire-devel-0.3.47-2.el9.x86_64.rpm 1b80dbba8c30cde1f574587f158a11c50815b699cbb59ec19d25b6ae34d4c781 pipewire-gstreamer-0.3.47-2.el9.i686.rpm 176368d405004d1be22432a1fdd2c7856c6ac42c82d4d41646f91189c4ea16c5 pipewire-gstreamer-0.3.47-2.el9.x86_64.rpm 07019486ea9968f3fcfa2436370b1065673c510f872285a5d6363cab5d9e0160 pipewire-jack-audio-connection-kit-0.3.47-2.el9.i686.rpm 92c3f5ab981bc430c21102c2ff04f0dba8e8f06a3b17b899768ba6eb6b804e82 pipewire-jack-audio-connection-kit-0.3.47-2.el9.x86_64.rpm aa7ea3528e16a8af6aabf7b4f300548ba25eb56c4a0ca82a9d22603e2eed029f pipewire-jack-audio-connection-kit-devel-0.3.47-2.el9.i686.rpm a501d458ae5a43c3c1c1c5a40f98cbf7d74e20b31928b158dadba80ad838ad0c pipewire-jack-audio-connection-kit-devel-0.3.47-2.el9.x86_64.rpm 6bc6089139b156c5afa64891e6395fbf7a4d84fbb835569093ea6908e699b43c pipewire-libs-0.3.47-2.el9.i686.rpm 6dff526d939f72cc31545a2d83142787f555fcb7f29805160d2b16d19e7fca5a pipewire-libs-0.3.47-2.el9.x86_64.rpm 0c2d96713249488829737d7107396fdc566f87031931ed105623bcadd44cbcef pipewire-pulseaudio-0.3.47-2.el9.x86_64.rpm 7415b8fde19ea9bb78959a7fcc30e945f07bbd05643a56efe60138c7a86ab00f pipewire-utils-0.3.47-2.el9.x86_64.rpm 01de374851cb6f1989858bfba16cf220b38141da9da1e4cf9c4d54e4bdba65ee RLBA-2024:9260 libreswan bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libreswan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Beta Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libreswan-4.15-3.el9.x86_64.rpm 2c46920a48dc0b236f33854375275656ab2949b0eb52700f01a01e11d081fe80 RLBA-2024:9261 go-rpm-macros bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for go-rpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms go-filesystem-3.6.0-3.el9.x86_64.rpm 20c51fdc0f44014214d9e2a0bb660e7cf0ef47049e4377b26e451f9444d0fe94 go-rpm-macros-3.6.0-3.el9.x86_64.rpm bb18e03db9690b1c394ad9ba057d024113183a08e8b3735cc626323e97fc4dfb go-rpm-templates-3.6.0-3.el9.noarch.rpm e65a440ff0fdd2547ca730b1357953a7cb64937c307371db2166a1eb97a93aca go-srpm-macros-3.6.0-3.el9.noarch.rpm 4e1b0d8ab6cb3e74aab9202d07adb27cc5a93b8c27599b7407f733c612af4fc2 RLBA-2024:9262 rear bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rear. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rear-2.6-25.el9.x86_64.rpm e4b2183b0d9d878c951fcc07b6b0c5e3295a626bf049139396197e7ecf7e362b RLBA-2024:9264 gvisor-tap-vsock bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for gvisor-tap-vsock. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms gvisor-tap-vsock-0.7.5-1.el9.x86_64.rpm abc4c668dc8b5a935cbe7c634cfab5e552aea2a46dde8266665cb50a2491cdfb RLBA-2024:9268 osinfo-db bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for osinfo-db. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms osinfo-db-20240701-2.el9.noarch.rpm 3335d41f2b595bc9e5775b1836062dbaddda5cbdcfd08e9ec31db987e1f86b5e RLBA-2024:9269 linuxptp bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for linuxptp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms linuxptp-4.2-3.el9_5.1.x86_64.rpm 82b5dccbd82868fc3a2f1ca90834c5fd7b6a4c9ea37c4f0f6cbc1317cdeaecb1 RLBA-2024:9273 alsa-utils bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-utils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms alsa-utils-1.2.12-1.el9.x86_64.rpm 97bbb7e44341d3c29fbc95bfcf8c76f5225bb9b73f375db1d9ce62545d69f28b RLSA-2024:9277 Moderate: oci-seccomp-bpf-hook security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for oci-seccomp-bpf-hook. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OCI Hook to generate seccomp json files based on EBF syscalls used by container oci-seccomp-bpf-hook provides a library for applications looking to use the Container Pod concept popularized by Kubernetes. Security Fix(es): * golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms oci-seccomp-bpf-hook-1.2.10-2.el9.x86_64.rpm 3b8f6f2231e8db059486d3a3574ac80307d3271380e7821109226a3bee51e9ec RLBA-2024:9295 composefs bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for composefs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms composefs-1.0.5-1.el9.x86_64.rpm 4b76180274303a9efe85a162cf13b7c3f3d46fca52f7549b5d31c6c00912b8da composefs-libs-1.0.5-1.el9.i686.rpm a3395e2aab54f42d0cb4a6a7398c0ea0ee91a866ef903652a6421c44e9b856bf composefs-libs-1.0.5-1.el9.x86_64.rpm 0f27a0911d943492a9ea957bbde6a6f9c94782b652d6daf3c9a096d31aac62c0 RLBA-2024:9298 tomcat bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tomcat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms tomcat-9.0.87-2.el9.noarch.rpm fe9333e1c43aba7846f0ce478eb5f555dd684ce81e3f39c7c17e535895fd4d3a tomcat-admin-webapps-9.0.87-2.el9.noarch.rpm b175cbcaee57d48b9396b80e39c976f5ccd9be254300779e9786cf3f86e1f8ee tomcat-docs-webapp-9.0.87-2.el9.noarch.rpm 9e5cc3a8e03b233f33f6ca91fe283280e074501e70b45a16f2fb326a3abb37d9 tomcat-el-3.0-api-9.0.87-2.el9.noarch.rpm 7cb2d6c38304a52641989eb1b6648e27d9213b9279002c40d6de2898c3d1e0ec tomcat-jsp-2.3-api-9.0.87-2.el9.noarch.rpm 9fba32b19e10d444445e646d824f8566daa84fbae2cd0cf97e02983e22362df4 tomcat-lib-9.0.87-2.el9.noarch.rpm eadaa69f8091ae5b983e405c50da2b9e9e82e2871b24a5d29153669c84da024b tomcat-servlet-4.0-api-9.0.87-2.el9.noarch.rpm 0ebcaccb1094e089bedd1bce070cef3f1838cb623d0dc4d74c51d2bd4125ac3f tomcat-webapps-9.0.87-2.el9.noarch.rpm aa9967616be9c7ef7e6a6f578b16664d0fec5f529aec06ba72f35c9e9e7c0795 RLBA-2024:9297 guestfs-tools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for guestfs-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms guestfs-tools-1.51.6-5.el9.x86_64.rpm 2d5690fcbcc3b0e2de9302d36652e9a8663d39c9e9f990550a59fca5fcb3d1eb virt-win-reg-1.51.6-5.el9.noarch.rpm 3820d261273d377065fad9a40fd250954ea6004b5bd3e7c929a8874474a68bd4 RLBA-2024:9304 rasdaemon bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rasdaemon. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rasdaemon-0.6.7-15.el9.x86_64.rpm f8cfcacc12b00a84e66ccce45406e71110a80d6abae0ad20e140093f79f22a8b RLSA-2024:9306 Moderate: httpd security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: HTTP response splitting (CVE-2023-38709) * httpd: HTTP Response Splitting in multiple modules (CVE-2024-24795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms httpd-2.4.62-1.el9.x86_64.rpm e41b3aa9f1a465710e67929e7cfbbd51dea641b8e1c0fd2fe5b8558c8cad0569 httpd-core-2.4.62-1.el9.x86_64.rpm 153367ba0db800b2ee61ad674b3d170f0d2bba426e9e3d3e091a2018d54a87de httpd-devel-2.4.62-1.el9.x86_64.rpm 025ed9fb5f3f7a1c30360e1be47f924bcfe0bd05f51af9bdbe90c58150d5828d httpd-filesystem-2.4.62-1.el9.noarch.rpm 6588c09fd00a8657551b9e944fefe00e69611eb42cf8455e6367cf1331c2b43e httpd-manual-2.4.62-1.el9.noarch.rpm 5e18b1e6b69cb9c61943ffdf71e9ee546d0e0dbb04618b8198d112467f1a919c httpd-tools-2.4.62-1.el9.x86_64.rpm 9805a08f14ddd02831c89707ec82c82de6ba52eb7feee5568628404ce92d46c4 mod_ldap-2.4.62-1.el9.x86_64.rpm 46a12528649e72619b3fcc551fd1ee986cc5a34f63485483d257921f1ffcf244 mod_lua-2.4.62-1.el9.x86_64.rpm 53186365853438f2059a58e74a3bfc2adc445afef608294ee187ea12ac62ae92 mod_proxy_html-2.4.62-1.el9.x86_64.rpm beb57999a626002a2aabaa5d944fd8bb2d9efcb9cc1ae1184f39da64d183740d mod_session-2.4.62-1.el9.x86_64.rpm 001473eb8226a1c52e23ea92967e84903f4ff5206c394e3f41b8252b86cc00f8 mod_ssl-2.4.62-1.el9.x86_64.rpm 3813ce9aa737852df5ce04559173767bddd6f67da94b0395db7d3a40feec42f9 RLBA-2024:9455 fence-agents bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Bug Fix(es): * fence_scsi agents results in failures with less number of registration keys over multipath devices [rhel-9.5.z] (JIRA:Rocky Linux-59882) rocky-linux-9-x86-64-appstream-rpms fence-agents-common-4.10.0-76.el9_5.1.noarch.rpm 13c57d0c0179a22f20094d3999e4ededfeb1ccdd5c58b41b6921832be3139ffb fence-agents-compute-4.10.0-76.el9_5.1.x86_64.rpm 1cebfa38f6802d639582bc993e76663aa6d2d3d96b4a0bdf573932156df6a392 fence-agents-ibm-powervs-4.10.0-76.el9_5.1.noarch.rpm c718900a74741da9541eb30c1dacb6e9fa1fabc20d9aa8113b10bdb7142b62bb fence-agents-ibm-vpc-4.10.0-76.el9_5.1.noarch.rpm 979972ccc0dc6371ed7aa5888cb810c7c4d3a1ac6be3cfb2eb9e6a6ee382e704 fence-agents-kubevirt-4.10.0-76.el9_5.1.x86_64.rpm 8e7a84e36d56b29c115ef6ff1ce914bc9feba4c2fea9f60a73869c82fade5b1b fence-agents-virsh-4.10.0-76.el9_5.1.noarch.rpm 90370d312da6f5a01fc3e683fd266accce5313b03cf938eac11a6e3ea8c3e073 fence-virt-4.10.0-76.el9_5.1.x86_64.rpm 408112bfa50d8d99a3a1081008428254532c7964c4bac5aa220f0f8455c4ff43 fence-virtd-4.10.0-76.el9_5.1.x86_64.rpm b42a2c3b074f0f14241c9e798f32469351f236f93049f3d984bae92db82923ba fence-virtd-cpg-4.10.0-76.el9_5.1.x86_64.rpm 24d4dfb0ea048c3ddc63b9fad0265ef8dc5d69740dbc47dffd73ed9ae8d092b6 fence-virtd-libvirt-4.10.0-76.el9_5.1.x86_64.rpm 3d16376833af531b2e8c6ca168370b539486e5199c3ec3ccb848d612288ec4f9 fence-virtd-multicast-4.10.0-76.el9_5.1.x86_64.rpm 3a42cbf09e1a2e1cf984a0df6412c8a5a0d2fcabd8697b8dafcc2605b82672dd fence-virtd-serial-4.10.0-76.el9_5.1.x86_64.rpm 1b6d159a4422a8015a506059e74865c51ff848e0936a8af5bd6c6fc22e2242f4 fence-virtd-tcp-4.10.0-76.el9_5.1.x86_64.rpm fe5accd323eadead37a910fb95b5b0572500cb76231d54cd5459fd27dcc35c03 RLSA-2024:9452 Moderate: pcp security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Performance Co-Pilot (PCP) is a suite of tools, services, and libraries for acquisition, archiving, and analysis of system-level performance measurements. Its light-weight distributed architecture makes it particularly well-suited to centralized analysis of complex systems. Security Fix(es): * pcp: pmpost symlink attack allows escalating pcp to root user (CVE-2024-45770) * pcp: pmcd heap corruption through metric pmstore operations (CVE-2024-45769) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms pcp-6.2.2-7.el9_5.x86_64.rpm c518cda520d769515b154bc7ba0da017c8fc45aa9e31ed354dd70c24cbc05ea6 pcp-conf-6.2.2-7.el9_5.x86_64.rpm 9ff8328f8dd8c482be84deccc0f69c3633de744bc1d2f53ca7c192ab8a74276e pcp-devel-6.2.2-7.el9_5.i686.rpm 2950ec76bdd0922be66d1ebc95da6cd9c55b7d991692d9e787716adc09858c56 pcp-devel-6.2.2-7.el9_5.x86_64.rpm 3216e1e4fe77f38e60e6950fc06229e7899415100b3162c91e97acb8d18ec40f pcp-doc-6.2.2-7.el9_5.noarch.rpm c8763d215d2777ac860f3c2694bb346687fb0378e84111be2c61cc4b0198e6f3 pcp-export-pcp2elasticsearch-6.2.2-7.el9_5.x86_64.rpm a5f92aafcc4232366049f136f18dd52ec09d6d007229d6424a08d56ca3dc165c pcp-export-pcp2graphite-6.2.2-7.el9_5.x86_64.rpm bbf0840d7fdcfff2190f48e1017d6fabeccaa259827a4c8dfe00e7ce3ccb3b10 pcp-export-pcp2influxdb-6.2.2-7.el9_5.x86_64.rpm 52ff587401399cd95c194d49a0380c1c9cfb22c06da20830d294216134734333 pcp-export-pcp2json-6.2.2-7.el9_5.x86_64.rpm c6d03d5d20fe4e769fee6a314c55a2b587510784306d457fb0d2f2ea93e9df05 pcp-export-pcp2openmetrics-6.2.2-7.el9_5.x86_64.rpm 00e58ced8729c243a770a30fdfbd4952eba785b6577363523c69c91f3c97df17 pcp-export-pcp2spark-6.2.2-7.el9_5.x86_64.rpm 61879f4d89c2f1d47eb8a26e895732985602ad80b6c9828724ce9e8989707ccc pcp-export-pcp2xml-6.2.2-7.el9_5.x86_64.rpm 4206efe6202f92b8f21800a182eccf796b6ac0fbe4d49416958835ae70f85457 pcp-export-pcp2zabbix-6.2.2-7.el9_5.x86_64.rpm fbe6bb40a1fe518b35edd073b1404802694ddfd80f1753d89c5498b81b954153 pcp-export-zabbix-agent-6.2.2-7.el9_5.x86_64.rpm a366308a2e94e39bd7d4a9876540301b46a14cc852b0528e43b90af9d86fbe1c pcp-geolocate-6.2.2-7.el9_5.x86_64.rpm 88dc85f14f88dc2eb098d89daa5ad863234d9063274aa248f62baeddd48fb295 pcp-gui-6.2.2-7.el9_5.x86_64.rpm 6ab187fb6503ec6c0ff9cf66e2739925ba7ac24718c2c549604639bce667361b pcp-import-collectl2pcp-6.2.2-7.el9_5.x86_64.rpm 57fac75c87bb0a268c4676f5ab3ab6108640a83a1bcbb1d152a0848d1a40b9fe pcp-import-ganglia2pcp-6.2.2-7.el9_5.x86_64.rpm f72a8f0012dbb048dc4f073c80e979277b578c183102935ff52518f89ac6fcb6 pcp-import-iostat2pcp-6.2.2-7.el9_5.x86_64.rpm b4411306d7d8d81264db000889ceb838838dd651144b6b5806bf851d4cc65fed pcp-import-mrtg2pcp-6.2.2-7.el9_5.x86_64.rpm 7b429ca42650ba9f08eb7aa2e08bb6374a359124ecd30594c16dfa36adb15d36 pcp-import-sar2pcp-6.2.2-7.el9_5.x86_64.rpm 77b4766ea5d94927799569af3e415bc0d792eb1efbe1d0a8afb7c13ce604d295 pcp-libs-6.2.2-7.el9_5.i686.rpm 9ea127b5a1b8a9c4cf4ae2781d3d420923f6fcaf3dbb544cddd1dcf5417df09d pcp-libs-6.2.2-7.el9_5.x86_64.rpm f5d608a45fe19057bb7bcf36150d31a2af945df0c1ade5ca1e852c15a9c373d0 pcp-libs-devel-6.2.2-7.el9_5.i686.rpm 952af36728e41b5c8809f9c8c70fce3718139477e1b8a2de84d8504071e16dab pcp-libs-devel-6.2.2-7.el9_5.x86_64.rpm 8294b10dbae8886bff628dc3a707ed732fa0d3573551cbcbd6a8b6947b433b1a pcp-pmda-activemq-6.2.2-7.el9_5.x86_64.rpm 0ea621256d10027880fe6603f4fda131169d2a4ba07e1a6a7a5d3075c68ca6e2 pcp-pmda-apache-6.2.2-7.el9_5.x86_64.rpm 84f6add58a6d3ea32e791e6b1ab30c410a0ea7ec6cca690be55ffbcce3fa5561 pcp-pmda-bash-6.2.2-7.el9_5.x86_64.rpm 1921c2f22cfce662e9a36a28ad991ca8baa06842e50386a37dd2029a4f38f7c9 pcp-pmda-bcc-6.2.2-7.el9_5.x86_64.rpm 9a9787944e48d2f5cc7965089b63b7211536352403c32edd7e6bd1cdc6a55938 pcp-pmda-bind2-6.2.2-7.el9_5.x86_64.rpm 9b296e30f5d69b57a40b30de2e154c58550c29f312922d726008fa5b2406ad37 pcp-pmda-bonding-6.2.2-7.el9_5.x86_64.rpm c81ce938a05e713c1d2ea08b3d7affb0eb23ebaa72f612a1e8e0f5d3cfda18a8 pcp-pmda-bpf-6.2.2-7.el9_5.x86_64.rpm 9c00fdfd050995039045d6cf3dd6a3b5231e645ea20ee712d42f1e054cab88c9 pcp-pmda-bpftrace-6.2.2-7.el9_5.x86_64.rpm fcc36e30b3402550d4b19c59a6727272919fca27a3efc70b6e129454aa1b81c5 pcp-pmda-cifs-6.2.2-7.el9_5.x86_64.rpm 4b3150eac97a24843e00f25b71f3f7d89e26a6cab7999306f6c24d646f20e90f pcp-pmda-cisco-6.2.2-7.el9_5.x86_64.rpm b94a46d63e46450e12b6cbb8fcdd356fbf379e6ed6d61aca811cd3993725e04a pcp-pmda-dbping-6.2.2-7.el9_5.x86_64.rpm 34dbf5da6024ce245081408bf994531f329c79e7ff783b8a6f77571ba0467850 pcp-pmda-denki-6.2.2-7.el9_5.x86_64.rpm 56d305f4aa861c63ddf0d7a420c76c776d161b42a4550169d650ec359c2b5ec4 pcp-pmda-dm-6.2.2-7.el9_5.x86_64.rpm e70a130d182b42cd2e6858499f0681814ab261c39eee2b98f94f5a4e46b35edd pcp-pmda-docker-6.2.2-7.el9_5.x86_64.rpm 41f96f7f9c6b0a01dff002dd738e91173b68f7234f584cc35e80409a3a0dcf5e pcp-pmda-ds389-6.2.2-7.el9_5.x86_64.rpm 30ce8751ad4b0608502610fe347365af067cf4c95879bf2b06f3dd63f977464e pcp-pmda-ds389log-6.2.2-7.el9_5.x86_64.rpm ce4db354ff15b60989917f1b54ba96fd52c7fbfab1c605535362bbc82ca0cd2b pcp-pmda-elasticsearch-6.2.2-7.el9_5.x86_64.rpm 461c0cd64cde189a4999fae2a318d08d715ce42458f476fa5c698662f4d63f2a pcp-pmda-farm-6.2.2-7.el9_5.x86_64.rpm b0be29b76fc7d794ce15ade8bb112bd58cf1ecd5d5993e1ac27d5126c443d41e pcp-pmda-gfs2-6.2.2-7.el9_5.x86_64.rpm b5ffa0f25839b288ed11c85c7faef3063104da2dc517f8aa30b0551b567380fa pcp-pmda-gluster-6.2.2-7.el9_5.x86_64.rpm 4afb931bc9656c20cce7860bd713aee9fc0179574e32e647cde1f5e5306078f0 pcp-pmda-gpfs-6.2.2-7.el9_5.x86_64.rpm e335130a3b3ca65f0992c35e86ea9d330827103783d95521b029256b25ae7f0d pcp-pmda-gpsd-6.2.2-7.el9_5.x86_64.rpm e5a6409f5c1b45b86094bbf5e6ce738d024b443255300cdf00c4cbc905c6f70d pcp-pmda-hacluster-6.2.2-7.el9_5.x86_64.rpm 99762005f2ba50deb066b4a9ef1e255f7479170477cefea4b234f5af6e0514a1 pcp-pmda-haproxy-6.2.2-7.el9_5.x86_64.rpm 104b0262e28796c55778eab02ce2690ebc282ee3e31565a067c9bdda36153184 pcp-pmda-infiniband-6.2.2-7.el9_5.x86_64.rpm 14faa4924cabc3027565982cc7ee32a34f87064f6a3faa0b82dc800a5a79848f pcp-pmda-json-6.2.2-7.el9_5.x86_64.rpm 68100b1d6fe5f445f79a2d661dac30668405087ad69d2e5e178dc81191781d89 pcp-pmda-libvirt-6.2.2-7.el9_5.x86_64.rpm 1c435292ee52e544f6d8594da3a093000c22eb29faccb5685533e5a2f2eeaaca pcp-pmda-lio-6.2.2-7.el9_5.x86_64.rpm eb0b74064c69b6eec7ce305a5f2f70cb97df2e99634f9bb7b0be7c4e9434e948 pcp-pmda-lmsensors-6.2.2-7.el9_5.x86_64.rpm 6f8168e8d62139b2ea7aa26bc120f56ae6ecd4484e0764d622bbe79dc8db799c pcp-pmda-logger-6.2.2-7.el9_5.x86_64.rpm 24d705e5f7ec79db333cd9f6daa9648f0a624282e1c038faccd650419fdb4287 pcp-pmda-lustre-6.2.2-7.el9_5.x86_64.rpm 2ab54989657ebf60d7786de60eb2fc7e52c3cec159ae12c6dc37907cc13f1c76 pcp-pmda-lustrecomm-6.2.2-7.el9_5.x86_64.rpm 4eb2e1a5c0affe46a7fec5b0ebedb589e29a8b7c5939531530ba8610b59ed3e4 pcp-pmda-mailq-6.2.2-7.el9_5.x86_64.rpm 390b7e7d380c776aacd03a1263d40bcd1ceba6e059dceffda900a0defb54e14a pcp-pmda-memcache-6.2.2-7.el9_5.x86_64.rpm 97e8ca2dfbb1af246d2014e3c9f23e9691ac2c7568b0c3b74deb2d1db34c52b4 pcp-pmda-mic-6.2.2-7.el9_5.x86_64.rpm 8a444b656b36e04976337715cd095a0b181ea4cfe8404879ed56aa9832930bbf pcp-pmda-mongodb-6.2.2-7.el9_5.x86_64.rpm aec38b4122d9826dd5bd57bff88e62d0e6cc83088776192966234314a59ccc87 pcp-pmda-mounts-6.2.2-7.el9_5.x86_64.rpm 529daa1201ef0751ad8e148a2e9183d3f5243e659cd71f1633000d67b8f924be pcp-pmda-mssql-6.2.2-7.el9_5.x86_64.rpm 9ca30c3cc9d554b0f83498d07f536dfe130f02e98a3ee32f9ee78150098447ad pcp-pmda-mysql-6.2.2-7.el9_5.x86_64.rpm b227da142819eee934c170b7a75e5aa93d202c72229261413803d18c68929a91 pcp-pmda-named-6.2.2-7.el9_5.x86_64.rpm 5c6aabfbef9c9e008c32501d322e72a5df5dbcebedb1c324370c9f9d232524ea pcp-pmda-netcheck-6.2.2-7.el9_5.x86_64.rpm 3316513ca98f554bb7d40cceb07a7a4436a2bf88724b3c36ddb55d081e786015 pcp-pmda-netfilter-6.2.2-7.el9_5.x86_64.rpm 7970d28a5ff622977f7a090ee8d1ff92d963e602d8998211617735efda8bef69 pcp-pmda-news-6.2.2-7.el9_5.x86_64.rpm ef1add1352d3d374601a97e869bc50d922d39b30da5978342c666fbf629e9c08 pcp-pmda-nfsclient-6.2.2-7.el9_5.x86_64.rpm ef5d576427665a25794d8ff03ef1b16947257167625983131bcf31fc1f2b1fc2 pcp-pmda-nginx-6.2.2-7.el9_5.x86_64.rpm 8c20ef97403740c2985263a8f4865a1ea1c9f42aadc1cf15289c62ad6d89d4bb pcp-pmda-nvidia-gpu-6.2.2-7.el9_5.x86_64.rpm 71093c657cfe20b7be22ec19a4d1dc66664ea7297eaf46adbfc51332a4fc22c3 pcp-pmda-openmetrics-6.2.2-7.el9_5.x86_64.rpm 1d38e46df4390e79e456235acb7fb6b3ad7c91e83b43f54a1c7475143a2c28ee pcp-pmda-openvswitch-6.2.2-7.el9_5.x86_64.rpm 1bd507ef8a1b40ac7b56d98f727edf2062e80efb5668226f22d55539161bcafb pcp-pmda-oracle-6.2.2-7.el9_5.x86_64.rpm 0ba66ec881cb58f350dbeb8afad56255d5dc7786569a26abfe0d78d0028898b6 pcp-pmda-pdns-6.2.2-7.el9_5.x86_64.rpm 12d3be683f68ebe8a58c68310dd18ed2131d83c7ce936396e569079fcfb2d2e6 pcp-pmda-perfevent-6.2.2-7.el9_5.x86_64.rpm 168666ae1f996830d23fbbf8d19a6a19fde74ba92f7973e14118d405ca374039 pcp-pmda-podman-6.2.2-7.el9_5.x86_64.rpm 7657f9178ffac703b409f959696fa5590e040218385df09cd2ed9ccaf292b577 pcp-pmda-postfix-6.2.2-7.el9_5.x86_64.rpm 2d726616b2c6da7b4ac9662ed5ce1bc89fdb6ac31148969a7139d72369a95a2f pcp-pmda-postgresql-6.2.2-7.el9_5.x86_64.rpm 6cac42842a63b74f0dbaf15ad1b399957bbcebc3e13027f755d729bc0e75f946 pcp-pmda-rabbitmq-6.2.2-7.el9_5.x86_64.rpm 70157f64d7f392b7dc75a2e45956c3aa66e833d3cdfa9a6d44f339917f9b22d3 pcp-pmda-redis-6.2.2-7.el9_5.x86_64.rpm 24d655260fce7d480262b46ee888ec818168d52c5911a9f9d97bd6d034c29171 pcp-pmda-resctrl-6.2.2-7.el9_5.x86_64.rpm 06a6e8b91df96fcb680ab70723316c9ebafd83db9e47e0faf7c79b3d963645d9 pcp-pmda-roomtemp-6.2.2-7.el9_5.x86_64.rpm a0fceda99ea0cc922e4fa8e94830ef61ba9ba6f01058d39b4348a47d5d3d8443 pcp-pmda-rsyslog-6.2.2-7.el9_5.x86_64.rpm d9552db4730b6865d86e063ae3b351f3c95458ec8db947916e43c7c79919d17c pcp-pmda-samba-6.2.2-7.el9_5.x86_64.rpm df98e6ddbacfca98a0a59f64e446927d6e61f48dd97afb00121584ab7bcf1fd7 pcp-pmda-sendmail-6.2.2-7.el9_5.x86_64.rpm 742f7cce64fc00848b1684ab58655382c66e97ce8b294f32a4e1953f583f6ac9 pcp-pmda-shping-6.2.2-7.el9_5.x86_64.rpm 64f3923c50aa815393402d1217bc3afd0f475f8fd518708cff7b3449b4979377 pcp-pmda-slurm-6.2.2-7.el9_5.x86_64.rpm 70113192a6fb7cd3aeb9aa8bc148ec406fa68021a248bebf5ab7fd57a89f86da pcp-pmda-smart-6.2.2-7.el9_5.x86_64.rpm 8b782d2c553a8801064b4540ea4cb81780444d93fc42e32679e0bd89c351a834 pcp-pmda-snmp-6.2.2-7.el9_5.x86_64.rpm 3f00b0d9cd873a8529eed62f9635fc67537a92feee49b93fef461ba829f39683 pcp-pmda-sockets-6.2.2-7.el9_5.x86_64.rpm 153881b73762c397312f325d3e96c0356d29bf610f5d10abcae496b0a4c2e619 pcp-pmda-statsd-6.2.2-7.el9_5.x86_64.rpm fa0b154fe9b39fe65958be40767be110dcbc908587606c029ca4deff99b25365 pcp-pmda-summary-6.2.2-7.el9_5.x86_64.rpm b16e30aea3f571eb473d8deac2402fb6f16b36f112817fcfa1e27f6256a3a265 pcp-pmda-systemd-6.2.2-7.el9_5.x86_64.rpm bc1a4ff07f61eebc8d44efc08e879e491190eb5faee030350efb2e1f1ab22789 pcp-pmda-trace-6.2.2-7.el9_5.x86_64.rpm 6093c19383da516007227de22c89371f8d892fc391450e4561e316e116b0828b pcp-pmda-unbound-6.2.2-7.el9_5.x86_64.rpm 32dc8e8aa465f985dbbd72c46d30e2724c4d45bec98ab1a844372ac1484f567e pcp-pmda-uwsgi-6.2.2-7.el9_5.x86_64.rpm bba95782a6813d700e25816d46049f6f6572e44e7865063004c87e449474e295 pcp-pmda-weblog-6.2.2-7.el9_5.x86_64.rpm 6e9b30e9a643aef6c7f3e6c342e9086270f95ca4bbaf4a9b5cf64df178b148e1 pcp-pmda-zimbra-6.2.2-7.el9_5.x86_64.rpm f462ec9c2e70ffe33b91f2f19253255f3c4c6bbc9f135fabd3d423b170b2c826 pcp-pmda-zswap-6.2.2-7.el9_5.x86_64.rpm ca343bb812df656b37b88c313a65f5c16b0d6f8fb32e164bae0da47625d379c8 pcp-selinux-6.2.2-7.el9_5.x86_64.rpm 1e163d8cf83ac63708b768b6d5b34eaf0efa679af7fc451882f1bc9cb5d10647 pcp-system-tools-6.2.2-7.el9_5.x86_64.rpm 32af3feb8710befdc23c34a5c143eb2638c1986d1810affbe2592cd4322ec9f6 pcp-testsuite-6.2.2-7.el9_5.i686.rpm e8265c6e4d4ed4519cf20e852271b8152a7c07b97ac3ae680389b575eb0a70f1 pcp-testsuite-6.2.2-7.el9_5.x86_64.rpm b03f1d6d7cb0572c31431784b0e087efa61c6d3634b6bd883477af3fc214fc8c pcp-zeroconf-6.2.2-7.el9_5.x86_64.rpm 74ea1c8cf2b1781b86b6d45e0137df006645f0edea525575d92dbf3c9b59e9f6 perl-PCP-LogImport-6.2.2-7.el9_5.x86_64.rpm df2f578c3c8c08d3fe84a9babeb9ae245efaa3a96d62c2ed5b57cfc8c8e3e9d7 perl-PCP-LogSummary-6.2.2-7.el9_5.x86_64.rpm d01c1c07d642d6efdf3b7d71040e4d62de8b1d7d4c02f1faedcb59fcf7f6bdc5 perl-PCP-MMV-6.2.2-7.el9_5.x86_64.rpm 5b4ba540f9b07a337944dd3aac3fe170ea04fdf463e267f1a5f846a7641eeab5 perl-PCP-PMDA-6.2.2-7.el9_5.x86_64.rpm d939bb9a5c45cbbd17ee4e6882e4cf65c9758beb8c939f7b403f1e6c09b10b03 python3-pcp-6.2.2-7.el9_5.x86_64.rpm 35f295fc14a77bcfff785ca60797950d73514819f19dac6a30abad9b508575c5 RLSA-2024:9456 Important: osbuild-composer security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for osbuild-composer. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Besides building images for local usage, it can also upload images directly to cloud. It is compatible with composer-cli and cockpit-composer clients. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms osbuild-composer-118-2.el9_5.rocky.0.6.x86_64.rpm 733843260d4af7a56acea0aecdd04335e2378270533d9a927f0c8efa9b837e44 osbuild-composer-core-118-2.el9_5.rocky.0.6.x86_64.rpm f3c5786603ea677d55bd9feaf46061fa57aaa6242cbb815ab5dce56bd7f1a67d osbuild-composer-worker-118-2.el9_5.rocky.0.6.x86_64.rpm 3e06ddffc4394a03c993b531cc88745fea9d92581074c29bf3f4126e3765d6a0 RLSA-2024:9457 Moderate: python3.12-urllib3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.12-urllib3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list urllib3 is a powerful, user-friendly HTTP client for Python. urllib3 brings many critical features that are missing from the Python standard libraries: • Thread safety. • Connection pooling. • Client-side SSL/TLS verification. • File uploads with multipart encoding. • Helpers for retrying requests and dealing with HTTP redirects. • Support for gzip, deflate, brotli, and zstd encoding. • Proxy support for HTTP and SOCKS. • 100% test coverage. Security Fix(es): * urllib3: proxy-authorization request header is not stripped during cross-origin redirects (CVE-2024-37891) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-urllib3-1.26.18-2.el9_5.1.noarch.rpm 07f7d96157dce5accd2e7622d9b8a1c4b13aa55706617e5d625462f5a3f631a6 RLSA-2024:9472 Important: grafana-pcp security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana-pcp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-pcp-5.1.1-9.el9_5.x86_64.rpm d218c299d14cdc353b8160f3bca75b9e8341edbe962d431fc9caeb0d8412e9e4 RLSA-2024:9473 Important: grafana security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) * dompurify: nesting-based mutation XSS vulnerability (CVE-2024-47875) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-10.2.6-7.el9_5.x86_64.rpm 72dcc00c7006eebcd0f06d1014414102c848d307774a52f0f513d379a8d0db6d grafana-selinux-10.2.6-7.el9_5.x86_64.rpm 5d76498f096b5578713f6aff79525331b35f3e4a835b5d176a193c9dc63bb08c RLSA-2024:9555 Important: NetworkManager-libreswan security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for NetworkManager-libreswan. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This package contains software for integrating the libreswan VPN software with NetworkManager and the GNOME desktop Security Fix(es): * NetworkManager-libreswan: Local privilege escalation via leftupdown (CVE-2024-9050) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms NetworkManager-libreswan-1.2.22-4.el9_5.x86_64.rpm 74604f0c5cb6b6a7c66fd5bc157c9cb68d582b6f20f871a6992a6dd5a29be12d NetworkManager-libreswan-gnome-1.2.22-4.el9_5.x86_64.rpm 0e45b62b929a85e06392b3783acfb67af60b204a1424b5c0d41afad05fee31ec RLSA-2024:9559 Important: libsoup security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libsoup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsoup packages provide an HTTP client and server library for GNOME. Security Fix(es): * libsoup: infinite loop while reading websocket data (CVE-2024-52532) * libsoup: HTTP request smuggling via stripping null bytes from the ends of header names (CVE-2024-52530) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libsoup-2.72.0-8.el9_5.2.i686.rpm 89e25765a4e858530aacae9ebbc1b82c7e1112f9101738a8dd3d18eab9b570d5 libsoup-2.72.0-8.el9_5.2.x86_64.rpm 16174a05d4e064ede29d450dc992d4166bc70fb081abf270b128ea1095f3fc36 libsoup-devel-2.72.0-8.el9_5.2.i686.rpm e0ff272a25cffdf7ecae1cdac57bc17c7afdafeed380821876b26a3b6fae7336 libsoup-devel-2.72.0-8.el9_5.2.x86_64.rpm fc75fa4320dc4bc69ec1801ba81ff2335a0271fbcf473aeb7edcb2e2710f5b30 RLSA-2024:9625 Important: squid security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for squid. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: Denial of Service processing ESI response content (CVE-2024-45802) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms squid-5.5-14.el9_5.3.x86_64.rpm 336441636ff36a801486627f8f871a61ed2dfbb2ab5d6ffd0ba04f4da471283c RLSA-2024:10090 Important: tigervnc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tigervnc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability (CVE-2024-9632) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms tigervnc-1.14.1-1.el9_5.1.x86_64.rpm 1bbaf3519214e912ff87e50723e36afb3b14cc8a57acd867e92a0efac0911ae2 tigervnc-icons-1.14.1-1.el9_5.1.noarch.rpm 846e000353a8be7794f588779b852a08c983b7c6b5f13a18e60b6411b8533097 tigervnc-license-1.14.1-1.el9_5.1.noarch.rpm c7350af3679285aed436d2032d6c32f9ceac132251fd62ed9c0998ce95491cfb tigervnc-selinux-1.14.1-1.el9_5.1.noarch.rpm 9c2a11c2c28180e3584a0306b7a80a55432cd0b327875e9d8bb96cd19c070c4d tigervnc-server-1.14.1-1.el9_5.1.x86_64.rpm 1e9f54db73c3f55c02a22025ef0af74b4eed8be253c84a02151d9ca1b863099b tigervnc-server-minimal-1.14.1-1.el9_5.1.x86_64.rpm 2f7ddb7d43e0afa3c33111e9d2ff410c7d11afa03c7320e1ad587a07264299a6 tigervnc-server-module-1.14.1-1.el9_5.1.x86_64.rpm afa7cca671a7c6141d6d2ab9a659209a6113e2c86136eb4f2b08a438355a1c1b RLSA-2024:10218 Moderate: perl-App-cpanminus security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for perl-App-cpanminus. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Why? It's dependency free, requires zero configuration, and stands alone but it's maintainable and extensible with plug-ins and friendly to shell scripting. When running, it requires only 10 MB of RAM. Security Fix(es): * perl-App-cpanminus: Insecure HTTP in App::cpanminus Allows Code Execution Vulnerability (CVE-2024-45321) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms perl-App-cpanminus-1.7044-14.1.el9_5.noarch.rpm e82b68086e728c08ccb0029c5f85d75e9af6c48a62be384d923078077b4f89f0 RLSA-2024:10590 Important: python-tornado security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python-tornado. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Tornado is a Python web framework and asynchronous networking library that provides an open source version of scalable, non-blocking web server and tools. Security Fix(es): * python-tornado: Tornado has HTTP cookie parsing DoS vulnerability (CVE-2024-52804) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-tornado-6.4.2-1.el9_5.x86_64.rpm e5f190ce47d798727b4e02ce80d6c950a8f80ae682487eb9021c3ea57fde267c RLBA-2022:2444 new packages: jq Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jq. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms jq-1.6-12.el9.i686.rpm 0631ee92182046159a3f4341d55bf019bfffdf7e3a0e4d5f8c00845aa88d0d78 jq-1.6-12.el9.x86_64.rpm 21263379b6c4d9bf1a40acb07ccd7b42a299031bdf70387041b90b50d5f587a8 RLSA-2024:11122 Important: gstreamer1-plugins-good security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for gstreamer1-plugins-good. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license. Security Fix(es): * gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer (CVE-2024-47540) * gstreamer1-plugins-good: OOB-write in isomp4/qtdemux.c (CVE-2024-47537) * gstreamer1-plugins-good: OOB-write in convert_to_s334_1a (CVE-2024-47539) * gstreamer1-plugins-good: null pointer dereference in gst_gdk_pixbuf_dec_flush (CVE-2024-47613) * gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes (CVE-2024-47606) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gstreamer1-plugins-good-1.22.1-3.el9_5.i686.rpm d72d61ea8f817942c429889a37011481aa699f0d9cefd37198dd5c2f37ffa53a gstreamer1-plugins-good-1.22.1-3.el9_5.x86_64.rpm 457cfb4a37c45680777637430358e1536a8ca8219a0fe20938464c7ef01f2769 gstreamer1-plugins-good-gtk-1.22.1-3.el9_5.i686.rpm 32054f59884418940e925c55c58ef6ba2005dd4a995acff4e95952185894b612 gstreamer1-plugins-good-gtk-1.22.1-3.el9_5.x86_64.rpm a6eb580ced10181be47bbc0f9c94c1d4211a9440e3fc166fb952798ff445d531 RLSA-2024:11123 Important: gstreamer1-plugins-base security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for gstreamer1-plugins-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-base packages contain a collection of well-maintained base plug-ins. Security Fix(es): * gstreamer1-plugins-base: GStreamer has a stack-buffer overflow in vorbis_handle_identification_packet (CVE-2024-47538) * gstreamer1-plugins-base: out-of-bounds write in Ogg demuxer (CVE-2024-47615) * gstreamer1-plugins-base: stack-buffer overflow in gst_opus_dec_parse_header (CVE-2024-47607) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gstreamer1-plugins-base-1.22.1-3.el9_5.i686.rpm 22180a2be432c555de9be3bc81936291a1b340c20c70aa8b0a2b9f1ea5f6ba3a gstreamer1-plugins-base-1.22.1-3.el9_5.x86_64.rpm a85e8834265aa097cb43ef064cf529243c6c5fc9d3ad99c2df637a51845bf458 gstreamer1-plugins-base-devel-1.22.1-3.el9_5.i686.rpm f536b896e2fb20cf04bc43dad85fa9b3cf749e0f8c62a5783fa597a8dc4cb002 gstreamer1-plugins-base-devel-1.22.1-3.el9_5.x86_64.rpm d9da27b6c78c9733a5cc404bd77c6c5b470819cb0bce0764abafe3db60f33af8 gstreamer1-plugins-base-tools-1.22.1-3.el9_5.x86_64.rpm 485286de13d35d2fa5cebfcdd2f2d10b4612e94ca03c23be28c6e60554ea702e RLBA-2024:11214 aardvark-dns bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for aardvark-dns. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Authoritative DNS server for A/AAAA container records Forwards other request to configured resolvers. Read more about configuration in `src/backend/mod.rs`. Bug Fix(es) and Enhancement(s): * aardvark-dns: TCP Query Handling Flaw in Aardvark-dns Leading to Denial of Service [rhel-9.5] (JIRA:Rocky Linux-57072) * Issue with podman and netavark / aardvark-dns (JIRA:Rocky Linux-58233) rocky-linux-9-x86-64-appstream-rpms aardvark-dns-1.12.2-1.el9_5.x86_64.rpm 10950cd232bb2395c8de2d33b2c57cbcd1d26997606a7eb8e3cda037041d619a RLSA-2024:11216 Moderate: containernetworking-plugins security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for containernetworking-plugins. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms containernetworking-plugins-1.5.1-3.el9_5.x86_64.rpm 667a92330e2cfde69a5c5a7fd0f8a9be23feef90c68a4cec9cb003a25c5fc0e9 RLSA-2024:11217 Important: skopeo security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for skopeo. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms skopeo-1.16.1-2.el9_5.x86_64.rpm c06ad66a9530fe815168b6b8a1edf21327e3c6d544aeef9aa55cbf8f34aca77b skopeo-tests-1.16.1-2.el9_5.x86_64.rpm 7479441716771bb66d4939fcadabbdb2863d8924aa9ba50ea93cf2f7fa645b42 RLBA-2024:11221 ksh bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ksh. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list KornShell (ksh) is a Unix shell developed by AT&T Bell Laboratories, which is backward-compatible with the Bourne shell (sh) and includes many features of the C shell. The most recent version is KSH-93. KornShell complies with the POSIX.2 standard (IEEE Std 1003.2-1992). Bug Fix(es): * Regression in behavior of exit with no args in trap handler. [rhel-9.5.z] (JIRA:Rocky Linux-62228) rocky-linux-9-x86-64-appstream-rpms ksh-1.0.6-4.el9_5.x86_64.rpm 049a3456a6b904835c4987d6d6584d49d8c9713b1e303ec54aeb1578e11c3b5b RLBA-2024:11227 cloud-init bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cloud-init. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Bug Fix(es): * Configuring metric for default gateway is not working [rhel-9.5.z] (JIRA:Rocky Linux-65018) * NoCloud - network_config bridges incorrectly configured [rhel-9.5.z] (JIRA:Rocky Linux-65021) * [Rocky Linux-9] Prevent NM from handling DNS when network interfaces have DNS config [rhel-9.5.z] (JIRA:Rocky Linux-65778) * cloud-init fails to configure DNS and search domain [rhel-9.5.z] (JIRA:Rocky Linux-68409) rocky-linux-9-x86-64-appstream-rpms cloud-init-23.4-19.el9_5.4.0.2.noarch.rpm 8ad84a9132fc354eef1e7305650b2dede0aef01d9d448e7268489768683e21fe RLBA-2024:11230 greenboot bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for greenboot. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Generic Health Check Framework for systemd. Bug Fix(es): * Greenboot v0.15.7 to rhel-9.5.z (JIRA:Rocky Linux-67299) rocky-linux-9-x86-64-appstream-rpms greenboot-0.15.7-1.el9_5.x86_64.rpm 9faf55f6bb9833f7c19e535d935cc815a166c2ad427d55fce93f82e710965530 greenboot-default-health-checks-0.15.7-1.el9_5.x86_64.rpm 2fdf48e4e994b873c8d429c190cea1d41ee0cc8a9c45c1ce3f488bc977a1cc2b RLBA-2024:11231 containers-common bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for containers-common. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This package contains common configuration files and documentation for container tools ecosystem, such as Podman, Buildah and Skopeo. It is required because the most of configuration files and docs come from projects which are vendored into Podman, Buildah, Skopeo, etc. but they are not packaged separately. Bug Fix(es): * storage.conf enables zstd:chunked partial pull support in Rocky Linux 9.5 (JIRA:Rocky Linux-65057) rocky-linux-9-x86-64-appstream-rpms containers-common-1-96.el9_5.x86_64.rpm 35f35df491a5a01ad271f196156eb0b8c24a4f577295456bce5eace905deb725 RLBA-2024:11233 golang bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for golang. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Bug Fix(es): * Update to Go 1.22.9 [rhel-9] (JIRA:Rocky Linux-67672) rocky-linux-9-x86-64-appstream-rpms golang-1.22.9-2.el9_5.x86_64.rpm cb632e2b03e55db7bbb8938bab7248914c7a60782173fd571c25a3a2ac2bf031 golang-bin-1.22.9-2.el9_5.x86_64.rpm 777487b110a00d25009ff6594ec7edc7296ade01b967dedb10d82ae0a3cabb44 golang-docs-1.22.9-2.el9_5.noarch.rpm fcbb4dd59a76cf67cbb12dd44de1335ab95acbe991db90b3a2720d20e75344bc golang-misc-1.22.9-2.el9_5.noarch.rpm bfe8aa3ca26ebef5236911ed7f53a0d1196161a2aaf946f7f3569deb2bcb7368 golang-race-1.22.9-2.el9_5.x86_64.rpm 1cf47dd9739e68d31f000abf5037d90db01774c6c26f9934f135be692824407e golang-src-1.22.9-2.el9_5.noarch.rpm 08edfa141f14fbe34d38f82066a219caea02d30c01d712a1a9158a280bb77fd9 golang-tests-1.22.9-2.el9_5.noarch.rpm f10f619b46ce422f8878df524530c7b7b2dbb704d5c7ab7fb4c61882523f7281 go-toolset-1.22.9-2.el9_5.x86_64.rpm b15b22a15b21929044a21f3ac0c28a5c1c0ecbcabd34655a31752cb65fccf2ee RLBA-2024:11234 virtio-win bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virtio-win. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) offers a full virtualization solution forLinux on numerous hardware platforms. The virt:rhel module contains packageswhich provide user-space components used to run virtual machines using KVM.The packages also provide APIs for managing and interacting with the virtualized systems. Bug Fix(es) and Enhancement(s): * [virtio-win][viomem] guest BSOD or stuck if try to resize the mem to a smaller value than the original setting value [rhel-9.5.z] (JIRA:Rocky Linux-66540) * [viomem] Implement VIRTIO_MEM_F_UNPLUGGED_INACCESSIBLE feature [rhel-9.5.z] (JIRA:Rocky Linux-66563) * [virtio-win][vioinput] Update INF to support DMA Remapping [rhel-9.5.z] (JIRA:Rocky Linux-66564) * [virtio-win][fwcfg] Update INF to disable DMA remapping [rhel-9.5.z] (JIRA:Rocky Linux-66565) * [virtio-win][balloon] Update INF to support DMA remapping [rhel-9.5.z] (JIRA:Rocky Linux-66566) * [virtio-win][virtio-fs] virtiofs driver should use DMA API [rhel-9.5.z] (JIRA:Rocky Linux-66567) * [viomem] Improved waiting for the command submission (1 second wait can fail) [rhel-9.5.z] (JIRA:Rocky Linux-67482) * [virtio-win][vioserial] Update INF to support DMA Remapping [rhel-9.5.z] (JIRA:Rocky Linux-67483) rocky-linux-9-x86-64-appstream-rpms virtio-win-1.9.44-0.el9_5.noarch.rpm 9540279743cb188ac6582bf70db0ca30bff37d59aeb37be4f006ec3140af067b RLBA-2024:11236 bootc bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for bootc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bootable container system Bug Fix(es): * Rebase to 1.1.2 [rhel-9.5.z] (JIRA:Rocky Linux-66610) rocky-linux-9-x86-64-appstream-rpms bootc-1.1.2-1.el9_5.x86_64.rpm 40d9e16dcff514ef9884fcda99ebf8c6b2c122a99a9fc1f4585cc74a43b599c9 RLSA-2024:11238 Moderate: python3.11-urllib3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for python3.11-urllib3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities. Security Fix(es): * urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-urllib3-1.26.12-2.el9_5.2.noarch.rpm edf26997373df5bca4c704084b8dcf063461333145b0b8f102372a69cccf6374 RLBA-2024:11239 rpm-ostree bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rpm-ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rpm-ostree tool binds together the RPM packaging model with the OSTree model of bootable file system trees. It provides commands that can be used both on client systems and on server-side composes. The rpm-ostree-client package provides commands for client systems to perform upgrades and rollbacks. Bug Fix(es): * [rhel-9.5.z] Rebase rpm-ostree to 2024.9 (JIRA:Rocky Linux-68144) rocky-linux-9-x86-64-appstream-rpms rpm-ostree-2024.9-1.el9_5.x86_64.rpm 16b54fd7ebe89a8fa3a079d6631839cf4600ce9501aed44e598e343b008505c5 rpm-ostree-libs-2024.9-1.el9_5.i686.rpm 1bd64feb364230c9fe542500d6610b23cf19b91d29235d7911a97bb7d9742c4d rpm-ostree-libs-2024.9-1.el9_5.x86_64.rpm c5ffa0eb8f712aa94f7078c84c73b1d22f674d318fbef27a6d351a70633ea376 RLBA-2024:11240 git bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for git. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Bug Fix(es): * git 2.43 extremely slow shallow clones [rhel-9] (JIRA:Rocky Linux-67118) rocky-linux-9-x86-64-appstream-rpms git-2.43.5-2.el9_5.x86_64.rpm 5632adce592d411d0790b3fbf356baa694931d95f6c3eb235f406d09fd9b2646 git-all-2.43.5-2.el9_5.noarch.rpm b1b8197f277c57a9d6809c03ed620d3987bfecf653199b56d40b989d62407fc0 git-core-2.43.5-2.el9_5.x86_64.rpm 16a095da6cdd948bf5bad6393c4ab2cb8d65cc84873f9517b23156598665eff8 git-core-doc-2.43.5-2.el9_5.noarch.rpm d3e6cba781ab5ade8398480206a8ea4ac987e508ae94734e798da8ab984f8fb4 git-credential-libsecret-2.43.5-2.el9_5.x86_64.rpm 7e4c5330282a56897430fa76384638abc7f016dcb607a706b9aab4ee9bc5ce9b git-daemon-2.43.5-2.el9_5.x86_64.rpm 2ff73834477f08d09e4432c7cb45487518034fc25cabbfcec88107ba2579be65 git-email-2.43.5-2.el9_5.noarch.rpm c5e0b58255c2a296eed0dc78aa4aeb8000220f658cd0a0360c9afcbb8ff619e1 git-gui-2.43.5-2.el9_5.noarch.rpm 5dd5c6e7d62e64ed1acf37dc38f339d524348e14a1bd1a961075370a90c8edec git-instaweb-2.43.5-2.el9_5.noarch.rpm aaf008e3288d83d91bcea12adb8be452b6b2102bc10598fa004680ce988ba9f7 gitk-2.43.5-2.el9_5.noarch.rpm bb9a48d05b71cf5d53e71ba5282f7121f561cb1eac4dfc6f6948939084fe443d git-subtree-2.43.5-2.el9_5.x86_64.rpm 85380d92ded2b3e02b6ccd5e5d6a8b55874d377723d507a7f3c92c90a1a35316 git-svn-2.43.5-2.el9_5.noarch.rpm 552c06ee88945a3325256bbc6812269e96b557cc6f637233d1f34ff36f869150 gitweb-2.43.5-2.el9_5.noarch.rpm dddf44f7e3cdfc8c4146d75146bb1976eb7f8ea2ad86bd6b065149c40d99f035 perl-Git-2.43.5-2.el9_5.noarch.rpm 7e7aef261de567f58f527de6f278d4982fee0c4af2cdb9d2de024bbf8c61c1cd perl-Git-SVN-2.43.5-2.el9_5.noarch.rpm c68a7a898c04869fce31dabd391cc9cddd2d2d5861d4c9d786260725d3dae1f9 RLSA-2025:0161 Important: iperf3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for iperf3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Iperf is a tool which can measure maximum TCP bandwidth and tune various parameters and UDP characteristics. Iperf reports bandwidth, delay jitter, and data-gram loss. Security Fix(es): * iperf: Denial of Service in iperf Due to Improper JSON Handling (CVE-2024-53580) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms iperf3-3.9-13.el9_5.1.i686.rpm a87e81f2ffbf3bc1dd8a4f56d4330d16e03c2e31d7de92526907c6ab7135358c iperf3-3.9-13.el9_5.1.x86_64.rpm 1b622b64bfe74b11ae8e2eea032fe02e3935811aa6eac7569332f00b59c90153 RLSA-2025:0308 Important: fence-agents security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Security Fix(es): * fence-agents: Jinja has a sandbox breakout through indirect reference to format method [rhel-9.5.z] (CVE-2024-56326) * fence-agents: Jinja has a sandbox breakout through malicious filenames [rhel-9.5.z] (CVE-2024-56201) rocky-linux-9-x86-64-appstream-rpms fence-agents-common-4.10.0-76.el9_5.4.noarch.rpm 4149d445c1ca679ae96d838b3135f3afa8006ac7b79147d30087ce5963658468 fence-agents-compute-4.10.0-76.el9_5.4.x86_64.rpm b2217fa53cdb8bf96ad1a17d6e3eaca12a0aaf4d07e62dc7774d093c2c16bb44 fence-agents-ibm-powervs-4.10.0-76.el9_5.4.noarch.rpm 48be5f9fe074ee82bc19e1e353fce0266b19d5373bb94383b37c6018dd432998 fence-agents-ibm-vpc-4.10.0-76.el9_5.4.noarch.rpm 48fffe328c7e0ae34b0e0f81b4dcd50cebc9a0f55796a9b3361cb37c3e948690 fence-agents-kubevirt-4.10.0-76.el9_5.4.x86_64.rpm 3c7d426fde71af2b9781a74c74f020fe784a69e1e7a95cf76dc6fe42eee54560 fence-agents-virsh-4.10.0-76.el9_5.4.noarch.rpm 629803c10b5eb880588420b22d77794979f2cbb5f775ebc1055161334b9c43fb fence-virt-4.10.0-76.el9_5.4.x86_64.rpm 0a423b1d227231e3a32335afb44bf802a31929944bfeb193f235de9fae90de7b fence-virtd-4.10.0-76.el9_5.4.x86_64.rpm 1bd88c587059a7196d00f6d2fed763e37ff65cfa142a6f36f3df0bfe8653b00e fence-virtd-cpg-4.10.0-76.el9_5.4.x86_64.rpm 43f3f785171a0b24dbfe235161413caeeb630ff65e4ffca4758c3f9b6fdf9eb7 fence-virtd-libvirt-4.10.0-76.el9_5.4.x86_64.rpm 59410ab04185b7495e99313544d0a16e4485a3a682db132456916c7f0b6597a3 fence-virtd-multicast-4.10.0-76.el9_5.4.x86_64.rpm 61158e4fa8fea6ed5c835309d00f4514780f95e3367a3e57a1777ed6465d2f5c fence-virtd-serial-4.10.0-76.el9_5.4.x86_64.rpm 32859b173c4fac8119608103708f2d8733603ceb3a9cf3939bf411cb608f7981 fence-virtd-tcp-4.10.0-76.el9_5.4.x86_64.rpm 630c8dbf469048c5ccbe1bc7a219081615386bdbb91b3b4d41e252c65a0d7b2e RLBA-2025:0541 httpd bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for httpd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Bug Fix(es): * openssl 3.2 ENGINE regression [rhel-9.5.z] (JIRA:Rocky Linux-69456) * RewriteRule proxying to UDS (unix domain socket) configured in .htaccess doesn't work on httpd-2.4.62-1 [rhel-9.5.z] (JIRA:Rocky Linux-73580) rocky-linux-9-x86-64-appstream-rpms httpd-filesystem-2.4.62-1.el9_5.2.noarch.rpm 747dc60adeb0325fae0bc0f7cb43cdd8cd7bc01980f453e8dc4d3ab7bb2ee03b httpd-2.4.62-1.el9_5.2.x86_64.rpm ff8e5b5738c73dec2f5146c82a08d43d3c39ee61874b70d520307737aae2640d httpd-core-2.4.62-1.el9_5.2.x86_64.rpm 2bbd4f7110a5670beadaf3d3ebd4678e84cfa3309a42782a5c39e27c99db965d httpd-devel-2.4.62-1.el9_5.2.x86_64.rpm d6182d0d474d9fae99e277468660759b1394d01c73172cf2a45349cb7fc964d1 httpd-manual-2.4.62-1.el9_5.2.noarch.rpm a696e00084a121399c0cf2e164f168e15c6adf8e2e5efed7e3bf2fd6df888058 httpd-tools-2.4.62-1.el9_5.2.x86_64.rpm 2e4e7e22f067a4ee192dfe57c97e0f183412b20d3d4c5041680c81dcfc51eb68 mod_ldap-2.4.62-1.el9_5.2.x86_64.rpm 776af70a85e2a615bcdfc5a5207ab479fc8ba9ef807bcbf87a93b06cc638f8e5 mod_lua-2.4.62-1.el9_5.2.x86_64.rpm f9046d4e50afe19d75c0c0a8faa0e4de2560ebb7d342350aeb406959d5819015 mod_proxy_html-2.4.62-1.el9_5.2.x86_64.rpm 9d3bfd9c92babab273b94d599fea4ebdf18eb53cfec0722f221a6d0b1b4abcd2 mod_session-2.4.62-1.el9_5.2.x86_64.rpm 1f63e1901e1f92e252fa5ce1ca2ef4d9f2d04c913b41afe22967ace37190d1aa mod_ssl-2.4.62-1.el9_5.2.x86_64.rpm fe46aa3dcddbe9ac33e2b705d73c71a2247548ecb0d04d94f7b59eadacdf417b RLSA-2025:0667 Important: python-jinja2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for python-jinja2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * jinja2: Jinja has a sandbox breakout through indirect reference to format method (CVE-2024-56326) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-jinja2-2.11.3-7.el9_5.noarch.rpm 826b5329d897a044c321be59b1c90b1dc8d2226e647b960634e572b6cdb722b1 RLSA-2025:0693 Important: redis security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for redis. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: heap overflow in the lua cjson and cmsgpack libraries (CVE-2022-24834) * redis: possible bypass of Unix socket permissions on startup (CVE-2023-45145) * redis: Lua library commands may lead to stack overflow and RCE in Redis (CVE-2024-31449) * redis: Denial-of-service due to unbounded pattern matching in Redis (CVE-2024-31228) * redis: Redis' Lua library commands may lead to remote code execution (CVE-2024-46981) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms redis-6.2.17-1.el9_5.x86_64.rpm 017d920a25942e243a2b5d97360b51304e855b01f1fc2dc33366cb47473479f7 redis-devel-6.2.17-1.el9_5.i686.rpm b0671cd8217ba814074eaa4a792c145c5216af1f1719fa1093615534169d3f89 redis-devel-6.2.17-1.el9_5.x86_64.rpm 9eb56cda03556f7852d873aad8f5abb0922fed5608baac25314aa966d7f70516 redis-doc-6.2.17-1.el9_5.noarch.rpm df89ffd6492d1746fe62b039c6c436347eeb7aeb5fa5ab7bef7799579f1c93dd RLSA-2025:0791 Important: libsoup security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libsoup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsoup packages provide an HTTP client and server library for GNOME. Security Fix(es): * libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (CVE-2024-52531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libsoup-2.72.0-8.el9_5.3.i686.rpm d172816face90e802801177eb9a3c0c572ef823dc71108ab1e5c2df9df8cb5e4 libsoup-2.72.0-8.el9_5.3.x86_64.rpm 2130c3c7f5f9087a637eee21a1d05e9046cd59b23820fcf5227163ec5d113957 libsoup-devel-2.72.0-8.el9_5.3.i686.rpm e3d9cc79d3cf4b47b3ee07ca2579d40ee9d342f0b84223f4ddca006facca061e libsoup-devel-2.72.0-8.el9_5.3.x86_64.rpm 765d0855d6c88c0abef5af690893bf1953bc7e425cf285c2a5fe8ccb84a3b50b RLBA-2025:0909 alsa-sof-firmware bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for alsa-sof-firmware. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This package contains the firmware binaries for the Sound Open Firmware project. Bug Fix(es): * Update Intel/AMD SOF firmware in Rocky Linux 9.6 [rhel-9.5.z] (JIRA:Rocky Linux-62358) rocky-linux-9-x86-64-appstream-rpms alsa-sof-firmware-2024.09-1.el9_5.noarch.rpm ce54af2d3e1b04adb688defb98d49f85bb7be72d754c4a86a548b78768f597c5 RLBA-2025:0916 rust bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rust. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rust is a systems programming language that runs blazingly fast, prevents segfaults, and guarantees thread safety. This package includes the Rust compiler and documentation generator. Bug Fix(es) and Enhancement(s): * regression in rust-toolset 1.79: %cargo_install macro no longer accepts arguments [rhel-9.5.z] (JIRA:Rocky Linux-70036) rocky-linux-9-x86-64-appstream-rpms cargo-1.79.0-3.el9_5.x86_64.rpm 3c5824116c511d01bc14caa05d1d2333807197ea82dadda7672eae5e71e46c67 clippy-1.79.0-3.el9_5.x86_64.rpm eae5a298505cf929c2f562d30ec8f5342c1e4ff5e7f6c6f409d6d62054ccaff3 rust-1.79.0-3.el9_5.x86_64.rpm 38f5504cb0a3665e0d983583da9d3b4f4b87a698e34d62e1c3c14c142c708276 rust-analyzer-1.79.0-3.el9_5.x86_64.rpm bd4eaf2f0d255682ef4c30dda14b99d2ff078717133cb4dc5c9d406491d0f843 rust-debugger-common-1.79.0-3.el9_5.noarch.rpm 029df4467e19c7be274bd5a3547152d02d9965c8d8621117440567249d6879ce rust-doc-1.79.0-3.el9_5.x86_64.rpm 2ad3819ead5a01b5b885ff300ebf3ebaa853205052c351f6475f2064758c1a33 rustfmt-1.79.0-3.el9_5.x86_64.rpm 9d4d9f8900ef9adba917db64c04ecde21cca6ea039442313780d0d7940b52d53 rust-gdb-1.79.0-3.el9_5.noarch.rpm 511e1815f8b8940c0b9e09129e4a3537cc522765cbd59e18bcc5a5973dd4aa3f rust-lldb-1.79.0-3.el9_5.noarch.rpm 6a70057becb0702b48f10d926b47aa64614dd33260346c12926854d11869d91a rust-src-1.79.0-3.el9_5.noarch.rpm 4f4f282d73f69e3dcc778c06ef64e76d5b56329c50516d7c7c87ad405559d1aa rust-std-static-1.79.0-3.el9_5.i686.rpm 8c0f7d5a19b8573fc8f573915481168d6de2929cd1643bfefbc861e3336affb9 rust-std-static-1.79.0-3.el9_5.x86_64.rpm a534344d32586a783ede22bfa8e4af24ac5cb8d8e39858c6c86b77da16706206 rust-std-static-wasm32-unknown-unknown-1.79.0-3.el9_5.noarch.rpm a1cede993e1594128861b2c80b50207e719d46e6b0afba5d6446dfce3ad46021 rust-std-static-wasm32-wasi-1.79.0-3.el9_5.noarch.rpm 8d0b974f42a6653e6ef2eca89e32d2d6651bed7b663183346f256b4c22e30751 rust-std-static-wasm32-wasip1-1.79.0-3.el9_5.noarch.rpm fdc16b3c0291449e32ff8708c23ce428b33844766d7e03201a7cc9517d0ed8dd rust-toolset-1.79.0-3.el9_5.noarch.rpm 1ecd99b1b7ba672adc81957000ce34e55c2aaf16086096f062620332744cceb0 RLBA-2025:0919 haproxy bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for haproxy. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Bug Fix(es) and Enhancement(s): * Newer openssl library (3.2.2) breaks executing haproxy [rhel-9.5.z] (JIRA:Rocky Linux-72952) * HAProxy fix CPU usage spikes [rhel-9.5.z] (JIRA:Rocky Linux-72955) rocky-linux-9-x86-64-appstream-rpms haproxy-2.4.22-3.el9_5.1.x86_64.rpm f1f88ce0cd2ffcf6afda68ffb4b3e54de1a3d8230ad56f03c8d125df517b69ea RLBA-2025:0920 passt bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for passt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list passt implements a translation layer between a Layer-2 network interface and native Layer-4 sockets (TCP, UDP, ICMP/ICMPv6 echo) on a host. It doesn't require any capabilities or privileges, and it can be used as a simple replacement for Slirp. pasta (same binary as passt, different command) offers equivalent functionality, for network namespaces: traffic is forwarded using a tap interface inside the namespace, without the need to create further interfaces on the host, hence not requiring any capabilities or privileges. Bug Fix(es): * [Pasta] TCP keepalive causes connection reset [rhel-9.5.z] (JIRA:Rocky Linux-68948) * Poor Performance with Pasta for rootless container when compared with slirp4netns [rhel-9.5.z] (JIRA:Rocky Linux-73251) * pasta fails to associate container packets to existing flow, connection data is discarded [rhel-9.5.z] (JIRA:Rocky Linux-74301) * Issues with Camel-Quarkus Integration in Podman Container Post-Upgrade (Podman 4.9 → 5.2) based on Pasta networking [rhel-9.5.z] (JIRA:Rocky Linux-75645) rocky-linux-9-x86-64-appstream-rpms passt-0^20240806.gee36266-6.el9_5.x86_64.rpm 72f66ce603df8e6df3336f6c9ef70223aa346fdee0a91e27d1474046b14f0760 passt-selinux-0^20240806.gee36266-6.el9_5.noarch.rpm 90b6783920a286f357131a95d0fd925313bbf50de9254c0014d5576e5cfa36f8 RLBA-2025:0921 linuxptp bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for linuxptp. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The linuxptp packages provide Precision Time Protocol (PTP) implementation for Linux according to IEEE standard 1588 for Linux. The dual design goals are to provide a robust implementation of the standard and to use the most relevant and modern Application Programming Interfaces (API) offered by the Linux kernel. Bug Fix(es): * [RFE] Option for assumed NMEA delay in ts2phc (JIRA:Rocky Linux-70168) * [RFE] Allow phc2sys to get offset from ptp4l without -a and -w options [rhel-9.5.z] (JIRA:Rocky Linux-70678) rocky-linux-9-x86-64-appstream-rpms linuxptp-4.2-3.el9_5.1.x86_64.rpm 82b5dccbd82868fc3a2f1ca90834c5fd7b6a4c9ea37c4f0f6cbc1317cdeaecb1 RLSA-2025:0922 Important: podman security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for podman. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile (CVE-2024-11218) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms podman-5.2.2-13.el9_5.x86_64.rpm 776a1adad50d599bbb42e73a7238f4dba5625ea1a8eeabc9bdd0467ab83c8ac2 podman-docker-5.2.2-13.el9_5.noarch.rpm 53a17c32228850d8b47eaf0963d2fca734f437054f5448e67495b496f7152cb4 podman-plugins-5.2.2-13.el9_5.x86_64.rpm 6475de32f2e34ea1cb53d6f5bf38d3cb841cd218577bd2e275e30247e3458d91 podman-remote-5.2.2-13.el9_5.x86_64.rpm dfb5d2ac5934ec5f86f766c9f13016e8562ca7379de9e78d3f6d73794c7369cf podman-tests-5.2.2-13.el9_5.x86_64.rpm 0a01a3fa387d5267fe206918dfeee547fa4905c18c0b95aa6f65be29c2cee344 RLSA-2025:1210 Moderate: tbb security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for tbb. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Threading Building Blocks (TBB) is a C++ runtime library that abstracts the low-level threading details necessary for optimal multi-core performance. Security Fix(es): * jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods (CVE-2020-11023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3-tbb-2020.3-8.el9_5.1.x86_64.rpm dcdd99f87fbd23b5fc54dc4332f0c28522dbfd98f3e1b956af99d163ed274844 tbb-2020.3-8.el9_5.1.i686.rpm b6500ee2e56caa7287d387ce3828e3ff0bbbd9fd5ee78f76a58dbddaa45e418c tbb-2020.3-8.el9_5.1.x86_64.rpm a8b678297e29ccf6907400119d0e0e749507b49f5bac9959d39aeeef327a80c6 tbb-devel-2020.3-8.el9_5.1.i686.rpm 10f509b875e8e5e8b4520b50d830ba7e58e96d05c162fa0a1c82f2e4951539cc tbb-devel-2020.3-8.el9_5.1.x86_64.rpm b8674bab7d1a90a44fc4956f7193486c0dd7490b39e4dc390154e43ed611fb59 tbb-doc-2020.3-8.el9_5.1.x86_64.rpm bd90dde2e34775b7b2cf927d84f2e66f3f36e154b8fa16a83bd128410ccdd12c RLSA-2025:1300 Moderate: gcc-toolset-14-gcc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gcc-toolset-14-gcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc-toolset-14-gcc13 package contains the GNU Compiler Collection version 14. Security Fix(es): * jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods (CVE-2020-11023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-14-gcc-14.2.1-1.3.el9_5.x86_64.rpm 876a22394894a9d39c907bd40143d8cce61c87cb841393d11e8d9231d00cc1df gcc-toolset-14-gcc-c++-14.2.1-1.3.el9_5.x86_64.rpm 1c0eb9ee545cc0952f7e89775ad5154c057f0faeec4d01a8d88b614360e3679c gcc-toolset-14-gcc-gfortran-14.2.1-1.3.el9_5.x86_64.rpm f0b5beb0439263344aba9534af0110a7c1a3477fd4097841ebe1f500b0e0eb9e gcc-toolset-14-gcc-plugin-annobin-14.2.1-1.3.el9_5.x86_64.rpm a3682d4b06232f361481c5d6582bfcae8a0d8d5e373b45e818d39663015a9e95 gcc-toolset-14-gcc-plugin-devel-14.2.1-1.3.el9_5.i686.rpm 10e6c7e0eb322deb6d5cd1956012858fa873f947c8b3c542291374f3553c9383 gcc-toolset-14-gcc-plugin-devel-14.2.1-1.3.el9_5.x86_64.rpm 77a2cbce8147769fb47be0b4f2d2f8df7be6e6f3d5ca4710e0fbe707bd77fd7e gcc-toolset-14-libasan-devel-14.2.1-1.3.el9_5.i686.rpm 0cee025c62a34090388d08784e10d57764d1063a0cf3c8eded46a740c9827cef gcc-toolset-14-libasan-devel-14.2.1-1.3.el9_5.x86_64.rpm 7162bf0287aec97a1faeea41a938a003b994d7b35ed03eb295e46e67e311e034 gcc-toolset-14-libatomic-devel-14.2.1-1.3.el9_5.i686.rpm 4949e4da015b6ad75f2b92da071306da7def068d88c6c7070981219bf64fbd16 gcc-toolset-14-libatomic-devel-14.2.1-1.3.el9_5.x86_64.rpm 71d1642c759f26578d5ae2035d3ecc04942e3ae3a67e50ecd1bd1877ba11ea7f gcc-toolset-14-libgccjit-14.2.1-1.3.el9_5.i686.rpm ebba9f23155cd712d6180c12364bba6d71ef87c2ba7a25fd2cbe60408d256387 gcc-toolset-14-libgccjit-14.2.1-1.3.el9_5.x86_64.rpm a28b67152086a93b73c006769b17b49a16a3f3066895cd553fea1cd5f8ee2381 gcc-toolset-14-libgccjit-devel-14.2.1-1.3.el9_5.i686.rpm 9ebd338fcb93d7b02415ddb42e51c9c6abfc0d54107ba31373747e2a7807496e gcc-toolset-14-libgccjit-devel-14.2.1-1.3.el9_5.x86_64.rpm 3a797e49fe4884a2b4760a3df444538da2e69dd09ab5e0503fc4c1c273a8a90d gcc-toolset-14-libitm-devel-14.2.1-1.3.el9_5.i686.rpm 88a4d8d55339176e922a30689656105bd9b770497a30834a15ee6bda657e21f6 gcc-toolset-14-libitm-devel-14.2.1-1.3.el9_5.x86_64.rpm e4c7090aa4ef335af7baafc834c687c71cbf19e9aa172c6c4f0e3ef24c01869e gcc-toolset-14-liblsan-devel-14.2.1-1.3.el9_5.x86_64.rpm 648fcdf105b1fb40c21434c8180d2990f9d742358882ac65aa8fc9f4b20a70be gcc-toolset-14-libquadmath-devel-14.2.1-1.3.el9_5.i686.rpm 946412d2ccecfea823eb02910c1c5038193aa88583bcd1eb41a6e59b585675ee gcc-toolset-14-libquadmath-devel-14.2.1-1.3.el9_5.x86_64.rpm 89e721914855a78ee67486d9d83d49132d5986f77d52bd48a05fe935b0f14506 gcc-toolset-14-libstdc++-devel-14.2.1-1.3.el9_5.i686.rpm 878abc14cb7af14968833e01ea14533344089698034aae5008477d837a62870f gcc-toolset-14-libstdc++-devel-14.2.1-1.3.el9_5.x86_64.rpm b4113560467c2d37fae2ea34cbe65a6e69f1e6e4d7747f4a346ab865e32dd277 gcc-toolset-14-libstdc++-docs-14.2.1-1.3.el9_5.x86_64.rpm f37b475497cf46d9604a7c8e3d168c1caa6aa0805092cce8f59cf95ed64f927f gcc-toolset-14-libtsan-devel-14.2.1-1.3.el9_5.x86_64.rpm e376e993b663ecd695faf16fdc0b1f37e52da1f3cc8830c70d1eca2104e8e81c gcc-toolset-14-libubsan-devel-14.2.1-1.3.el9_5.i686.rpm 7123846f4f7291b4065bde58a3096ae656ee4b2bf7d897119f0ffecd6a5d7a54 gcc-toolset-14-libubsan-devel-14.2.1-1.3.el9_5.x86_64.rpm ceaec2312da3428660838b9999f94f8138077805276e6f4994332d786496e8db gcc-toolset-14-offload-nvptx-14.2.1-1.3.el9_5.x86_64.rpm 38b1e47e3c97eaa7a6d099a4da3bbdec07a6617a7ead48609aa1bf19886e4a38 libasan8-14.2.1-1.3.el9_5.i686.rpm 29c00c38aff4eb8bf212a589b8b03d737336473b107e7b4f4787bec304d5328c libasan8-14.2.1-1.3.el9_5.x86_64.rpm dd6f52b3c505847b5546f3c8ebe270d6953aeb22da44d873970c360c7569fb52 libtsan2-14.2.1-1.3.el9_5.x86_64.rpm 34e8b5ba48aff6d257d44f90170968966afae333ec02c8c875e23d6a8a6d4ba6 RLSA-2025:1309 Moderate: gcc-toolset-13-gcc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for gcc-toolset-13-gcc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc-toolset-13-gcc13 package contains the GNU Compiler Collection version 13. Security Fix(es): * jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods (CVE-2020-11023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms gcc-toolset-13-gcc-13.3.1-2.2.el9_5.x86_64.rpm bc5c3b646535eda7b65e323dfceffb5eee1024ca19bd091c190fb0a68b4fd606 gcc-toolset-13-gcc-c++-13.3.1-2.2.el9_5.x86_64.rpm b5ee6b7f650e26a9697dd37891cc481ad2e285fdda8ee6c2e1e0db6ebea48fde gcc-toolset-13-gcc-gfortran-13.3.1-2.2.el9_5.x86_64.rpm e5d5242efdc85adee1c48e70f63094916f7fd497535f9b99fe7549d9acddaf0b gcc-toolset-13-gcc-plugin-annobin-13.3.1-2.2.el9_5.x86_64.rpm ee6f2c86a2355a4ca4bbcf4f56041794d30a42704a80512e19113d5b78fff0a0 gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el9_5.i686.rpm 4fb1ec79e1d1606506eca85b996ffbccdfe86dd21ee61df2dcd9af8bfe8b7f06 gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el9_5.x86_64.rpm 21c30595772dd4a6dadbc5f0ed83dbb8e262152a46d8d598269495adbc6f04ce gcc-toolset-13-libasan-devel-13.3.1-2.2.el9_5.i686.rpm 0fc6ac71ec82e533617a0f7f25ca53720a665d48d8ab02a8a1c00e45bde6deed gcc-toolset-13-libasan-devel-13.3.1-2.2.el9_5.x86_64.rpm 233c2421cead89007a87a2486eec45834680f1aec861e78b063c49e4aff8fff5 gcc-toolset-13-libatomic-devel-13.3.1-2.2.el9_5.i686.rpm b4b2b7b4ebdd7257e44dcb9e8a18b49dcc7f85f9de3cfbe14ce094a0e9f2593e gcc-toolset-13-libatomic-devel-13.3.1-2.2.el9_5.x86_64.rpm 4acac9699ee47273868bd09d0feab2dc75744a39f1c66c5db74fee38990fb4aa gcc-toolset-13-libgccjit-13.3.1-2.2.el9_5.i686.rpm a4b7309e4da3ee04c3452aba4c2aa1d41ca9ccfbcf529d06c8e914f73a5729b1 gcc-toolset-13-libgccjit-13.3.1-2.2.el9_5.x86_64.rpm 8bf2c6fb5f42acecab918cc27063f4782e8e84e1e7f2bd209ac5c51a74118251 gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el9_5.i686.rpm a9476d46d303a863b71e35659dd0b0679eee75ab140f5ce282bd7759011bf057 gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el9_5.x86_64.rpm 603552d85511075283224ef8ee81c74f1aee1291f9df45f23042fa29e4cc4cfe gcc-toolset-13-libitm-devel-13.3.1-2.2.el9_5.i686.rpm c8ad171a67a83fc261a8e5899c1b9467bbde8eda7f14498768bd584ad99e5a3b gcc-toolset-13-libitm-devel-13.3.1-2.2.el9_5.x86_64.rpm 561a9988ba615e28e4bc0acd5a116258e80d6d9756f61cc4e420216229b01446 gcc-toolset-13-liblsan-devel-13.3.1-2.2.el9_5.x86_64.rpm f41dc3f00e61d1813034c0829b57d770a28e8727604315aa3c08067586c8faba gcc-toolset-13-libquadmath-devel-13.3.1-2.2.el9_5.i686.rpm 7f3b75713e759719c81f81eb29bf71557e2a13c710f56242833b53283cf0a173 gcc-toolset-13-libquadmath-devel-13.3.1-2.2.el9_5.x86_64.rpm ab2ee740f7ee97666b5e982e3400e1f478295db74a128ff5ad5689a624055633 gcc-toolset-13-libstdc++-devel-13.3.1-2.2.el9_5.i686.rpm 391e6bbf1b1393dce07c37d21a137a3a9ac8e25b7481205accf8a0d5a3e1adb9 gcc-toolset-13-libstdc++-devel-13.3.1-2.2.el9_5.x86_64.rpm ccb3a7d10948e12d58a65fb9f947f7ab0f84af81ac1c9965a9ff1a515791fd4b gcc-toolset-13-libstdc++-docs-13.3.1-2.2.el9_5.x86_64.rpm 2132db3c0323180bbc9c1cec2b5d5e78badfa2dbfd58542785a48d48deae8ef5 gcc-toolset-13-libtsan-devel-13.3.1-2.2.el9_5.x86_64.rpm 676c5084d5ac78bb2ab9ecf72c211c0f8670cb8199236e73249784a5ccb929eb gcc-toolset-13-libubsan-devel-13.3.1-2.2.el9_5.i686.rpm 4cd9ad88617f8c04d9b87e72fb986d562638bf3e965fec1e91ecf2259c9684ba gcc-toolset-13-libubsan-devel-13.3.1-2.2.el9_5.x86_64.rpm 5876e697c0625db3c6772799862e19f85ca236d52384d7e6d618f9f02b953cea gcc-toolset-13-offload-nvptx-13.3.1-2.2.el9_5.x86_64.rpm 3854537a72fde399f98853e12a4a6bcbf2920fd65bb28d725419f7f5e6d19d6f RLBA-2024:2443 libselinux bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libselinux. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libselinux-devel-3.6-1.el9.i686.rpm e3d2ca801ba991e588d495eedef08a028cb029dfbac42d435a9d2b7a1ddf059d libselinux-devel-3.6-1.el9.x86_64.rpm 53f451c22a43535c5542c1c41fcb3acd44b013be171367ba54436cd235a5edc1 libselinux-ruby-3.6-1.el9.x86_64.rpm 5e97adc57d3603b708ef01385f8169a168c5228b545e9e2f2347c722e0e5374f python3-libselinux-3.6-1.el9.x86_64.rpm 3744ff0bdd26d9666c0025a2a58fb33a482a13a1c92bd6fc9b7347984ccd6db9 RLBA-2024:2454 nettle bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for nettle. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms nettle-devel-3.9.1-1.el9.i686.rpm cd77fb736b0d481cd3f5e3d93ec45d16574bdb750185be7d10b56ba3268e20b8 nettle-devel-3.9.1-1.el9.x86_64.rpm 30333749ec75e76ce5bcc54ddf6877461c388802bfd7b026d31e7797a14e0e64 RLBA-2024:2457 libnl3 bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libnl3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libnl3-devel-3.9.0-1.el9.i686.rpm 3771b1a994d477d43aeea4f1858caef1b4929572b211df47146e3a7296845d6a libnl3-devel-3.9.0-1.el9.x86_64.rpm 537cd61150b79ace602af6e30e07374a73c8f396e0e49f2ffd9d3e01cf6d247e RLBA-2024:2460 openldap bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for openldap. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms openldap-devel-2.6.6-3.el9.i686.rpm 9f2eb26ae79c2dddd8cd8f3930ce11bdc0eb73b068f843adeebdc8bd03fc2fd3 openldap-devel-2.6.6-3.el9.x86_64.rpm 724740cc641a431cc169dbbef1b37496ac18bf41331916f6c7ff1ff376ab96c9 RLBA-2024:2487 python-requests bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python-requests. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3-requests+security-2.25.1-8.el9.noarch.rpm 676b05532e43a8b7ea183fcd2b858549aa191d0d65e4b6a722d77bd72bfa8de5 python3-requests+socks-2.25.1-8.el9.noarch.rpm 80220380ba92bd3a66c65bc44a0dc996c568417c2c807c703dc2712c939124f5 RLBA-2024:2500 fwupd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fwupd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fwupd-plugin-flashrom-1.9.13-2.el9.x86_64.rpm 69d830eaccc260de22c35d5f219b2ab0e36366121636adbbc08c5fbdcd88cf14 RLBA-2024:11252 sssd bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sssd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * SSSD needs an option to indicate if the LDAP server can run the exop with an anonymous bind or not [rhel-9.5.z] (JIRA:Rocky Linux-66268) * Label DP_OPT_DYNDNS_REFRESH_OFFSET has no corresponding option [rhel-9.5.z] (JIRA:Rocky Linux-67673) * sssd backend process segfaults when krb5.conf is invalid [rhel-9.5.z] (JIRA:Rocky Linux-68508) rocky-linux-9-x86-64-appstream-rpms sssd-idp-2.9.5-4.el9_5.4.x86_64.rpm ca72fdb1bc964e29a6b73e71bf825b93026f007d7256f783634b16a9b4d73e20 RLBA-2024:11253 libsemanage bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libsemanage. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsemanage library provides an API for the manipulation of SELinux binary policies. It is used by the checkpolicy compiler and similar utilitlies, as well as by programs such as load_policy, which must perform specific transformations on binary policies, such as customizing policy Boolean settings. Bug Fix(es): * semanage fails to get lock if / is on NFS (or /var/lib/selinux/) [rhel-9.5.z] (JIRA:Rocky Linux-69531) rocky-linux-9-x86-64-appstream-rpms python3-libsemanage-3.6-2.1.el9_5.x86_64.rpm 6240cebf3aa8e7e62c17ad7535080d53b6c02187b853c6c978e6be5071fb9eee RLBA-2024:2350 pyproject-rpm-macros bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pyproject-rpm-macros. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pyproject-srpm-macros-1.12.0-1.el9.noarch.rpm 1a5c9ea7910fc23befec1ed332c3729aa795f41849a3ad7673ebfb282cc9a7d3 RLSA-2024:2353 Moderate: mingw components security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mingw-w64-tools, mingw-headers, mingw-zlib, mingw-binutils, mingw-winpthreads, mingw-libffi, mingw-gcc, mingw-crt, mingw-filesystem. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MinGW (Minimalist GNU for Windows) is a free and open source software development environment to create Microsoft Windows applications. Security Fix(es): * binutils: Heap-buffer-overflow binutils-gdb/bfd/libbfd.c in bfd_getl64 (CVE-2023-1579) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms mingw32-crt-11.0.1-3.el9.noarch.rpm c51230f416183e0c57de307d407e2ffba39f5c4090da825baba386b61741f5fe mingw32-filesystem-148-3.el9.noarch.rpm ec3132796ec36ed721b243022b478be4a6daf1d12aee2c81ead248ed61269fcb mingw-binutils-generic-2.41-3.el9.x86_64.rpm 9f427f572607cb57bb40d5d6613be6b04d1666085b88f82f6c7be6a310ef8f88 mingw-filesystem-base-148-3.el9.noarch.rpm 7b01e206f79e561a50b62f94540ad910b9f52435ca135bb0872511c0685f788c RLBA-2024:4759 qatlib bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qatlib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Intel QuickAssist Technology (Intel QAT) provides hardware acceleration for offloading security, authentication and compression services from the CPU, thus significantly increasing the performance and efficiency of standard platform solutions. Its services include symmetric encryption and authentication, asymmetric encryption, digital signatures, RSA, DH and ECC, and lossless data compression. This package provides user space libraries that allow access to Intel QuickAssist devices and expose the Intel QuickAssist APIs. Bug Fix(es): * qatlib: 24.02 update [rhel-9.4.z] (JIRA:Rocky Linux-40921) rocky-linux-9-x86-64-appstream-rpms qatlib-24.02.0-1.el9_4.x86_64.rpm e03575d24572e10d5919879963e1f3df5fcb995b5a996501fe4158f436cb5b06 qatlib-service-24.02.0-1.el9_4.x86_64.rpm 20273dfe3465437abe002819320da9a7771c46006976334bb3a719c9ca41b9e4 RLSA-2024:6197 Moderate: ghostscript security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for ghostscript. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed. Security Fix(es): * ghostscript: format string injection leads to shell command execution (SAFER bypass) (CVE-2024-29510) * ghostscript: path traversal and command execution due to path reduction (CVE-2024-33869) * ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths (CVE-2024-33870) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms ghostscript-9.54.0-17.el9_4.x86_64.rpm 15489effe2f0301e148ee63e3223d43ecc3e4da06b26627001ee298e062cdc57 ghostscript-doc-9.54.0-17.el9_4.noarch.rpm 8fc380d55d4895e82633bd5003f45094ce9ad8dbf862ca0d810bdcbcdef062ff ghostscript-tools-dvipdf-9.54.0-17.el9_4.x86_64.rpm ab2dcde21226cab3180a4386fd6f2d47a715570e2e717d2e303d2d3336ec034c ghostscript-tools-fonts-9.54.0-17.el9_4.x86_64.rpm 3ddad590bf383ea2e95149b572afb328612494d6c3a16684930aac1a143da836 ghostscript-tools-printing-9.54.0-17.el9_4.x86_64.rpm ba1ec6a5268f06e1b64287f65849647f6d82bc1eaf53ded828aee82169c376dc ghostscript-x11-9.54.0-17.el9_4.x86_64.rpm edf9284756cb04c4afa3864133be4b6c68cb2faf25440a7080247732838988bd libgs-9.54.0-17.el9_4.i686.rpm b260e17cc12e158a0c1825415d68fb62646c750b0c270e7167526f130cffb6ad libgs-9.54.0-17.el9_4.x86_64.rpm 863d2e89d8404a002c559d5a87e8cfa617539103507e5db923d73a844fcb254f RLSA-2024:6356 Important: bubblewrap and flatpak security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for flatpak. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bubblewrap (/usr/bin/bwrap) is a core execution engine for unprivileged containers that works as a setuid binary on kernels without user namespaces. Security Fix(es): * flatpak: Access to files outside sandbox for apps using persistent= (--persist) (CVE-2024-42472) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms flatpak-1.12.9-3.el9_5.x86_64.rpm 80eacd4468c3f7f76b7750d862f89d23b46e475d3d7c337eafac8dca204fc36a flatpak-libs-1.12.9-3.el9_5.i686.rpm 2aaaf694f61da1d2942f876500edd4e652eafca864a1618e363f37b37fbbcd2b flatpak-libs-1.12.9-3.el9_5.x86_64.rpm 74b4b7d4cb8a41a1ff43b5694e3f19b5d2343bb77d5405f89d9a9e650bd63ca2 flatpak-selinux-1.12.9-3.el9_5.noarch.rpm 9a7a53e33d124e6838a778da95590442fdd3b984734b618807ef14ffff2e2194 flatpak-session-helper-1.12.9-3.el9_5.x86_64.rpm b50f940198df8ce8868e962728202d50fd8711058a41c3e64ee4653bec2866ba RLBA-2024:11220 ant bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for byte-buddy, jzlib, xerces-j2, xz-java, xml-commons-apis, jdepend, regexp, jakarta-mail, junit5, assertj-core, univocity-parsers, jakarta-oro, objectweb-asm, hamcrest, opentest4j, ant, antlr, apache-commons-logging, junit, xml-commons-resolver, jsch, bcel, jakarta-activation, bsf, apache-commons-net. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Apache Ant is a Java library and command-line tool, which drives processes described in build files as targets dependent upon each other. Ant provides a number of built-in tasks allowing to compile, assemble, test, and run Java applications. Ant can also be used effectively to build non-Java applications, for instance, C or C++ applications. Generally, Ant can be used to pilot any type of process which can be described in terms of targets and tasks. Bug Fix(es): * ant: Add OpenJDK bindings [rhel-9.5.z] (JIRA:Rocky Linux-62405) rocky-linux-9-x86-64-appstream-rpms ant-1.10.9-11.el9_5.noarch.rpm 1c4aec9df75cab4de1294af4857af0bf672528f1092044e2c38fe7a00a363cd1 ant-antlr-1.10.9-11.el9_5.noarch.rpm fd0895435fed9892fe409db9e3cdccb6d1496630afd651a53060ddfd17656d1f ant-apache-bcel-1.10.9-11.el9_5.noarch.rpm a7e1449ca05cc60924b0f873a8abea8f5d6d3e646a7aca9600f08c73539b1acc ant-apache-bsf-1.10.9-11.el9_5.noarch.rpm a0c5e55694e0e37e34965f7043de9479ffb6140c74439d2557d56cd4bc9ad199 ant-apache-oro-1.10.9-11.el9_5.noarch.rpm 8566017758aefdd542ce6a62041e6a9b2b988dd03388ba38027e345f1cf04875 ant-apache-regexp-1.10.9-11.el9_5.noarch.rpm 11cba04f4e37ce2e7d30df42da5d5f96dbf7fa60ce8f2bbb316415d4f94faf36 ant-apache-resolver-1.10.9-11.el9_5.noarch.rpm 79fd9596a8c0fabe630789988b9dab3f4a4ef680c2cc3d0c90ca8e0dac8a9bcd ant-apache-xalan2-1.10.9-11.el9_5.noarch.rpm c3bf010e5d5f1905da74b5d71b00262e5c35c1b5e834d0a7e52d59fe650639de ant-commons-logging-1.10.9-11.el9_5.noarch.rpm 04dc67de448d8ccf06e32df1367c261b262ff0a988cbe175e5fcb4e4b9cc8285 ant-commons-net-1.10.9-11.el9_5.noarch.rpm 992b63b67a5acb6ed48f8e3bf9839434fa060286ffd325bc3ff314b39375690e ant-javamail-1.10.9-11.el9_5.noarch.rpm acdea8988cb8ad841f69c8f0d82d58299a1f1205ee87c4ed7daa314e77c4a1c0 ant-jdepend-1.10.9-11.el9_5.noarch.rpm a8fb999950207209ef4c34383116ae9c04450519ef1ab7f74ded8e8da9f98853 ant-jmf-1.10.9-11.el9_5.noarch.rpm ef28afc8865422dadc6bb86ba330f0b67c9ddca6fa72cdcda09568ebc5ad8342 ant-jsch-1.10.9-11.el9_5.noarch.rpm 6496ed6fdee2705ef1c1560aaddd82a828df453d4c348432545936e08f9a51af ant-junit-1.10.9-11.el9_5.noarch.rpm 4445b849b6262d1e436af9c80a07cda70b3a4325910e20a67a8058780c488d1e ant-junit5-1.10.9-11.el9_5.noarch.rpm 4423797ac4487eb43fde4fc1c7974548c3b6ee29077a6b3011063d91ba9602ab ant-lib-1.10.9-11.el9_5.noarch.rpm f9519570cb3bfadf8674b0d94f3daff63bfd4757b6efb789e64ebcc8d52fc762 antlr-tool-2.7.7-70.el9_5.noarch.rpm f88990fec7ddf6acfc00756aa843f9b6d1e72bf38cd47d713146c3be8921e249 ant-openjdk11-1.10.9-11.el9_5.noarch.rpm d4ca711c2c1be3203f4a7538fe203bf6b4c15939c09ab36e0bdd05dda79e192b ant-openjdk17-1.10.9-11.el9_5.noarch.rpm 726a562b2251c710c7841a57b7733bf67bb026a40c62992059f3fdd6702a0699 ant-openjdk21-1.10.9-11.el9_5.noarch.rpm 751586f497071e427a77b2ee39acd10bfea31756ec0917e4e6e7132ca0289b24 ant-openjdk8-1.10.9-11.el9_5.noarch.rpm 8e24e1c573386fec69a9a08c78b9b136de56933ecbf84ff1cbe54b24e9ae85d4 ant-swing-1.10.9-11.el9_5.noarch.rpm 02b8d80681a15db831af32a9e8088cd0398318ce00bd33d523e89742f8ae84f0 ant-testutil-1.10.9-11.el9_5.noarch.rpm c6d005d7aa725d9ae2a0970e65acde476f13041cd825edbcf99c36a91724242b ant-xz-1.10.9-11.el9_5.noarch.rpm 698e387118a0629fab8c10853894d5483f0abac29ebd19e78271128f97c13d1b apache-commons-logging-1.2-31.el9_5.noarch.rpm 076fab2c3b13fde2586fd82249c221f73bde11eab292e4505deb1b24084facc3 apache-commons-net-3.6-15.el9_5.noarch.rpm 66bf86679254ccfc645f40aa5753d2519727ce34afa85aeccb90b9227568ca57 assertj-core-3.19.0-6.el9_5.noarch.rpm 41c3093573d2c707bd0b6cfc9101bb9cf5891374970cb1f65eaaa9963cbd5870 bcel-6.4.1-11.el9_5.noarch.rpm 9cf2f0c13b6eab7a1000bafa2ce6ae999e1adbc1e894fcd55b78ddb871aa69f6 bsf-2.4.0-45.el9_5.noarch.rpm d77224d70e968e3a391a33dd5cc6fbf7a9036d2e5a64d61ea7d47ffcd7c02913 byte-buddy-1.10.20-7.el9_5.noarch.rpm 9c1cea78988441136bff9f04326b7a1a3e302cfefe716190ea855ce2424148eb hamcrest-2.2-9.el9_5.noarch.rpm 106ca09fc8a2883044fb05d04bac90bd8426fad1e1b2f7c67e3d291bf16f7654 jakarta-activation-1.2.2-6.el9_5.noarch.rpm 95bd815ec51166ce25ccca83a52d23cb36942e4713d34bc0c24fc9bde1b87966 jakarta-mail-1.6.5-6.el9_5.noarch.rpm e792e337a6a3c5c02555a36179b7abdf12bacc6015a68e7618e6bc0ebbd9e67f jakarta-oro-2.0.8-36.el9_5.noarch.rpm ec9cb2cfc39d6038d4a9eac891276cd082d77b60b90af405aaa03bdde3e29c86 jdepend-2.9.1-29.el9_5.noarch.rpm 8f32f06bc130f7000cc62a739fb59e849b05c25aa7a3ae20c3bb23e0a7d8aeab jsch-0.1.55-6.el9_5.noarch.rpm c6aa4517b05bb15d44a31f08523f267c4bfe1fe435d95e939eb8497cd2770a92 junit-4.13.1-7.el9_5.noarch.rpm 2687ac5a0b2fcad707eaf307ccdbbbac76fd01e4ab788fec7f98b3c3240aee37 junit5-5.7.1-6.el9_5.noarch.rpm 410120c1f750c87af60e9e3f2884cb3cd9b2d4ce343f862552bf4c37d97f9c5a jzlib-1.1.3-21.el9_5.noarch.rpm 819b86ff0674102366f16bf647966be7815bef7706ed7f775bceff6bbecd231c objectweb-asm-9.1-6.el9_5.noarch.rpm 4364992df6971959294b679dd537c6ae3138efa444cf5bd5064ab8268332d8ea opentest4j-1.2.0-10.el9_5.noarch.rpm 1f26cc5b507705f16e8c2aa9ff0689957c67b2adbc9d127659913931f24579f1 regexp-1.5-39.el9_5.noarch.rpm 78ea3c07047dd4116565f7f956b32e56b20f23af8ad334622437e7d40a16bea0 univocity-parsers-2.9.1-6.el9_5.noarch.rpm 40443d59904066181bca1363d29a8b0aef5787e27884a263ddbc8ece8d66ea31 xerces-j2-2.12.1-8.el9_5.noarch.rpm 8295da0ac0c1e1f1fd2969f1ea79583944873aca707ad48d7dbc4f2069a9ff09 xml-commons-apis-1.4.01-37.el9_5.noarch.rpm ea0b78bea7bae81ba063bb65a7cc56de729fb929fee9de7a1b06a302075b35e6 xml-commons-resolver-1.2-39.el9_5.noarch.rpm 994f345c1d9800affa35087c86e51a44051a1c3fb04241015347923f1ab0544b xz-java-1.8-15.el9_5.noarch.rpm e6d96628b59b81e9a33f75fb34ddf4a03f0ec0328d5ce40659da5ff550650175 RLBA-2024:11222 maven bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jansi, cdi-api, google-guice, maven-wagon, plexus-cipher, guava, maven, httpcomponents-core, jakarta-annotations, apache-commons-io, maven-shared-utils, apache-commons-lang3, apache-commons-codec, plexus-interpolation, plexus-classworlds, sisu, plexus-sec-dispatcher, jsr-305, maven-resolver, httpcomponents-client, apache-commons-cli, plexus-containers, plexus-utils, slf4j, atinject, jsoup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information. Bug Fix(es): * maven: Suggest maven-openjdk17 [rhel-9.5.z] (JIRA:Rocky Linux-62398) * maven: Add maven-openjdk21 [rhel-9.5.z] (JIRA:Rocky Linux-62407) rocky-linux-9-x86-64-appstream-rpms apache-commons-cli-1.4-18.el9_5.noarch.rpm 04da72630479a92a25157004a1f09bf525f091769f6c4fa13e7ef5aaffb08fbc apache-commons-codec-1.15-8.el9_5.noarch.rpm 894241cf0e45528ff00118c2b6ad79550b63f89c0f8b77b79e58254c2115f06e apache-commons-io-2.8.0-10.el9_5.noarch.rpm 46413f0bf2810291d66d0dbd0992471c684580eac73cf295e99e066dbe98e174 apache-commons-lang3-3.12.0-8.el9_5.noarch.rpm 41eeb78b8c9bbcf4b6efcc7623b7c5ae7e988a707be02824cfa9eaf68afba8b6 atinject-1.0.3-7.el9_5.noarch.rpm 19c4267998818ee76f2a9d8d9edbd24c4135a73928f9d5e7cbf65066b7aaf1e6 cdi-api-2.0.2-7.el9_5.noarch.rpm 30883769f6b0d175e2bfaba213bd7a29aebb3c84ee084b8ae4cd4b858182e208 google-guice-4.2.3-10.el9_5.noarch.rpm 334c479a28c490f9576db65fea67ecfcaef04c53bd87ea850867d91b3477144d guava-30.1-8.el9_5.noarch.rpm 4edf35bc681794407fa0be5e0fe5a3207bf911c7b44f4e792b7e1bfb0ddf90e6 httpcomponents-client-4.5.13-5.el9_5.noarch.rpm ad92ab286f6db164dca0abb39750fef669036ad35fe24cfcac6362425dd7441c httpcomponents-core-4.4.13-9.el9_5.noarch.rpm 0400ad0c9a620f5981ab8b59405b6c7a3b89e1c5515716f184734cad896b97e8 jakarta-annotations-1.3.5-14.el9_5.noarch.rpm b3eccaf167c17ba118e753d1f55ef44ded9a4012df2506478e8e84eb0fc86b8b jansi-2.3.3-7.el9_5.x86_64.rpm 7339bd473e9b3b0b37a0515a259a9151761e7bd22242c07a0e82599bbbae1ec8 jcl-over-slf4j-1.7.30-14.el9_5.noarch.rpm 9459a36182b0dc723c6bbdb0218e4b84d93647b3f13c401306344c7ac38cec05 jsoup-1.13.1-11.el9_5.noarch.rpm fd55edecef7f15eaf622d160d39136b057331e042b336e8072ea86291e63fc9b jsr-305-3.0.2-7.el9_5.noarch.rpm d8879d3aa5d1f5044eaee485261ec351180b953366a948ed7c07ed0132b6c400 maven-3.6.3-19.el9_5.noarch.rpm af1c37b6d579fd7ffc59f0c906e8a0c5c2785d594a20ebf1776f8b7c20b1f31b maven-lib-3.6.3-19.el9_5.noarch.rpm d22cb618f580cf1704810511dbce01855a5228b414f00078a17f905a93a8d234 maven-openjdk11-3.6.3-19.el9_5.noarch.rpm b95fe7b253b702421288c2be6db001ac5d5141151a50b5bc6b1facd460bd6afe maven-openjdk17-3.6.3-19.el9_5.noarch.rpm 0e34cd602afc5fa28200378674fd1d74d29a2ff27f07682e76a51e5e01be5b46 maven-openjdk21-3.6.3-19.el9_5.noarch.rpm 4db0384edd684b1c06e3ee1b10e11b10464f322f664e724e5a818dd0b0734669 maven-openjdk8-3.6.3-19.el9_5.noarch.rpm 88f390b45a57ad969f0dff4b8b0a9f0b34fbc23220c0dfa4921bb547515d3259 maven-resolver-1.6.1-12.el9_5.noarch.rpm a6cf8c57f9e4230917791e3fcc27c5c750b19424cdc1406537285281099f3e63 maven-shared-utils-3.3.4-5.el9_5.noarch.rpm 0417d35e3c4bcfc9a5e0aa52febb6bca767e6c0c46dd06373b5a30314ac32fd5 maven-wagon-3.4.2-8.el9_5.noarch.rpm 32059059feb662305e159ace4fe3b40477411b836727c6190accc52caf1148f2 plexus-cipher-1.7-28.el9_5.noarch.rpm 3dacbcb72e638900a781f086fb1475876834496c6ab2a0a31b6674672cae9477 plexus-classworlds-2.6.0-12.el9_5.noarch.rpm 9fb6fb8af81afaa50c0e4f6c5cbb8238fdd65209e59c71305309d20df5dbb703 plexus-containers-component-annotations-2.1.0-11.el9_5.noarch.rpm eac8aafa8d7cefb2cbb37a0138d2995219898cef6f9914f2298bd523b8845554 plexus-interpolation-1.26-13.el9_5.noarch.rpm ba9a92ade4c70fcffbd28e0ffdefaf60b994a138b674f80c9bfb80ab9c7de598 plexus-sec-dispatcher-1.4-39.el9_5.noarch.rpm efeda0b1ee009ede8b11517d9ec0abb181677edb9e96337cdc097cc1d2e76b29 plexus-utils-3.3.0-11.el9_5.noarch.rpm 24fd272c4742e8d18371c7ea998e8f0e8f367f9c701fd4cf26cede84ffaead16 sisu-0.3.4-12.el9_5.noarch.rpm 7015eb49550303d7ea5657968d35f583fb3de41329e122f7c9fa39fc60215ac0 slf4j-1.7.30-14.el9_5.noarch.rpm 795803c0ee2023607c2e6dd3922930ccd4aa5b8a20ec3d55d196fd7074dac508 slf4j-jdk14-1.7.30-14.el9_5.noarch.rpm a44926d065682a8a1ab13d15b5b6d8198ce580bb475442f4df1612df99743df3 RLBA-2024:2148 evolution-data-server bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for evolution-data-server. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms evolution-data-server-3.40.4-9.el9.i686.rpm 8b6f9a14de82145ea069ca8a467b1f7fe74c89a292b054dae536e13b5ca0420d evolution-data-server-3.40.4-9.el9.x86_64.rpm 8ec8132e4fc15b05c0a84399626f0373edff9a86f02444202640861ecc1d5f54 evolution-data-server-devel-3.40.4-9.el9.i686.rpm 0e98e15dec04ce6ca33510feab368e134a8cbb084ab198d597a9ea1dc95689c9 evolution-data-server-devel-3.40.4-9.el9.x86_64.rpm 8c28a38536cc9a2419269a6e546a3f518fcb109ee84153ae12418918c0343729 evolution-data-server-doc-3.40.4-9.el9.noarch.rpm 16c5a08f942847ec4b817e4191dddfb0a571a1c1aa5e12110c600acb277880e3 evolution-data-server-langpacks-3.40.4-9.el9.noarch.rpm 0cec2d5e0b6f21e16417c45df72c91c18b3f889926c98f42b8f6cc3d0ccd6bae evolution-data-server-perl-3.40.4-9.el9.x86_64.rpm 081305cab753a2fccf196fee639851fdc8700ffa26331a5a4eff16b2e7bd4800 evolution-data-server-tests-3.40.4-9.el9.i686.rpm 545197cd2a908dcb2e6dc86fb38577d1f15040b5aa862aa3cc69bab3de53e92a evolution-data-server-tests-3.40.4-9.el9.x86_64.rpm 9e87d78681e21e551507686dd1ec1a538e13c221102685261e3cfc3088875ac9 evolution-data-server-ui-3.40.4-9.el9.i686.rpm 94b597cdca328ae3c025a63c70e6e45e1542577c33da7eacb880c443291bd672 evolution-data-server-ui-3.40.4-9.el9.x86_64.rpm c3768a81fa81b138e462e7d0249dfe287ab039a4d00f9497926c83f0fd3d553f evolution-data-server-ui-devel-3.40.4-9.el9.i686.rpm 198fdd59ae48c2e2688de95b69072ae18c7032026cfb150f0ecf4ac9024f0044 evolution-data-server-ui-devel-3.40.4-9.el9.x86_64.rpm 6164be553136a47121c821e17cf94a90a2bda6d3d31a99a07863136e7ea23a7d RLBA-2024:2144 libkdumpfile bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libkdumpfile. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libkdumpfile-0.5.2-2.el9.i686.rpm b4a0a3ac89b97ff762927e257a2b02210d96b5264b68348bb6de5c96dfd5cc89 libkdumpfile-0.5.2-2.el9.x86_64.rpm 070236a9b2d05979b5e3b67ee33ffbf8c4acf266eef5eaf66d28587b577ac495 RLSA-2024:2145 Moderate: libX11 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libX11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libX11 packages contain the core X11 protocol client library. Security Fix(es): * libX11: out-of-bounds memory access in _XkbReadKeySyms() (CVE-2023-43785) * libX11: stack exhaustion from infinite recursion in PutSubImage() (CVE-2023-43786) * libX11: integer overflow in XCreateImage() leading to a heap overflow (CVE-2023-43787) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libX11-1.7.0-9.el9.i686.rpm 34b2f17a30de2ed6c1cdf43ee2d524ce9c616f9d236c5c018b6bf76f04ec02ca libX11-1.7.0-9.el9.x86_64.rpm bd4fb0a4223fb3d842cf476a895869abb455e69e456535bab81fd0341c3ef8cc libX11-common-1.7.0-9.el9.noarch.rpm bc6997ba2e9741f99446ecd29ecdd2730adcba45aeaf7ab286a953a1fb936083 libX11-devel-1.7.0-9.el9.i686.rpm b054456e38df83ce62b6952403e97cf93407b6c5ac66dc9275ec6016fd13b746 libX11-devel-1.7.0-9.el9.x86_64.rpm 3c7e327d39e21d365a71e7f00ad8b15eac95109361de60397ecb915dae1ff726 libX11-xcb-1.7.0-9.el9.i686.rpm 0e69f769a446745b18e74414e3e1dc9d713b1c063f456f892fadce1692c2159e libX11-xcb-1.7.0-9.el9.x86_64.rpm c92a3188c44a3f0e760bd1c6e580f814d814aa538957a0bfc6d0f5e04df7c976 RLBA-2024:2164 virt-manager bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for virt-manager. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms virt-install-4.1.0-5.el9.noarch.rpm b6f49e815a392e8e03792c296d1d6f4b119efc53e3a28777cf6ef7f6cb767a55 virt-manager-4.1.0-5.el9.noarch.rpm 5ad7fe3702c776ff7361f4e2f3576aac8fc441667487adcc957fa363588f83ad virt-manager-common-4.1.0-5.el9.noarch.rpm 449cf3f7e66ce03b1b1ab92cf77e2f4bf66a3b630f5144c74b2282e180ad8d9c RLBA-2024:2173 libblockdev bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for libblockdev. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms libblockdev-2.28-10.el9.i686.rpm a5ed25900523410cfd88e7f908b547fb16d24c308797acd56889032516f22aac libblockdev-2.28-10.el9.x86_64.rpm e44ff53b9c974d1646a8a622e0af3f27621196721920956eb213291b9d74c33b libblockdev-crypto-2.28-10.el9.i686.rpm d287e44eef3443efad013987ee90da5a9410af7ead940186e0b2538dfd64cefd libblockdev-crypto-2.28-10.el9.x86_64.rpm 148aefffb89821910e2fb80786afb8237fe0a2430fc492ac4edfb3c6c3d4320d libblockdev-dm-2.28-10.el9.i686.rpm c39ac1054bc620eb646b7810eee021dd3e59cba00b166e7e6526cd3d9c2c6378 libblockdev-dm-2.28-10.el9.x86_64.rpm ecdfd7a25b082c2eedfc8c8acab924b2324586ea152ca8db4d0261ffd3fb2723 libblockdev-fs-2.28-10.el9.i686.rpm 4fb8ebf7df2c1b12110391277962dcb24cb2d7e591c3e50347aaf27f460a2e62 libblockdev-fs-2.28-10.el9.x86_64.rpm 6ba19b8ea755760d9a8c76ea9183c080e98ac8bff6ac896d11c88cdd49078e9d libblockdev-kbd-2.28-10.el9.i686.rpm ef682c7662af6afdf3e1bf1ba562da2b20af62eb7c76d9bae406716489d1b24c libblockdev-kbd-2.28-10.el9.x86_64.rpm 8734ec14285b9af361289cc7ec5a27cd4b4fa6b18aec237fdf1079f1bc616860 libblockdev-loop-2.28-10.el9.i686.rpm d9f3e25adf08fc64332a53e7b3d6d3c04c692d325bf48cf35269e749510e215b libblockdev-loop-2.28-10.el9.x86_64.rpm eeda2f3f6769c80c6163cd66f0a2cb3771ffe6e32bd7cb1a2d0d02a7484ca3d8 libblockdev-lvm-2.28-10.el9.i686.rpm 4e184e1373a55a27f6db3d275b943edca5c6c4274aed5cbf379356a5bbe62f96 libblockdev-lvm-2.28-10.el9.x86_64.rpm dc60d66d0ea6fa938801200f1ba5aecd907706dd52fdbb457702a3ae5da299d2 libblockdev-lvm-dbus-2.28-10.el9.i686.rpm fdd339a4c0768e35e7cc8fb7aa376e428125ba5b38fdeca48722f3b78d5570b3 libblockdev-lvm-dbus-2.28-10.el9.x86_64.rpm 02d0e680a064ef80d0141c8994e2a1cc47b09b27d9baca711ec64015e314396c libblockdev-mdraid-2.28-10.el9.i686.rpm 91f7fbf0815659c4aff068046f3aa68da8605067515da1005aae02f41b9f8d95 libblockdev-mdraid-2.28-10.el9.x86_64.rpm 88fde156d7154c26a843c16fa8b15b08516540179d11f9c51d642a143ef68542 libblockdev-mpath-2.28-10.el9.i686.rpm d4cebbb57ee3c783bdf23252d5cdeac6ce573f0e4721201aec57f243738ccf42 libblockdev-mpath-2.28-10.el9.x86_64.rpm 8a2618010cbc9ecb0fc63bbe40f3b9d62f8c2a5deb7c5939b699108cb4cd79e7 libblockdev-nvdimm-2.28-10.el9.i686.rpm 7ae29a1d32e1a87aeb891086e0e92298646e924cfe43675c60ea017d19805cd7 libblockdev-nvdimm-2.28-10.el9.x86_64.rpm 8c9a6d65ce5b2b469ffb60382faa421c624988b1ccb41d25a9fafb185c065ac0 libblockdev-nvme-2.28-10.el9.i686.rpm eadf4dca61f4ff0f2a63fdb44cc69c322366e35d5870941081c4dc203917d2e8 libblockdev-nvme-2.28-10.el9.x86_64.rpm a5ef56ab0c579839f1a19c0839a91d1286e5ab15ea0a23035e632c799bd823c6 libblockdev-part-2.28-10.el9.i686.rpm fc71fad445a8a8f7c9169e371933ef4dd590a0d6768e4d79f924381f236b17e3 libblockdev-part-2.28-10.el9.x86_64.rpm f6b2f3306aafef32843e30983273c87e5649a1fb3eb0c05e7c57e070e8ab6956 libblockdev-plugins-all-2.28-10.el9.x86_64.rpm dd55369f9c733fcc9fded079f43e7d9b50fa34eef11d120f5f418b3f235a16a9 libblockdev-swap-2.28-10.el9.i686.rpm f3165c018b9b2db5df52bb89b7a465114cec597c2096ea3ad4cdc24b237ad24c libblockdev-swap-2.28-10.el9.x86_64.rpm 66ce03a02b8b6a2babce38224d33ace584cc16a07b7018584d9aa93f8baa4861 libblockdev-tools-2.28-10.el9.x86_64.rpm d9ec549fe5c08439b02f0abc4a0a991672adb80682527404f74ea15d789f43ce libblockdev-utils-2.28-10.el9.i686.rpm 59db799c9fdf16c19f8cfe03ec41aae4e644e100dd1b1f2e9832f830c9335098 libblockdev-utils-2.28-10.el9.x86_64.rpm 835f6fe3d28d80837a8273ec9aa57ab60cadb1029570f786c2d6a07e4949b886 python3-blockdev-2.28-10.el9.x86_64.rpm 3ff3b458323b3413b7f410f200fa192b06292be3fe42c7eef414e1ac5e6248a2 RLBA-2024:2187 stratis-cli bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for stratis-cli. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms stratis-cli-3.6.0-1.el9.noarch.rpm 8acb19639a598849e7af0bbfbcf653e25c6f79075de1bfd14ee87d82eee5635e RLBA-2024:2191 ucx bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ucx. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ucx-1.15.0-2.el9.x86_64.rpm 7cdd77e58a11c24f261641e561b034d1c575a5a78c40a77a843e59a525098f73 ucx-cma-1.15.0-2.el9.x86_64.rpm 7fe2092839942f9a4fc5d23e265594b642bad6d6e9bf2f8265fd9b23e2bf7acd ucx-devel-1.15.0-2.el9.x86_64.rpm 4ff215f2f5c18a4bc0da7a3b3850ad337aa06ba548b828cd3c4e5001999f0c2f ucx-ib-1.15.0-2.el9.x86_64.rpm 3479c055e3ec64cc8a67873a9ed45a94d38bc32def7840754ca4a15d9107eb82 ucx-rdmacm-1.15.0-2.el9.x86_64.rpm 540e62c30e18279ed998cf5b01cdf34f1a63885044b1e4d4e71983ca7eba565b RLBA-2024:2206 rsyslog bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rsyslog. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rsyslog-8.2310.0-4.el9.x86_64.rpm 81e5de9ba7d4da6cad7fc1eac379467a0ae0b03a3934fc07ee57057f880db74f rsyslog-crypto-8.2310.0-4.el9.x86_64.rpm aacde10f787eec52e76c6f8f68ad5c2322eb44ed98175bee7f99ead57f71293c rsyslog-doc-8.2310.0-4.el9.noarch.rpm d4f4d52740d8e2f0df3909a562db23b90c74babc75a5b072a211276ea2e2cc02 rsyslog-elasticsearch-8.2310.0-4.el9.x86_64.rpm 577b370ac9b473eb709ebd15d36cc7f8624f6c7b06ff7a84967a9c1b1576561a rsyslog-gnutls-8.2310.0-4.el9.x86_64.rpm 26b17e10018ff678a804ed0232925bf4126680083a027c7120c693bfdf1c23cf rsyslog-gssapi-8.2310.0-4.el9.x86_64.rpm 8cfcd41e00b38f0f3a0af16bd6d47cc62f2a8a3dd72240482d749e4079029e8d rsyslog-kafka-8.2310.0-4.el9.x86_64.rpm a9c92723ebce0cb629e5f914d659e3211bf5a57addb6649403d0472f7145567e rsyslog-logrotate-8.2310.0-4.el9.x86_64.rpm 4fe33205368b2f62009fab34c857a5c0c92c6bae9de82d2a5f3a28baffd8de49 rsyslog-mmaudit-8.2310.0-4.el9.x86_64.rpm 54c61b391d13cd713522805ead3dadd4c45ed59ddbfa79640f3cad990c40ede7 rsyslog-mmfields-8.2310.0-4.el9.x86_64.rpm 02734df65b3cb3c6acb5cf3167d22f1a8188abd8fce668f1a561268709383f9c rsyslog-mmjsonparse-8.2310.0-4.el9.x86_64.rpm 8fc8af6d6a55c5bd420da8d9d7ed550a02443ea7f4761c9fc9d8cf1c7a14eb33 rsyslog-mmkubernetes-8.2310.0-4.el9.x86_64.rpm 53de1d0978b4b3141f8980270a03dbdd18a18ce512732ff5f9e1368fdb159419 rsyslog-mmnormalize-8.2310.0-4.el9.x86_64.rpm 884be71a64c784fbdf592999604c87ef1d9ebefdfbcf5e680649f7a293b8ab29 rsyslog-mmsnmptrapd-8.2310.0-4.el9.x86_64.rpm 6b5412343f62f2c1c31336ba828aa253bb75dfcef53e5db47da50bdabde92cd6 rsyslog-mysql-8.2310.0-4.el9.x86_64.rpm c34ccf187848f11749ef784554ae8dfbd951dd513e729633858c8b379930bd82 rsyslog-omamqp1-8.2310.0-4.el9.x86_64.rpm 057912a13cd12f4fbc22b535c6642aedf9851000f746dfaba5f024f26af09010 rsyslog-openssl-8.2310.0-4.el9.x86_64.rpm 0876ffeaafd3090c7cf435811c4131b95c2974147e64fdd23e4210a2c3288099 rsyslog-pgsql-8.2310.0-4.el9.x86_64.rpm a370d71201c76deffdf25afd39687b252f484a619e579748f9b0cbc9b592224c rsyslog-relp-8.2310.0-4.el9.x86_64.rpm 0e1efcf43d3a4373a86d738ba0323b2966b9024808f7b27397e4506ce4e86900 rsyslog-snmp-8.2310.0-4.el9.x86_64.rpm a76ebd9a6f59dd55989b4d9091609e329709f1c1ba6bfb7aec6796b3afc211ed rsyslog-udpspoof-8.2310.0-4.el9.x86_64.rpm 42ce40994951a0201cd00b5581fe6f356efb2d05bfa90136fd3b581f1216e27b RLSA-2024:2217 Moderate: motif security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for motif. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The motif packages include the Motif shared libraries needed to run applications which are dynamically linked against Motif, as well as MWM, the Motif Window Manager. Security Fix(es): * libXpm: out of bounds read in XpmCreateXpmImageFromBuffer() (CVE-2023-43788) * libXpm: out of bounds read on XPM with corrupted colormap (CVE-2023-43789) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms motif-2.3.4-28.el9.i686.rpm 6849484501028d8994c15bccd5cebdea754b65eadfe0c725e22a566af05b1726 motif-2.3.4-28.el9.x86_64.rpm 7f1b72f8325ea284a5842360b12c4ecdf5a0d24bef43cea2a1412a93faf7a6b2 motif-devel-2.3.4-28.el9.i686.rpm 5d39183a120fe5ac3eed22dd0d1796851ef710c4a295522a26344b4c94893869 motif-devel-2.3.4-28.el9.x86_64.rpm 5b0d9a2a72255be3f53bbdc07a53db7175c437806c67ab1af1d4bce8076d8402 RLBA-2024:2253 jss bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for jss. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms idm-jss-5.5.0-1.el9.x86_64.rpm 766eab20481c0fe5a0524278f0e29a67cccdc22cd099fd99b205240b516b6c39 idm-jss-tomcat-5.5.0-1.el9.x86_64.rpm e3f456c472ed273e6a2525a97640a6938b84eb42b7b5e39ce7275d0352111679 RLBA-2024:2252 ldapjdk bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ldapjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms idm-ldapjdk-5.5.0-1.el9.noarch.rpm 43a3a04e32377a1c730cecf35f7d6e5951b39d31629df4fe2a3f9b9c8cfac8ae RLBA-2024:2255 smc-tools bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for smc-tools. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms smc-tools-1.8.3-1.el9.i686.rpm 943f2a4a641a40ee061c562ca9104f1c6608f2ef48210b37a4c704c44a5e37c2 smc-tools-1.8.3-1.el9.x86_64.rpm ac7e0e53646cf669576e8c5eac5c08a7f79e7f9e944a72886ce600a76d159dc0 RLBA-2024:2280 ansible-collection-microsoft-sql bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ansible-collection-microsoft-sql. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms ansible-collection-microsoft-sql-2.2.3-2.el9.noarch.rpm e7c4b3880665142de4822ff74645bd38849775d27453982c6d0b7646e16dc91f RLBA-2024:2294 pykickstart bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for pykickstart. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms pykickstart-3.32.11-1.el9.noarch.rpm b0b97b86915eb56e99c9a4bf5d7e1d46145c32bac9ed62115fc9f19dacf7d3a4 python3-kickstart-3.32.11-1.el9.noarch.rpm bb820f53d2104aa7a58fa5d74660059aa3697bbb65f51e881cff376a11d978fa RLBA-2024:2309 python3.12-cryptography bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for python3.12-cryptography. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-cryptography-41.0.7-1.el9.x86_64.rpm 35d2d816387a3e82e2ecce857a554f4f0094b10aa62ecab630985b37cfcf855b RLBA-2024:2389 fido-device-onboard bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for fido-device-onboard. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms fdo-admin-cli-0.5.0-2.el9.x86_64.rpm e134f179df91a99cf7b894e64e0dc2d55ede7fff4dde155fc45e0b98ca8d48d8 fdo-client-0.5.0-2.el9.x86_64.rpm 052e19a734c97b14c81ea013644c78ede717f85e7f60f034391bf0f42637248a fdo-init-0.5.0-2.el9.x86_64.rpm a2c74dc017a113139f65d82f24a4876b8c22f6202c5c27ae5d56b5b03164ee63 fdo-manufacturing-server-0.5.0-2.el9.x86_64.rpm d2c6914a489228104fefc30e4c3e573ab9e81cdd91b04b7f72ea1ab49688b324 fdo-owner-cli-0.5.0-2.el9.x86_64.rpm c1217cf2c8403fcf305e19ff5962812fe2b229e3ce3dd36e9087ded8bac6a63e fdo-owner-onboarding-server-0.5.0-2.el9.x86_64.rpm b7dfc348c0674c5b8c00b35ebde834e343e39911a33af1780647870bb546fe4e fdo-rendezvous-server-0.5.0-2.el9.x86_64.rpm 3c0f3eab39c469cf275ac6f21ad0300608af9689dac74e18b59b5fe5daee26c5 RLBA-2024:4758 qatengine bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for qatengine. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This package provides the Intel QuickAssist Technology OpenSSL Engine (an OpenSSL Plug-In Engine) which provides cryptographic acceleration for both hardware and optimized software using Intel QuickAssist Technology enabled Intel platforms. Bug Fix(es): * qatengine: 1.6.0 update [rhel-9.4.z] (JIRA:Rocky Linux-41076) rocky-linux-9-x86-64-appstream-rpms qatengine-1.6.0-1.el9_4.x86_64.rpm a882fefc905d5f18e055a8fe6d3c89689229486d25e39772fe94b08de35ad378 RLSA-2025:0923 Important: buildah security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for buildah. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile (CVE-2024-11218) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms buildah-1.37.6-1.el9_5.x86_64.rpm 6e47a3030889bdda3210272259681a3c31ade87cdb0d4e6ffe681617800e51bd buildah-tests-1.37.6-1.el9_5.x86_64.rpm ca00f7623e0c2f43bdbb0882ac9ed5b137436d0716753a6cbbf91c506d774d65 RLSA-2025:1915 Important: emacs security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for emacs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news. Security Fix(es): * emacs: Shell Injection Vulnerability in GNU Emacs via Custom "man" URI Scheme (CVE-2025-1244) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms emacs-27.2-11.el9_5.1.x86_64.rpm 76bf72fcea0f033345a5b310aeaadd40507f369bfcbd45bd5288032769535009 emacs-common-27.2-11.el9_5.1.x86_64.rpm 50b20e43e63aa3beb7bb3c4c47180e5c9aa62b04b4973ef1d56ddfed8a1d030a emacs-filesystem-27.2-11.el9_5.1.noarch.rpm 17b9274a53b1287a9da36982096248b91bd26da6307f6abb9da62e2dc0b1dee3 emacs-lucid-27.2-11.el9_5.1.x86_64.rpm ffc61278fa3a10ec21ec7744c25f308ed3ce2614638d6b6a6c9371c24669bcf0 emacs-nox-27.2-11.el9_5.1.x86_64.rpm 696c77b2eb5731a259950e6e2589771fcd4dbf9da7ed50e6dfb56d55987ccdcf RLSA-2025:2500 Important: tigervnc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tigervnc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * X.Org: Xwayland: Use-after-free of the root cursor (CVE-2025-26594) * xorg: xwayland: Use-after-free in SyncInitTrigger() (CVE-2025-26601) * xorg: xwayland: Use-after-free in PlayReleasedEvents() (CVE-2025-26600) * xorg: xwayland: Use of uninitialized pointer in compRedirectWindow() (CVE-2025-26599) * xorg: xwayland: Out-of-bounds write in CreatePointerBarrierClient() (CVE-2025-26598) * xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey() (CVE-2025-26597) * xorg: xwayland: Heap overflow in XkbWriteKeySyms() (CVE-2025-26596) * Xorg: xwayland: Buffer overflow in XkbVModMaskText() (CVE-2025-26595) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms tigervnc-1.14.1-1.el9_5.1.x86_64.rpm 1bbaf3519214e912ff87e50723e36afb3b14cc8a57acd867e92a0efac0911ae2 tigervnc-icons-1.14.1-1.el9_5.1.noarch.rpm 846e000353a8be7794f588779b852a08c983b7c6b5f13a18e60b6411b8533097 tigervnc-license-1.14.1-1.el9_5.1.noarch.rpm c7350af3679285aed436d2032d6c32f9ceac132251fd62ed9c0998ce95491cfb tigervnc-selinux-1.14.1-1.el9_5.1.noarch.rpm 9c2a11c2c28180e3584a0306b7a80a55432cd0b327875e9d8bb96cd19c070c4d tigervnc-server-1.14.1-1.el9_5.1.x86_64.rpm 1e9f54db73c3f55c02a22025ef0af74b4eed8be253c84a02151d9ca1b863099b tigervnc-server-minimal-1.14.1-1.el9_5.1.x86_64.rpm 2f7ddb7d43e0afa3c33111e9d2ff410c7d11afa03c7320e1ad587a07264299a6 tigervnc-server-module-1.14.1-1.el9_5.1.x86_64.rpm afa7cca671a7c6141d6d2ab9a659209a6113e2c86136eb4f2b08a438355a1c1b RLSA-2025:2679 Important: libxml2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libxml2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Use-After-Free in libxml2 (CVE-2024-56171) * libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2 (CVE-2025-24928) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libxml2-devel-2.9.13-6.el9_5.2.i686.rpm d53a8493d41ba11495d3f3bbe33b841b02a44ea9412d921efe49a2355292eb20 libxml2-devel-2.9.13-6.el9_5.2.x86_64.rpm 678d28675f03ae6e5e204f272d8160970b1d1783a5e3d8710e89e342a79317c9 RLSA-2025:3531 Moderate: expat security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for expat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat (CVE-2024-8176) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms expat-devel-2.5.0-3.el9_5.3.x86_64.rpm e28a99fe6a867be1d1795a9bf012a7a88a8f37624f3ccfcadf561e262230ef03 expat-devel-2.5.0-3.el9_5.3.i686.rpm 1daae7c7d79bd008f4a3f6775e45d804bf546fa56581c372cd049c5fd36fae4b RLSA-2025:4244 Moderate: glibc security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for glibc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: buffer overflow in the GNU C Library's assert() (CVE-2025-0395) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms glibc-devel-2.34-125.el9_5.8.i686.rpm 73fbf8beab0fea69803e6c706d7828eaa07ba4b99d4ff1f82cae594c55c5b882 glibc-devel-2.34-125.el9_5.8.x86_64.rpm 71b669dae2d01ab784068454f2a7f196fc6a39c038f92aab025ce70909080a79 glibc-doc-2.34-125.el9_5.8.noarch.rpm cfd172ced118dd02594b94f016a17fd905cb8b6ba3ddf7125946dacbf1278dc6 glibc-headers-2.34-125.el9_5.8.x86_64.rpm 1581f170a3e272715013f4e3d93aec13f97a79c3f720731e02369f8c59c4b169 glibc-locale-source-2.34-125.el9_5.8.x86_64.rpm 139778d5adf58b07b240c760675df2bf54f381a5228b83b47a2924d8398321b0 glibc-utils-2.34-125.el9_5.8.x86_64.rpm 5486c48233c4a1efff382998c7e0421b29ba00b0459584c25adc7351fcfb99a3 RLSA-2025:4341 Important: kernel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: kobject_uevent: Fix OOB access within zap_modalias_env() (CVE-2024-42292) * kernel: ipvs: properly dereference pe in ip_vs_add_service (CVE-2024-42322) * kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok (CVE-2024-44990) * kernel: ELF: fix kernel.randomize_va_space double read (CVE-2024-46826) * kernel: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (CVE-2025-21927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-503.40.1.el9_5.x86_64.rpm ff07e8f615f3ff6466bc3163a2bd4434f2c00342227aa5bcc142d9f6c330a28e kernel-debug-devel-matched-5.14.0-503.40.1.el9_5.x86_64.rpm cfc6361f5e70c33abb43e0d6c55f45624205e9320ae8fb62bd57cdc8fe034b0a kernel-devel-5.14.0-503.40.1.el9_5.x86_64.rpm 92cd4631a44fdefb112feca5d4528089738fd89f726ef5edb936eb31331da3c7 kernel-devel-matched-5.14.0-503.40.1.el9_5.x86_64.rpm d6771e0da9212990c4821ae81dd720d78c4ca751e7b60112b94244bf254e2440 kernel-doc-5.14.0-503.40.1.el9_5.noarch.rpm 86da0adcdfa82a75da3c8ce34385332582a22b2ba222de9def5d3ee89bf3648e kernel-headers-5.14.0-503.40.1.el9_5.x86_64.rpm c1ce3fba00143e7f225b2200b18356da5e6361ea956c9d962d12eb20d25ea301 perf-5.14.0-503.40.1.el9_5.x86_64.rpm 747a2bc8eade099c4dba81b7551463a57a789124a1c9fc1c2c61f806650dd80a rtla-5.14.0-503.40.1.el9_5.x86_64.rpm d496693fba16ca3d830a8cc022d4c105ffbad5dbacb494140b81cd4047972e20 rv-5.14.0-503.40.1.el9_5.x86_64.rpm 8283d0ee23e8d2781c680cd045270998a573b6650bc7f1f1eafe71aded011509 RLSA-2025:3631 Low: python3.12 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for python3.12. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: python: Uncontrolled CPU resource consumption when in http.cookies module (CVE-2024-7592) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.12-3.12.5-2.el9_5.3.x86_64.rpm 9c9d12b1c28e51b866c7970a68ef7eac3e636d775c4a8f51ce3d8e033f9dd8ec python3.12-devel-3.12.5-2.el9_5.3.i686.rpm 561825806417d650da739b460159cd20279aaa10f54c0313b89053d86a16230e python3.12-devel-3.12.5-2.el9_5.3.x86_64.rpm f658b5839b9b15edad5f333812f2cdc1a08a5c9d7c607671c608e1a578251201 python3.12-libs-3.12.5-2.el9_5.3.i686.rpm 256237758a161f72f1beb9964f5a43bdded8d5e74963d1f60f0a29e59af576e5 python3.12-libs-3.12.5-2.el9_5.3.x86_64.rpm 71efc1a9abeb08ea7a32a1899af4d9f31896361554cb09abf4f49974a50c274a python3.12-tkinter-3.12.5-2.el9_5.3.x86_64.rpm ff5d067fe54864d3d86f96c651fff6d665ed087ce328e87ab936fee00db14aad RLSA-2025:3634 Low: python3.11 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Low An update is available for python3.11. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * cpython: python: Uncontrolled CPU resource consumption when in http.cookies module (CVE-2024-7592) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms python3.11-3.11.9-7.el9_5.3.x86_64.rpm 23db3a5a3d124ba9768d9afeced2d6818332a582be85cfd2156fe87e09650614 python3.11-devel-3.11.9-7.el9_5.3.i686.rpm ad41b83a4fbd5e093f7dda6b180d8022f09bd39820e2d0572ab1aa4a5b7fde5c python3.11-devel-3.11.9-7.el9_5.3.x86_64.rpm 7b6956d7a0d77045b6494d74c34b02528492b559e557642e8cbd269c0a4ca9d3 python3.11-libs-3.11.9-7.el9_5.3.i686.rpm 743d1e202b391dbecb9bc4133ce84fdb9c057085ba498d35254f8b0051d874c3 python3.11-libs-3.11.9-7.el9_5.3.x86_64.rpm 4a2020a0c6d29cfdc48af361b7fe14af058f27bfad7d4ec42171899a34ccfed5 python3.11-tkinter-3.11.9-7.el9_5.3.x86_64.rpm ee13a821996e5cabb1296365a4dc90166dd442a86ceb846494e8b8b50b06d9df RLSA-2025:4491 Moderate: 389-ds-base security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for 389-ds-base. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es): * 389-ds-base: null pointer dereference leads to denial of service (CVE-2025-2487) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms 389-ds-base-2.5.2-9.el9_5.x86_64.rpm 502f331b400efb9c3160463ef959cc59e410bddc47e2f23c0935a55f43cece11 389-ds-base-libs-2.5.2-9.el9_5.x86_64.rpm 5d972b05b3a82942dc7d32c95b0389b99f9a051ae2e203f62a17ed2520560216 389-ds-base-snmp-2.5.2-9.el9_5.x86_64.rpm 9ad472b9ea9f5f3a401f069a219a0729cc25d4c0e470275d4a09abce3722dc86 python3-lib389-2.5.2-9.el9_5.noarch.rpm 36768b6576ca2bca5d30864d479f774eab8ee837b7e93d23302793330e2e1184 RLSA-2025:3113 Important: fence-agents security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for fence-agents. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Security Fix(es): * jinja2: Jinja sandbox breakout through attr filter selecting format method (CVE-2025-27516) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms fence-agents-common-4.10.0-76.el9_5.6.noarch.rpm 5919ab248b8025e88bcc9554062e04c9406e1b17849c66ff033def74c173d8dc fence-agents-compute-4.10.0-76.el9_5.6.x86_64.rpm 921195169138cc32e55077fa604c15d02e079cd19a637e0e128da585eec893a4 fence-agents-ibm-powervs-4.10.0-76.el9_5.6.noarch.rpm 62c8ead516da824e97c05ab8f70290beddf665bb9e9485f8ee0c4efbcfa275a4 fence-agents-ibm-vpc-4.10.0-76.el9_5.6.noarch.rpm 25cfb3e83f562ae117c0f5dad201a89955851ed61c12805f47411c586d430adf fence-agents-kubevirt-4.10.0-76.el9_5.6.x86_64.rpm 5d2a8508aa33a6479d600d6efb537e1a8a7c9fd8834943a42b601f64062cc4d6 fence-agents-virsh-4.10.0-76.el9_5.6.noarch.rpm 0ca3334e5bf88e6daf310dd09b89cdbb8ec4ef5d37f85eb77608f8474de8aecc fence-virt-4.10.0-76.el9_5.6.x86_64.rpm bf7dd02bfd5d8a81527289b8212af9418fc6e9dc8974626cc061309c530b115c fence-virtd-4.10.0-76.el9_5.6.x86_64.rpm e3aa48ec3645983a36dbf59d3862affc068b965e492f8cc9293c48e4c7aef21c fence-virtd-cpg-4.10.0-76.el9_5.6.x86_64.rpm 491c394e597e8c7ec123751e0546d35a9b67914977dd32b9006bca18f8866cd3 fence-virtd-libvirt-4.10.0-76.el9_5.6.x86_64.rpm b85b18d666b957f3b09fe4fc99ea17366a57b76a90828f92b90ee265330bc256 fence-virtd-multicast-4.10.0-76.el9_5.6.x86_64.rpm ef283bd2322d87d0236adb9f6bf9910db073d63de7a6d29a05d91287b864c75f fence-virtd-serial-4.10.0-76.el9_5.6.x86_64.rpm ec1cf2bd753800030cab1e8c79adade5c47ad6501b0cfa189d2e0500529d6e0e fence-virtd-tcp-4.10.0-76.el9_5.6.x86_64.rpm 1752742181b84ffa4f086afbacac5a069b226817dddd548a3190e4bf826be56e RLSA-2025:3344 Important: grafana security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for grafana. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing (CVE-2025-30204) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms grafana-10.2.6-9.el9_5.x86_64.rpm b49bd0c2a45b4b5ce54544d9276d248b1911e2e9043180c223bb6af9a46bb0ae grafana-selinux-10.2.6-9.el9_5.x86_64.rpm dd13d3d6e9ed0c34d1434fbcd34bc17ada464c926ce0f9e7e409adb73b6a53b1 RLSA-2025:3713 Important: webkit2gtk3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44192) * webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-54467) * webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54551) * webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack (CVE-2025-24208) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24209) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24216) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-30427) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.48.1-1.el9_5.i686.rpm 09ad8896315f233ba0f9bfbc07951ddab5abb7f08ef74aaaa1fa70a997b0ada1 webkit2gtk3-2.48.1-1.el9_5.x86_64.rpm 177734562a0ffa5f3f09dde52e7ad228d5690caaff1a6b2542c4c83e09b645c2 webkit2gtk3-devel-2.48.1-1.el9_5.i686.rpm f609ec8203ef898e313f1e2ed8af35c686d903f2898b7ae9399c12f8b199b8b0 webkit2gtk3-devel-2.48.1-1.el9_5.x86_64.rpm ca01e96c67e5fea3ef494f375d3947c37e8345de6f215a1398a1c8535f2a3ee9 webkit2gtk3-jsc-2.48.1-1.el9_5.i686.rpm 47c6bdfa9204b037c6eb4276115b416d1f63c1d666677f892b7ee1190fd2398f webkit2gtk3-jsc-2.48.1-1.el9_5.x86_64.rpm baf3b7ecfda5a32fe41ad401f284c2458e9edcfa1205800811197602f17d9415 webkit2gtk3-jsc-devel-2.48.1-1.el9_5.i686.rpm 08778da4290e9ef2fd89e3cdbf23cbbe2b9c33d032790738aa24182afd81f398 webkit2gtk3-jsc-devel-2.48.1-1.el9_5.x86_64.rpm d73519f4ea3a5b303c861d1c7389e140ff28e656923d9f38b8127cbe14d59385 RLSA-2025:4443 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Privilege escalation in Firefox Updater (CVE-2025-2817) * firefox: thunderbird: Unsafe attribute access during XPath parsing (CVE-2025-4087) * firefox: thunderbird: Process isolation bypass using "javascript:" URI links in cross-origin frames (CVE-2025-4083) * firefox: thunderbird: Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10 (CVE-2025-4091) * firefox: thunderbird: Memory safety bug fixed in Firefox ESR 128.10 and Thunderbird 128.10 (CVE-2025-4093) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-128.10.0-1.el9_5.x86_64.rpm ea07422540a0301c39afe8fe4d6af23036edc4d000bef5351c548bf5063e5606 firefox-x11-128.10.0-1.el9_5.x86_64.rpm 92115e9f925ddf5610004578442fb5dd47a1bcb139a35df15a6db53ad42fe57c RLSA-2025:4492 Moderate: qemu-kvm security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for qemu-kvm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Security Fix(es): * QEMU: virtio-net: stack buffer overflow in virtio_net_flush_tx() (CVE-2023-6693) * qemu-kvm: net: assertion failure in update_sctp_checksum() (CVE-2024-3567) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms qemu-guest-agent-9.0.0-10.el9_5.3.x86_64.rpm a2366ab92599dc8294aff24fc24a3fadbad218f0596a215fda67dd640900dbf7 qemu-img-9.0.0-10.el9_5.3.x86_64.rpm c8484256286b782786b8605d79da69d3ffdad8b0b098c92bd5cca4853bbf7b9d qemu-kvm-9.0.0-10.el9_5.3.x86_64.rpm 1681c3d80c70b50aa45b25ee0d899fc54c2fddcfb4f50fc434eaffe67ff088a1 qemu-kvm-audio-pa-9.0.0-10.el9_5.3.x86_64.rpm d8b5190833cb501851c521816d61cb80f2c8b141a954ad4772ab5d45dc314561 qemu-kvm-block-blkio-9.0.0-10.el9_5.3.x86_64.rpm 136b1d85015b955a58c3c30e41c9565869a2ae27ccb4e8843d1a91c5418eaa48 qemu-kvm-block-curl-9.0.0-10.el9_5.3.x86_64.rpm 5b8cd58f70c3b58d92aeb8da64cd9014cdfce6ccbe60d0f06ebc5b14ef2d42a4 qemu-kvm-block-rbd-9.0.0-10.el9_5.3.x86_64.rpm 3236788bc018fc69dfa7e766b544e8be3a8ddef4fb6933ed0141d115afa9869d qemu-kvm-common-9.0.0-10.el9_5.3.x86_64.rpm 3dba6cdd66b3b5ddaf1419f7a36cf3df8536d79cd5da7a7ad02467f1d08e3006 qemu-kvm-core-9.0.0-10.el9_5.3.x86_64.rpm 648ab321aa2eba1063d5594d2e9975dca19008f227d754df72596779dd8416ab qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9_5.3.x86_64.rpm 5ebe3c6e98d9723bd553bca09a29bd79fbde84ca2a3558c654d137483cc93397 qemu-kvm-device-display-virtio-gpu-pci-9.0.0-10.el9_5.3.x86_64.rpm 10b41cc1c2c689c69b1a975ccc8e2f7b9996baeeb503393342d7055f69b1961d qemu-kvm-device-display-virtio-vga-9.0.0-10.el9_5.3.x86_64.rpm 465f4c2e11afb8a209a7033c41a8c696e42afff38f59407e291a9a6449b243cc qemu-kvm-device-usb-host-9.0.0-10.el9_5.3.x86_64.rpm db7fb377de4757758ca6dbfed0e2ab8ea8fa8cbb00078b635c624b5ad8a2d942 qemu-kvm-device-usb-redirect-9.0.0-10.el9_5.3.x86_64.rpm 77dbf2b5842e4b584390ce262418234cedf1bc60df00f9c37eb7553d66fbe85e qemu-kvm-docs-9.0.0-10.el9_5.3.x86_64.rpm 1d67febbec318222714360b87e1f22a0eb9f3622e08f9c5c60180dc00ee1d9a8 qemu-kvm-tools-9.0.0-10.el9_5.3.x86_64.rpm 75f021791217edbb475910bbf0a7c2452d2ac5b841b04b06e8e048fc82a91518 qemu-kvm-ui-egl-headless-9.0.0-10.el9_5.3.x86_64.rpm 968f32ce88710f49b61a23fa6978ebabb52abdfa9583db8c3542f3a568a1d49a qemu-kvm-ui-opengl-9.0.0-10.el9_5.3.x86_64.rpm bd568d822ff312679ceb23700ee6f10cb826adf3ab31e9c15df448cf68d72f5b qemu-pr-helper-9.0.0-10.el9_5.3.x86_64.rpm 25c698ab3a4ad95bd41b8c9b1c3816fb9d73f82ced02978671a86d618ad4474a RLSA-2025:7387 Important: webkit2gtk3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44192) * webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-54467) * webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54551) * webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack (CVE-2025-24208) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24209) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24216) * webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-30427) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.48.1-1.el9_5.i686.rpm 09ad8896315f233ba0f9bfbc07951ddab5abb7f08ef74aaaa1fa70a997b0ada1 webkit2gtk3-2.48.1-1.el9_5.x86_64.rpm 177734562a0ffa5f3f09dde52e7ad228d5690caaff1a6b2542c4c83e09b645c2 webkit2gtk3-devel-2.48.1-1.el9_5.i686.rpm f609ec8203ef898e313f1e2ed8af35c686d903f2898b7ae9399c12f8b199b8b0 webkit2gtk3-devel-2.48.1-1.el9_5.x86_64.rpm ca01e96c67e5fea3ef494f375d3947c37e8345de6f215a1398a1c8535f2a3ee9 webkit2gtk3-jsc-2.48.1-1.el9_5.i686.rpm 47c6bdfa9204b037c6eb4276115b416d1f63c1d666677f892b7ee1190fd2398f webkit2gtk3-jsc-2.48.1-1.el9_5.x86_64.rpm baf3b7ecfda5a32fe41ad401f284c2458e9edcfa1205800811197602f17d9415 webkit2gtk3-jsc-devel-2.48.1-1.el9_5.i686.rpm 08778da4290e9ef2fd89e3cdbf23cbbe2b9c33d032790738aa24182afd81f398 webkit2gtk3-jsc-devel-2.48.1-1.el9_5.x86_64.rpm d73519f4ea3a5b303c861d1c7389e140ff28e656923d9f38b8127cbe14d59385 RLSA-2025:4787 Moderate: emacs security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for emacs. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news. Security Fix(es): * emacs: arbitrary code execution via Lisp macro expansion (CVE-2024-53920) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms emacs-27.2-11.el9_5.2.x86_64.rpm 4db2921e83c2392cba48692f55ea579407926fcdbc3b58e019e533a654492314 emacs-common-27.2-11.el9_5.2.x86_64.rpm 0c56a6da81490bfd798cafebf5617c55e991730ef04d76aa466f42a537723491 emacs-filesystem-27.2-11.el9_5.2.noarch.rpm ab4236bc25f78caf03c02b010d5473b72994b44f4c2914d95033491c8ef7e2a4 emacs-lucid-27.2-11.el9_5.2.x86_64.rpm 0dd479077927d780f907390d3c3f1611c993cae6a942d6954f63efcd0a05c277 emacs-nox-27.2-11.el9_5.2.x86_64.rpm 146d9cac21322b3ea9acc316587fc261511a4e5b520189d9d33a26c24bbe8388 RLSA-2025:7435 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * thunderbird: User Interface (UI) Misrepresentation of attachment URL (CVE-2025-3523) * thunderbird: Information Disclosure of /tmp directory listing (CVE-2025-2830) * thunderbird: Leak of hashed Window credentials via crafted attachment URL (CVE-2025-3522) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-128.10.0-1.el9_5.x86_64.rpm 3c345da09047edaf7e2c5611514829eea3374e7fd4a34db1429bd9dd87c555d8 RLSA-2025:7428 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for firefox. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Privilege escalation in Firefox Updater (CVE-2025-2817) * firefox: thunderbird: Unsafe attribute access during XPath parsing (CVE-2025-4087) * firefox: thunderbird: Process isolation bypass using "javascript:" URI links in cross-origin frames (CVE-2025-4083) * firefox: thunderbird: Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10 (CVE-2025-4091) * firefox: thunderbird: Memory safety bug fixed in Firefox ESR 128.10 and Thunderbird 128.10 (CVE-2025-4093) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms firefox-128.10.0-1.el9_5.x86_64.rpm ea07422540a0301c39afe8fe4d6af23036edc4d000bef5351c548bf5063e5606 firefox-x11-128.10.0-1.el9_5.x86_64.rpm 92115e9f925ddf5610004578442fb5dd47a1bcb139a35df15a6db53ad42fe57c RLSA-2025:4460 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: thunderbird: Privilege escalation in Firefox Updater (CVE-2025-2817) * firefox: thunderbird: Unsafe attribute access during XPath parsing (CVE-2025-4087) * firefox: thunderbird: Process isolation bypass using "javascript:" URI links in cross-origin frames (CVE-2025-4083) * firefox: thunderbird: Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10 (CVE-2025-4091) * firefox: thunderbird: Memory safety bug fixed in Firefox ESR 128.10 and Thunderbird 128.10 (CVE-2025-4093) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-128.10.0-1.el9_5.x86_64.rpm 3c345da09047edaf7e2c5611514829eea3374e7fd4a34db1429bd9dd87c555d8 RLSA-2022:5948 Moderate: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for mysql-selinux, mariadb, galera. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a later upstream version: galera (26.4.11), mariadb (10.5.16), mysql-selinux (1.0.5). Security Fix(es): * mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used (CVE-2021-46669) * mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer (CVE-2022-24048) * mariadb: lack of validating the existence of an object prior to performing operations on the object (CVE-2022-24050) * mariadb: lack of proper validation of a user-supplied string before using it as a format specifier (CVE-2022-24051) * mariadb: CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability (CVE-2022-24052) * mariadb: assertion failure in Item_args::walk_arg (CVE-2022-27376) * mariadb: use-after-poison when complex conversion is involved in blob (CVE-2022-27377) * mariadb: server crash in create_tmp_table::finalize (CVE-2022-27378) * mariadb: server crash in component arg_comparator::compare_real_fixed (CVE-2022-27379) * mariadb: server crash at my_decimal::operator= (CVE-2022-27380) * mariadb: server crash at Field::set_default via specially crafted SQL statements (CVE-2022-27381) * mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order (CVE-2022-27382) * mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c (CVE-2022-27383) * mariadb: crash via component Item_subselect::init_expr_cache_tracker (CVE-2022-27384) * mariadb: server crashes in query_arena::set_query_arena upon SELECT from view (CVE-2022-27386) * mariadb: assertion failures in decimal_bin_size (CVE-2022-27387) * mariadb: crash when using HAVING with NOT EXIST predicate in an equality (CVE-2022-27444) * mariadb: assertion failure in compare_order_elements (CVE-2022-27445) * mariadb: crash when using HAVING with IS NULL predicate in an equality (CVE-2022-27446) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27447) * mariadb: crash in multi-update and implicit grouping (CVE-2022-27448) * mariadb: assertion failure in sql/item_func.cc (CVE-2022-27449) * mariadb: crash via window function in expression in ORDER BY (CVE-2022-27451) * mariadb: assertion failure in sql/item_cmpfunc.cc (CVE-2022-27452) * mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING (CVE-2022-27455) * mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc (CVE-2022-27456) * mariadb: incorrect key in "dup value" error after long unique (CVE-2022-27457) * mariadb: use-after-poison in Binary_string::free_buffer (CVE-2022-27458) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31622) * mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc (CVE-2022-31623) * mariadb: Crash executing query with VIEW, aggregate and subquery (CVE-2021-46659) * mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) (CVE-2021-46661) * mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements (CVE-2021-46663) * mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr (CVE-2021-46664) * mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations (CVE-2021-46665) * mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements (CVE-2021-46668) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms galera-26.4.11-1.el9_0.x86_64.rpm be8e0004017ead821c09dd4d96caa34af82dadecb520f290aaad6030ea35ed66 mariadb-10.5.16-2.el9_0.x86_64.rpm 8834aa6d622ab64a22234e2f045f22f6e0330ea957550901150a3a4d60d3ac0d mariadb-backup-10.5.16-2.el9_0.x86_64.rpm 8e553970a520e0e779c66b51f56e088434b1796059e3dc57a148de1fb4593e22 mariadb-common-10.5.16-2.el9_0.x86_64.rpm f774514657c4fbd6987f0d341529950e4a23fa7371a63e30c94a3c9dbfb96948 mariadb-embedded-10.5.16-2.el9_0.x86_64.rpm d03f1b8eaae455a6da4af82164282edbe47fc5eb5cb59df882dd434703bacc87 mariadb-errmsg-10.5.16-2.el9_0.x86_64.rpm 017756d95c87df2b4e987df03be570c1f2e73aa5c7720e50e245975d2a08fc4a mariadb-gssapi-server-10.5.16-2.el9_0.x86_64.rpm 5fa9f2e2b8b96dc639b869f8f1381ce0e6b1af0aa4d716e4c716c827ec0e141a mariadb-oqgraph-engine-10.5.16-2.el9_0.x86_64.rpm 6c4342de09226eb2d9376f7fb3100b461bac03369ad84af3f3a625e5d495fd0d mariadb-pam-10.5.16-2.el9_0.x86_64.rpm 8a60b6f0162c1783e20718ad949a7e4ada40220ba5e02080420cc25ebeb7ea73 mariadb-server-10.5.16-2.el9_0.x86_64.rpm 89f0325781e8f4a360f37828d38d41d35afa7e413fee01356a064f6b98128a1a mariadb-server-galera-10.5.16-2.el9_0.x86_64.rpm 2de215b7a47169ee0b6bec71ffdbcbf8d9f91fbc2c1f1b58f1ee31660a4af634 mariadb-server-utils-10.5.16-2.el9_0.x86_64.rpm 7b98204667205e2108a8c93ef2893f53922e9e2ad9b639703ed35e8979ac0de9 mysql-selinux-1.0.5-1.el9_0.noarch.rpm 3eb39d87c5a04055a947b1bc7800521d9dcc6b405189e53201e3f79716a680d7 RLSA-2023:0334 Important: kernel security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959) * kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964) * kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139) * kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945) * kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077) * kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Intel 9.2: Important iavf bug fixes (BZ#2127884) * vfio zero page mappings fail after 2M instances (BZ#2128514) * nvme-tcp automatic reconnect fails intermittently during EMC powerstore NDU operation (BZ#2131359) * ice: Driver Update to 5.19 (BZ#2132070) * WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134588) * drm: duplicated call of drm_privacy_screen_register_notifier() in drm_connector_register() (BZ#2134619) * updating the appid field through sysfs is returning an -EINVAL error (BZ#2136914) * DELL EMC: System is not booting into RT Kernel with perc12. (BZ#2139213) * No signal showed in the VGA monitor when installing Rocky Linux9 in the legacy bios mode (BZ#2140153) * Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142168) * ppc64le: unexpected oom panic when there's enough memory left in zswap test (BZ#2143976) * fatal error: error in backend: Branch target out of insn range (BZ#2144902) * AMdCLIENT: The kernel command line parameter "nomodeset" not working properly (BZ#2145217) * Azure: PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150910) * Azure z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2151605) * DELL 9.0 RT - On PE R760 system, call traces are observed dmesg when system is running stress (BZ#2154407) rocky-linux-9-x86-64-appstream-rpms kernel-debug-devel-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm d7078b07a7d3258bce301881d95cd531ff4bf1738589e0a8eea3c2d613ccd242 kernel-debug-devel-matched-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm 67aa047e3741025beed60b1174d9b45adff970ee7a205d258536d1618223c768 kernel-devel-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm 6e452933e721e2eb77ae23d9f06c570b204bccd4b84e2cd3ee217550e57c5486 kernel-devel-matched-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm 8e5998e8aa9b0dedbaf2bc9ecb5901e31b225ed4865a32958f1c596176467cde kernel-doc-5.14.0-162.12.1.el9_1.0.2.noarch.rpm a30caac1765a17513658b6ae7859056fef19c282f1e637deba66186dbf46279d kernel-headers-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm 716500404c0b33b144109d2f2a970799ed5b1df3bedc8047d4c80ff291c64ba6 perf-5.14.0-162.12.1.el9_1.0.2.x86_64.rpm 08e73b8611cb057252192d7d645427449a8014b78ec0368105fdb8c7b4fff82d RLEA-2022:7320 ostree bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for ostree. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OSTree is a tool for managing bootable, immutable, versioned file system trees. Bug Fix(es) and Enhancement(s): * Update ostree to latest upstream version 2022.5 (BZ#2127868) rocky-linux-9-x86-64-appstream-rpms ostree-2022.5-1.el9.i686.rpm 23a185b07b0cc39438e7b90bbcce197cefa9f7d1cb3acf46c179a557721dfa7c ostree-2022.5-1.el9.x86_64.rpm 6af184ec89b61e57aab331e065d125e27d15acefbbeb79275ade48b7d26b48ca ostree-grub2-2022.5-1.el9.x86_64.rpm 270c8f82d1dc25fe3fa7c2d256e93e9108043a42ef698b2d593426f78330f23e ostree-libs-2022.5-1.el9.i686.rpm d41157f436cb396a2e666626b3de7701482976c82050e467b872222b5ff6402a ostree-libs-2022.5-1.el9.x86_64.rpm 01fb60886745eceaf7b7237d433a21a1d7312c974e7528554dbb1ffdadaad3fc RLBA-2022:7963 rsyslog bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rsyslog. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms rsyslog-8.2102.0-105.el9.x86_64.rpm 40d277dc72563d90b6e82079f04f4d6a4653950d5ae55fe46f3c1fc5cc5cecf3 rsyslog-crypto-8.2102.0-105.el9.x86_64.rpm 52eca00cef8ae9eef680e2f0dde997903a77b06e44e0c60b738297efed94b336 rsyslog-doc-8.2102.0-105.el9.noarch.rpm dcd300c713a8e80758e2a66bdf3159b05c88fc89f888d65aad66e6d89531aa10 rsyslog-elasticsearch-8.2102.0-105.el9.x86_64.rpm 2f08e016bc39898340c0eee4616fc1a6416f453435e2a454731e1f0a39549f14 rsyslog-gnutls-8.2102.0-105.el9.x86_64.rpm cca1d79ee0fdbdda374ae074758432dcf0eceeaff0002c28496cd12442ecbbb1 rsyslog-gssapi-8.2102.0-105.el9.x86_64.rpm 26e137487a6fad618adbe465d50c8439107ba6ba8ee6040c8c0b5cae3b0d36c8 rsyslog-kafka-8.2102.0-105.el9.x86_64.rpm 26510e4ab13f07861198b2d21073b4198aaeda888060d96998bb7e9a1a495cda rsyslog-logrotate-8.2102.0-105.el9.x86_64.rpm 712f6ea374a8173ad38a7c00c4692b23c16792807df882fc137a4143a1efd05b rsyslog-mmaudit-8.2102.0-105.el9.x86_64.rpm 4439b4921a61a45ac1f89140cb26a82de701d0165c2fa18513b0a700d78240b0 rsyslog-mmfields-8.2102.0-105.el9.x86_64.rpm e3832b65c84ea368104b0be39aacf148cf302ff813765c941369acb431baa928 rsyslog-mmjsonparse-8.2102.0-105.el9.x86_64.rpm 31fb268be07a9805114100282a9cf69ff97ca062078a734c942cb64e9f8e1c8f rsyslog-mmkubernetes-8.2102.0-105.el9.x86_64.rpm 52adbb316dc9d727dd46a41ceec4843087f9c0ec972ac8e99a024a0502dc9c13 rsyslog-mmnormalize-8.2102.0-105.el9.x86_64.rpm 5e82f452580c16e19d870eb0fcc45e6cbac69a6a14759b1245a99bcf6e1d4dd1 rsyslog-mmsnmptrapd-8.2102.0-105.el9.x86_64.rpm 2b89ac3fdc9bb98c91b040a1912ccdc2c4732d0d932d47b95dff87b09bae6455 rsyslog-mysql-8.2102.0-105.el9.x86_64.rpm 807854568e2c2cd18cddf99ee0a993f58b42224ce511224c57cb7881188a0308 rsyslog-omamqp1-8.2102.0-105.el9.x86_64.rpm baf508f9a9ecb32817c2228d20a561644db795e8f5c633bd02e43e15c195d95b rsyslog-openssl-8.2102.0-105.el9.x86_64.rpm a20e1697e01fa0a7943b202bde643d8acbb27dcc2f2df79fff7dfa128a71f09f rsyslog-pgsql-8.2102.0-105.el9.x86_64.rpm 74b6956f7dc8838f6579ffb92f70e5f530fe117d16ce086ed8346093e3bef9cb rsyslog-relp-8.2102.0-105.el9.x86_64.rpm a85071a7891308b41b18d219088f8173f799e1a8d214270aa3b51b0c0a6aa1ae rsyslog-snmp-8.2102.0-105.el9.x86_64.rpm 82acb6094da9c89b361ed04e3e08b42929770492f9d414c9e718acaa2e348c9f rsyslog-udpspoof-8.2102.0-105.el9.x86_64.rpm 00f5f9a69400796877abb7c5bf068fb968d4c83231e675298f6d220c3af1bb8a RLEA-2022:8056 cloud-init bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for cloud-init. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms cloud-init-22.1-5.el9.0.1.noarch.rpm 48a72ce9513d28c13d9f123b03a052bd85bcdf4649719d633fa289156fcccf9d RLBA-2022:8127 corosync bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for corosync. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-appstream-rpms corosynclib-3.1.5-4.el9.i686.rpm 08f828de0bc93e38adddca4a33e68935c94fe7eeeeafd4614b38b50951306f0c corosynclib-3.1.5-4.el9.x86_64.rpm e243d3ef9369bcce3e44bb51c65c093272f0ea214e0718c0bfbba1f60b363c5a RLBA-2022:8898 thunderbird:flatpak bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. Bug Fix(es) and Enhancement(s): * Update thunderbird:flatpak module stream for Thunderbird 102.5 release (JIRA:Rocky LinuxPLAN-137720) rocky-linux-9-x86-64-appstream-rpms dbus-glib-0.110-13.el9.x86_64.rpm bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071 dbus-glib-devel-0.110-13.el9.x86_64.rpm 78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756 libsbc-1.4-9.el9.x86_64.rpm b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd mozilla-filesystem-1.9-30.el9.x86_64.rpm 725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742 sbc-1.4-9.el9.x86_64.rpm 94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1 RLSA-2023:0005 Important: bcel security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for bcel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Byte Code Engineering Library (Apache Commons BCEL) is intended to give users a convenient way to analyze, create, and manipulate (binary) Java class files (those ending with .class). Security Fix(es): * Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing (CVE-2022-42920) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms bcel-6.4.1-9.el9_1.noarch.rpm 0c006b32e4b485fdcadf6c6e79a97aaa7dacba4cc46b097566eb8609e3ee6be9 RLBA-2023:0006 thunderbird:flatpak bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for mozilla-filesystem, sbc, dbus-glib. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. Bug Fix(es) and Enhancement(s): * Update thunderbird:flatpak module stream for Thunderbird 102.6 release (JIRA:Rocky LinuxPLAN-141433) rocky-linux-9-x86-64-appstream-rpms dbus-glib-0.110-13.el9.x86_64.rpm bdbbb3f7e140ae24a17c4d3d2ae0d565e716bbfeb169f008547d730f83cf4071 dbus-glib-devel-0.110-13.el9.x86_64.rpm 78ffcf6fc266cdf3cc986336288643c9c2471f2b1993426d407142ff6d78c756 libsbc-1.4-9.el9.x86_64.rpm b886d01338daa1194b436625065a520ff49d09c23112d286af540136dc8ed4cd mozilla-filesystem-1.9-30.el9.x86_64.rpm 725877c749fbfb51edb76a5bc01effbcfacd22e74e58037d2e96b6d703b10742 sbc-1.4-9.el9.x86_64.rpm 94d0418adf1505229dd49c1a334b48d3b928dd3bc43a76856d0e061094ec67c1 RLSA-2023:0021 Important: webkit2gtk3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for webkit2gtk3. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Security Fix(es): * webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms webkit2gtk3-2.36.7-1.el9_1.1.i686.rpm d66140c17b00905d7cc3e1bb1b8accd1a2ff6984dfcc13b4edb71c4feb88a360 webkit2gtk3-2.36.7-1.el9_1.1.x86_64.rpm f0337b6a542d8490b4055085a410002b97816f77a6848b1ee9ab6ca4936d2795 webkit2gtk3-devel-2.36.7-1.el9_1.1.i686.rpm ee61e1f6f58f8c423729f54d04ea7b077010e16f95c94be74708dfe31c9ba439 webkit2gtk3-devel-2.36.7-1.el9_1.1.x86_64.rpm b5ad594ef098744c9206721575a3951f51267b1e0a9e7da04eee2e53717b0496 webkit2gtk3-jsc-2.36.7-1.el9_1.1.i686.rpm 43015e9befacaf0c15a755cb23e5a9427067cc7a8d358a7dc37330327cc7d6f3 webkit2gtk3-jsc-2.36.7-1.el9_1.1.x86_64.rpm 543eaaa8d15ca0dd684eacb50159cf7d311144f917bbfcfd1be4102f2e7c551b webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.i686.rpm 671374d9f7638dc5fb4917123a9496d1049f933fcebcfb1c7965d8279bae25a5 webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.x86_64.rpm 29d7357c4930ac980b264beee3330b528533ecc49c1e116a366c1e88aba703ca RLSA-2023:0202 Moderate: java-11-openjdk security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-11-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) [Rocky Linux-9] (BZ#2157798) rocky-linux-9-x86-64-appstream-rpms java-11-openjdk-11.0.18.0.10-2.el9_1.x86_64.rpm 60c900e0e70ad2aa113168d0ad1248e227f72765f35f2ccbfecd7332a0556521 java-11-openjdk-demo-11.0.18.0.10-2.el9_1.x86_64.rpm 6ff16801bfc4f869f374a422c0d63f76704b5c2b9381283f7d61a26b5588cc3d java-11-openjdk-devel-11.0.18.0.10-2.el9_1.x86_64.rpm d5a8739a6eac143ec2e0ee514ef2b75c99bc9537193611e89e16266ce6b5b735 java-11-openjdk-headless-11.0.18.0.10-2.el9_1.x86_64.rpm 80e3bf567d65b724252354970f420896b5e7fdfb9a061d11f2d9e50357b6af84 java-11-openjdk-javadoc-11.0.18.0.10-2.el9_1.x86_64.rpm a6dc49895a69a59fe8b17e4950e71ddfce4631ff1a6917ea4e6e0f1d126d1081 java-11-openjdk-javadoc-zip-11.0.18.0.10-2.el9_1.x86_64.rpm efeee81819c8be95606f0332b03e9bf263eca50ed3680e76e54ccc500b4ac37f java-11-openjdk-jmods-11.0.18.0.10-2.el9_1.x86_64.rpm 4c9a4b8f28722695dcce618d2206825054f21c03c3f5b78d749a837610a82fb5 java-11-openjdk-src-11.0.18.0.10-2.el9_1.x86_64.rpm 130807833f20785a8d94a8f3f2e9140a43b28cbd2b2fb0e4878ec7241855ded2 java-11-openjdk-static-libs-11.0.18.0.10-2.el9_1.x86_64.rpm 7f3dad478f4df0733595a39a172e3fef8a32c9bbc47632cc7a5a300b6aab126c RLSA-2023:0336 Moderate: systemd security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for systemd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd: buffer overrun in format_timespan() function (CVE-2022-3821) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms systemd-devel-250-12.el9_1.1.i686.rpm 921151c64773074869b8df7f17977e220c78b208d5b2148198755ec8cfd9f3fd systemd-devel-250-12.el9_1.1.x86_64.rpm 9561845b251615a5715cf19ae5ac180cf2f72cfd4b93e6472db40a1663802123 systemd-journal-remote-250-12.el9_1.1.x86_64.rpm f3d437b037773dcea88ddf212091b9a55471acb33169138759be996306050b81 RLSA-2023:0337 Moderate: expat security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for expat. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate (CVE-2022-43680) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms expat-devel-2.4.9-1.el9_1.1.i686.rpm d56de768135c8173e1a48fd540d0d95c0e6f222c8ace97b3065c3bca57c2f615 expat-devel-2.4.9-1.el9_1.1.x86_64.rpm 442a1d6ce6f18fe5e24d2816d8781dd54885432cf72a77f0ab3945a68117049b RLSA-2023:0338 Moderate: libxml2 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libxml2. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303) * libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libxml2-devel-2.9.13-3.el9_1.i686.rpm 276956a8fbe2b1be327e2c1dd4357fedf3846313365a713e824d8872d988a33f libxml2-devel-2.9.13-3.el9_1.x86_64.rpm c53a522fe38db759678ab1c634127868fd516b781880dedee75aba109041fc7e RLSA-2023:0339 Moderate: sqlite security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for sqlite. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API (CVE-2022-35737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms sqlite-3.34.1-6.el9_1.i686.rpm 9458e0539f8508ed7927ad6fcca5e7d84c0dda4eedfd34c8326a370f3c6c4bc6 sqlite-3.34.1-6.el9_1.x86_64.rpm b5a603b09425c50ed52067c2bd2fa866a68ac39a1b17086d6ce08fce1e37aa99 sqlite-devel-3.34.1-6.el9_1.i686.rpm b59bc71172106a4722b36a0ea4d84fdd432af6c50df42c544533d9f60b6478af sqlite-devel-3.34.1-6.el9_1.x86_64.rpm e7949f7b0eb0ff292616f0efb3044ebf2f02b49c1123df64ffb08e6d2cf2bfd1 RLBA-2023:0341 iputils bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for iputils. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iputils packages contain basic utilities for monitoring a network, including ping. Bug Fix: * annocheck reports that no compiled code found in /usr/bin and /usr/sbin (BZ#2147538) rocky-linux-9-x86-64-appstream-rpms iputils-ninfod-20210202-8.el9_1.1.x86_64.rpm b968204aca3bf61196bace1dd638d5f3bd6426aa625f14d182264e9719c05463 RLBA-2023:0342 glibc bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for glibc. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Bug Fix: * glibc: Restore IPC_64 support in sysvipc *ctl functions (BZ#2142111) rocky-linux-9-x86-64-appstream-rpms glibc-devel-2.34-40.el9_1.1.i686.rpm 809dcfd1bb41816d5633c66b90ac759cbb40cdb33cff1c52bb1b114b0956e55c glibc-devel-2.34-40.el9_1.1.x86_64.rpm 7e7b8ccf16deb632f4d20b56b0a6eda9704c6255b2c04386b9d4e65ad378fe7a glibc-doc-2.34-40.el9_1.1.noarch.rpm 1f147fbfd881a31bce8bca9620c16d73535f1a52f5055fe1c686f3fd76af8fab glibc-headers-2.34-40.el9_1.1.x86_64.rpm c4edb39982fbcd3975b254a378b452ea1d73b94f8db90b01027c749c749a9e17 glibc-locale-source-2.34-40.el9_1.1.x86_64.rpm 045c95d9ff47011ee0225aea5115ddbe42fea8c3bc129b9c0d3cb2fea1a7a7e3 glibc-utils-2.34-40.el9_1.1.x86_64.rpm be083837ee6d4762cde490f3b9cce8421f1f0d2d3d79611e7ec8df1a540d0d7a RLSA-2023:0343 Moderate: libtasn1 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for libtasn1. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions. Security Fix(es): * libtasn1: Out-of-bound access in ETYPE_OK (CVE-2021-46848) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libtasn1-devel-4.16.0-8.el9_1.i686.rpm 454331c78e2a86c9bd8ddd28782a95dc8aa2e5309a9efd16d014f67c28e8aed8 libtasn1-devel-4.16.0-8.el9_1.x86_64.rpm f38461f7aab8690eab2da2769a10e23e4f7a1b28fc457ccd5879f4c321217ead libtasn1-tools-4.16.0-8.el9_1.x86_64.rpm be199dfca1202d1be55af3d09ff746d9f408f648785e5e29c6450c0de1d7016a RLBA-2023:0345 authselect bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for authselect. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The authselect package configures authentication and identity sources from supported profiles. Bug Fix: * change the default password encryption algorithm back to sha512 (BZ#2151230) rocky-linux-9-x86-64-appstream-rpms authselect-compat-1.2.5-2.el9_1.x86_64.rpm 829b7652bdd4b2aa1d417ef8efb8a7ed3bf2d1ea114825069cef2168c8ad98ab RLBA-2023:0347 sssd bug fix and enhancement update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for sssd. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139870) * SSS_CLIENT: fix thread unsafe access to get*ent structs. (BZ#2141830) * SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142960) * UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148988) * authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152884) rocky-linux-9-x86-64-appstream-rpms sssd-idp-2.7.3-4.el9_1.3.x86_64.rpm eccbe135e9df9e1c11bb358bf5acec78bb2b12d26be98a1e013a3170e3efce1d RLSA-2023:0383 Important: libXpm security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for libXpm. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list X.Org X11 libXpm runtime library. Security Fix(es): * libXpm: compression commands depend on $PATH (CVE-2022-4883) * libXpm: Runaway loop on width of 0 and enormous height (CVE-2022-44617) * libXpm: Infinite loop on unclosed comments (CVE-2022-46285) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms libXpm-3.5.13-8.el9_1.i686.rpm a9c83e719598aaf946066c421263447564772c3de2fc7d394e9bf2914d895cb9 libXpm-3.5.13-8.el9_1.x86_64.rpm 33892f7917599d8a7581ab7f44e30fa06e777abf9ea17962df937a96929d2a1e libXpm-devel-3.5.13-8.el9_1.i686.rpm 71fe586c8935e14575a62cfff52a085682481d580c0efb6a3a98da8ea8e5672b libXpm-devel-3.5.13-8.el9_1.x86_64.rpm 5a6693ca796b7e5e33f5a9d723f6c024992ebba05538c81a33f05e778322128f RLSA-2023:0210 Moderate: java-1.8.0-openjdk security and bug fix update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for java-1.8.0-openjdk. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) [Rocky Linux-9] (BZ#2159912) * solr broken due to access denied ("java.io.FilePermission" "/etc/pki/java/cacerts" "read") [Rocky Linux-9, openjdk-8] (BZ#2163594) rocky-linux-9-x86-64-appstream-rpms java-1.8.0-openjdk-1.8.0.362.b09-2.el9_1.x86_64.rpm a19683ecb4cbc37da7f3273916a9fcc9a9e7cc375a322e8dc6d2b0bbb865d6cb java-1.8.0-openjdk-demo-1.8.0.362.b09-2.el9_1.x86_64.rpm 51a05b7182a83d97927c2d364cdda3f9f50706c60bf17a1794c90b61279272f7 java-1.8.0-openjdk-devel-1.8.0.362.b09-2.el9_1.x86_64.rpm acf9ddf9f4a969224b75b89703fadc0ee1ac7144009961923d8b4cb2e024e92b java-1.8.0-openjdk-headless-1.8.0.362.b09-2.el9_1.x86_64.rpm e66aeb439a1f2204e8b7275822e3da4856ba226636d91bd7a80765109a95437b java-1.8.0-openjdk-javadoc-1.8.0.362.b09-2.el9_1.noarch.rpm d0b1508c5af35809bd42f71964ba8678666e46383c04e6ce396bd2835144fe0f java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b09-2.el9_1.noarch.rpm ef7edb2fc10aee4785d45b3d152c5cf79a3fdbdad6e169ef8ee773cc29f8dfcc java-1.8.0-openjdk-src-1.8.0.362.b09-2.el9_1.x86_64.rpm c2d290ceb0c6b242252e9a950c6278e7936e0c6a1cf070358f644a541be77ba3 RLSA-2023:0476 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.7.1. Security Fix(es): * Mozilla: libusrsctp library out of date (CVE-2022-46871) * Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) * Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) * Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) * Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) * Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) * Mozilla: Fullscreen notification bypass (CVE-2022-46877) * Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-102.7.1-1.el9_1.x86_64.rpm b8efab098baa6845e2d591f54dd3e8fecd44c77fe6a16d0239972d7568084f02 RLSA-2023:0608 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for thunderbird. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.7.1. Security Fix(es): * Mozilla: Revocation status of S/Mime signature certificates was not checked (CVE-2023-0430) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-x86-64-appstream-rpms thunderbird-102.7.1-2.el9_1.x86_64.rpm 9a19eb5d598812f59d555f6c0588407309c085cf931767ee8eff0a9d2a21a6b4